root@dm814x-evm:~# wpa_supplicant -iwlan0 -Dnl80211 -c wpa_supplicant.txt -ddd wpa_supplicant v0.8.x random: Trying to read entropy from /dev/random Initializing interface 'wlan0' conf 'wpa_supplicant.txt' driver 'nl80211' ctrl_interface 'N/A' brid' Configuration file 'wpa_supplicant.txt' -> '/home/root/wpa_supplicant.txt' Reading configuration file '/home/root/wpa_supplicant.txt' ap_scan=1 update_config=1 ctrl_interface='/var/run/wpa_supplicant' Line: 5 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test proto: 0x1 key_mgmt: 0x2 pairwise: 0x18 group: 0x18 PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] disabled=1 (0x1) PSK (from passphrase) - hexdump(len=32): [REMOVED] Line: 16 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test key_mgmt: 0x4 wep_key0 - hexdump(len=13): [REMOVED] wep_tx_keyidx=0 (0x0) disabled=1 (0x1) Line: 24 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test key_mgmt: 0x4 wep_key0 - hexdump(len=10): [REMOVED] wep_tx_keyidx=1 (0x1) disabled=1 (0x1) Line: 33 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test proto: 0x2 key_mgmt: 0x2 pairwise: 0x10 group: 0x18 PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] disabled=1 (0x1) PSK (from passphrase) - hexdump(len=32): [REMOVED] Line: 45 - start of a new network block ssid - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N scan_ssid=1 (0x1) proto: 0x1 key_mgmt: 0x2 pairwise: 0x8 auth_alg: 0x1 PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED] disabled=0 (0x0) PSK (from passphrase) - hexdump(len=32): [REMOVED] Line 54: removed CCMP from group cipher list since it was not allowed for pairwise cipher Line: 55 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test scan_ssid=1 (0x1) auth_alg: 0x1 key_mgmt: 0x4 disabled=1 (0x1) Line: 63 - start of a new network block ssid - hexdump_ascii(len=7): 61 73 65 6c 73 61 6e wifi_test scan_ssid=1 (0x1) auth_alg: 0x1 key_mgmt: 0x4 disabled=1 (0x1) Priority group 0 id=0 ssid='wifi_test' id=1 ssid='wifi_test' id=2 ssid='wifi_test' id=3 ssid='wifi_test' id=4 ssid='wifi_test_N' id=5 ssid='wifi_test' id=6 ssid='wifi_test' nl80211: interface wlan0 in phy phy0 rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0 wl1271: firmware booted (Rev 6.3.6.0.79_1) wl1271: Driver version: R4_SP2_02_00 ADDRCONF(NETDEV_UP): wlan0: link is not ready netlink: Operstate: linkmode=1, operstate=5 nl80211: Using driver-based off-channel TX nl80211: driver param='(null)' wlan0: Own MAC address: 00:12:34:56:78:90 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wlan0: RSN: flushing PMKID list in the driver WPS: Set UUID for interface wlan0 WPS: UUID based on MAC address - hexdump(len=16): e8 f0 1f 99 6e b1 52 34 bf 7b 31 ba d1 79 f7 e8 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: Supplicant port status: Unauthorized EAPOL: Supplicant port status: Unauthorized P2P: Own listen channel: 6 P2P: Random operating channel: 81:6 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: Added interface wlan0 random: Got 20/20 bytes from /dev/random RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: Starting delayed sched scan wlan0: add to filter ssid: wifi_test_N wlan0: add to active scan ssid: wifi_test_N WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (2388) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 wlan0: Starting sched scan: interval 3 nl80211: Sched scan filter SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N nl80211: Sched scan SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N nl80211: Sched scan extra IEs - hexdump_ascii(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 _i_P___J____:___ 10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1 ____#__G______n_ 52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00 R4_{1__y___T____ 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 _______<________ 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 ______________!_ 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 _ _#__ _$__ ____ 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a _I___7*__ __Po_ 09 02 02 00 23 00 06 05 00 58 58 04 51 06 ____#____XX_Q_ nl80211: sched scan start failed: ret=-16 (Device or resource busy) wlan0: Failed to start sched scan (-16) wlan0: Setting scan request: 0 sec 0 usec wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for specific SSID(s) WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (2388) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 nl80211: Scan SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N nl80211: Scan extra IEs - hexdump_ascii(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 _i_P___J____:___ 10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1 ____#__G______n_ 52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00 R4_{1__y___T____ 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 _______<________ 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 ______________!