All of lore.kernel.org
 help / color / mirror / Atom feed
* ar6004 / ar9374 firmware
@ 2012-06-27 21:28 drwho
  2012-07-10 10:49 ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: drwho @ 2012-06-27 21:28 UTC (permalink / raw)
  To: Kalle Valo
  Cc: Julian Calaby, Sujith Manoharan, Mohammed Shafi, linux-wireless

Kalle,

I've noticed in core.h in the ath6kl driver that it is defining the
following firmware for the ar6004....

ath6k/AR6004/hw1.0/fw.ram.bin
ath6k/AR6004/hw1.1/fw.ram.bin
ath6k/AR6004/hw1.2/fw.ram.bin

In linux-firmware.git all that exists is...

ath6k/AR6004/hw1.2/fw-2.bin
ath6k/AR6004/hw1.2/bdata.bin

fw-2.bin need a rename?

Also, my UB134 is coming up with a device ID of 0x31c8088a?

[  361.676440] ath6kl: Unsupported hardware version: 0x31c8088a
[  361.680437] ath6kl: Failed to init ath6kl core: -22
[  361.680491] ath6kl_usb: probe of 2-1:1.0 failed with error -22
[  361.680520] usbcore: registered new interface driver ath6kl_usb

Jon

> That's right, AR9374 is basically AR6004 with USB. Don't ask me why :)
Latest ath6kl should support is. I can't remember what kernel version
has the full support, but I'm pretty sure 3.3 didn't support it yet. But
I should update ath6kl documentation to mention this, thanks for
pointing this out.
> Kalle





^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ar6004 / ar9374 firmware
  2012-06-27 21:28 ar6004 / ar9374 firmware drwho
@ 2012-07-10 10:49 ` Kalle Valo
  2012-07-10 13:42   ` ar6004 / ar9374 drwho
  0 siblings, 1 reply; 11+ messages in thread
From: Kalle Valo @ 2012-07-10 10:49 UTC (permalink / raw)
  To: drwho
  Cc: Julian Calaby, Sujith Manoharan, Mohammed Shafi, linux-wireless,
	ath6kl-devel

+ath6kl-devel

Hi Jon,

On 06/28/2012 12:28 AM, drwho@infidigm.net wrote:
> I've noticed in core.h in the ath6kl driver that it is defining the
> following firmware for the ar6004....
> 
> ath6k/AR6004/hw1.0/fw.ram.bin
> ath6k/AR6004/hw1.1/fw.ram.bin
> ath6k/AR6004/hw1.2/fw.ram.bin
> 
> In linux-firmware.git all that exists is...
> 
> ath6k/AR6004/hw1.2/fw-2.bin
> ath6k/AR6004/hw1.2/bdata.bin
> 
> fw-2.bin need a rename?

fw.ram.bin is for FW API 1 and fw-2.bin is FW API 2. So fw-2.bin is
correct, I'll send a patch for ath6kl to fix this.

> Also, my UB134 is coming up with a device ID of 0x31c8088a?
> 
> [  361.676440] ath6kl: Unsupported hardware version: 0x31c8088a
> [  361.680437] ath6kl: Failed to init ath6kl core: -22
> [  361.680491] ath6kl_usb: probe of 2-1:1.0 failed with error -22
> [  361.680520] usbcore: registered new interface driver ath6kl_usb

That's odd, I'm not familiar with 0x31c8088a. I wonder if it's corrupted
somehow or is it a valid device id? Does anyone from ath6kl-devel know?

Kalle

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ar6004 / ar9374
  2012-07-10 10:49 ` Kalle Valo
@ 2012-07-10 13:42   ` drwho
  2012-07-11 12:48     ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: drwho @ 2012-07-10 13:42 UTC (permalink / raw)
  To: Kalle Valo
  Cc: Julian Calaby, Sujith Manoharan, Mohammed Shafi, linux-wireless,
	ath6kl-devel

>> Also, my UB134 is coming up with a device ID of 0x31c8088a?
>>
>> [  361.676440] ath6kl: Unsupported hardware version: 0x31c8088a
>> [  361.680437] ath6kl: Failed to init ath6kl core: -22
>> [  361.680491] ath6kl_usb: probe of 2-1:1.0 failed with error -22
>> [  361.680520] usbcore: registered new interface driver ath6kl_usb
>
> That's odd, I'm not familiar with 0x31c8088a. I wonder if it's corrupted
> somehow or is it a valid device id? Does anyone from ath6kl-devel know?

