Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- WPS: Received M1
- WPS: UUID-E - hexdump(len=16): c8 12 0d b3 01 56 48 4d c5 52 e5 68 94 c6 9b 99
- WPS: Enrollee MAC Address a4:52:6f:27:57:d6
- WPS: Enrollee Nonce - hexdump(len=16): 89 67 4f ce 62 d9 1e 50 71 a4 3a 10 6e fe 41 29
- WPS: Enrollee Authentication Type flags 0x27
- WPS: Enrollee Encryption Type flags 0xf
- WPS: Enrollee Connection Type flags 0x1
- WPS: Enrollee Config Methods 0x84 [Label] [PBC]
- WPS: Prefer PSK format key due to Enrollee not supporting display
- WPS: Enrollee Wi-Fi Protected Setup State 2
- WPS: Manufacturer - hexdump_ascii(len=8):
- 42 72 6f 61 64 63 6f 6d Broadcom
- WPS: Model Name - hexdump_ascii(len=8):
- 42 72 6f 61 64 63 6f 6d Broadcom
- WPS: Model Number - hexdump_ascii(len=6):
- 31 32 33 34 35 36 123456
- WPS: Serial Number - hexdump_ascii(len=4):
- 31 32 33 34 1234
- WPS: Primary Device Type: 6-0050F204-1
- WPS: Device Name - hexdump_ascii(len=10):
- 42 72 6f 61 64 63 6f 6d 41 50 BroadcomAP
- WPS: Enrollee RF Bands 0x1
- WPS: Enrollee Association State 0
- WPS: Device Password ID 0
- WPS: Enrollee Configuration Error 0
- WPS: OS Version 80000000
- EAP-WSC: MESG -> MESG
- WPS: Found a wildcard PIN. Assigned it for this UUID-E
- WPS: Registrar Nonce - hexdump(len=16): 92 5b 72 e0 fb af 20 63 f3 db ae 0e d5 89 8f 59
- WPS: UUID-R - hexdump(len=16): 8e e8 9b dd 1a 13 5b fc a0 82 0d 62 b2 f3 d8 2e
- WPS: Building Message M2
- WPS: * Version (hardcoded 0x10)
- WPS: * Message Type (5)
- WPS: * Enrollee Nonce
- WPS: * Registrar Nonce
- WPS: * UUID-R
- WPS: * Public Key
- WPS: Generate new DH keys
- WPS: DH Private Key - hexdump(len=192): 5c 4a 10 ac 42 71 90 13 a9 00 59 2d 37 3a 83 74 5d 15 35 88 66 c1 fa 47 f8 83 39 64 11 7c 50 5c f6 d1 64 c0 77 c4 7c 09 e1 7f b9 91 1a 7e 03 14 49 45 a5 2d d9 68 3e 4a 75 1d dd 83 b6 03 8c 6b ab 18 24 3f 67 91 a6 d8 7d b8 a7 3f 26 37 00 09 63 24 9e 6d dc 7f b1 86 46 dd 49 af 8d 91 51 e8 80 19 03 d9 b8 7b 9b 5f 1d 5d 04 a5 1a 40 f9 bd 61 1a 31 cb a0 a9 c2 d2 72 21 7e 6a 7c 4a 13 91 ac d4 2f 28 f8 d5 b3 e2 d8 0e cd ee e5 1d fd c7 f9 58 d0 db 22 d0 bf 60 71 6a 2c df ac 1c 1c 60 e2 23 fe bc 4f 31 9b c6 1b 86 90 ca 0c c4 77 25 ac 7a 97 e9 71 be 7a 7e 0c b7 0c bc a4 0a 6a e5
- WPS: DH own Public Key - hexdump(len=192): b7 f9 2d 83 d0 64 91 24 03 a1 dc 29 2f 9f 15 63 11 1e b1 ed 99 9c a8 02 64 81 a0 92 0b 5d 4a 4e 82 29 41 30 23 da 43 59 2e 8c b8 33 84 95 e3 2b 96 a4 cd 34 62 99 3e 58 a1 92 93 c8 c3 28 86 7d 78 80 96 18 7f b0 17 da f1 92 9b 83 3d a1 41 57 8d 88 db 2a bf e6 ee 35 b0 53 e9 ed 81 02 47 4c 72 05 2c 2e a1 8b cd 6c 8c 4f 57 4e 55 b5 0a d6 98 88 89 5b a8 f3 1c d6 9b 75 3a 2c 00 aa d2 19 26 e8 fc 2d b9 a3 af 86 bd 0d 96 1f 33 0b ad d5 5f ea 4d e1 2d 24 96 b9 f5 49 c1 8a 45 a3 35 ab cb 3e 2b 98 45 05 76 b8 7f 19 8f 98 9e a0 a0 42 c8 73 9b 96 c7 0f 25 12 78 c0 21 3d 3a 07 99 e6
- WPS: DH Private Key - hexdump(len=192): 5c 4a 10 ac 42 71 90 13 a9 00 59 2d 37 3a 83 74 5d 15 35 88 66 c1 fa 47 f8 83 39 64 11 7c 50 5c f6 d1 64 c0 77 c4 7c 09 e1 7f b9 91 1a 7e 03 14 49 45 a5 2d d9 68 3e 4a 75 1d dd 83 b6 03 8c 6b ab 18 24 3f 67 91 a6 d8 7d b8 a7 3f 26 37 00 09 63 24 9e 6d dc 7f b1 86 46 dd 49 af 8d 91 51 e8 80 19 03 d9 b8 7b 9b 5f 1d 5d 04 a5 1a 40 f9 bd 61 1a 31 cb a0 a9 c2 d2 72 21 7e 6a 7c 4a 13 91 ac d4 2f 28 f8 d5 b3 e2 d8 0e cd ee e5 1d fd c7 f9 58 d0 db 22 d0 bf 60 71 6a 2c df ac 1c 1c 60 e2 23 fe bc 4f 31 9b c6 1b 86 90 ca 0c c4 77 25 ac 7a 97 e9 71 be 7a 7e 0c b7 0c bc a4 0a 6a e5
