wpa_supplicant v2.0 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'wlan0' conf 'wpa_networkers.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file 'wpa_networkers.conf' -> '//wpa_networkers.conf' Reading configuration file '//wpa_networkers.conf' Line: 2 - start of a new network block ssid - hexdump_ascii(len=10): 6e 65 74 77 6f 72 6b 65 72 73 networkers key_mgmt: 0x1 eap methods - hexdump(len=16): 00 00 00 00 19 00 00 00 00 00 00 00 00 00 00 00 identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel password - hexdump_ascii(len=10): [REMOVED] ca_cert - hexdump_ascii(len=22): 2f 72 6f 6f 74 63 61 2d 6e 65 74 77 6f 72 6b 65 /rootca-networke 72 73 2e 70 65 6d rs.pem phase1 - hexdump_ascii(len=11): 70 65 61 70 6c 61 62 65 6c 3d 30 peaplabel=0 phase2 - hexdump_ascii(len=13): 61 75 74 68 3d 4d 53 43 48 41 50 56 32 auth=MSCHAPV2 priority=10 (0xa) Priority group 10 id=0 ssid='networkers' WEXT: cfg80211-based driver detected wext: interface wlan0 phy: phy0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf capabilities: key_mgmt 0xf enc 0x1f flags 0x0 netlink: Operstate: linkmode=1, operstate=5 wlan0: Own MAC address: b4:74:9f:de:e4:0e wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0 Driver did not support SIOCSIWENCODEEXT wpa_driver_wext_set_countermeasures wlan0: RSN: flushing PMKID list in the driver wlan0: Setting scan request: 0 sec 100000 usec WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): 28 36 82 c6 8b 58 5b 88 ab d1 0e 1f eb 32 da 43 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized wlan0: Added interface wlan0 wlan0: State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 random: Got 16/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID Scan requested (ret=0) - scan timeout 10 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b19 len=16 wlan0: Event SCAN_RESULTS (3) received Scan results did not fit - trying larger buffer (8192 bytes) Scan results did not fit - trying larger buffer (16384 bytes) Received 13432 bytes of scan results (27 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 00:18:39:a1:f7:c9 SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wlan0: BSS: Add new id 1 BSSID 20:3a:07:97:15:72 SSID 'networkers' wlan0: BSS: Add new id 2 BSSID 20:3a:07:97:15:70 SSID 'networkers-data' wlan0: BSS: Add new id 3 BSSID 90:94:e4:35:57:ba SSID 'konarskiego 42' wlan0: BSS: Add new id 4 BSSID 00:12:2a:98:72:d8 SSID 'NETIASPOT-9872D0' wlan0: BSS: Add new id 5 BSSID f0:7d:68:8e:10:ce SSID '' wlan0: BSS: Add new id 6 BSSID 00:19:70:79:97:c8 SSID 'FAST3764-4279' wlan0: BSS: Add new id 7 BSSID 20:3a:07:97:15:71 SSID '\x00' wlan0: BSS: Add new id 8 BSSID 00:18:f8:3c:01:18 SSID 'piotrnet' wlan0: BSS: Add new id 9 BSSID c8:3a:35:27:59:70 SSID 'mani' wlan0: BSS: Add new id 10 BSSID 54:e6:fc:e8:c6:02 SSID 'Ukasz' wlan0: BSS: Add new id 11 BSSID 8c:e0:81:6b:de:44 SSID 'Livebox-DE44' wlan0: BSS: Add new id 12 BSSID 00:22:b0:93:8e:55 SSID 'namukai' wlan0: BSS: Add new id 13 BSSID d8:5d:4c:fa:2e:79 SSID 'Andriusza' wlan0: BSS: Add new id 14 BSSID 00:19:5b:b3:22:39 SSID 'MAJEX' wlan0: BSS: Add new id 15 BSSID 00:1f:33:33:99:48 SSID 'STELLA' wlan0: BSS: Add new id 16 BSSID 00:25:86:ce:7e:ae SSID 'Bors' wlan0: BSS: Add new id 17 BSSID 00:24:d1:70:92:b9 SSID 'UPC006086' wlan0: BSS: Add new id 18 BSSID 00:23:69:ab:ab:54 SSID 'link' wlan0: BSS: Add new id 19 BSSID c8:7b:5b:b9:3a:7d SSID 'lampart' wlan0: BSS: Add new id 20 BSSID 90:f6:52:fe:35:46 SSID 'comel427' wlan0: BSS: Add new id 21 BSSID 2c:e4:12:72:d5:37 SSID 'SAGEM_D536' wlan0: BSS: Add new id 22 BSSID 00:1c:4a:a5:c8:cb SSID 'Yorki_Nikolki' wlan0: BSS: Add new id 23 BSSID c8:3a:35:29:4c:68 SSID 'PENTAGRAM' wlan0: BSS: Add new id 24 BSSID e2:b9:c8:62:78:38 SSID '500_JoikuSpot_943AF04AD3F5' wlan0: BSS: Add new id 25 BSSID 00:4f:62:1c:40:5d SSID 'airlive' wlan0: BSS: Add new id 26 BSSID 00:12:2a:98:72:da SSID 'FON_NETIA_FREE_INTERNET' BSS: last_scan_res_used=27/32 last_scan_full=0 wlan0: New scan results available WPS: Unknown Vendor Extension (Vendor ID 9442) WPS: Unknown Vendor Extension (Vendor ID 9442) WPS: Unknown Vendor Extension (Vendor ID 9442) WPS: AP 90:94:e4:35:57:ba type 0 added WPS: AP 00:12:2a:98:72:d8 type 0 added WPS: AP f0:7d:68:8e:10:ce type 0 added WPS: AP 00:19:70:79:97:c8 type 0 added WPS: AP 8c:e0:81:6b:de:44 type 0 added WPS: Unknown Vendor Extension (Vendor ID 9442) WPS: AP 90:f6:52:fe:35:46 type 0 added WPS: AP 2c:e4:12:72:d5:37 type 0 added WPS: AP[0] 90:94:e4:35:57:ba type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[1] 00:12:2a:98:72:d8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[2] f0:7d:68:8e:10:ce type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[3] 00:19:70:79:97:c8 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[4] 8c:e0:81:6b:de:44 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[5] 90:f6:52:fe:35:46 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 WPS: AP[6] 2c:e4:12:72:d5:37 type=0 tries=0 last_attempt=-1 sec ago blacklist=0 wlan0: Selecting BSS from priority group 10 wlan0: 0: 00:18:39:a1:f7:c9 ssid='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-39 wlan0: skip - SSID mismatch wlan0: 1: 20:3a:07:97:15:72 ssid='networkers' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-40 wlan0: selected based on RSN IE wlan0: selected BSS 20:3a:07:97:15:72 ssid='networkers' wlan0: Request association: reassociate: 0 selected: 20:3a:07:97:15:72 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING wlan0: Trying to associate with 20:3a:07:97:15:72 (SSID='networkers' freq=2412 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Cancelling scan request wlan0: WPA: clearing own WPA/RSN IE wlan0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0 RSN: Search for BSSID 20:3a:07:97:15:72 RSN: No PMKSA cache entry found wlan0: RSN: using IEEE 802.11i/D9.0 wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 1 proto 2 wlan0: WPA: Selected mgmt group cipher 32 wlan0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 wlan0: WPA: using GTK CCMP wlan0: WPA: using PTK CCMP wlan0: WPA: using KEY_MGMT 802.1X wlan0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 Limit connection to BSSID 20:3a:07:97:15:72 freq=2412 MHz based on scan results (bssid_set=0) wpa_driver_wext_associate wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_psk wlan0: Association request to the driver failed wlan0: Setting authentication timeout: 5 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=16 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b1a len=26 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8c08 len=110 AssocResp IE wireless event - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 20:3a:07:97:15:72 wlan0: Event ASSOCINFO (4) received wlan0: Association info event resp_ies - hexdump(len=94): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a 2c 18 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 01 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): wlan0: Event ASSOC (0) received wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=20:3a:07:97:15:72 wlan0: No keys have been configured - skip key clearing wlan0: Associated with 20:3a:07:97:15:72 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: Cancelling scan request wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=66): 02 00 00 3e 01 01 00 3e 01 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 2c 70 6f 72 74 69 64 3d 31 wlan0: Setting authentication timeout: 70 sec 0 usec EAPOL: Received EAP-Packet frame EAPOL: SUPP_PAE entering state RESTART EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 EAP: EAP entering state IDENTITY wlan0: CTRL-EVENT-EAP-STARTED EAP authentication started EAP: EAP-Request Identity data - hexdump_ascii(len=57): 00 6e 65 74 77 6f 72 6b 69 64 3d 6e 65 74 77 6f _networkid=netwo 72 6b 65 72 73 2c 6e 61 73 69 64 3d 57 4c 43 2d rkers,nasid=WLC- 31 2d 4e 45 54 2d 4d 47 4d 54 2d 4d 44 46 2d 31 1-NET-MGMT-MDF-1 2c 70 6f 72 74 69 64 3d 31 ,portid=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=15): 