_ 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 _ _#__ _$__ ____ 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a _I___7*__ __Po_ 09 02 02 00 23 00 06 05 00 58 58 04 51 06 ____#____XX_Q_ Scan requested (ret=0) - scan timeout 10 seconds nl80211: Event message available nl80211: Scan trigger nl80211: Event message available nl80211: New scan results available wlan0: Event 3 received on interface wlan0 Received scan results (1 BSSes) wlan0: BSS: Start scan result update 1 wlan0: BSS: Add new id 0 BSSID 00:26:cb:f3:ed:10 SSID 'wifi_test_N' Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: New scan results available wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:26:cb:f3:ed:10 ssid='wifi_test_N' wpa_ie_len=24 rsn_ie_len=0 caps=0x431 level=-45 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: selected based on WPA IE wlan0: selected BSS 00:26:cb:f3:ed:10 ssid='wifi_test_N' wlan0: Request association: reassociate: 0 selected: 00:26:cb:f3:ed:10 bssid: 00:00:00:00:00:00 G wlan0: Automatic auth_alg selection: 0x1 wlan0: Overriding auth_alg selection: 0x1 wlan0: WPA: using IEEE 802.11i/D3.0 wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 0ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 0 50 f2 01 01 00cfg80211: Calling CRDA for country: US 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 28 00 wlan0: WPA: clearing AP RSN IE wlan0: WPA: using GTK TKIP wlan0: WPA: using PTK TKIP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24cfg80211: Regulatory domain changed to country: US ): dd 16 00 50 fcfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) 2 01 01 00 00 50cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm) f2 02 01 00 00 cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm) 50 f2 02 01 00 0cfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 0 50 f2 02 P2P:cfg80211: (5490000 KHz - 5600000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) * P2P IE headercfg80211: (5650000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) P2P: * Capabilcfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm) ity dev=23 group=00 P2P: * Device Info wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request wlan0: SME: Trying to authenticate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> AUTHENTICATING EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized nl80211: Authenticate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 nl80211: Event message available nl80211: MLME event 37 nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 11 received on interface wlan0 wlan0: SME: Authentication response: peer=00:26:cb:f3:ed:10 auth_type=0 status_code=0 SME: Authentication response IEs - hexdump(len=0): [NULL] wlan0: Trying to associate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: State: AUTHENTICATING -> ASSOCIATING wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 nl80211: Associate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0 * pairwise=0xfac02 * group=0xfac02 * P2P group nl80211: Association request send successfully nl80211: Event message available nl80211: New station 00:26:cb:f3:ed:10 nl80211: Event message available nl80211: MLME event 38 nl80cfg80211: Calling CRDA to update world regulatory domain 211: MLME event frame - hexdump(len=72): 10 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 cb f: 2 02 01 01 87 00cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) 05 a6 00 00 2c cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) a8 00 00 45 64 0cfg80211: (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) 0 00 62 42 00 00cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) wlan0: Event 0cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) received on intcfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) erface wlan0 wlan0: Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 8c 92 96 98 a4 32 04 b0 c8 e0 ec dd 18 00 50 f2 02 01 010 wlan0: freq=2447 MHz wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:26:cb:f3:ed:10 Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:26:cb:f3:ed:10 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) nl80211: Event message available nl80211: Ignore connect event (cmd=46) when using userspace SME RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 1a 71 23 b6 25 0c 120 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 ebf key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 1a 71 23 b60 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) Get randomness: len=32 entropy=2 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): 87 8c 13 55 98 cb d8 61 e6 3e 77 20 70 30 dc 57 d1 cb 67 6a 6 WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 87 8c 13 55 98 cb d8 61 e6 3e 