- WPS: DH peer Public Key - hexdump(len=192): 5b f4 25 50 3e 30 e2 ea 91 76 a3 ac 74 16 d1 a6 82 3d 77 98 33 13 58 8d 2d 46 0f 58 0e 39 e2 44 9d c2 ea 4a a1 53 be fb fd 5b 30 24 95 af 04 3b b7 e0 b2 2b c1 7d ee 13 68 32 ba 8c 06 52 7a 71 59 cb 89 7f 77 ab e5 e4 46 79 1f 8f 39 5f 10 00 30 5b 36 fa 3b 7b 3a dd ea 4e c7 12 46 01 84 03 ea 88 9a 98 6c b0 85 62 47 33 6c cb 41 74 8e 95 a3 08 34 25 b6 65 7b 1c 4a a4 2d f0 87 68 d6 6c f1 42 e7 32 2e 67 d3 e0 da 67 79 a4 ee 70 92 de 13 24 f7 93 33 ae 19 67 3e 21 cf e9 26 b9 b1 9e f1 ba 20 15 67 4e 84 47 d8 e3 59 86 1f e2 ca 67 61 d9 09 e8 d4 10 71 ee 13 c2 bc 70 3a 50 3e d2
- WPS: DH shared key - hexdump(len=192): ce 92 21 c2 59 81 2d 44 94 92 7f c6 7d fa 69 93 09 0a 85 80 e8 87 5e cb 9a 91 9d d6 5a 94 51 38 9f 7f 86 45 89 44 d8 1e 2e aa b3 66 e5 a4 95 0b 94 f5 6f 34 4d da f0 fe e9 9d b6 ea d5 b6 85 06 63 75 d9 e7 ac 19 a4 fd 1b 85 ca 07 39 4d 43 87 b8 77 08 72 08 c4 44 37 fe 18 a6 12 85 24 93 f9 36 38 87 a4 45 8d 18 39 db c7 02 30 ce 34 b7 c5 f8 12 af f2 e6 e9 5d 5e 2e cf 46 c2 20 02 e9 4d 67 60 9a a7 61 5d bd 99 44 4b 6f 38 02 a8 66 f8 e7 8e 94 58 6f 9e db cf 46 f5 0d 71 2f 60 f4 0b 6a 46 c0 92 ee 12 b0 a7 6b 77 d2 06 66 c0 bf 68 f6 74 f4 e3 17 21 19 5e da d0 f0 ce af 91 fa e2
- WPS: DHKey - hexdump(len=32): 28 10 b0 4e db 8b dd 8f 04 0b be 7f 8c 17 51 a9 30 4c 14 f7 6e fa f8 6c e7 47 b6 01 e3 a5 93 29
- WPS: KDK - hexdump(len=32): a2 f2 0f 9b f6 69 e7 fb f1 36 c7 31 1b 0d 50 70 1a 27 3b 30 4a 64 fa 3b af 6c 37 2a 2d 80 51 3d
- WPS: AuthKey - hexdump(len=32): e9 35 63 9e 69 2e c0 5c 91 bf 3b 90 b0 e8 21 e6 8f 1e 58 84 84 31 2f 7c 73 a8 7c c0 1a b7 27 8c
- WPS: KeyWrapKey - hexdump(len=16): 07 3d bc a9 f5 3d 5e ab 88 ea 88 42 a6 86 85 8c
- WPS: EMSK - hexdump(len=32): 4a 88 b4 72 e1 ba 80 0c ef 9d 8d ae 6b 86 68 07 9d 83 17 0f 2f 91 1e 4f d6 7d 54 cd a8 a3 f4 94
- WPS: * Authentication Type Flags
- WPS: * Encryption Type Flags
- WPS: * Connection Type Flags
- WPS: * Config Methods (3148)
- WPS: * Manufacturer
- WPS: * Model Name
- WPS: * Model Number
- WPS: * Serial Number
- WPS: * Primary Device Type
- WPS: * Device Name
- WPS: * RF Bands (1)
- WPS: * Association State
- WPS: * Configuration Error (0)
- WPS: * Device Password ID (0)
- WPS: * OS Version
- WPS: * Version2 (0x20)
- WPS: * Authenticator
- EAP-WSC: MESG -> MESG
- EAP-WSC: Generating Response
- EAP-WSC: Sending out 379 bytes (message sent completely)
- EAP-WSC: MESG -> MESG
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e29423f0
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=132
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=2 method=254 vendor=14122 vendorMethod=1
- EAP: EAP entering state METHOD
- EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
- WPS: Processing received message (len=114 op_code=4)
- WPS: Received WSC_MSG
- WPS: Received M3
- WPS: E-Hash1 - hexdump(len=32): e3 a0 b2 aa 6b b5 cc bb c5 92 d0 36 fb 45 92 84 7a 13 62 ce f9 f9 e6 a4 da c8 b4 16 8c a7 ca dc
- WPS: E-Hash2 - hexdump(len=32): 8a d9 4d a0 bf 45 43 59 d5 20 9d 3b f1 8c fa 97 36 ad 98 1f 01 bd db 39 c6 3e 40 90 16 42 c5 fe
- EAP-WSC: MESG -> MESG
- WPS: Building Message M4
- WPS: Device Password - hexdump_ascii(len=8):
- 31 33 32 32 31 39 33 35 13221935
- WPS: PSK1 - hexdump(len=16): 83 af 71 90 80 d0 d1 29 28 3d 43 06 35 cf 26 72
- WPS: PSK2 - hexdump(len=16): 94 eb f7 6a 3d 4a 93 05 98 1c 85 f1 87 d6 14 b0
- WPS: * Version (hardcoded 0x10)
- WPS: * Message Type (8)
- WPS: * Enrollee Nonce
- WPS: R-S1 - hexdump(len=16): df 49 82 c7 5e 5a 17 94 d4 ab e9 13 32 59 f8 c2