01 00 00 0b 02 01 00 0b 01 6a 77 69 64 65 6c EAPOL: SUPP_BE entering state RECEIVE EAPOL: startWhen --> 0 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=26): 02 00 00 16 01 02 00 16 04 10 af 80 b4 fa f1 1a 7a 23 33 d5 e4 a7 8f 5d a1 ce EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=2 method=4 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD EAP: configuration does not allow: vendor 0 method 4 EAP: vendor 0 method 4 not allowed wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=4 -> NAK EAP: Status notification: refuse proposed method (param=MD5) EAP: Building EAP-Nak (requested type 4 vendor=0 method=0 not allowed) EAP: allowed methods - hexdump(len=1): 19 EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 02 00 06 03 19 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=10): 02 00 00 06 01 03 00 06 19 20 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=3 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state GET_METHOD wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=25 EAP: Status notification: accept proposed method (param=PEAP) EAP: Initialize selected EAP method: vendor 0 method 25 (PEAP) TLS: Phase2 EAP types - hexdump(len=8): 00 00 00 00 1a 00 00 00 TLS: using phase1 config options TLS: Trusted root certificate(s) loaded wlan0: CTRL-EVENT-EAP-METHOD EAP vendor 0 method 25 (PEAP) selected EAP: EAP entering state METHOD SSL: Received packet(len=6) - Flags 0x20 EAP-PEAP: Start (server ver=0, own ver=1) EAP-PEAP: Using PEAP version 0 SSL: (where=0x10 ret=0x1) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:before/connect initialization SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client hello A SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read server hello A SSL: SSL_connect - want more data SSL: 223 bytes pending from ssl_out SSL: 223 bytes left to be sent out (of total 223 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=237): 01 00 00 e9 02 03 00 e9 19 80 00 00 00 df 16 03 01 00 da 01 00 00 d6 03 01 51 50 61 9a 2d c2 b1 33 3f ff 1b 47 c1 f1 f3 a9 72 b8 c7 52 3f 1b 23 69 44 96 b4 8d 74 5a a4 3f 00 00 68 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 00 07 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 45 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 0f 00 01 01 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1028): 02 00 04 00 01 04 04 00 19 c0 00 00 0f 0c 16 03 01 00 31 02 00 00 2d 03 01 51 50 53 87 d9 2c a1 5e 8d 30 65 1a 72 f8 2b e5 71 b0 3c f3 5e a2 ac a6 5e d5 07 fc ab a4 ad ed 00 00 39 00 00 05 ff 01 00 01 00 16 03 01 0c b6 0b 00 0c b2 00 0c af 00 04 13 30 82 04 0f 30 82 02 f7 a0 03 02 01 02 02 01 0d 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 32 32 32 31 32 36 35 32 5a 17 0d 32 38 30 32 31 39 32 31 32 36 35 32 5a 30 81 94 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 21 30 1f 06 03 55 04 03 13 18 72 61 64 69 75 73 31 2e 6e 65 74 77 6f 72 6b 65 72 73 2e 6c 6f 63 61 6c 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 e0 79 50 d8 dc 34 e3 84 41 fb 6d c2 ad 77 1c 2e 0c 7e 06 fa 57 9c 58 1e 6b d1 84 25 a2 12 de 0d 82 18 af d7 ee 9a f1 16 24 26 25 e0 15 8b 70 24 98 17 93 5b 4e 43 04 ac 1c 91 db 6a bf 82 45 65 d5 53 d4 01 8c 78 27 07 5d 5e 6a 02 8e d9 8c 37 47 2b a4 fc a5 f7 f8 dd 3f 7d 3d bc bd 09 e7 0c 13 1a 62 ca 44 2c 1d 96 6e 84 37 83 98 53 a0 ec dd 7e 7a ef 60 31 21 66 07 03 0c bd 5e d9 c7 78 26 11 3f 2f 9f 94 5e 67 ed 27 78 2a 56 86 dc 4f 38 c8 f1 56 f6 aa 2d f7 05 c4 87 f5 ed 08 b2 73 45 fb 52 c5 d4 bd 53 ed 34 d8 90 ab d1 25 d6 fd 0e 92 68 a8 c5 aa 5f 83 70 bb e8 fb cd cf 96 a6 90 e1 f0 61 23 16 9d 2e 34 ed a5 6b be 8e 0b 92 79 de 5f 5f e7 4d 4e 65 b4 32 c6 61 e0 30 f9 e4 fe 06 28 c3 14 69 11 a2 87 33 7b d1 4f 7f 05 91 79 5b c3 5d 7f 6e e2 52 08 3e 9c 40 6f fc 36 93 02 03 01 00 01 a3 7b 30 79 30 09 06 03 55 1d 13 04 02 30 00 30 2c 06 09 60 86 48 01 86 f8 42 01 0d 04 1f 16 1d 4f 70 65 6e 53 53 4c 20 47 65 6e 65 72 61 74 65 64 20 43 65 72 74 69 66 69 63 61 74 65 30 1d 06 03 55 1d 0e 04 16 04 14 55 