77 20 70 30 dc 57 d1 cb 67 6a 07 6b 7d6 WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 ebf WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 6b 77 e5 34 e7 e1 1f 5b 64 42 1f 25 ba b9 2c ce WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 87 8c 13 52 nl80211: Event message available nl80211: Regulatory domain change wlan0: Event 31 received on interface wlan0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: P2P: Update channel list wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b6 25 0c 120 wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b60 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 87 8c 13 55 98 cb d8 61 e6 3e 77 20 70 30 dc 57 d1 cb 67 6a 07 6b 7d6 WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb0 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): e1 52 72 f3 cf 47 a4 e8 f5 35 cd 36 6a 63 bb f2 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 87 8c 13 52 nl80211: Event message available nl80211: Delete station 00:26:cb:f3:ed:10 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 1a 71 23 b6 25 0c 120 wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb1 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 1a 71 23 b60 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 87 8c 13 55 98 cb d8 61 e6 3e 77 20 70 30 dc 57 d1 cb 67 6a 07 6b 7d6 WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb1 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 12 fd 8a 97 3a c1 fb 8f bb db c7 67 68 c2 a6 aa WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 87 8c 13 52 nl80211: Event message available nl80211: MLME event 39 nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 12 received on interface wlan0 wlan0: Deauthentication notification wlan0: * reason 23 wlan0: * address 00:26:cb:f3:ed:10 Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect wlan0: WPA: Auto connect enabled: try to reconnect (wps=0) wlan0: Setting scan request: 0 sec 100000 usec Added BSSID 00:26:cb:f3:ed:10 into blacklist wlan0: Not rescheduling scan to ensure that specific SSID scans occur wlan0: CTRL-EVENT-DISCONNECTED bssid=00:26:cb:f3:ed:10 reason=23 wlan0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=00:26:cb:f3:ed:10 wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for wildcard SSID WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (2388) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 nl80211: Scan SSID - hexdump_ascii(len=0): [NULL] nl80211: Scan extra IEs - hexdump_ascii(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 _i_P___J____:___ 10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1 ____#__G______n_ 52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00 R4_{1__y___T____ 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 _______<________ 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 ______________!_ 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 _ _#__ _$__ ____ 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a _I___7*__ __Po_ 09 02 02 00 23 00 06 05 00 58 58 04 51 06 ____#____XX_Q_ Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Ignore disconnect event when using userspace SME EAPOL: Supplicant port status: Unauthorized nl80211: Event message available nl80211: Regulatory domain change wlan0: Event 31 received on interface wlan0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: P2P: Update channel list nl80211: Event message available nl80211: Scan trigger nl80211: Event message available nl80211: New scan results available wlan0: Event 3 received on interface wlan0 Received scan results (6 BSSes) wlan0: BSS: Start scan result update 2 wlan0: BSS: Add new id 1 BSSID 00:24:a8:b3:16:51 SSID 'Company - WiFi' wlan0: BSS: Add new id 2 BSSID 00:25:9c:bb:01:cf SSID 'wifi_test' wlan0: BSS: Add new id 3 BSSID 00:22:75:09:8e:e6 SSID 'tikonacall' wlan0: BSS: Add new id 4 BSSID 00:24:a8:b3:16:50 SSID 'Company-Guest-WiFi' wlan0: BSS: Add new id 5 BSSID 00:90:4c:91:00:01 SSID 'linksys' Add randomness: count=3 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=4 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=5 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=6 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=7 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=8 entropy=5 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:26:cb:f3:ed:10 ssid='wifi_test_N' wpa_ie_len=24 rsn_ie_len=0 caps=0x431 level=-45 wlan0: skip - blacklisted (count=1 limit=0) wlan0: 1: 00:24:a8:b3:16:51 ssid='Company - WiFi' wpa_ie_len=0 rsn_ie_len=20 caps=0xc31 level=-45 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 2: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-60 wps wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 3: 00:22:75:09:8e:e6 ssid='tikonacall' wpa_ie_len=28 rsn_ie_len=24 caps=0x411 level=-66 wps wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 4: 00:24:a8:b3:16:50 ssid='Company-Guest-WiFi' wpa_ie_len=0 rsn_ie_len=0 caps=0xc21 level=-52 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 5: 00:90:4c:91:00:01 ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-75 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: No APs found - clear blacklist and try again Removed BSSID 00:26:cb:f3:ed:10 from blacklist (clear) wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:26:cb:f3:ed:10 ssid='wifi_test_N' wpa_ie_len=24 rsn_ie_len=0 caps=0x431 level=-45 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: selected based on WPA IE wlan0: selected BSS 00:26:cb:f3:ed:10 ssid='wifi_test_N' wlan0: Request association: reassociate: 0 selected: 00:26:cb:f3:ed:10 bssid: 00:00:00:00:00:00 G wlan0: Automatic auth_alg selection: 0x1 wlan0: Overriding auth_alg selection: 0x1 wlan0: WPA: using IEEE 802.11i/D3.0 wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 wlan0: WPA: clearing AP RSN IE wlan0: WPA: using GTK TKIP wlan0: WPA: using PTK TKIP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Device Info wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request wlan0: SME: Trying to authenticate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> AUTHENTICATING EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized nl80211: Authenticate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 nl80211: Event message available nl80211: MLME event 37 nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 11 received on interface wlan0 wlan0: SME: Authentication response: peer=00:26:cb:f3:ed:10 auth_type=0 status_code=0 SME: Authentication response IEs - hexdump(len=0): [NULL] wlan0: Trying to associate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: State: AUTHENTICATING -> ASSOCIATING wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 nl80211: Associate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 S 21 50 6f 9a 09 02 02 00 23 00 0d 15 00 00 12 34 56 78 90 01 88 00 00 00 00 00 00 00 00 00 10 11 000 * pairwise=0xfac02 * group=0xfac02 * prev_bssid=00:26:cb:f3:ed:10 * P2P group nl80211: Association request scfg80211: Regulatory domain changed to country: US end successfullycfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) EAPOL: Suppliccfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm) ant port status:cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm) Unauthorized ncfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) l80211: Event mecfg80211: (5490000 KHz - 5600000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) cfg80211: (5650000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) nl80211: New stcfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm) ation 00:26:cb:f3:ed:10 nl80211: Event message available nl80211: MLME event 38 nl80211: MLME event frame - hexdump(len=72): 30 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 0 received on interface wlan0 wlan0: Association info event resp_ies - hexdump(len=42): 01 08 82 84 8b 8c 92 96 98 a4 32 04 b0 c8 e0 ec dd 18 00 50 f2 02 01 010 wlan0: freq=2447 MHz wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:26:cb:f3:ed:10 Add randomness: count=9 entropy=6 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:26:cb:f3:ed:10 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 1a 71 23 b6 25 0c 120 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_cfg80211: Calling CRDA to update world regulatory domain length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb: f5 09 58 fd 5f 2cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) a fd 02 key_icfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) v - hexdump(len=cfg80211: (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) 16): 00 00 00 00cfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) 00 00 00 00 00 cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 00 00 00 00 00 0cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 0 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 1a 71 23 b60 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) Get randomness: len=32 entropy=7 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): 67 45 32 2c 13 d3 99 84 f6 aa 0e 69 5c aa 62 9e 3e 83 f2 ef f WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 67 45 32 2c 13 d3 99 84 f6 aa 0e 69 5c aa 62 9e 3e 83 f2 ef 02 19 43f WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb2 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 73 d3 37 25 48 9f 24 12 20 4b 44 6d 1c 5d c2 dd WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 67 45 32 22 nl80211: Event message available nl80211: Ignore connect event (cmd=46) when using userspace SME RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b6 25 0c 120 wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb3 