- WPS: R-S2 - hexdump(len=16): 51 14 f6 8a dd 6e 38 91 b5 68 52 dd cf df 4a a2
- WPS: * R-Hash1
- WPS: R-Hash1 - hexdump(len=32): 2d 03 7c d9 c4 bd e6 05 97 da fc d0 7e 06 f1 a2 3a e3 0e d9 ec e4 15 54 c4 bf 22 1e 79 6f 64 9c
- WPS: * R-Hash2
- WPS: R-Hash2 - hexdump(len=32): cf 4e 48 d9 4e 84 07 c7 04 6e 9a ac 84 3b bd 3b 6d 08 f1 88 90 0c 00 32 90 2c d7 29 72 45 f7 a3
- WPS: * R-SNonce1
- WPS: * Key Wrap Authenticator
- WPS: * Encrypted Settings
- WPS: * Version2 (0x20)
- WPS: * Authenticator
- EAP-WSC: MESG -> MESG
- EAP-WSC: Generating Response
- EAP-WSC: Sending out 192 bytes (message sent completely)
- EAP-WSC: MESG -> MESG
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e2941340
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=128
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=3 method=254 vendor=14122 vendorMethod=1
- EAP: EAP entering state METHOD
- EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
- WPS: Processing received message (len=110 op_code=4)
- WPS: Received WSC_MSG
- WPS: Received M5
- WPS: Processing decrypted Encrypted Settings attribute
- WPS: E-SNonce1 - hexdump(len=16): 6f 25 1d 2a ab 3e 63 69 a6 cd c0 c5 e3 cb f0 33
- WPS: Enrollee proved knowledge of the first half of the device password
- EAP-WSC: MESG -> MESG
- WPS: Building Message M6
- WPS: * Version (hardcoded 0x10)
- WPS: * Message Type (10)
- WPS: * Enrollee Nonce
- WPS: * R-SNonce2
- WPS: * Key Wrap Authenticator
- WPS: * Encrypted Settings
- WPS: * Version2 (0x20)
- WPS: * Authenticator
- EAP-WSC: MESG -> MESG
- EAP-WSC: Generating Response
- EAP-WSC: Sending out 120 bytes (message sent completely)
- EAP-WSC: MESG -> MESG
- EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e294b510
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state RECEIVE
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=176
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Request id=4 method=254 vendor=14122 vendorMethod=1
- EAP: EAP entering state METHOD
- EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
- WPS: Processing received message (len=158 op_code=4)
- WPS: Received WSC_MSG
- WPS: Received M7
- WPS: Processing decrypted Encrypted Settings attribute
- WPS: E-SNonce2 - hexdump(len=16): 0e b6 eb 3f 3a e6 bf 5b 05 81 c8 f1 71 ea e9 73
- WPS: Enrollee proved knowledge of the second half of the device password
- WPS: Invalidated PIN for UUID - hexdump(len=16): c8 12 0d b3 01 56 48 4d c5 52 e5 68 94 c6 9b 99
- WPS: Remove authorized MAC ff:ff:ff:ff:ff:ff
- WPS: Authorized MACs - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPS: Selected registrar information changed
- WPS: Authorized MACs union (start with own) - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPS: Internal Registrar selected (pbc=0)
- WPS: wps_cb_set_sel_reg: sel_reg=1 config_methods=0x3148 pbc=0 methods=0x3148
- WPS: Processing AP Settings
- WPS: SSID - hexdump_ascii(len=9):
- 63 61 76 61 6c 6c 69 6e 69 cavallini
- WPS: Authentication Type: 0x2
- WPS: Encryption Type: 0x8
- WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
- WPS: MAC Address a4:52:6f:27:57:d6
- WPS: Received old AP configuration from AP
- WPS: PIN completed using internal Registrar
- WPS: Selected registrar information changed
- WPS: Authorized MACs union (start with own) - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPS: Internal Registrar not selected
- WPS: wps_cb_set_sel_reg: sel_reg=0 config_methods=0x3148 pbc=0 methods=0x0
- WPS: * AP Settings
- WPS: * Network Index (1)