33 38 cb 7d 01 e7 6d a7 b6 b9 3f e8 33 05 22 95 2a 9b 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 68 cd 51 3b 47 b3 5f 86 55 b7 9f a3 20 59 2f f5 2c 6d 90 58 2f 9f a2 f4 e5 0b 30 ea 7e 4a ed f1 e5 cc 24 86 d2 b8 f1 12 b0 59 be 5a 38 9f 89 12 17 86 69 aa c5 29 61 21 e9 be 6b ae 9c a4 70 de a2 37 50 c7 e4 68 d3 29 d8 79 79 92 1f f8 e0 31 de c2 5f 33 71 a6 fc fb c0 03 54 e0 a8 72 22 d3 d5 6f f0 91 b0 0f 61 d7 35 ff 71 4b 57 65 cd 13 d9 64 d8 f6 df 1d f7 65 f9 47 c2 16 8f 9f 1d 19 bd 98 1f 30 c3 fd ec a2 3b bc a4 1e b2 a4 4b 4f 3b b3 be 89 80 73 d3 81 ff ff cc d3 90 a1 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=4 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1024) - Flags 0xc0 SSL: TLS Message Length: 3852 SSL: Need 2838 bytes more input data SSL: Building ACK (type=25 id=4 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 04 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 05 03 fc 19 40 81 86 8c 71 0d 01 40 f4 81 e1 4a 8c 19 2d 1d 1c 05 b1 98 5e fa 21 b7 d2 0a dc 65 2c e8 99 5d 53 2d c4 13 b2 ab e3 52 46 aa 1f b9 3f ce f2 c1 95 57 98 de 6c fe 88 63 40 13 5a 34 1b 2f 0e ac ec e7 b2 fa 1f c5 46 cf 30 55 09 18 06 7c 57 55 d0 4e 07 be 0f 25 c3 88 fd 19 4d 80 41 e3 12 56 02 34 1f 00 04 53 30 82 04 4f 30 82 03 37 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b ea 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 32 30 33 30 34 33 5a 17 0d 33 33 30 31 32 37 32 30 33 30 34 33 5a 30 81 83 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 0f 30 0d 06 03 55 04 07 13 06 4b 72 61 6b 6f 77 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 10 30 0e 06 03 55 04 03 13 07 53 55 42 43 41 2d 31 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 dc 31 39 98 9c a1 6f 4e fb 31 7a ec 6d 0c 59 5d 7b 2c 11 74 76 06 87 d2 60 97 c4 95 35 1b 35 89 61 a9 bb 6f 83 6a 76 dd e6 77 4e 9d 1b b0 b0 c0 e0 f7 0b 66 e3 2d 6d d0 f2 63 60 15 cc f1 8b 7a c6 79 28 9f a9 53 06 5b 63 6d b0 e3 d7 9e 17 a0 f2 dc 55 b5 5f 74 31 4d 4c 91 bc 9f 3c ac 6a 17 37 69 6d 03 43 0c 3c 97 fe c4 c3 70 38 6a b3 7a 95 9e 9a 72 b3 50 58 a7 a8 f6 47 74 8b 67 7f fb d4 82 7c 67 12 73 70 28 d5 ff a6 ed 42 07 e5 8d 2f 1c db de 44 f4 b3 6b ff 36 e7 67 cf 18 08 e6 4e 7a d7 9e 5a f5 0f 0e 05 26 42 76 5f 30 ed 5a 94 5b f3 a9 64 1d a1 e8 7c 8f eb 81 64 38 e1 15 fa 75 0a 94 1a 24 0d 71 d0 d4 8e 67 be e3 84 38 e8 1d 48 7e 85 9e b8 a5 5a bf f2 0d bd 3b fc 08 04 48 4b bd 93 39 27 fc f2 bc 79 bc e2 c8 4c 06 e3 3b d9 72 af 25 ce 3e ef 73 99 6e ba 74 ac 73 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 b9 84 49 fd 59 01 03 d3 58 21 84 ad 23 92 07 ad 96 1c 7d f2 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 53 2a d6 45 13 bc a6 a7 49 b3 a9 32 65 b3 23 fc 97 48 f3 22 ea c7 03 c7 40 bc 4b 44 86 49 cd 3c da b6 7d 4b a0 fb 0d 87 cc 9e 7c 92 14 0c 6d 47 86 8f 26 8a 0a d5 98 8f 30 1d f6 55 66 75 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=5 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 1824 bytes more input data SSL: Building ACK (type=25 id=5 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 05 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=1024): 02 00 03 fc 01 06 03 fc 19 40 e8 5a 74 a4 94 66 39 f6 8e bd bd 33 a0 bf 10 c5 29 3c c8 9e 50 f9 32 52 42 8f 19 65 75 cf fc ac a2 58 c7 87 c5 bc 04 71 9f 13 82 d4 13 ae 46 67 b1 34 34 20 91 bb b2 a0 f2 e3 d4 17 b5 6a 7e 5c ff 65 09 c1 4a 4d 4d 2e 06 7a 0b 20 c2 12 67 d9 67 67 de a3 86 c4 f2 36 4e 4a 56 c4 ee e4 b2 06 6b e2 4b 0b 33 35 74 3d 3e 74 dc 86 10 cd 54 71 3a 6b b7 c7 e8 9a 01 70 54 f2 2f de cb 67 c9 be 3a ba 01 cc e0 9f 95 ab 7d d7 0b d2 79 a4 c2 7c 48 54 68 b1 23 17 78 b3 1e 59 e4 78 90 a9 9c 01 5d c8 ea 07 76 43 db b0 66 e1 84 10 9f 55 a8 2b 41 99 ab 7b ca f7 6e 0b bd b0 5b 0f c8 95 4d b9 64 b0 00 04 40 30 82 04 3c 30 82 03 24 a0 03 02 01 02 02 09 00 bf 88 d2 f5 9d ba 2b e9 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 1e 17 0d 31 33 30 32 30 31 31 38 35 34 34 39 5a 17 0d 34 33 30 31 32 35 31 38 35 34 34 39 5a 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 