[root@armadillo440-0 (ttymxc1) /var/log]# wpa_supplicant -ira0 -c/etc/config/wpa_supplicant.conf -dd Initializing interface 'ra0' conf '/etc/config/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/config/wpa_supplicant.conf' -> '/etc/config/wpa_supplicant.conf' Reading configuration file '/etc/config/wpa_supplicant.conf' Line: 1 - start of a new network block ssid - hexdump_ascii(len=13): 58 70 65 72 69 61 5a 33 5f 39 36 30 30 XperiaZ3_9600 PSK - hexdump(len=32): [REMOVED] key_mgmt: 0x2 Priority group 0 id=0 ssid='XperiaZ3_9600' Initializing interface (2) 'ra0' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX enterRtmpAsicLoadFirmware: ver 21/21, sum 8061/cdf7, mac 80612100 ing state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 ioctl[SIOCSIWPMKSA]: Network is down ioctl[SIOCSIWMODE]: Network is down Could not configure driver to use managed mode 0x1300 = 00064300 SIOCGIWRANGE: WE(compiled)=22 WE(source)=14 enc_capa=0xf capabilities: key_mgmt 0xf enc 0xf WEXT: Operstate: linkmode=1, operstate=5 Own MAC address: cc:e1:d5:40:f3:a5 wpa_driver_wext_set_wpa wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_countermeasures ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted Setting scan request: 0 sec 100000 usec Added interface ra0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Trying to get current scan results first without requesting a new scan to speed up initial association Received 0 bytes of scan results (0 BSSes) Scan results: 0 Selecting BSS from priority group 0 Try to find WPA-enabled AP Try to find non-WPA AP No suitable AP found. Setting scan request: 0 sec 0 usec Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 5 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 1452 bytes of scan results (8 BSSes) Scan results: 8 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 84:8e:df:ef:f0:9e ssid='XperiaZ3_9600' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE selected WPA AP 84:8e:df:ef:f0:9e ssid='XperiaZ3_9600' Try to find non-WPA AP Trying to associate with 84:8e:df:ef:f0:9e (SSID='XperiaZ3_9600' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RSN: Ignored PMKID candidate without preauth flag RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b1a len=21 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c07 len=55 AssocReq IE wireless event - hexdump(len=47): 00 0d 58 70 65 72 69 61 5a 33 5f 39 36 30 30 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 84:8e:00:00:f0:9e Association info event req_ies - hexdump(len=47): 00 0d 58 70 65 72 69 61 5a 33 5f 39 36 30 30 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=84:8e:df:ef:f0:9e No keys have been configured - skip key clearing Associated with 84:8e:df:ef:f0:9e WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): db 45 5e 5f c4 30 14 ec 91 3e 76 db b7 c0 75 13 60 f2 5b f1 6e 8d f2 da 83 91 a6 d7 b7 ec e9 c3 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 db 45 5e 5f c4 30 14 ec 91 3e 76 db b7 c0 75 13 60 f2 5b f1 6e 8d f2 da 83 91 a6 d7 b7 ec e9 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 06 11 2a 88 bf ee 78 af 73 8f 28 31 22 7d f1 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae d2 04 6d 35 94 91 72 71 6d d4 2f 25 74 fb a4 00 38 d7 72 cf 07 53 dc b7 60 08 5d af a7 95 29 74 2c 3b 9d 40 0f 54 8d ee be 40 ce 58 4c 3d 13 bb 45 38 e3 2e 40 ad 74 53 f5 d7 29 84 7f 1f 2a 0c 8f 39 a8 6a 3f 0d 0b 5e db IEEE 802.1X RX: version=2 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ae d2 04 6d 35 94 91 72 71 6d d4 2f 25 74 fb a4 WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 de 0d 5e fc 25 fc 09 5d 7e 97 c5 f6 ec 9b ea e2 ca d9 3b 32 b1 df 06 af 0c 09 3e 7f 7a e1 87 f7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae d2 04 6d 35 94 91 72 71 6d d4 2f 25 74 fb a4 00 38 d7 72 cf 07 53 dc b7 60 08 5d af a7 95 29 74 2c 3b 9d 40 0f 54 8d ee be 40 ce 58 4c 3d 13 bb 45 38 e3 2e 40 ad 74 53 f5 d7 29 84 7f 1f 2a 0c 8f 39 a8 6a 3f 0d 0b 5e db RSN: encrypted key data - hexdump(len=56): d7 72 cf 07 53 dc b7 60 08 5d af a7 95 29 74 2c 3b 9d 40 0f 54 8d ee be 40 ce 58 4c 3d 13 bb 45 38 e3 2e 40 ad 74 53 f5 d7 29 84 7f 1f 2a 0c 8f 39 a8 6a 3f 0d 0b 5e db WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 84:8e:df:ef:f0:9e (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 01 00 e4 0d 1c 79 1b 50 20 50 94 28 30 ce 4b d7 c7 04 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 42 64 a7 93 ef a1 bc 59 9b 54 10 2c 33 64 53 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 84:8e:df:ef:f0:9e [PTK=CCMP GTK=CCMP] Cancelling authentication timeout State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 84:8e:df:ef:f0:9e completed (auth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added EAPOL: startWhen --> 0 RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 03 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 95 22 87 29 34 5a 2d 9a a9 c1 79 8e e2 3d 0b 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb IEEE 802.1X RX: version=2 type=3 length=127 EAPOL-Key type=2 key_info 0x1382 (ver=2 keyidx=0 rsvd=0 Group Ack MIC Secure Encr) key_length=16 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): e4 95 22 87 29 34 5a 2d 9a a9 c1 79 8e e2 3d 0b WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 03 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 95 22 87 29 34 5a 2d 9a a9 c1 79 8e e2 3d 0b 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb RSN: encrypted key data - hexdump(len=32): 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED] WPA: RX message 1 of Group Key Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 RSN: received GTK in group key handshake - hexdump(len=18): 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 02 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9b de cd 7f c5 47 2a 8a a0 1a 12 1c da 81 55 bd 00 00 WPA: Group rekeying completed with 84:8e:df:ef:f0:9e [GTK=CCMP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 04 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 75 51 f7 b8 c1 f6 2a 71 3f 2f f7 f3 8b c4 17 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb IEEE 802.1X RX: version=2 type=3 length=127 EAPOL-Key type=2 key_info 0x1382 (ver=2 keyidx=0 rsvd=0 Group Ack MIC Secure Encr) key_length=16 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): c1 75 51 f7 b8 c1 f6 2a 71 3f 2f f7 f3 8b c4 17 WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 04 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 75 51 f7 b8 c1 f6 2a 71 3f 2f f7 f3 8b c4 17 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb RSN: encrypted key data - hexdump(len=32): 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED] WPA: RX message 1 of Group Key Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 RSN: received GTK in group key handshake - hexdump(len=18): 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 02 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc a1 97 16 5f 98 3d d2 67 c1 ad 85 b3 57 8b 31 00 00 WPA: Group rekeying completed with 84:8e:df:ef:f0:9e [GTK=CCMP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 05 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de cb bf e9 45 60 84 b8 6c 1d af be 91 75 44 2f 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb IEEE 802.1X RX: version=2 type=3 length=127 EAPOL-Key type=2 key_info 0x1382 (ver=2 keyidx=0 rsvd=0 Group Ack MIC Secure Encr) key_length=16 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 key_nonce - hexdump(len=32): 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): de cb bf e9 45 60 84 b8 6c 1d af be 91 75 44 2f WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 05 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 de cb bf e9 45 60 84 b8 6c 1d af be 91 75 44 2f 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb RSN: encrypted key data - hexdump(len=32): 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED] WPA: RX message 1 of Group Key Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 RSN: received GTK in group key handshake - hexdump(len=18): 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 02 00 00 00 00 00 00 00 00 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 17 cd 18 9f dc da 55 27 c0 56 de e9 29 11 23 35 00 00 WPA: Group rekeying completed with 84:8e:df:ef:f0:9e [GTK=CCMP] State: GROUP_HANDSHAKE -> COMPLETED RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 06 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 54 fa c2 3c cb 98 55 9f 92 39 fa a6 20 c7 a8 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb IEEE 802.1X RX: version=2 type=3 length=127 EAPOL-Key type=2 key_info 0x1382 (ver=2 keyidx=0 rsvd=0 Group Ack MIC Secure Encr) key_length=16 key_data_length=32 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 key_nonce - hexdump(len=32): 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 01 54 fa c2 3c cb 98 55 9f 92 39 fa a6 20 c7 a8 WPA: RX EAPOL-Key - hexdump(len=131): 02 03 00 7f 02 13 82 00 10 00 00 00 00 00 00 00 06 0a 68 f2 b2 c6 48 aa 32 bc 72 04 dc 85 6a c9 61 3e 5a a4 51 ad 84 03 c2 6a 97 7f 25 1b 6f 00 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 54 fa c2 3c cb 98 55 9f 92 39 fa a6 20 c7 a8 00 20 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb RSN: encrypted key data - hexdump(len=32): 77 d7 43 01 b6 4b 10 db 9e 11 c9 8f 08 4b d0 6e 77 73 78 e8 6d 2f eb 57 7f a6 53 c4 a7 13 ba eb WPA: decrypted EAPOL-Key key data - hexdump(len=24): [REMOVED] WPA: RX message 1 of Group Key Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/2 key data - hexdump(len=24): dd 16 00 0f ac 01 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 RSN: received GTK in group key handshake - hexdump(len=18): 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 02 00 00 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ac 4a 2e 19 f0 fd 85 ff 00 ae 40 32 d2 4d 12 00 00 00 WPA: Group rekeying completed with 84:8e:df:ef:f0:9e [GTK=CCMP] State: GROUP_HANDSHAKE -> COMPLETED RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Setting scan request: 0 sec 100000 usec Added BSSID 84:8e:df:ef:f0:9e into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 Added BSSID 00:00:00:00:00:00 into blacklist CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 State: DISCONNECTED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan requested (ret=0) - scan timeout 30 seconds RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b19 len=8 Received 1452 bytes of scan results (8 BSSes) Scan results: 8 Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: 84:8e:df:ef:f0:9e ssid='XperiaZ3_9600' wpa_ie_len=0 rsn_ie_len=22 caps=0x11 selected based on RSN IE selected WPA AP 84:8e:df:ef:f0:9e ssid='XperiaZ3_9600' Try to find non-WPA AP Trying to associate with 84:8e:df:ef:f0:9e (SSID='XperiaZ3_9600' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 WPA: using GTK CCMP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing wpa_driver_wext_set_drop_unencrypted State: SCANNING -> ASSOCIATING wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_associate Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b06 len=8 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b04 len=12 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b1a len=21 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8c07 len=55 AssocReq IE wireless event - hexdump(len=47): 00 0d 58 70 65 72 69 61 5a 33 5f 39 36 30 30 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 84:8e:00:00:f0:9e Association info event req_ies - hexdump(len=47): 00 0d 58 70 65 72 69 61 5a 33 5f 39 36 30 30 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 State: ASSOCIATING -> ASSOCIATED wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 Associated to a new BSS: BSSID=84:8e:df:ef:f0:9e No keys have been configured - skip key clearing Associated with 84:8e:df:ef:f0:9e WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=2 type=3 length=95 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 84:8e:df:ef:f0:9e (ver=2) RSN: msg 1/4 key data - hexdump(len=0): WPA: Renewed SNonce - hexdump(len=32): 70 ce 69 79 ed 2b 48 6c 59 0b 31 b9 38 42 1b 7a aa 99 e2 61 3d d4 4c 00 9e 87 ce 6f a3 e0 7e ca WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 70 ce 69 79 ed 2b 48 6c 59 0b 31 b9 38 42 1b 7a aa 99 e2 61 3d d4 4c 00 9e 87 ce 6f a3 e0 7e ca 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b9 f5 4b 90 c1 1d 59 a1 c9 49 de 3a 5e d6 8d 90 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from 84:8e:df:ef:f0:9e RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8f 22 71 83 6a 7e 17 7b 4f cf ff 32 0b 5a ed 8d 00 38 56 0b 51 96 c9 bd 46 93 a5 9b df 70 c1 42 59 13 d4 74 cb f8 ff a3 74 cb 80 ae 77 07 b2 58 7a 51 02 f3 17 9a 64 2c bc 09 e5 58 55 69 bd 3b 8c 8d 27 93 09 be b8 8f c9 85 IEEE 802.1X RX: version=2 type=3 length=151 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 8f 22 71 83 6a 7e 17 7b 4f cf ff 32 0b 5a ed 8d WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 ac f7 59 66 c6 51 94 62 d5 fb 96 0c fb 73 3d be 48 1e 14 f4 91 f1 7c 5c e8 fb a8 2c 16 2b 7e ed 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8f 22 71 83 6a 7e 17 7b 4f cf ff 32 0b 5a ed 8d 00 38 56 0b 51 96 c9 bd 46 93 a5 9b df 70 c1 42 59 13 d4 74 cb f8 ff a3 74 cb 80 ae 77 07 b2 58 7a 51 02 f3 17 9a 64 2c bc 09 e5 58 55 69 bd 3b 8c 8d 27 93 09 be b8 8f c9 85 RSN: encrypted key data - hexdump(len=56): 56 0b 51 96 c9 bd 46 93 a5 9b df 70 c1 42 59 13 d4 74 cb f8 ff a3 74 cb 80 ae 77 07 b2 58 7a 51 02 f3 17 9a 64 2c bc 09 e5 58 55 69 bd 3b 8c 8d 27 93 09 be b8 8f c9 85 WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from 84:8e:df:ef:f0:9e (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 16 00 0f ac 01 02 00 a6 41 b6 e1 90 ac 67 24 03 b6 7d 74 fc b6 6a 19 dd 00 WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a4 25 0a 9b 1b aa e7 2d d9 c1 85 70 89 bd cf 0c 00 00 WPA: Installing PTK to the driver. wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 EAPOL: External notification - portValid=1 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] WPA: Installing GTK to the driver (keyidx=2 tx=0). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_wext_set_key: alg=3 key_idx=2 set_tx=0 seq_len=6 key_len=16 WPA: Key negotiation completed with 84:8e:df:ef:f0:9e [PTK=CCMP GTK=CCMP] Cancelling authentication timeout Removed BSSID 84:8e:df:ef:f0:9e from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to 84:8e:df:ef:f0:9e completed (reauth) [id=0 id_str=] wpa_driver_wext_set_operstate: operstate 0->1 (UP) WEXT: Operstate: linkmode=-1, operstate=6 EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'ra0' added EAPOL: startWhen --> 0 CTRL-EVENT-TERMINATING - signal 2 received Removing interface ra0 State: COMPLETED -> DISCONNECTED wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) WEXT: Operstate: linkmode=-1, operstate=5 wpa_driver_wext_deauthenticate wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAPOL: External notification - portValid=0 wpa_driver_wext_set_wpa wpa_driver_wext_set_drop_unencrypted wpa_driver_wext_set_countermeasures ioctl[SIOCSIWAUTH]: Operation not supported WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing Removed BSSID 00:00:00:00:00:00 from blacklist (clear) Cancelling scan request Cancelling authentication timeout WEXT: Operstate: linkmode=0, operstate=6