- WPS: * SSID
- WPS: SSID for Credential - hexdump_ascii(len=9):
- 63 61 76 61 6c 6c 69 6e 69 cavallini
- WPS: * Authentication Type (0x2)
- WPS: * Encryption Type (0x8)
- WPS: * Network Key (len=9)
- WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
- WPS: * MAC Address (a4:52:6f:27:57:d6)
- WPS: Update local configuration based on the AP configuration
- wlan0: WPS-CRED-RECEIVED
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- WPS: Received Credential attribute - hexdump(len=57): 10 0e 00 35 10 26 00 01 01 10 45 00 09 63 61 76 61 6c 6c 69 6e 69 10 03 00 02 00 02 10 0f 00 02 00 08 10 27 00 09 73 61 75 63 61 31 32 30 33 10 20 00 06 a4 52 6f 27 57 d6
- WPS: SSID - hexdump_ascii(len=9):
- 63 61 76 61 6c 6c 69 6e 69 cavallini
- WPS: Authentication Type 0x2
- WPS: Encryption Type 0x8
- WPS: Network Key Index 0
- WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
- WPS: MAC Address a4:52:6f:27:57:d6
- WPS: Replace WPS network block based on the received credential
- WPS: AP found from BSS table
- Remove duplicate network 2
- wlan0: WPS-FAIL msg=11 config_error=0
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- WPS: Register timeout to clear WPS network
- P2P: Ignore WPS fail event - P2P provisioning not in progress
- EAP-WSC: MESG -> MESG
- WPS: Building Message WSC_NACK
- WPS: * Version (hardcoded 0x10)
- WPS: * Message Type (14)
- WPS: * Enrollee Nonce
- WPS: * Registrar Nonce
- WPS: * Configuration Error (0)
- WPS: * Version2 (0x20)
- EAP-WSC: MESG -> MESG
- EAP-WSC: Generating Response
- EAP-WSC: Sending out 66 bytes (message sent completely)
- EAP-WSC: MESG -> FAIL
- EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL eapRespData=0x5570e293fc80
- EAP: EAP entering state SEND_RESPONSE
- EAP: EAP entering state IDLE
- EAPOL: SUPP_BE entering state RESPONSE
- EAPOL: txSuppRsp
- TX EAPOL: dst=a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state RECEIVE
- WPS: Clear WPS network from timeout
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=8
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- EAPOL: Received EAP-Packet frame
- EAPOL: SUPP_BE entering state REQUEST
- EAPOL: getSuppRsp
- EAP: EAP entering state RECEIVED
- EAP: Received EAP-Failure
- EAP: Status notification: completion (param=failure)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- EAP: Workaround for unexpected identifier field in EAP Success: reqId=5 lastId=4 (these are supposed to be same)
- EAP: EAP entering state FAILURE
- wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- EAPOL: SUPP_PAE entering state HELD
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Set supplicant port unauthorized for a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state RECEIVE
- EAPOL: SUPP_BE entering state FAIL
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=FAILURE
- wlan0: WPS-FAIL
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- WPS: Network configuration replaced - try to associate with the received credential (freq=2462)
- wlan0: Request to deauthenticate - bssid=a4:52:6f:27:57:d6 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
- TDLS: Tear down peers
- wpa_driver_nl80211_deauthenticate(addr=a4:52:6f:27:57:d6 reason_code=3)
- wlan0: Event DEAUTH (12) received
- wlan0: Deauthentication notification
- wlan0: * reason 3 (locally generated)
- Deauthentication frame IE(s) - hexdump(len=0): [NULL]
- wlan0: CTRL-EVENT-DISCONNECTED bssid=a4:52:6f:27:57:d6 reason=3 locally_generated=1