a9 73 32 65 98 c1 13 31 31 63 37 b7 e1 d0 a5 77 e1 07 28 1e 5c 9b c0 21 29 99 29 49 46 61 83 3c 66 f7 cf e7 88 5c da 07 ee 8d 22 1f 77 7c f0 88 34 9d 75 c3 6f cf 54 72 17 1e 11 41 b7 0f 8e 15 c9 c4 ad 90 b8 e0 e4 2d 6b 9f cf 3c 9f e0 00 20 d1 1c 35 df 08 d3 92 25 15 b6 4c d2 58 36 d2 c0 52 8b 80 1c 5c 11 e7 28 7e e1 31 59 5e 81 a4 d7 80 bc 06 92 9f f4 6e 7c 3d a6 f7 a2 c1 ed 7c c5 91 4e fc 03 da ed b7 da 1c e7 b9 c4 4c bc df 69 c6 08 58 b0 f2 02 36 ee 52 d4 04 79 e2 61 87 3f 9e 31 bb ae 9f d8 b8 69 67 3f c4 58 ac 46 94 6f 99 c0 34 e1 85 90 ca 2e 9d c1 e0 2d 3e b7 65 5e bd 8c 6f 9d af 54 70 e8 4c 1b be e4 5d 51 47 1a 8f c9 0c 78 69 f2 bc f6 77 9d cd 06 a4 4a fd 95 a5 2b 7f 73 e3 1d 7a 94 0c a5 2b 3a 1c 9a 9a a9 ff 1d 31 94 1b a9 f4 e8 63 0d 29 bb 38 43 cc 35 02 03 01 00 01 a3 81 d6 30 81 d3 30 1d 06 03 55 1d 0e 04 16 04 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 30 81 a3 06 03 55 1d 23 04 81 9b 30 81 98 80 14 4f 92 df d1 91 95 08 b5 81 92 98 c8 d3 81 cd 37 24 41 46 35 a1 75 a4 73 30 71 31 0b 30 09 06 03 55 04 06 13 02 50 4c 31 14 30 12 06 03 55 04 08 13 0b 4d 61 6c 6f 70 6f 6c 73 6b 69 65 31 16 30 14 06 03 55 04 0a 13 0d 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 31 0f 30 0d 06 03 55 04 03 13 06 52 4f 4f 54 43 41 31 23 30 21 06 09 2a 86 48 86 f7 0d 01 09 01 16 14 6e 61 64 6d 69 6e 40 6e 65 74 77 6f 72 6b 65 72 73 2e 70 6c 82 09 00 bf 88 d2 f5 9d ba 2b e9 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 0d 06 09 2a EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=6 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=1020) - Flags 0x40 SSL: Need 810 bytes more input data SSL: Building ACK (type=25 id=6 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 06 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=820): 02 00 03 30 01 07 03 30 19 00 86 48 86 f7 0d 01 01 05 05 00 03 82 01 01 00 2b d4 1d a8 76 72 e7 52 60 a7 68 fe 7f d7 f0 58 42 9a 94 d4 5f f8 65 5c 2e d9 c1 ff de 33 30 f3 89 c8 67 55 8e eb e5 94 66 ad df ff 95 ea f0 c5 50 4b 5e d1 94 9a b8 3f f3 68 41 f3 68 b8 b2 37 69 36 90 80 27 e9 90 15 b2 0f 12 89 9b 9f af a7 48 25 7d 7c ad 56 04 cd c3 68 7c 8d b1 7c 66 5b 3e 45 90 b2 c8 76 78 3d 6e 4c fd 77 a1 37 d7 e5 15 60 d4 18 fc 40 40 f0 82 d3 45 0e ca c3 5c 49 d8 20 9d 22 63 ca 48 79 9d ca 26 b7 f1 39 e1 e3 7d 82 64 d0 51 b9 05 96 e4 6a fc 59 5a 10 2c 1b 56 ff c3 7f d1 81 db bf ce fb 0f 71 a4 df 22 84 92 87 62 a0 7a 39 ed 2f 0b 26 6c 8f ad d4 32 c0 93 6b c9 7f df 18 73 52 ff 00 cd 54 84 b9 30 bd 7f 03 51 99 ed d9 a7 d2 e8 65 58 0e 73 1d c9 c8 47 53 4b 85 5a 0e 4d dd e9 7a 79 61 e6 ef bd d3 11 a8 93 54 d9 fb 4c 0a b1 3a 0a 77 0c 0b 49 87 16 03 01 02 0d 0c 00 02 09 00 80 e1 1c b9 f7 d1 bd 7a 76 58 0e 61 57 73 03 a4 eb 32 66 db 69 5b f2 c6 fa e8 37 86 dc b6 b2 c4 0d ca 4c 03 61 78 69 af 20 aa c0 12 71 12 4a c6 86 5d c1 45 80 68 9f a9 79 23 bf 23 d5 5d 70 93 f5 7e ce 9a 65 99 8e dd 35 b9 07 c8 cb 31 27 f0 05 4c 6d cf 90 1e ac 1a 8c f1 4d 85 d4 4b ab f4 1a 8a bf 04 c4 83 93 f7 5b 67 da bf 27 c6 0f 61 f3 c7 bf 97 66 4e 36 c9 3f c1 9a 7f db 9a 86 2b 5b 00 01 02 00 80 a7 ab fd 5d 24 2b eb ec 21 b9 3c 5a 12 0e 0d 09 37 f6 9c d1 0d 3e f9 89 55 d6 da 30 68 ba 64 31 f3 eb 48 c8 8f 45 9c 07 a6 6e 9d 37 d8 cf 62 2a ba 91 86 5b 4d 09 59 15 06 74 63 04 eb dc 82 4c b8 b5 3e 28 24 d3 e7 39 aa d4 a6 b2 02 af d7 1c 64 10 68 51 06 48 35 94 61 54 6d c0 96 d6 5b f0 72 2b 6b ac c9 fc 6b fb 6c 48 46 24 87 2f e5 e2 02 74 55 37 28 a1 41 88 80 c7 cf 26 f6 36 48 79 01 00 8e 2a 6b 83 07 ba 7f 35 74 dd db 20 cd e5 8c eb db 46 13 fa df b6 f3 cb 19 a2 34 27 7b 14 f6 ab 77 fb 7d 53 63 cb 51 77 26 18 d1 ca e8 21 81 c0 be f5 35 1e ae 5d 5c 87 62 e4 95 35 f3 36 73 0c ac 4c 33 7b 58 dd 2a 6c b7 fd 65 09 11 88 99 29 1d 61 4d 25 5b 3f 68 22 d5 31 bd 68 84 06 5f 51 66 5d 3a a3 50 bb 2a 41 6e c5 61 56 95 1c 1e 50 44 e3 07 03 cf b3 d6 e8 bf 2f da f1 99 a2 d0 29 7d 76 eb 13 b4 c1 9c f9 8d 72 2b 71 d4 8c 4e 35 fb 65 6c ea 6b 88 2d 6e f2 d3 e5 49 dc 40 6a 2a 26 62 83 87 8f 31 c6 a4 cd 27 cc 98 b7 fa a9 36 44 72 02 d8 49 f9 19 be d1 86 5f 8a 30 9d