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b60 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 67 45 32 2c 13 d3 99 84 f6 aa 0e 69 5c aa 62 9e 3e 83 f2 ef 02 19 43f WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb3 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f0 51 c7 ba 6f 42 a4 80 e9 74 11 b8 5b f1 94 54 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 02 67 45 32 22 nl80211: Event message available nl80211: Regulatory domain change wlan0: Event 31 received on interface wlan0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: P2P: Update channel list wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 1a 71 23 b6 25 0c 120 wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb4 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 1a 71 23 b60 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 67 45 32 2c 13 d3 99 84 f6 aa 0e 69 5c aa 62 9e 3e 83 f2 ef 02 19 43f WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb4 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): fc 8d b5 dd 61 e6 ed 74 f9 92 50 fb 01 0e 9f 21 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 03 67 45 32 22 nl80211: Event message available nl80211: Delete station 00:26:cb:f3:ed:10 nl80211: Event message available nl80211: MLME event 39 nl80211: MLME event frame - hexdump(len=26): c0 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 12 received on interface wlan0 wlan0: Deauthentication notification wlan0: * reason 23 wlan0: * address 00:26:cb:f3:ed:10 Deauthentication frame IE(s) - hexdump(len=0): [NULL] wlan0: WPA: 4-Way Handshake failed - pre-shared key may be incorrect wlan0: WPA: Auto connect enabled: try to reconnect (wps=0) wlan0: Setting scan request: 0 sec 100000 usec Added BSSID 00:26:cb:f3:ed:10 into blacklist wlan0: Not rescheduling scan to ensure that specific SSID scans occur wlan0: CTRL-EVENT-DISCONNECTED bssid=00:26:cb:f3:ed:10 reason=23 wlan0: Disconnect event - remove keys wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0xe04b4 key_idx=0 set_tx=0 seq_len=0 key_len=0 addr=00:26:cb:f3:ed:10 wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wlan0: State: DISCONNECTED -> SCANNING wlan0: Starting AP scan for specific SSID(s) WPS: Building WPS IE for Probe Request WPS: * Version (hardcoded 0x10) WPS: * Request Type WPS: * Config Methods (2388) WPS: * UUID-E WPS: * Primary Device Type WPS: * RF Bands (3) WPS: * Association State WPS: * Configuration Error (0) WPS: * Device Password ID (0) WPS: * Manufacturer WPS: * Model Name WPS: * Model Number WPS: * Device Name WPS: * Version2 (0x20) P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Listen Channel: Regulatory Class 81 Channel 6 nl80211: Scan SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N nl80211: Scan extra IEs - hexdump_ascii(len=126): dd 69 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 _i_P___J____:___ 10 08 00 02 23 88 10 47 00 10 e8 f0 1f 99 6e b1 ____#__G______n_ 52 34 bf 7b 31 ba d1 79 f7 e8 10 54 00 08 00 00 R4_{1__y___T____ 00 00 00 00 00 00 10 3c 00 01 03 10 02 00 02 00 _______<________ 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 ______________!_ 01 20 10 23 00 01 20 10 24 00 01 20 10 11 00 01 _ _#__ _$__ ____ 20 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a _I___7*__ __Po_ 09 02 02 00 23 00 06 05 00 58 58 04 51 06 ____#____XX_Q_ Scan requested (ret=0) - scan timeout 30 seconds nl80211: Event message available nl80211: Ignore disconnect event when using userspace SME RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: Supplicant port status: Unauthorized nl80211: Event message available nl80211: Regulatory domain change wlan0: Event 31 received on interface wlan0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: P2P: Update channel list nl80211: Event message available nl80211: Scan trigger nl80211: Event message available nl80211: New scan results available wlan0: Event 3 received on interface wlan0 Received scan results (6 BSSes) wlan0: BSS: Start scan result update 3 Add randomness: count=10 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=11 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=12 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=13 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=14 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=15 entropy=5 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: New scan results available WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x1041 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=19 WPS: attr type=0x1023 len=7 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=12 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=20 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 WPS: attr type=0x104a len=1 WPS: attr type=0x1044 len=1 WPS: attr type=0x103b len=1 WPS: attr type=0x1047 len=16 WPS: attr type=0x1021 len=6 WPS: attr type=0x1023 len=15 WPS: attr type=0x1024 len=7 WPS: attr type=0x1042 len=14 WPS: attr type=0x1054 len=8 WPS: attr type=0x1011 len=32 WPS: attr type=0x1008 len=2 wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:26:cb:f3:ed:10 ssid='wifi_test_N' wpa_ie_len=24 rsn_ie_len=0 caps=0x431 level=-45 wlan0: skip - blacklisted (count=1 limit=0) wlan0: 1: 00:24:a8:b3:16:51 ssid='Company - WiFi' wpa_ie_len=0 rsn_ie_len=20 caps=0xc31 level=-45 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 2: 00:25:9c:bb:01:cf ssid='wifi_test' wpa_ie_len=22 rsn_ie_len=0 caps=0x531 level=-60 wps wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 3: 00:22:75:09:8e:e6 ssid='tikonacall' wpa_ie_len=28 rsn_ie_len=24 caps=0x411 level=-66 wps wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 4: 00:24:a8:b3:16:50 ssid='Company-Guest-WiFi' wpa_ie_len=0 rsn_ie_len=0 caps=0xc21 level=-52 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: 5: 00:90:4c:91:00:01 ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x401 level=-75 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - SSID mismatch wlan0: skip - disabled wlan0: skip - disabled wlan0: No APs found - clear blacklist and try again Removed BSSID 00:26:cb:f3:ed:10 from blacklist (clear) wlan0: Selecting BSS from priority group 0 wlan0: 0: 00:26:cb:f3:ed:10 ssid='wifi_test_N' wpa_ie_len=24 rsn_ie_len=0 caps=0x431 level=-45 wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: skip - disabled wlan0: selected based on WPA IE wlan0: selected BSS 00:26:cb:f3:ed:10 ssid='wifi_test_N' wlan0: Request association: reassociate: 0 selected: 00:26:cb:f3:ed:10 bssid: 00:00:00:00:00:00 G wlan0: Automatic auth_alg selection: 0x1 wlan0: Overriding auth_alg selection: 0x1 wlan0: WPA: using IEEE 802.11i/D3.0 wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 wlan0: WPA: clearing AP RSN IE wlan0: WPA: using GTK TKIP wlan0: WPA: using PTK TKIP wlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 P2P: * P2P IE header P2P: * Capability dev=23 group=00 P2P: * Device Info wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request wlan0: SME: Trying to authenticate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: No keys have been configured - skip key clearing wlan0: State: SCANNING -> AUTHENTICATING EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP fail=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portControl=Auto EAPOL: Supplicant port status: Unauthorized nl80211: Authenticate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=0): [NULL] * Auth Type 0 nl80211: Authentication request send successfully wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 nl80211: Event message available nl80211: MLME event 37 nl80211: MLME event frame - hexdump(len=30): b0 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 0 wlan0: Event 11 received on interface wlan0 wlan0: SME: Authentication response: peer=00:26:cb:f3:ed:10 auth_type=0 status_code=0 SME: Authentication response IEs - hexdump(len=0): [NULL] wlan0: Trying to associate with 00:26:cb:f3:ed:10 (SSID='wifi_test_N' freq=2447 MHz) wlan0: State: AUTHENTICATING -> ASSOCIATING wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 nl80211: Associate (ifindex=4) * bssid=00:26:cb:f3:ed:10 * freq=2447 * SSID - hexdump_ascii(len=9): 61 73 65 6c 73 61 6e 5f 4e wifi_test_N * IEs - hexdump(len=59): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 0 * pairwise=0xfac02 * group=0xfac02 * prev_bssid=00:26:cb:f3:ed:10 * P2P group nl80211: Association request send successfully nl80211: Event message available nl80211: New station 00:26:cb:f3:ed:10 nl80211: Event mcfg80211: Calling CRDA for country: US essage available nl80211: MLME event 38 nl80211: MLME event frame - hexdump(len=72): 30 00 3a 01 00 12 34 56 78 90 00 26 cb f3 ed 10 00 26 S 00 62 42 00 00 cfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) wlan0: Event 0 rcfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2700 mBm) eceived on intercfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 1700 mBm) face wlan0 wlancfg80211: (5250000 KHz - 5330000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 0: Association icfg80211: (5490000 KHz - 5600000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) nfo event resp_cfg80211: (5650000 KHz - 5710000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) ies - hexdump(lecfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 3000 mBm) n=42): 01 08 82 84 8b 8c 92 96 98 a4 32 04 b0 c8 e0 ec dd 18 00 50 f2 02 01 01 87 00 05 a6 00 00 2c0 wlan0: freq=2447 MHz wlan0: State: ASSOCIATING -> ASSOCIATED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 wlan0: Associated to a new BSS: BSSID=00:26:cb:f3:ed:10 Add randomness: count=16 entropy=6 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] wlan0: No keys