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- wlan0: Auto connect enabled: try to reconnect (wps=1/0 wpa_state=6)
- wlan0: Setting scan request: 0.100000 sec
- wlan0: Radio work 'sme-connect'@0x5570e2945d60 done in 4.502674 seconds
- wlan0: Ignore connection failure due to local request to disconnect
- TDLS: Remove peers on disassociation
- wlan0: WPA: Clear old PMK and PTK
- wlan0: Disconnect event - remove keys
- wlan0: State: ASSOCIATED -> DISCONNECTED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WMM AC: WMM AC is disabled
- EAPOL: External notification - portEnabled=0
- EAPOL: SUPP_PAE entering state DISCONNECTED
- EAPOL: Supplicant port status: Unauthorized
- nl80211: Skip set_supp_port(unauthorized) while not associated
- EAPOL: SUPP_BE entering state INITIALIZE
- EAP: EAP entering state DISABLED
- EAPOL: External notification - portValid=0
- wlan0: State: DISCONNECTED -> DISCONNECTED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- WPS: Checking whether fast association without a new scan can be used
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: f8:1a:67:30:4a:4c ssid='Wi-Fi_SECpa2' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-19 wps
- wlan0: skip - SSID mismatch
- wlan0: 1: a4:5d:a1:82:52:9a ssid='Tecnosoft' wpa_ie_len=22 rsn_ie_len=0 caps=0x431 level=-29 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: a4:52:6f:27:57:d6 ssid='cavallini' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-51 wps
- wlan0: selected based on WPA IE
- wlan0: selected BSS a4:52:6f:27:57:d6 ssid='cavallini'
- WPS: Continue association from timeout
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x323 ([UP])
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x323 ([UP])
- nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
- nl80211: Delete station a4:52:6f:27:57:d6
- nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
- nl80211: Deauthenticate event
- nl80211: Ignore deauth event triggered due to own deauth request
- nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
- nl80211: Ignore disconnect event when using userspace SME
- nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
- nl80211: Regulatory domain change
- * initiator=0
- * type=1
- wlan0: Event CHANNEL_LIST_CHANGED (28) received
- wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- nl80211: Regulatory information - country=00
- nl80211: 2402-2472 @ 40 MHz 20 mBm
- nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
- nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
- nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
- nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
- nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
- nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
- nl80211: 57240-63720 @ 2160 MHz 0 mBm
- nl80211: Added 802.11b mode based on 802.11g information
- WPS: Continuing association after eapol_cb
- wlan0: Selecting BSS from priority group 0
- wlan0: 0: f8:1a:67:30:4a:4c ssid='Wi-Fi_SECpa2' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-19 wps
- wlan0: skip - SSID mismatch
- wlan0: 1: a4:5d:a1:82:52:9a ssid='Tecnosoft' wpa_ie_len=22 rsn_ie_len=0 caps=0x431 level=-29 wps
- wlan0: skip - SSID mismatch
- wlan0: 2: a4:52:6f:27:57:d6 ssid='cavallini' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-51 wps
- wlan0: selected based on WPA IE
- wlan0: selected BSS a4:52:6f:27:57:d6 ssid='cavallini'
- wlan0: Considering connect request: reassociate: 1 selected: a4:52:6f:27:57:d6 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED ssid=0x5570e294b630 current_ssid=(nil)