d8 b9 31 6f f9 51 e1 cf 7b 20 2b b9 00 dd 5d d5 93 c0 b7 93 6e 1c 95 ac 27 5e 05 ba b8 a9 9e 63 8f 33 e7 70 6f a0 11 30 94 57 a2 41 9a 65 ea 33 8e 4c b0 ec 02 fd 97 f9 c2 fe 15 c5 ea 23 db 1d 1c 3f 16 03 01 00 04 0e 00 00 00 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=7 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=816) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server hello A TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=2 buf='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=2 subject='/C=PL/ST=Malopolskie/O=networkers.pl/CN=ROOTCA/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=1 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=1 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=SUBCA-1/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) ca_cert_verify=1 depth=0 buf='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl' wlan0: CTRL-EVENT-EAP-PEER-CERT depth=0 subject='/C=PL/ST=Malopolskie/L=Krakow/O=networkers.pl/CN=radius1.networkers.local/emailAddress=nadmin@networkers.pl' EAP: Status notification: remote certificate verification (param=success) SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server certificate A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read server done A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write client key exchange A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write change cipher spec A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 write finished A SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 flush data SSL: (where=0x1002 ret=0xffffffff) SSL: SSL_connect:error in SSLv3 read finished A SSL: SSL_connect - want more data SSL: 198 bytes pending from ssl_out SSL: 198 bytes left to be sent out (of total 198 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=212): 01 00 00 d0 02 07 00 d0 19 80 00 00 00 c6 16 03 01 00 86 10 00 00 82 00 80 59 e5 57 fb 0b 80 da ed 7a c1 37 a1 e9 50 a1 a0 4c 8c 9a fe 22 03 6a 33 f1 dc 1b 78 64 a8 0e b9 0a d0 07 6b 7d 9a f5 d3 22 10 08 8c 53 be 0a 8d f7 ed 95 10 6c 91 0a f4 95 fa 30 8b 93 ac bb 8c 5d ea 34 c3 5e 87 3a 7d 2f e8 0e 11 97 6f 08 a9 27 a5 01 5a 9e a1 f7 c9 0d 7b 09 38 c8 ba 09 34 b5 cf 56 07 e3 46 54 5f 6a e1 0f 0a ef 9a 18 5c 56 2c e7 6d 1e a0 e0 0d f7 df 15 bc 7d c6 11 1c 14 03 01 00 01 01 16 03 01 00 30 78 fc 4f 40 93 6c c0 3d 16 65 e4 0b e1 9f 48 26 4d 91 7d 97 df 39 d0 76 46 c4 52 85 b0 87 c8 c2 e3 01 56 ef 7f a2 1b 76 0e 3b 0f ab 65 1f a0 85 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=69): 02 00 00 41 01 08 00 41 19 00 14 03 01 00 01 01 16 03 01 00 30 d1 f1 91 d0 5d 09 f3 99 75 0a e7 2b cb ef b2 b5 fc 7b 3f e3 5c 03 c9 53 cb 40 34 8a 82 a5 d0 c8 77 1f 08 16 da bb e7 4d 30 c6 a8 ed f5 36 d3 0b EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=8 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=65) - Flags 0x00 SSL: (where=0x1001 ret=0x1) SSL: SSL_connect:SSLv3 read finished A SSL: (where=0x20 ret=0x1) SSL: (where=0x1002 ret=0x1) SSL: 0 bytes pending from ssl_out SSL: No Application Data included SSL: No data to be sent out EAP-PEAP: TLS done, proceed to Phase 2 EAP-PEAP: using label 'client EAP encryption' in key derivation EAP-PEAP: Derived key - hexdump(len=64): [REMOVED] SSL: Building ACK (type=25 id=8 ver=0) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=10): 01 00 00 06 02 08 00 06 19 00 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=47): 02 00 00 2b 01 09 00 2b 19 00 17 03 01 00 20 dd 45 11 89 3d 40 4a e3 ad 1a 27 10 09 3a 3b 98 fc cf f9 31 cd ca 0e 90 c0 f7 60 9d 0e e3 26 d2 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=9 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=5): 01 09 00 05 01 EAP-PEAP: received Phase 2: code=1 identifier=9 length=5 EAP-PEAP: Phase 2 Request: type=1 EAP: using real identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 09 00 50 19 00 17 03 01 00 20 67 9f 75 bc f9 0c a0 1c 53 5d 72 26 fb db 83 91 57 c7 4e 7d d2 3c 60 27 1e 0c df dd 56 e7 e2 15 17 03 01 00 20 37 3a f2 1d 1d 9d