have been configured - skip key clearing wlan0: Associated with 00:26:cb:f3:ed:10 wlan0: WPA: Association event - clear replay counter wlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: SUPP_BE entering state IDLE wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: cancel_sched_scan called when no sched scan wlan0: Cancelling scan request nl80211: Event message available nl80211: Ignore connect event (cmd=46) when using userspace SME RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 1a 71 23 b6 25 0c 120 wlan0: Setting authentication timeout: 10 sec 0 usec wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00cfg80211: Calling CRDA to update n 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 cfg80211: World regulatory domain : 00 00 00 00 WPAcfg80211: (start_freq - end_freq @ bandwidth), (max_antenna_gain, max_eirp) : RX EAPOL-Key -cfg80211: (2402000 KHz - 2472000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) hexdump(len=99)cfg80211: (2457000 KHz - 2482000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) : 01 03 00 5f fecfg80211: (2474000 KHz - 2494000 KHz @ 20000 KHz), (300 mBi, 2000 mBm) 00 89 00 20 00 cfg80211: (5170000 KHz - 5250000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 00 00 00 00 00 0cfg80211: (5735000 KHz - 5835000 KHz @ 40000 KHz), (300 mBi, 2000 mBm) 0 01 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb 44 f5 09 58 fd 5f 2a fd 00 wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handsh6:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 04 c4 86 65 7b 3b bd 9c 73 02 9e d9 a9 70 b1 a7 63 09 61 55 15 b3 636 WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb5 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): d7 ef 94 bc 31 44 38 77 5b 93 7a 8d d3 01 6b 35 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 04 c4 86 62 wlan0: CTRL-EVENT-TERMINATING - signal 2 received nl80211: Event message available nl80211: Regulatory domain change wlan0: Event 31 received on interface wlan0 nl80211: Regulatory information - country=00 nl80211: 2402-2472 @ 40 MHz nl80211: 2457-2482 @ 20 MHz nl80211: 2474-2494 @ 20 MHz nl80211: 5170-5250 @ 40 MHz nl80211: 5735-5835 @ 40 MHz P2P: Add operating class 81 P2P: Channels - hexdump(len=11): 01 02 03 04 05 06 07 08 09 0a 0b wlan0: P2P: Update channel list RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added wlan0: Event 5 received on interface wlan0 wlan0: RX EAPOL from 00:26:cb:f3:ed:10 RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b6 25 0c 120 wlan0: IEEE 802.1X RX: version=1 type=3 length=95 wlan0: EAPOL-Key type=254 wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) wlan0: key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb6 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 1a 71 23 b60 wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE wlan0: WPA: RX message 1 of 4-Way Handshake from 00:26:cb:f3:ed:10 (ver=1) WPA: PTK derivation - A1=00:12:34:56:78:90 A2=00:26:cb:f3:ed:10 WPA: Nonce1 - hexdump(len=32): 04 c4 86 65 7b 3b bd 9c 73 02 9e d9 a9 70 b1 a7 63 09 61 55 15 b3 636 WPA: Nonce2 - hexdump(len=32): 1a 71 23 b6 25 0c 12 9e c9 76 68 c2 21 5a f7 73 32 24 f0 ef 3b 81 eb6 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 012 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 wlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 8e 3a 92 5d 33 1a 4a 2b 67 99 e4 d0 13 cf 6d c2 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 wl1271: down 20 00 00 00 00 00 00 00 02 04 c4 86 65 7b 3b bd 9c 73 02 9e d9 a9 70 b1 a7 63 09 61 55 15 b3 63 98 2 wlan0: P2P: Clear timeout (state=IDLE) wlan0: P2P: State IDLE -> IDLE wlan0: Removing interface wlan0 wpa_driver_nl80211_deauthenticate(addr=00:26:cb:f3:ed:10 reason_code=3) nl80211: MLME command failed: ret=-107 (Transport endpoint is not connected) wlan0: No keys have been configured - skip key clearing wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT) netlink: Operstate: linkmode=-1, operstate=5 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: SUPP_BE entering state INITIALIZE EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - portValid=0 EAPOL: Supplicant port status: Unauthorized EAPOL: External notification - EAP success=0 EAPOL: Supplicant port status: Unauthorized wlan0: No keys have been configured - skip key clearing wlan0: BSS: Remove id 0 BSSID 00:26:cb:f3:ed:10 SSID 'wifi_test_N' wlan0: BSS: Remove id 1 BSSID 00:24:a8:b3:16:51 SSID 'Company - WiFi' wlan0: BSS: Remove id 2 BSSID 00:25:9c:bb:01:cf SSID 'wifi_test' wlan0: BSS: Remove id 3 BSSID 00:22:75:09:8e:e6 SSID 'tikonacall' wlan0: BSS: Remove id 4 BSSID 00:24:a8:b3:16:50 SSID 'Company-Guest-WiFi' wlan0: BSS: Remove id 5 BSSID 00:90:4c:91:00:01 SSID 'linksys' wlan0: Cancelling scan request wlan0: Cancelling authentication timeout netlink: Operstate: linkmode=0, operstate=6