- wlan0: Request association with a4:52:6f:27:57:d6
- wlan0: Re-association to the same ESS
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=11): 00 09 63 61 76 61 6c 6c 69 6e 69
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 0b
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 04
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2f 01 04
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
- WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlan0: Add radio work 'sme-connect'@0x5570e2945d60
- wlan0: First radio work item in the queue - schedule start immediately
- wlan0: Starting radio work 'sme-connect'@0x5570e2945d60 after 0.000011 second wait
- wlan0: Automatic auth_alg selection: 0x1
- wlan0: Overriding auth_alg selection: 0x1
- RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
- RSN: Search for BSSID a4:52:6f:27:57:d6
- RSN: No PMKSA cache entry found
- wlan0: WPA: using IEEE 802.11i/D3.0
- wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1
- wlan0: WPA: Selected mgmt group cipher 0
- WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
- wlan0: WPA: clearing AP RSN IE
- wlan0: WPA: using GTK CCMP
- wlan0: WPA: using PTK CCMP
- wlan0: WPA: using KEY_MGMT WPA-PSK
- wlan0: WPA: not using MGMT group cipher
- WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- RRM: Determining whether RRM can be used - device support: 0x0
- RRM: No RRM in network
- wlan0: Cancelling scan request
- wlan0: SME: Trying to authenticate with a4:52:6f:27:57:d6 (SSID='cavallini' freq=2462 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- wlan0: State: DISCONNECTED -> AUTHENTICATING
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - EAP fail=0
- EAPOL: External notification - portControl=Auto
- wlan0: Determining shared radio frequencies (max len 1)
- wlan0: Shared frequencies (len=0): completed iteration
- nl80211: Authenticate (ifindex=7)
- * bssid=a4:52:6f:27:57:d6
- * freq=2462
- * SSID - hexdump_ascii(len=9):
- 63 61 76 61 6c 6c 69 6e 69 cavallini
- * IEs - hexdump(len=0): [NULL]
- * Auth Type 0
- nl80211: Authentication request send successfully
- nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
- nl80211: New station a4:52:6f:27:57:d6
- nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlan0
- nl80211: Authenticate event
- wlan0: Event AUTH (11) received
- wlan0: SME: Authentication response: peer=a4:52:6f:27:57:d6 auth_type=0 auth_transaction=2 status_code=0
- wlan0: set_disable_max_amsdu: -1
- wlan0: set_ampdu_factor: -1
- wlan0: set_ampdu_density: -1
- wlan0: set_disable_ht40: 0
- wlan0: set_disable_sgi: 0
- wlan0: set_disable_ldpc: 0
- wlan0: Trying to associate with a4:52:6f:27:57:d6 (SSID='cavallini' freq=2462 MHz)
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- wlan0: State: AUTHENTICATING -> ASSOCIATING
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
- nl80211: Associate (ifindex=7)
- * bssid=a4:52:6f:27:57:d6
- * freq=2462
- * SSID - hexdump_ascii(len=9):
- 63 61 76 61 6c 6c 69 6e 69 cavallini
- * IEs - hexdump(len=34): 7f 08 00 00 0a 02 00 00 00 40 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
- * WPA Versions 0x1
- * pairwise=0xfac04
- * group=0xfac04
- * akm=0xfac02
- * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
- nl80211: Association request send successfully
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
- nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0
- nl80211: Associate event
- wlan0: Event ASSOC (0) received
- wlan0: Association info event
- resp_ies - hexdump(len=105): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 06 f0 04 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
- wlan0: freq=2462 MHz
- FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
- wlan0: State: ASSOCIATING -> ASSOCIATED
- nl80211: Set wlan0 operstate 0->0 (DORMANT)
- netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
- wlan0: Associated to a new BSS: BSSID=a4:52:6f:27:57:d6
- wlan0: Associated with a4:52:6f:27:57:d6
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- wlan0: WPA: Association event - clear replay counter
- wlan0: WPA: Clear old PTK
- TDLS: Remove peers on association
- EAPOL: External notification - portEnabled=0
- EAPOL: External notification - portValid=0
- EAPOL: External notification - EAP success=0
- EAPOL: External notification - portEnabled=1
- EAPOL: SUPP_PAE entering state CONNECTING
- EAPOL: SUPP_BE entering state IDLE
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: Cancelling scan request
- WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
- WMM AC: U-APSD queues=0x0
- WMM AC: Valid WMM association, WMM AC is enabled
- nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
- nl80211: Ignore connect event (cmd=46) when using userspace SME
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=99
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- wlan0: Setting authentication timeout: 10 sec 0 usec
- wlan0: IEEE 802.1X RX: version=1 type=3 length=95
- wlan0: EAPOL-Key type=254
- wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
- wlan0: key_length=16 key_data_length=0
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 1 of 4-Way Handshake from a4:52:6f:27:57:d6 (ver=2)
- WPA: Renewed SNonce - hexdump(len=32): 6b ff 32 20 f4 69 47 65 50 1e 45 e2 73 b5 e1 f1 72 d0 b5 c6 70 2d 5a 63 88 11 64 9a 7f 21 ef be
- WPA: PTK derivation - A1=98:3f:9f:22:1a:76 A2=a4:52:6f:27:57:d6
- WPA: Nonce1 - hexdump(len=32): 6b ff 32 20 f4 69 47 65 50 1e 45 e2 73 b5 e1 f1 72 d0 b5 c6 70 2d 5a 63 88 11 64 9a 7f 21 ef be
- WPA: Nonce2 - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
- WPA: PMK - hexdump(len=32): c9 a2 e0 05 51 70 20 ba 11 f7 7f 8e 9c cd 76 f1 aa 64 f6 9b e4 3a 01 72 c3 0a 5a af a7 f7 8a 26
- WPA: PTK - hexdump(len=48): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11 02 04 9e 4e 37 ab 31 68 d2 4d 55 86 6b b0 b4 1e 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
- WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
- WPA: KEK - hexdump(len=16): 02 04 9e 4e 37 ab 31 68 d2 4d 55 86 6b b0 b4 1e
- WPA: TK - hexdump(len=16): 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
- WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
- WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
- wlan0: WPA: Sending EAPOL-Key 2/4
- WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
- WPA: Derived Key MIC - hexdump(len=16): 0f dc 8e 67 7d d7 3c 1e 54 fb 69 85 1a ce 40 19
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=125
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- wlan0: IEEE 802.1X RX: version=1 type=3 length=121
- wlan0: EAPOL-Key type=254
- wlan0: key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
- wlan0: key_length=16 key_data_length=26
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
- key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
- key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): b1 79 cf a8 5e d7 eb 95 2f 3e ad d6 c5 c9 7f d4
- wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
- wlan0: WPA: RX message 3 of 4-Way Handshake from a4:52:6f:27:57:d6 (ver=2)
- WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
- WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
- wlan0: WPA: Sending EAPOL-Key 4/4
- WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
- WPA: Derived Key MIC - hexdump(len=16): 32 01 97 29 60 bb e7 fb 28 d9 4e 7d ed f2 5b 45
- wlan0: WPA: Installing PTK to the driver
- WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
- wpa_driver_nl80211_set_key: ifindex=7 (wlan0) alg=3 addr=0x5570e2921ac0 key_idx=0 set_tx=1 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
- nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
- addr=a4:52:6f:27:57:d6
- wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
- l2_packet_receive: src=a4:52:6f:27:57:d6 len=123
- wlan0: RX EAPOL from a4:52:6f:27:57:d6
- wlan0: IEEE 802.1X RX: version=1 type=3 length=119
- wlan0: EAPOL-Key type=254
- wlan0: key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
- wlan0: key_length=16 key_data_length=24
- replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
- key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 65
- key_iv - hexdump(len=16): 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a1
- key_rsc - hexdump(len=8): 29 be 00 00 00 00 00 00
- key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
- key_mic - hexdump(len=16): 98 e8 e0 4d 06 6f 1d e7 ce c2 0b 3f 7b 4d 5f 0c
- wlan0: WPA: RX message 1 of Group Key Handshake from a4:52:6f:27:57:d6 (ver=2)
- wlan0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
- WPA: Group Key - hexdump(len=16): 30 be e8 63 a0 f4 8a c2 80 73 94 90 04 fd 7e 64
- wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
- WPA: RSC - hexdump(len=6): 29 be 00 00 00 00
- wpa_driver_nl80211_set_key: ifindex=7 (wlan0) alg=3 addr=0x5570e16bff64 key_idx=1 set_tx=0 seq_len=6 key_len=16
- nl80211: KEY_DATA - hexdump(len=16): 30 be e8 63 a0 f4 8a c2 80 73 94 90 04 fd 7e 64
- nl80211: KEY_SEQ - hexdump(len=6): 29 be 00 00 00 00
- broadcast key
- wlan0: WPA: Sending EAPOL-Key 2/2
- WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
- WPA: Derived Key MIC - hexdump(len=16): 83 cb 1b e3 5c 00 f9 6e ba 7e 75 3c 1e aa cd b1
- wlan0: WPA: Key negotiation completed with a4:52:6f:27:57:d6 [PTK=CCMP GTK=CCMP]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- wlan0: Cancelling authentication timeout
- wlan0: State: GROUP_HANDSHAKE -> COMPLETED
- wlan0: Radio work 'sme-connect'@0x5570e2945d60 done in 0.163786 seconds
- wlan0: CTRL-EVENT-CONNECTED - Connection to a4:52:6f:27:57:d6 completed [id=3 id_str=]
- CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
- nl80211: Set wlan0 operstate 0->1 (UP)
- netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
- EAPOL: External notification - portValid=1
- EAPOL: External notification - EAP success=1
- EAPOL: SUPP_PAE entering state AUTHENTICATING
- EAPOL: SUPP_BE entering state SUCCESS
- EAP: EAP entering state DISABLED
- EAPOL: SUPP_PAE entering state AUTHENTICATED
- EAPOL: Supplicant port status: Authorized
- nl80211: Set supplicant port authorized for a4:52:6f:27:57:d6
- EAPOL: SUPP_BE entering state IDLE
- EAPOL authentication completed - result=SUCCESS
- RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x10363 ([UP][RUNNING][LOWER_UP])
- EAPOL: startWhen --> 0
- EAPOL: disable timer tick
Advertisement
Add Comment
Please, Sign In to add comment