cf e2 70 a7 8b 69 da d1 43 41 12 2c 36 c0 e1 fe ae 03 e8 d7 6d e9 fe 48 f1 a5 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=79): 02 00 00 4b 01 0a 00 4b 19 00 17 03 01 00 40 12 7f 25 09 c4 66 cd ca 77 bd 99 79 3f 70 99 1c dd 6c 2b 45 9c d6 ec 9d c1 96 d8 1b db a6 2e d5 02 d5 38 cb ac 05 cc 26 d2 fc 86 45 cb 3d d6 04 57 f4 02 03 d0 d3 6d 45 11 c4 cc 51 3e 6c d7 34 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=10 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=75) - Flags 0x00 EAP-PEAP: received 69 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=28): 1a 01 0a 00 1b 10 d8 ef fe ff da e5 04 fc c1 4c 2c 75 da 5e 95 7e 6a 77 69 64 65 6c EAP-PEAP: received Phase 2: code=1 identifier=10 length=32 EAP-PEAP: Phase 2 Request: type=26 EAP-PEAP: Selected Phase 2 EAP vendor 0 method 26 EAP-MSCHAPV2: RX identifier 10 mschapv2_id 10 EAP-MSCHAPV2: Received challenge EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel EAP-MSCHAPV2: Generating Challenge Response Get randomness: len=16 entropy=11 MSCHAPV2: Identity - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: Username - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: auth_challenge - hexdump(len=16): d8 ef fe ff da e5 04 fc c1 4c 2c 75 da 5e 95 7e MSCHAPV2: peer_challenge - hexdump(len=16): e7 31 b5 df 12 b5 05 14 9f 2a 20 23 2b 15 a7 8d MSCHAPV2: username - hexdump_ascii(len=6): 6a 77 69 64 65 6c jwidel MSCHAPV2: password - hexdump_ascii(len=10): [REMOVED] MSCHAPV2: NT Response - hexdump(len=24): 4c 94 19 f2 c6 c4 b3 f8 8c 31 f5 19 4b 42 c9 96 f4 91 fb 0f 35 b2 97 89 MSCHAPV2: Auth Response - hexdump(len=20): 74 40 31 77 01 0b c9 ba e2 13 da ca 68 15 2f 9b 79 63 a0 e8 MSCHAPV2: Master Key - hexdump(len=16): [REMOVED] EAP-MSCHAPV2: TX identifier 10 mschapv2_id 10 (response) EAP-PEAP: Encrypting Phase 2 data - hexdump(len=65): [REMOVED] SSL: 138 bytes left to be sent out (of total 138 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=148): 01 00 00 90 02 0a 00 90 19 00 17 03 01 00 20 f9 3a 51 6b 72 60 ba 41 15 fb 36 21 22 da 36 4a 65 54 c2 5d ea 8a 6b b0 57 e3 fb 74 11 07 9e f5 17 03 01 00 60 38 11 42 3d 07 02 23 d7 0a 1d 8f cd 18 c9 93 35 6b 00 2e 6f 44 49 62 ea d0 09 cd d7 47 53 42 85 17 54 74 85 c9 9e b1 19 11 a0 81 f8 2f ea 16 c6 68 0b 7d 55 53 02 68 3f 7e a1 7c cf ca 2a 58 08 9c 22 82 12 4a fa 50 7b d4 e0 77 0e 18 18 ba 34 49 ab 04 d9 4d b3 44 bf 31 c0 1a fa 66 c9 de 01 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=95): 02 00 00 5b 01 0b 00 5b 19 00 17 03 01 00 50 b7 9c 2f c7 1c 27 61 3c 76 ef 21 93 ae 8f ca ef 2a 4c 27 39 d0 06 96 16 c3 8e 68 da bd be 54 04 03 52 7b 6d 63 77 fc 09 5b 37 47 f1 96 a1 2e 2f 4f db 56 7d b7 24 62 a8 8b 34 33 91 f8 d0 f6 5e ae a7 39 b9 62 1d 72 6c f6 b1 23 ea f3 68 4c d4 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=11 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=91) - Flags 0x00 EAP-PEAP: received 85 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53 3d 37 34 34 30 33 31 37 37 30 31 30 42 43 39 42 41 45 32 31 33 44 41 43 41 36 38 31 35 32 46 39 42 37 39 36 33 41 30 45 38 EAP-PEAP: received Phase 2: code=1 identifier=11 length=51 EAP-PEAP: Phase 2 Request: type=26 EAP-MSCHAPV2: RX identifier 11 mschapv2_id 10 EAP-MSCHAPV2: Received success EAP-MSCHAPV2: Success message - hexdump_ascii(len=0): EAP-MSCHAPV2: Authentication succeeded EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 0b 00 50 19 00 17 03 01 00 20 58 41 f4 d7 26 d7 bb a4 3a 02 8b 0d 20 b4 6f e9 e3 2f a1 e3 e0 25 c8 13 33 05 ad db 86 5a f7 3c 17 03 01 00 20 97 ba b8 6f 2c 9c ed 79 45 2a 56 fd be 0d c3 c3 f5 dd 4e a8 b6 f6 df e5 f8 b5 03 08 d3 5e 5f b6 EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=47): 02 00 00 2b 01 0c 00 2b 19 00 17 03 01 00 20 3a f7 27 b4 14 71 83 97 a2 5c d1 ac 3a e7 13 3f b8 1d 1b 11 57 dc a6 a2 89 21 ff 93 92 fa 43 4f EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Request id=12 method=25 vendor=0 vendorMethod=0 EAP: EAP entering state METHOD SSL: Received packet(len=43) - Flags 0x00 EAP-PEAP: received 37 bytes encrypted data for Phase 2 EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80 03 00 02 00 01 EAP-PEAP: received Phase 2: code=1 identifier=12 length=11 EAP-PEAP: Phase 2 Request: type=33 EAP-TLV: Received TLVs - hexdump(len=6): 80 03 00 02 00 01 EAP-TLV: Result TLV - hexdump(len=2): 00 01 EAP-TLV: TLV Result - Success - EAP-TLV/Phase2 Completed EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): [REMOVED] SSL: 74 bytes left to be sent out (of total 74 bytes) EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC EAP: EAP entering state SEND_RESPONSE EAP: EAP entering state IDLE EAPOL: SUPP_BE entering state RESPONSE EAPOL: txSuppRsp TX EAPOL: dst=20:3a:07:97:15:72 TX EAPOL - hexdump(len=84): 01 00 00 50 02 0c 00 50 19 00 17 03 01 00 20 68 d1 15 6b f3 a8 1f 8c a3 af 9b 1d db 9b 11 0f d4 d3 7e 2a 62 83 eb 06 a3 4b 1b ef 5d c2 50 46 17 03 01 00 20 fc 4d 71 b5 46 8d 23 00 c7 b2 0a d2 11 f1 9f cc cd 40 22 97 8a 63 fd 3e 4c 01 3b c1 9f 41 c8 1a EAPOL: SUPP_BE entering state RECEIVE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=8): 02 00 00 04 03 0c 00 04 EAPOL: Received EAP-Packet frame EAPOL: SUPP_BE entering state REQUEST EAPOL: getSuppRsp EAP: EAP entering state RECEIVED EAP: Received EAP-Success EAP: Status notification: completion (param=success) EAP: EAP entering state SUCCESS wlan0: CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully EAPOL: SUPP_BE entering state RECEIVE EAPOL: SUPP_BE entering state SUCCESS EAPOL: SUPP_BE entering state IDLE wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines wlan0: IEEE 802.1X RX: version=2 type=3 length=117 wlan0: EAPOL-Key type=2 wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04 WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04 RSN: PMKID from Authenticator - hexdump(len=16): bd 04 10 d1 9a aa 7b 3f e2 91 e2 1a ac 15 2b 04 wlan0: RSN: no matching PMKID found EAPOL: Successfully fetched key (len=32) EAPOL: Successfully fetched key (len=64) WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] RSN: Added PMKSA cache entry for 20:3a:07:97:15:72 network_ctx=0x2273620 wlan0: RSN: the new PMK matches with the PMKID Get randomness: len=32 entropy=0 WPA: Renewed SNonce - hexdump(len=32): d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4 WPA: PTK derivation - A1=b4:74:9f:de:e4:0e A2=20:3a:07:97:15:72 WPA: Nonce1 - hexdump(len=32): d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4 WPA: Nonce2 - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 88 bd 5c 78 00 74 72 ed af 66 46 a1 1d 9d 7f 26 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 d5 de db c9 73 b8 f5 de cf dd 2c bd 44 cc 37 10 c2 7b c2 a1 44 8c d6 cb 8d ff 65 19 dc 9b 29 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 bd 5c 78 00 74 72 ed af 66 46 a1 1d 9d 7f 26 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 wlan0: RX EAPOL from 20:3a:07:97:15:72 RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62 00 38 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines wlan0: IEEE 802.1X RX: version=2 type=3 length=151 wlan0: EAPOL-Key type=2 wlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) wlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62 WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 c3 83 7d 42 80 7a ce 2f a9 bd 5b 7d 36 a5 b5 cd 17 85 9a e4 87 7e 5a 2e c7 8f 57 96 b5 22 59 2d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 ca f2 f1 32 03 bc d7 91 a6 13 34 96 c4 5c 62 00 38 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29 RSN: encrypted key data - hexdump(len=56): 5f b0 3c e2 34 0a da 9f 0d e7 80 76 1d 7c a3 00 02 d5 24 da 9d 83 4a 37 6e 09 d7 90 61 19 e3 67 b4 91 ff 71 e0 7a 2e 4b a3 af 23 c4 5d 8d fb 07 da dc 27 54 1d 0c 49 29 WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 3 of 4-Way Handshake from 20:3a:07:97:15:72 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 dd 16 00 0f ac 01 01 00 97 7f e1 1c 22 fb cc a1 61 bc 6b 7c a9 5e dc d9 dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] wlan0: WPA: