pipels

Untitled

Jan 31st, 2018
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 32.02 KB | None | 0 0
  1. WPS: Received M1
  2. WPS: UUID-E - hexdump(len=16): c8 12 0d b3 01 56 48 4d c5 52 e5 68 94 c6 9b 99
  3. WPS: Enrollee MAC Address a4:52:6f:27:57:d6
  4. WPS: Enrollee Nonce - hexdump(len=16): 89 67 4f ce 62 d9 1e 50 71 a4 3a 10 6e fe 41 29
  5. WPS: Enrollee Authentication Type flags 0x27
  6. WPS: Enrollee Encryption Type flags 0xf
  7. WPS: Enrollee Connection Type flags 0x1
  8. WPS: Enrollee Config Methods 0x84 [Label] [PBC]
  9. WPS: Prefer PSK format key due to Enrollee not supporting display
  10. WPS: Enrollee Wi-Fi Protected Setup State 2
  11. WPS: Manufacturer - hexdump_ascii(len=8):
  12. 42 72 6f 61 64 63 6f 6d Broadcom
  13. WPS: Model Name - hexdump_ascii(len=8):
  14. 42 72 6f 61 64 63 6f 6d Broadcom
  15. WPS: Model Number - hexdump_ascii(len=6):
  16. 31 32 33 34 35 36 123456
  17. WPS: Serial Number - hexdump_ascii(len=4):
  18. 31 32 33 34 1234
  19. WPS: Primary Device Type: 6-0050F204-1
  20. WPS: Device Name - hexdump_ascii(len=10):
  21. 42 72 6f 61 64 63 6f 6d 41 50 BroadcomAP
  22. WPS: Enrollee RF Bands 0x1
  23. WPS: Enrollee Association State 0
  24. WPS: Device Password ID 0
  25. WPS: Enrollee Configuration Error 0
  26. WPS: OS Version 80000000
  27. EAP-WSC: MESG -> MESG
  28. WPS: Found a wildcard PIN. Assigned it for this UUID-E
  29. WPS: Registrar Nonce - hexdump(len=16): 92 5b 72 e0 fb af 20 63 f3 db ae 0e d5 89 8f 59
  30. WPS: UUID-R - hexdump(len=16): 8e e8 9b dd 1a 13 5b fc a0 82 0d 62 b2 f3 d8 2e
  31. WPS: Building Message M2
  32. WPS: * Version (hardcoded 0x10)
  33. WPS: * Message Type (5)
  34. WPS: * Enrollee Nonce
  35. WPS: * Registrar Nonce
  36. WPS: * UUID-R
  37. WPS: * Public Key
  38. WPS: Generate new DH keys
  39. WPS: DH Private Key - hexdump(len=192): 5c 4a 10 ac 42 71 90 13 a9 00 59 2d 37 3a 83 74 5d 15 35 88 66 c1 fa 47 f8 83 39 64 11 7c 50 5c f6 d1 64 c0 77 c4 7c 09 e1 7f b9 91 1a 7e 03 14 49 45 a5 2d d9 68 3e 4a 75 1d dd 83 b6 03 8c 6b ab 18 24 3f 67 91 a6 d8 7d b8 a7 3f 26 37 00 09 63 24 9e 6d dc 7f b1 86 46 dd 49 af 8d 91 51 e8 80 19 03 d9 b8 7b 9b 5f 1d 5d 04 a5 1a 40 f9 bd 61 1a 31 cb a0 a9 c2 d2 72 21 7e 6a 7c 4a 13 91 ac d4 2f 28 f8 d5 b3 e2 d8 0e cd ee e5 1d fd c7 f9 58 d0 db 22 d0 bf 60 71 6a 2c df ac 1c 1c 60 e2 23 fe bc 4f 31 9b c6 1b 86 90 ca 0c c4 77 25 ac 7a 97 e9 71 be 7a 7e 0c b7 0c bc a4 0a 6a e5
  40. WPS: DH own Public Key - hexdump(len=192): b7 f9 2d 83 d0 64 91 24 03 a1 dc 29 2f 9f 15 63 11 1e b1 ed 99 9c a8 02 64 81 a0 92 0b 5d 4a 4e 82 29 41 30 23 da 43 59 2e 8c b8 33 84 95 e3 2b 96 a4 cd 34 62 99 3e 58 a1 92 93 c8 c3 28 86 7d 78 80 96 18 7f b0 17 da f1 92 9b 83 3d a1 41 57 8d 88 db 2a bf e6 ee 35 b0 53 e9 ed 81 02 47 4c 72 05 2c 2e a1 8b cd 6c 8c 4f 57 4e 55 b5 0a d6 98 88 89 5b a8 f3 1c d6 9b 75 3a 2c 00 aa d2 19 26 e8 fc 2d b9 a3 af 86 bd 0d 96 1f 33 0b ad d5 5f ea 4d e1 2d 24 96 b9 f5 49 c1 8a 45 a3 35 ab cb 3e 2b 98 45 05 76 b8 7f 19 8f 98 9e a0 a0 42 c8 73 9b 96 c7 0f 25 12 78 c0 21 3d 3a 07 99 e6
  41. WPS: DH Private Key - hexdump(len=192): 5c 4a 10 ac 42 71 90 13 a9 00 59 2d 37 3a 83 74 5d 15 35 88 66 c1 fa 47 f8 83 39 64 11 7c 50 5c f6 d1 64 c0 77 c4 7c 09 e1 7f b9 91 1a 7e 03 14 49 45 a5 2d d9 68 3e 4a 75 1d dd 83 b6 03 8c 6b ab 18 24 3f 67 91 a6 d8 7d b8 a7 3f 26 37 00 09 63 24 9e 6d dc 7f b1 86 46 dd 49 af 8d 91 51 e8 80 19 03 d9 b8 7b 9b 5f 1d 5d 04 a5 1a 40 f9 bd 61 1a 31 cb a0 a9 c2 d2 72 21 7e 6a 7c 4a 13 91 ac d4 2f 28 f8 d5 b3 e2 d8 0e cd ee e5 1d fd c7 f9 58 d0 db 22 d0 bf 60 71 6a 2c df ac 1c 1c 60 e2 23 fe bc 4f 31 9b c6 1b 86 90 ca 0c c4 77 25 ac 7a 97 e9 71 be 7a 7e 0c b7 0c bc a4 0a 6a e5
  42. WPS: DH peer Public Key - hexdump(len=192): 5b f4 25 50 3e 30 e2 ea 91 76 a3 ac 74 16 d1 a6 82 3d 77 98 33 13 58 8d 2d 46 0f 58 0e 39 e2 44 9d c2 ea 4a a1 53 be fb fd 5b 30 24 95 af 04 3b b7 e0 b2 2b c1 7d ee 13 68 32 ba 8c 06 52 7a 71 59 cb 89 7f 77 ab e5 e4 46 79 1f 8f 39 5f 10 00 30 5b 36 fa 3b 7b 3a dd ea 4e c7 12 46 01 84 03 ea 88 9a 98 6c b0 85 62 47 33 6c cb 41 74 8e 95 a3 08 34 25 b6 65 7b 1c 4a a4 2d f0 87 68 d6 6c f1 42 e7 32 2e 67 d3 e0 da 67 79 a4 ee 70 92 de 13 24 f7 93 33 ae 19 67 3e 21 cf e9 26 b9 b1 9e f1 ba 20 15 67 4e 84 47 d8 e3 59 86 1f e2 ca 67 61 d9 09 e8 d4 10 71 ee 13 c2 bc 70 3a 50 3e d2
  43. WPS: DH shared key - hexdump(len=192): ce 92 21 c2 59 81 2d 44 94 92 7f c6 7d fa 69 93 09 0a 85 80 e8 87 5e cb 9a 91 9d d6 5a 94 51 38 9f 7f 86 45 89 44 d8 1e 2e aa b3 66 e5 a4 95 0b 94 f5 6f 34 4d da f0 fe e9 9d b6 ea d5 b6 85 06 63 75 d9 e7 ac 19 a4 fd 1b 85 ca 07 39 4d 43 87 b8 77 08 72 08 c4 44 37 fe 18 a6 12 85 24 93 f9 36 38 87 a4 45 8d 18 39 db c7 02 30 ce 34 b7 c5 f8 12 af f2 e6 e9 5d 5e 2e cf 46 c2 20 02 e9 4d 67 60 9a a7 61 5d bd 99 44 4b 6f 38 02 a8 66 f8 e7 8e 94 58 6f 9e db cf 46 f5 0d 71 2f 60 f4 0b 6a 46 c0 92 ee 12 b0 a7 6b 77 d2 06 66 c0 bf 68 f6 74 f4 e3 17 21 19 5e da d0 f0 ce af 91 fa e2
  44. WPS: DHKey - hexdump(len=32): 28 10 b0 4e db 8b dd 8f 04 0b be 7f 8c 17 51 a9 30 4c 14 f7 6e fa f8 6c e7 47 b6 01 e3 a5 93 29
  45. WPS: KDK - hexdump(len=32): a2 f2 0f 9b f6 69 e7 fb f1 36 c7 31 1b 0d 50 70 1a 27 3b 30 4a 64 fa 3b af 6c 37 2a 2d 80 51 3d
  46. WPS: AuthKey - hexdump(len=32): e9 35 63 9e 69 2e c0 5c 91 bf 3b 90 b0 e8 21 e6 8f 1e 58 84 84 31 2f 7c 73 a8 7c c0 1a b7 27 8c
  47. WPS: KeyWrapKey - hexdump(len=16): 07 3d bc a9 f5 3d 5e ab 88 ea 88 42 a6 86 85 8c
  48. WPS: EMSK - hexdump(len=32): 4a 88 b4 72 e1 ba 80 0c ef 9d 8d ae 6b 86 68 07 9d 83 17 0f 2f 91 1e 4f d6 7d 54 cd a8 a3 f4 94
  49. WPS: * Authentication Type Flags
  50. WPS: * Encryption Type Flags
  51. WPS: * Connection Type Flags
  52. WPS: * Config Methods (3148)
  53. WPS: * Manufacturer
  54. WPS: * Model Name
  55. WPS: * Model Number
  56. WPS: * Serial Number
  57. WPS: * Primary Device Type
  58. WPS: * Device Name
  59. WPS: * RF Bands (1)
  60. WPS: * Association State
  61. WPS: * Configuration Error (0)
  62. WPS: * Device Password ID (0)
  63. WPS: * OS Version
  64. WPS: * Version2 (0x20)
  65. WPS: * Authenticator
  66. EAP-WSC: MESG -> MESG
  67. EAP-WSC: Generating Response
  68. EAP-WSC: Sending out 379 bytes (message sent completely)
  69. EAP-WSC: MESG -> MESG
  70. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e29423f0
  71. EAP: EAP entering state SEND_RESPONSE
  72. EAP: EAP entering state IDLE
  73. EAPOL: SUPP_BE entering state RESPONSE
  74. EAPOL: txSuppRsp
  75. TX EAPOL: dst=a4:52:6f:27:57:d6
  76. EAPOL: SUPP_BE entering state RECEIVE
  77. l2_packet_receive: src=a4:52:6f:27:57:d6 len=132
  78. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  79. EAPOL: Received EAP-Packet frame
  80. EAPOL: SUPP_BE entering state REQUEST
  81. EAPOL: getSuppRsp
  82. EAP: EAP entering state RECEIVED
  83. EAP: Received EAP-Request id=2 method=254 vendor=14122 vendorMethod=1
  84. EAP: EAP entering state METHOD
  85. EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
  86. WPS: Processing received message (len=114 op_code=4)
  87. WPS: Received WSC_MSG
  88. WPS: Received M3
  89. WPS: E-Hash1 - hexdump(len=32): e3 a0 b2 aa 6b b5 cc bb c5 92 d0 36 fb 45 92 84 7a 13 62 ce f9 f9 e6 a4 da c8 b4 16 8c a7 ca dc
  90. WPS: E-Hash2 - hexdump(len=32): 8a d9 4d a0 bf 45 43 59 d5 20 9d 3b f1 8c fa 97 36 ad 98 1f 01 bd db 39 c6 3e 40 90 16 42 c5 fe
  91. EAP-WSC: MESG -> MESG
  92. WPS: Building Message M4
  93. WPS: Device Password - hexdump_ascii(len=8):
  94. 31 33 32 32 31 39 33 35 13221935
  95. WPS: PSK1 - hexdump(len=16): 83 af 71 90 80 d0 d1 29 28 3d 43 06 35 cf 26 72
  96. WPS: PSK2 - hexdump(len=16): 94 eb f7 6a 3d 4a 93 05 98 1c 85 f1 87 d6 14 b0
  97. WPS: * Version (hardcoded 0x10)
  98. WPS: * Message Type (8)
  99. WPS: * Enrollee Nonce
  100. WPS: R-S1 - hexdump(len=16): df 49 82 c7 5e 5a 17 94 d4 ab e9 13 32 59 f8 c2
  101. WPS: R-S2 - hexdump(len=16): 51 14 f6 8a dd 6e 38 91 b5 68 52 dd cf df 4a a2
  102. WPS: * R-Hash1
  103. WPS: R-Hash1 - hexdump(len=32): 2d 03 7c d9 c4 bd e6 05 97 da fc d0 7e 06 f1 a2 3a e3 0e d9 ec e4 15 54 c4 bf 22 1e 79 6f 64 9c
  104. WPS: * R-Hash2
  105. WPS: R-Hash2 - hexdump(len=32): cf 4e 48 d9 4e 84 07 c7 04 6e 9a ac 84 3b bd 3b 6d 08 f1 88 90 0c 00 32 90 2c d7 29 72 45 f7 a3
  106. WPS: * R-SNonce1
  107. WPS: * Key Wrap Authenticator
  108. WPS: * Encrypted Settings
  109. WPS: * Version2 (0x20)
  110. WPS: * Authenticator
  111. EAP-WSC: MESG -> MESG
  112. EAP-WSC: Generating Response
  113. EAP-WSC: Sending out 192 bytes (message sent completely)
  114. EAP-WSC: MESG -> MESG
  115. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e2941340
  116. EAP: EAP entering state SEND_RESPONSE
  117. EAP: EAP entering state IDLE
  118. EAPOL: SUPP_BE entering state RESPONSE
  119. EAPOL: txSuppRsp
  120. TX EAPOL: dst=a4:52:6f:27:57:d6
  121. EAPOL: SUPP_BE entering state RECEIVE
  122. l2_packet_receive: src=a4:52:6f:27:57:d6 len=128
  123. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  124. EAPOL: Received EAP-Packet frame
  125. EAPOL: SUPP_BE entering state REQUEST
  126. EAPOL: getSuppRsp
  127. EAP: EAP entering state RECEIVED
  128. EAP: Received EAP-Request id=3 method=254 vendor=14122 vendorMethod=1
  129. EAP: EAP entering state METHOD
  130. EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
  131. WPS: Processing received message (len=110 op_code=4)
  132. WPS: Received WSC_MSG
  133. WPS: Received M5
  134. WPS: Processing decrypted Encrypted Settings attribute
  135. WPS: E-SNonce1 - hexdump(len=16): 6f 25 1d 2a ab 3e 63 69 a6 cd c0 c5 e3 cb f0 33
  136. WPS: Enrollee proved knowledge of the first half of the device password
  137. EAP-WSC: MESG -> MESG
  138. WPS: Building Message M6
  139. WPS: * Version (hardcoded 0x10)
  140. WPS: * Message Type (10)
  141. WPS: * Enrollee Nonce
  142. WPS: * R-SNonce2
  143. WPS: * Key Wrap Authenticator
  144. WPS: * Encrypted Settings
  145. WPS: * Version2 (0x20)
  146. WPS: * Authenticator
  147. EAP-WSC: MESG -> MESG
  148. EAP-WSC: Generating Response
  149. EAP-WSC: Sending out 120 bytes (message sent completely)
  150. EAP-WSC: MESG -> MESG
  151. EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL eapRespData=0x5570e294b510
  152. EAP: EAP entering state SEND_RESPONSE
  153. EAP: EAP entering state IDLE
  154. EAPOL: SUPP_BE entering state RESPONSE
  155. EAPOL: txSuppRsp
  156. TX EAPOL: dst=a4:52:6f:27:57:d6
  157. EAPOL: SUPP_BE entering state RECEIVE
  158. l2_packet_receive: src=a4:52:6f:27:57:d6 len=176
  159. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  160. EAPOL: Received EAP-Packet frame
  161. EAPOL: SUPP_BE entering state REQUEST
  162. EAPOL: getSuppRsp
  163. EAP: EAP entering state RECEIVED
  164. EAP: Received EAP-Request id=4 method=254 vendor=14122 vendorMethod=1
  165. EAP: EAP entering state METHOD
  166. EAP-WSC: Received packet: Op-Code 4 Flags 0x0 Message Length 0
  167. WPS: Processing received message (len=158 op_code=4)
  168. WPS: Received WSC_MSG
  169. WPS: Received M7
  170. WPS: Processing decrypted Encrypted Settings attribute
  171. WPS: E-SNonce2 - hexdump(len=16): 0e b6 eb 3f 3a e6 bf 5b 05 81 c8 f1 71 ea e9 73
  172. WPS: Enrollee proved knowledge of the second half of the device password
  173. WPS: Invalidated PIN for UUID - hexdump(len=16): c8 12 0d b3 01 56 48 4d c5 52 e5 68 94 c6 9b 99
  174. WPS: Remove authorized MAC ff:ff:ff:ff:ff:ff
  175. WPS: Authorized MACs - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  176. WPS: Selected registrar information changed
  177. WPS: Authorized MACs union (start with own) - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  178. WPS: Internal Registrar selected (pbc=0)
  179. WPS: wps_cb_set_sel_reg: sel_reg=1 config_methods=0x3148 pbc=0 methods=0x3148
  180. WPS: Processing AP Settings
  181. WPS: SSID - hexdump_ascii(len=9):
  182. 63 61 76 61 6c 6c 69 6e 69 cavallini
  183. WPS: Authentication Type: 0x2
  184. WPS: Encryption Type: 0x8
  185. WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
  186. WPS: MAC Address a4:52:6f:27:57:d6
  187. WPS: Received old AP configuration from AP
  188. WPS: PIN completed using internal Registrar
  189. WPS: Selected registrar information changed
  190. WPS: Authorized MACs union (start with own) - hexdump(len=30): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  191. WPS: Internal Registrar not selected
  192. WPS: wps_cb_set_sel_reg: sel_reg=0 config_methods=0x3148 pbc=0 methods=0x0
  193. WPS: * AP Settings
  194. WPS: * Network Index (1)
  195. WPS: * SSID
  196. WPS: SSID for Credential - hexdump_ascii(len=9):
  197. 63 61 76 61 6c 6c 69 6e 69 cavallini
  198. WPS: * Authentication Type (0x2)
  199. WPS: * Encryption Type (0x8)
  200. WPS: * Network Key (len=9)
  201. WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
  202. WPS: * MAC Address (a4:52:6f:27:57:d6)
  203. WPS: Update local configuration based on the AP configuration
  204. wlan0: WPS-CRED-RECEIVED
  205. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  206. WPS: Received Credential attribute - hexdump(len=57): 10 0e 00 35 10 26 00 01 01 10 45 00 09 63 61 76 61 6c 6c 69 6e 69 10 03 00 02 00 02 10 0f 00 02 00 08 10 27 00 09 73 61 75 63 61 31 32 30 33 10 20 00 06 a4 52 6f 27 57 d6
  207. WPS: SSID - hexdump_ascii(len=9):
  208. 63 61 76 61 6c 6c 69 6e 69 cavallini
  209. WPS: Authentication Type 0x2
  210. WPS: Encryption Type 0x8
  211. WPS: Network Key Index 0
  212. WPS: Network Key - hexdump(len=9): 73 61 75 63 61 31 32 30 33
  213. WPS: MAC Address a4:52:6f:27:57:d6
  214. WPS: Replace WPS network block based on the received credential
  215. WPS: AP found from BSS table
  216. Remove duplicate network 2
  217. wlan0: WPS-FAIL msg=11 config_error=0
  218. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  219. WPS: Register timeout to clear WPS network
  220. P2P: Ignore WPS fail event - P2P provisioning not in progress
  221. EAP-WSC: MESG -> MESG
  222. WPS: Building Message WSC_NACK
  223. WPS: * Version (hardcoded 0x10)
  224. WPS: * Message Type (14)
  225. WPS: * Enrollee Nonce
  226. WPS: * Registrar Nonce
  227. WPS: * Configuration Error (0)
  228. WPS: * Version2 (0x20)
  229. EAP-WSC: MESG -> MESG
  230. EAP-WSC: Generating Response
  231. EAP-WSC: Sending out 66 bytes (message sent completely)
  232. EAP-WSC: MESG -> FAIL
  233. EAP: method process -> ignore=FALSE methodState=DONE decision=FAIL eapRespData=0x5570e293fc80
  234. EAP: EAP entering state SEND_RESPONSE
  235. EAP: EAP entering state IDLE
  236. EAPOL: SUPP_BE entering state RESPONSE
  237. EAPOL: txSuppRsp
  238. TX EAPOL: dst=a4:52:6f:27:57:d6
  239. EAPOL: SUPP_BE entering state RECEIVE
  240. WPS: Clear WPS network from timeout
  241. l2_packet_receive: src=a4:52:6f:27:57:d6 len=8
  242. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  243. EAPOL: Received EAP-Packet frame
  244. EAPOL: SUPP_BE entering state REQUEST
  245. EAPOL: getSuppRsp
  246. EAP: EAP entering state RECEIVED
  247. EAP: Received EAP-Failure
  248. EAP: Status notification: completion (param=failure)
  249. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  250. EAP: Workaround for unexpected identifier field in EAP Success: reqId=5 lastId=4 (these are supposed to be same)
  251. EAP: EAP entering state FAILURE
  252. wlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed
  253. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  254. EAPOL: SUPP_PAE entering state HELD
  255. EAPOL: Supplicant port status: Unauthorized
  256. nl80211: Set supplicant port unauthorized for a4:52:6f:27:57:d6
  257. EAPOL: SUPP_BE entering state RECEIVE
  258. EAPOL: SUPP_BE entering state FAIL
  259. EAPOL: SUPP_BE entering state IDLE
  260. EAPOL authentication completed - result=FAILURE
  261. wlan0: WPS-FAIL
  262. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  263. WPS: Network configuration replaced - try to associate with the received credential (freq=2462)
  264. wlan0: Request to deauthenticate - bssid=a4:52:6f:27:57:d6 pending_bssid=00:00:00:00:00:00 reason=3 state=ASSOCIATED
  265. TDLS: Tear down peers
  266. wpa_driver_nl80211_deauthenticate(addr=a4:52:6f:27:57:d6 reason_code=3)
  267. wlan0: Event DEAUTH (12) received
  268. wlan0: Deauthentication notification
  269. wlan0: * reason 3 (locally generated)
  270. Deauthentication frame IE(s) - hexdump(len=0): [NULL]
  271. wlan0: CTRL-EVENT-DISCONNECTED bssid=a4:52:6f:27:57:d6 reason=3 locally_generated=1
  272. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  273. wlan0: Auto connect enabled: try to reconnect (wps=1/0 wpa_state=6)
  274. wlan0: Setting scan request: 0.100000 sec
  275. wlan0: Radio work 'sme-connect'@0x5570e2945d60 done in 4.502674 seconds
  276. wlan0: Ignore connection failure due to local request to disconnect
  277. TDLS: Remove peers on disassociation
  278. wlan0: WPA: Clear old PMK and PTK
  279. wlan0: Disconnect event - remove keys
  280. wlan0: State: ASSOCIATED -> DISCONNECTED
  281. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  282. netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  283. WMM AC: WMM AC is disabled
  284. EAPOL: External notification - portEnabled=0
  285. EAPOL: SUPP_PAE entering state DISCONNECTED
  286. EAPOL: Supplicant port status: Unauthorized
  287. nl80211: Skip set_supp_port(unauthorized) while not associated
  288. EAPOL: SUPP_BE entering state INITIALIZE
  289. EAP: EAP entering state DISABLED
  290. EAPOL: External notification - portValid=0
  291. wlan0: State: DISCONNECTED -> DISCONNECTED
  292. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  293. netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  294. EAPOL: External notification - portEnabled=0
  295. EAPOL: External notification - portValid=0
  296. WPS: Checking whether fast association without a new scan can be used
  297. wlan0: Selecting BSS from priority group 0
  298. wlan0: 0: f8:1a:67:30:4a:4c ssid='Wi-Fi_SECpa2' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-19 wps
  299. wlan0: skip - SSID mismatch
  300. wlan0: 1: a4:5d:a1:82:52:9a ssid='Tecnosoft' wpa_ie_len=22 rsn_ie_len=0 caps=0x431 level=-29 wps
  301. wlan0: skip - SSID mismatch
  302. wlan0: 2: a4:52:6f:27:57:d6 ssid='cavallini' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-51 wps
  303. wlan0: selected based on WPA IE
  304. wlan0: selected BSS a4:52:6f:27:57:d6 ssid='cavallini'
  305. WPS: Continue association from timeout
  306. RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x323 ([UP])
  307. RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=2 linkmode=1 ifi_family=0 ifi_flags=0x323 ([UP])
  308. nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for wlan0
  309. nl80211: Delete station a4:52:6f:27:57:d6
  310. nl80211: Drv Event 39 (NL80211_CMD_DEAUTHENTICATE) received for wlan0
  311. nl80211: Deauthenticate event
  312. nl80211: Ignore deauth event triggered due to own deauth request
  313. nl80211: Drv Event 48 (NL80211_CMD_DISCONNECT) received for wlan0
  314. nl80211: Ignore disconnect event when using userspace SME
  315. nl80211: Drv Event 36 (NL80211_CMD_REG_CHANGE) received for wlan0
  316. nl80211: Regulatory domain change
  317. * initiator=0
  318. * type=1
  319. wlan0: Event CHANNEL_LIST_CHANGED (28) received
  320. wlan0: CTRL-EVENT-REGDOM-CHANGE init=CORE type=WORLD
  321. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  322. nl80211: Regulatory information - country=00
  323. nl80211: 2402-2472 @ 40 MHz 20 mBm
  324. nl80211: 2457-2482 @ 20 MHz 20 mBm (no IR)
  325. nl80211: 2474-2494 @ 20 MHz 20 mBm (no OFDM) (no IR)
  326. nl80211: 5170-5250 @ 80 MHz 20 mBm (no IR)
  327. nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) (no IR)
  328. nl80211: 5490-5730 @ 160 MHz 20 mBm (DFS) (no IR)
  329. nl80211: 5735-5835 @ 80 MHz 20 mBm (no IR)
  330. nl80211: 57240-63720 @ 2160 MHz 0 mBm
  331. nl80211: Added 802.11b mode based on 802.11g information
  332. WPS: Continuing association after eapol_cb
  333. wlan0: Selecting BSS from priority group 0
  334. wlan0: 0: f8:1a:67:30:4a:4c ssid='Wi-Fi_SECpa2' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-19 wps
  335. wlan0: skip - SSID mismatch
  336. wlan0: 1: a4:5d:a1:82:52:9a ssid='Tecnosoft' wpa_ie_len=22 rsn_ie_len=0 caps=0x431 level=-29 wps
  337. wlan0: skip - SSID mismatch
  338. wlan0: 2: a4:52:6f:27:57:d6 ssid='cavallini' wpa_ie_len=24 rsn_ie_len=0 caps=0x411 level=-51 wps
  339. wlan0: selected based on WPA IE
  340. wlan0: selected BSS a4:52:6f:27:57:d6 ssid='cavallini'
  341. wlan0: Considering connect request: reassociate: 1 selected: a4:52:6f:27:57:d6 bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED ssid=0x5570e294b630 current_ssid=(nil)
  342. wlan0: Request association with a4:52:6f:27:57:d6
  343. wlan0: Re-association to the same ESS
  344. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=11): 00 09 63 61 76 61 6c 6c 69 6e 69
  345. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 03 01 0b
  346. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2a 01 04
  347. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=3): 2f 01 04
  348. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  349. WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
  350. WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  351. wlan0: Add radio work 'sme-connect'@0x5570e2945d60
  352. wlan0: First radio work item in the queue - schedule start immediately
  353. wlan0: Starting radio work 'sme-connect'@0x5570e2945d60 after 0.000011 second wait
  354. wlan0: Automatic auth_alg selection: 0x1
  355. wlan0: Overriding auth_alg selection: 0x1
  356. RSN: PMKSA cache search - network_ctx=(nil) try_opportunistic=0
  357. RSN: Search for BSSID a4:52:6f:27:57:d6
  358. RSN: No PMKSA cache entry found
  359. wlan0: WPA: using IEEE 802.11i/D3.0
  360. wlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1
  361. wlan0: WPA: Selected mgmt group cipher 0
  362. WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
  363. wlan0: WPA: clearing AP RSN IE
  364. wlan0: WPA: using GTK CCMP
  365. wlan0: WPA: using PTK CCMP
  366. wlan0: WPA: using KEY_MGMT WPA-PSK
  367. wlan0: WPA: not using MGMT group cipher
  368. WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
  369. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  370. RRM: Determining whether RRM can be used - device support: 0x0
  371. RRM: No RRM in network
  372. wlan0: Cancelling scan request
  373. wlan0: SME: Trying to authenticate with a4:52:6f:27:57:d6 (SSID='cavallini' freq=2462 MHz)
  374. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  375. wlan0: State: DISCONNECTED -> AUTHENTICATING
  376. EAPOL: External notification - EAP success=0
  377. EAPOL: External notification - EAP fail=0
  378. EAPOL: External notification - portControl=Auto
  379. wlan0: Determining shared radio frequencies (max len 1)
  380. wlan0: Shared frequencies (len=0): completed iteration
  381. nl80211: Authenticate (ifindex=7)
  382. * bssid=a4:52:6f:27:57:d6
  383. * freq=2462
  384. * SSID - hexdump_ascii(len=9):
  385. 63 61 76 61 6c 6c 69 6e 69 cavallini
  386. * IEs - hexdump(len=0): [NULL]
  387. * Auth Type 0
  388. nl80211: Authentication request send successfully
  389. nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for wlan0
  390. nl80211: New station a4:52:6f:27:57:d6
  391. nl80211: Drv Event 37 (NL80211_CMD_AUTHENTICATE) received for wlan0
  392. nl80211: Authenticate event
  393. wlan0: Event AUTH (11) received
  394. wlan0: SME: Authentication response: peer=a4:52:6f:27:57:d6 auth_type=0 auth_transaction=2 status_code=0
  395. wlan0: set_disable_max_amsdu: -1
  396. wlan0: set_ampdu_factor: -1
  397. wlan0: set_ampdu_density: -1
  398. wlan0: set_disable_ht40: 0
  399. wlan0: set_disable_sgi: 0
  400. wlan0: set_disable_ldpc: 0
  401. wlan0: Trying to associate with a4:52:6f:27:57:d6 (SSID='cavallini' freq=2462 MHz)
  402. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  403. wlan0: State: AUTHENTICATING -> ASSOCIATING
  404. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  405. netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  406. WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
  407. nl80211: Associate (ifindex=7)
  408. * bssid=a4:52:6f:27:57:d6
  409. * freq=2462
  410. * SSID - hexdump_ascii(len=9):
  411. 63 61 76 61 6c 6c 69 6e 69 cavallini
  412. * IEs - hexdump(len=34): 7f 08 00 00 0a 02 00 00 00 40 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
  413. * WPA Versions 0x1
  414. * pairwise=0xfac04
  415. * group=0xfac04
  416. * akm=0xfac02
  417. * htcaps - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  418. * htcaps_mask - hexdump(len=26): 63 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  419. * vhtcaps - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  420. * vhtcaps_mask - hexdump(len=12): 00 00 00 00 00 00 00 00 00 00 00 00
  421. nl80211: Association request send successfully
  422. RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
  423. RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
  424. RTM_NEWLINK: ifi_index=7 ifname=wlan0 wext ifi_family=0 ifi_flags=0x10323 ([UP][LOWER_UP])
  425. nl80211: Drv Event 38 (NL80211_CMD_ASSOCIATE) received for wlan0
  426. nl80211: Associate event
  427. wlan0: Event ASSOC (0) received
  428. wlan0: Association info event
  429. resp_ies - hexdump(len=105): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a fe 18 1b ff 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 06 f0 04 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  430. WPA: Unrecognized EAPOL-Key Key Data IE - hexdump(len=24): 3d 16 0b 07 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  431. WPA: WMM Parameter Element - hexdump(len=24): 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
  432. wlan0: freq=2462 MHz
  433. FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
  434. wlan0: State: ASSOCIATING -> ASSOCIATED
  435. nl80211: Set wlan0 operstate 0->0 (DORMANT)
  436. netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT)
  437. wlan0: Associated to a new BSS: BSSID=a4:52:6f:27:57:d6
  438. wlan0: Associated with a4:52:6f:27:57:d6
  439. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  440. wlan0: WPA: Association event - clear replay counter
  441. wlan0: WPA: Clear old PTK
  442. TDLS: Remove peers on association
  443. EAPOL: External notification - portEnabled=0
  444. EAPOL: External notification - portValid=0
  445. EAPOL: External notification - EAP success=0
  446. EAPOL: External notification - portEnabled=1
  447. EAPOL: SUPP_PAE entering state CONNECTING
  448. EAPOL: SUPP_BE entering state IDLE
  449. wlan0: Setting authentication timeout: 10 sec 0 usec
  450. wlan0: Cancelling scan request
  451. WMM AC: AC mandatory: AC_BE=0 AC_BK=0 AC_VI=0 AC_VO=0
  452. WMM AC: U-APSD queues=0x0
  453. WMM AC: Valid WMM association, WMM AC is enabled
  454. nl80211: Drv Event 46 (NL80211_CMD_CONNECT) received for wlan0
  455. nl80211: Ignore connect event (cmd=46) when using userspace SME
  456. l2_packet_receive: src=a4:52:6f:27:57:d6 len=99
  457. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  458. wlan0: Setting authentication timeout: 10 sec 0 usec
  459. wlan0: IEEE 802.1X RX: version=1 type=3 length=95
  460. wlan0: EAPOL-Key type=254
  461. wlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  462. wlan0: key_length=16 key_data_length=0
  463. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  464. key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
  465. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  466. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  467. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  468. key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  469. wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
  470. wlan0: WPA: RX message 1 of 4-Way Handshake from a4:52:6f:27:57:d6 (ver=2)
  471. WPA: Renewed SNonce - hexdump(len=32): 6b ff 32 20 f4 69 47 65 50 1e 45 e2 73 b5 e1 f1 72 d0 b5 c6 70 2d 5a 63 88 11 64 9a 7f 21 ef be
  472. WPA: PTK derivation - A1=98:3f:9f:22:1a:76 A2=a4:52:6f:27:57:d6
  473. WPA: Nonce1 - hexdump(len=32): 6b ff 32 20 f4 69 47 65 50 1e 45 e2 73 b5 e1 f1 72 d0 b5 c6 70 2d 5a 63 88 11 64 9a 7f 21 ef be
  474. WPA: Nonce2 - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
  475. WPA: PMK - hexdump(len=32): c9 a2 e0 05 51 70 20 ba 11 f7 7f 8e 9c cd 76 f1 aa 64 f6 9b e4 3a 01 72 c3 0a 5a af a7 f7 8a 26
  476. WPA: PTK - hexdump(len=48): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11 02 04 9e 4e 37 ab 31 68 d2 4d 55 86 6b b0 b4 1e 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
  477. WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
  478. WPA: KEK - hexdump(len=16): 02 04 9e 4e 37 ab 31 68 d2 4d 55 86 6b b0 b4 1e
  479. WPA: TK - hexdump(len=16): 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
  480. WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02
  481. WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  482. wlan0: WPA: Sending EAPOL-Key 2/4
  483. WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
  484. WPA: Derived Key MIC - hexdump(len=16): 0f dc 8e 67 7d d7 3c 1e 54 fb 69 85 1a ce 40 19
  485. l2_packet_receive: src=a4:52:6f:27:57:d6 len=125
  486. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  487. wlan0: IEEE 802.1X RX: version=1 type=3 length=121
  488. wlan0: EAPOL-Key type=254
  489. wlan0: key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  490. wlan0: key_length=16 key_data_length=26
  491. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  492. key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a0
  493. key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  494. key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  495. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  496. key_mic - hexdump(len=16): b1 79 cf a8 5e d7 eb 95 2f 3e ad d6 c5 c9 7f d4
  497. wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  498. wlan0: WPA: RX message 3 of 4-Way Handshake from a4:52:6f:27:57:d6 (ver=2)
  499. WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
  500. WPA: WPA IE in EAPOL-Key - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 0c 00
  501. wlan0: WPA: Sending EAPOL-Key 4/4
  502. WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
  503. WPA: Derived Key MIC - hexdump(len=16): 32 01 97 29 60 bb e7 fb 28 d9 4e 7d ed f2 5b 45
  504. wlan0: WPA: Installing PTK to the driver
  505. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
  506. wpa_driver_nl80211_set_key: ifindex=7 (wlan0) alg=3 addr=0x5570e2921ac0 key_idx=0 set_tx=1 seq_len=6 key_len=16
  507. nl80211: KEY_DATA - hexdump(len=16): 10 a5 c1 54 7c 32 21 33 44 ac 62 39 c1 88 44 a2
  508. nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00
  509. addr=a4:52:6f:27:57:d6
  510. wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  511. l2_packet_receive: src=a4:52:6f:27:57:d6 len=123
  512. wlan0: RX EAPOL from a4:52:6f:27:57:d6
  513. wlan0: IEEE 802.1X RX: version=1 type=3 length=119
  514. wlan0: EAPOL-Key type=254
  515. wlan0: key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure)
  516. wlan0: key_length=16 key_data_length=24
  517. replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  518. key_nonce - hexdump(len=32): 11 bc 18 bd 1b 06 73 eb 36 fd 1b cc 0e e1 a1 06 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 65
  519. key_iv - hexdump(len=16): 8f 3a 95 3e 24 98 9a cc 20 4a 9c 72 80 7a 09 a1
  520. key_rsc - hexdump(len=8): 29 be 00 00 00 00 00 00
  521. key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  522. key_mic - hexdump(len=16): 98 e8 e0 4d 06 6f 1d e7 ce c2 0b 3f 7b 4d 5f 0c
  523. wlan0: WPA: RX message 1 of Group Key Handshake from a4:52:6f:27:57:d6 (ver=2)
  524. wlan0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
  525. WPA: Group Key - hexdump(len=16): 30 be e8 63 a0 f4 8a c2 80 73 94 90 04 fd 7e 64
  526. wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16)
  527. WPA: RSC - hexdump(len=6): 29 be 00 00 00 00
  528. wpa_driver_nl80211_set_key: ifindex=7 (wlan0) alg=3 addr=0x5570e16bff64 key_idx=1 set_tx=0 seq_len=6 key_len=16
  529. nl80211: KEY_DATA - hexdump(len=16): 30 be e8 63 a0 f4 8a c2 80 73 94 90 04 fd 7e 64
  530. nl80211: KEY_SEQ - hexdump(len=6): 29 be 00 00 00 00
  531. broadcast key
  532. wlan0: WPA: Sending EAPOL-Key 2/2
  533. WPA: KCK - hexdump(len=16): 53 cc 65 41 8d 80 b2 00 d9 3c c1 cf 15 78 93 11
  534. WPA: Derived Key MIC - hexdump(len=16): 83 cb 1b e3 5c 00 f9 6e ba 7e 75 3c 1e aa cd b1
  535. wlan0: WPA: Key negotiation completed with a4:52:6f:27:57:d6 [PTK=CCMP GTK=CCMP]
  536. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  537. wlan0: Cancelling authentication timeout
  538. wlan0: State: GROUP_HANDSHAKE -> COMPLETED
  539. wlan0: Radio work 'sme-connect'@0x5570e2945d60 done in 0.163786 seconds
  540. wlan0: CTRL-EVENT-CONNECTED - Connection to a4:52:6f:27:57:d6 completed [id=3 id_str=]
  541. CTRL_IFACE monitor sent successfully to /tmp/wpa_ctrl_4595-2\x00
  542. nl80211: Set wlan0 operstate 0->1 (UP)
  543. netlink: Operstate: ifindex=7 linkmode=-1 (no change), operstate=6 (IF_OPER_UP)
  544. EAPOL: External notification - portValid=1
  545. EAPOL: External notification - EAP success=1
  546. EAPOL: SUPP_PAE entering state AUTHENTICATING
  547. EAPOL: SUPP_BE entering state SUCCESS
  548. EAP: EAP entering state DISABLED
  549. EAPOL: SUPP_PAE entering state AUTHENTICATED
  550. EAPOL: Supplicant port status: Authorized
  551. nl80211: Set supplicant port authorized for a4:52:6f:27:57:d6
  552. EAPOL: SUPP_BE entering state IDLE
  553. EAPOL authentication completed - result=SUCCESS
  554. RTM_NEWLINK: ifi_index=7 ifname=wlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x10363 ([UP][RUNNING][LOWER_UP])
  555. EAPOL: startWhen --> 0
  556. EAPOL: disable timer tick
Advertisement
Add Comment
Please, Sign In to add comment