Hi Kalle,

We have two units, both come up as 0x31c8088a using your kernel on x86
Ubuntu or using a recent compat-wireless on our arm platform.  The PN on
the chip is

AR9374X-4L3E which is on a usb board

The bubble wrap has the following....
UB134-055
QCABUB134
HT0430121

Jon



^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ar6004 / ar9374
  2012-07-10 13:42   ` ar6004 / ar9374 drwho
@ 2012-07-11 12:48     ` Kalle Valo
  2012-07-17 14:53       ` ath6kl: Add support for AR6004 hardware version 1.3 drwho
  0 siblings, 1 reply; 11+ messages in thread
From: Kalle Valo @ 2012-07-11 12:48 UTC (permalink / raw)
  To: drwho
  Cc: Julian Calaby, Sujith Manoharan, Mohammed Shafi, linux-wireless,
	ath6kl-devel

On 07/10/2012 04:42 PM, drwho@infidigm.net wrote:
> We have two units, both come up as 0x31c8088a using your kernel on x86
> Ubuntu or using a recent compat-wireless on our arm platform.  The PN on
> the chip is
> 
> AR9374X-4L3E which is on a usb board
> 
> The bubble wrap has the following....
> UB134-055
> QCABUB134
> HT0430121

Ok, I got more info inside QCA now. 0x31c8088a is a valid hw id for
ar6004/ar9374, it's just that nobody added the support to ath6kl. We are
working on adding it to ath6kl. I cannot give any schedule, but I hope
it happens soon.

Kalle

^ permalink raw reply	[flat|nested] 11+ messages in thread

* ath6kl: Add support for AR6004 hardware version 1.3
  2012-07-11 12:48     ` Kalle Valo
@ 2012-07-17 14:53       ` drwho
  2012-07-17 16:40         ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: drwho @ 2012-07-17 14:53 UTC (permalink / raw)
  To: bkamatch, Kalle Valo; +Cc: linux-wireless, ath6kl-devel

Would it be possible to get hw1.3 pushed up to linux-firmware git?

Jon

Add support for AR6004 hardware with version 1.3 and has
id 0x31c8088a.

Signed-off-by: Bala Shanmugam <bkamatch@qca.qualcomm.com>
---
 drivers/net/wireless/ath/ath6kl/core.h |    7 +++++++
 drivers/net/wireless/ath/ath6kl/init.c |   20 ++++++++++++++++++++
 drivers/net/wireless/ath/ath6kl/sdio.c |    3 +++
 drivers/net/wireless/ath/ath6kl/usb.c  |    3 +++
 4 files changed, 33 insertions(+)

diff --git a/drivers/net/wireless/ath/ath6kl/core.h
b/drivers/net/wireless/ath/ath6kl/core.h
index c655438..2d1b8ac 100644
--- a/drivers/net/wireless/ath/ath6kl/core.h
+++ b/drivers/net/wireless/ath/ath6kl/core.h
@@ -192,6 +192,13 @@ enum ath6kl_hw_flags {
 #define AR6004_HW_1_2_DEFAULT_BOARD_DATA_FILE \
 	AR6004_HW_1_2_FW_DIR "/bdata.bin"

+/* AR6004 1.3 definitions */
+#define AR6004_HW_1_3_VERSION			0x31c8088a
+#define AR6004_HW_1_3_FW_DIR			"ath6k/AR6004/hw1.3"
+#define AR6004_HW_1_3_FIRMWARE_FILE		"fw.ram.bin"
+#define AR6004_HW_1_3_BOARD_DATA_FILE		"ath6k/AR6004/hw1.3/bdata.bin"
+#define AR6004_HW_1_3_DEFAULT_BOARD_DATA_FILE	"ath6k/AR6004/hw1.3/bdata.bin"


^ permalink raw reply related	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-07-17 14:53       ` ath6kl: Add support for AR6004 hardware version 1.3 drwho
@ 2012-07-17 16:40         ` Kalle Valo
  2012-07-19  9:36           ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: Kalle Valo @ 2012-07-17 16:40 UTC (permalink / raw)
  To: drwho; +Cc: bkamatch, linux-wireless, ath6kl-devel

On 07/17/2012 05:53 PM, drwho@infidigm.net wrote:
> Would it be possible to get hw1.3 pushed up to linux-firmware git?

We are working on it. Hopefully we can push it soon.

Kalle

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-07-17 16:40         ` Kalle Valo
@ 2012-07-19  9:36           ` Kalle Valo
  2012-07-20 20:09             ` drwho
  0 siblings, 1 reply; 11+ messages in thread
From: Kalle Valo @ 2012-07-19  9:36 UTC (permalink / raw)
  To: drwho; +Cc: bkamatch, linux-wireless, ath6kl-devel

[-- Attachment #1: Type: text/plain, Size: 386 bytes --]

Hi Jon,

On 07/17/2012 07:40 PM, Kalle Valo wrote:
> On 07/17/2012 05:53 PM, drwho@infidigm.net wrote:
>> Would it be possible to get hw1.3 pushed up to linux-firmware git?
> 
> We are working on it. Hopefully we can push it soon.

Here's the firmware file and board data we are planning to send to
linux-firmware.git soon. Please let me know if you have any problems
with them.

Kalle

[-- Attachment #2: bdata.bin --]
[-- Type: application/octet-stream, Size: 6144 bytes --]

[-- Attachment #3: fw-3.bin --]
[-- Type: application/octet-stream, Size: 50662 bytes --]

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-07-19  9:36           ` Kalle Valo
@ 2012-07-20 20:09             ` drwho
  2012-08-17  7:35               ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: drwho @ 2012-07-20 20:09 UTC (permalink / raw)
  To: Kalle Valo; +Cc: bkamatch, linux-wireless, ath6kl-devel

[-- Attachment #1: Type: text/plain, Size: 761 bytes --]

Kalle,

Gave the firmware a try using your ath6kl-next branch (pulled yesterday). 
I can connect and move data to open networks only.  WPA connections appear
to keep trying to associate over and over at these states....

ASSOCIATED -> 4WAY_HANDSHAKE
4WAY_HANDSHAKE -> 4WAY_HANDSHAKE

wpa_supplicant log attached.  I tried a couple of routers / APs.

Jon

> Hi Jon,
>
> On 07/17/2012 07:40 PM, Kalle Valo wrote:
>> On 07/17/2012 05:53 PM, drwho@infidigm.net wrote:
>>> Would it be possible to get hw1.3 pushed up to linux-firmware git?
>>
>> We are working on it. Hopefully we can push it soon.
>
> Here's the firmware file and board data we are planning to send to
> linux-firmware.git soon. Please let me know if you have any problems
> with them.
>
> Kalle
>

[-- Attachment #2: test_error.txt --]
[-- Type: text/plain, Size: 122294 bytes --]

Initializing interface 'wlan5' conf '/home/lab/wpa_test.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/home/lab/wpa_test.conf' -> '/home/lab/wpa_test.conf'
Reading configuration file '/home/lab/wpa_test.conf'
Line: 1 - start of a new network block
ssid - hexdump_ascii(len=4):
     74 65 73 74                                       test            
scan_ssid=1 (0x1)
key_mgmt: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='test'
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:03:7f:20:48:79
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=5 set_tx=0 seq_len=0 key_len=0
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 15 92 41 47 5a 09 51 82 96 39 dd aa d4 b9 a8 70
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
Added interface wlan5
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Scan trigger
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
nl80211: Event message available
nl80211: New scan results available
Received scan results (11 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID c0:3f:0e:87:f3:0e SSID 'test'
BSS: Add new id 1 BSSID 00:25:9c:a2:a2:f5 SSID 'aw-linksys'
BSS: Add new id 2 BSSID 04:4f:aa:5b:da:11 SSID 'labtest'
BSS: Add new id 3 BSSID 00:25:9c:a2:a2:f4 SSID 'aw-linksys-5'
BSS: Add new id 4 BSSID 90:94:e4:55:d6:f4 SSID 'AW-Blue'
BSS: Add new id 5 BSSID 00:16:c7:10:04:00 SSID ''
BSS: Add new id 6 BSSID 84:c9:b2:55:0f:b1 SSID 'dlink'
BSS: Add new id 7 BSSID 00:17:94:a6:8f:40 SSID ''
BSS: Add new id 8 BSSID 00:16:c7:db:5c:90 SSID ''
BSS: Add new id 9 BSSID 00:16:47:92:92:a0 SSID ''
BSS: Add new id 10 BSSID 00:16:c7:db:58:f0 SSID ''
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: c0:3f:0e:87:f3:0e ssid='test' wpa_ie_len=0 rsn_ie_len=20 caps=0x431
   selected based on RSN IE
   selected WPA AP c0:3f:0e:87:f3:0e ssid='test'
Trying to associate with c0:3f:0e:87:f3:0e (SSID='test' freq=2422 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
nl80211: Connect (ifindex=2)
  * bssid=c0:3f:0e:87:f3:0e
  * freq=2422
  * SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * Auth Type 0
  * WPA Version 2
nl80211: Connect request send successfully
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=c0:3f:0e:87:f3:0e
No keys have been configured - skip key clearing
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 20 37 a9 ef 01 b8 6b 54 7d 62 1e b0 68 fd 07 29 29 7d f5 49 90 7c 48 22 31 aa be cc 1c c3 e6 d0
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 20 37 a9 ef 01 b8 6b 54 7d 62 1e b0 68 fd 07 29 29 7d f5 49 90 7c 48 22 31 aa be cc 1c c3 e6 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe 6d 7c 4c ec 85 d6 a9 57 d0 52 17 f6 02 44 e3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 20 37 a9 ef 01 b8 6b 54 7d 62 1e b0 68 fd 07 29 29 7d f5 49 90 7c 48 22 31 aa be cc 1c c3 e6 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f 80 f4 9a c9 4a 53 1a 0c 4a 8c 7e 5e 3a 74 fb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 20 37 a9 ef 01 b8 6b 54 7d 62 1e b0 68 fd 07 29 29 7d f5 49 90 7c 48 22 31 aa be cc 1c c3 e6 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d4 c2 26 a1 7b 40 95 ca e9 3d 4a a4 e7 70 41 99 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 20 37 a9 ef 01 b8 6b 54 7d 62 1e b0 68 fd 07 29 29 7d f5 49 90 7c 48 22 31 aa be cc 1c c3 e6 d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c1 81 99 ad 81 8d 39 ed d8 7a 07 75 cc 7e 67 a1 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 8a cd 42 16 a0 07 53 9d e9 8d f7 49 fe bd 62 e2 04 81 6b db f9 8d 0a a8 1a 35 b6 33 52 8f 33 fc
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 8a cd 42 16 a0 07 53 9d e9 8d f7 49 fe bd 62 e2 04 81 6b db f9 8d 0a a8 1a 35 b6 33 52 8f 33 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 17 0e 3a 8d 24 94 09 57 a8 20 27 2b 07 4b f9 b6 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 8a cd 42 16 a0 07 53 9d e9 8d f7 49 fe bd 62 e2 04 81 6b db f9 8d 0a a8 1a 35 b6 33 52 8f 33 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3c b9 79 80 75 75 fb 0a e4 9e 16 d1 92 ad 85 25 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 8a cd 42 16 a0 07 53 9d e9 8d f7 49 fe bd 62 e2 04 81 6b db f9 8d 0a a8 1a 35 b6 33 52 8f 33 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 12 3e b2 b6 f1 91 4c 63 a0 84 c9 c0 81 23 17 3e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 43 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 8a cd 42 16 a0 07 53 9d e9 8d f7 49 fe bd 62 e2 04 81 6b db f9 8d 0a a8 1a 35 b6 33 52 8f 33 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 44 91 c2 c0 e3 c2 d6 1c 55 28 06 e3 11 9f d9 fa 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 08 e8 3f 63 9d 52 59 5b 81 c0 1d 72 24 5c e3 43 25 73 74 ad a1 70 ec 71 61 50 7b fd 7a 04 d5 c3
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 08 e8 3f 63 9d 52 59 5b 81 c0 1d 72 24 5c e3 43 25 73 74 ad a1 70 ec 71 61 50 7b fd 7a 04 d5 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 4d 99 d6 a7 c4 92 a1 58 c2 e3 08 b9 ac fe 98 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 08 e8 3f 63 9d 52 59 5b 81 c0 1d 72 24 5c e3 43 25 73 74 ad a1 70 ec 71 61 50 7b fd 7a 04 d5 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a5 4b f6 3f 86 eb 2c ae d2 f2 e9 8c 7e 46 80 b3 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 08 e8 3f 63 9d 52 59 5b 81 c0 1d 72 24 5c e3 43 25 73 74 ad a1 70 ec 71 61 50 7b fd 7a 04 d5 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2f 94 04 51 41 fe c1 f8 f0 ff 83 f9 ed 01 f4 e2 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 08 e8 3f 63 9d 52 59 5b 81 c0 1d 72 24 5c e3 43 25 73 74 ad a1 70 ec 71 61 50 7b fd 7a 04 d5 c3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a 3d 5c f7 a3 c6 eb e6 41 e6 0c 23 60 d6 4d 94 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 45
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 15 88 d0 9b 05 02 87 18 b9 88 13 eb 3d 30 9e 18 36 5a a4 56 d3 af 2e 0c a9 2d 6e 40 5e 99 37 01
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 15 88 d0 9b 05 02 87 18 b9 88 13 eb 3d 30 9e 18 36 5a a4 56 d3 af 2e 0c a9 2d 6e 40 5e 99 37 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7b 28 ec 13 d2 b5 45 73 6a 5d 68 f1 d1 a7 87 3c 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
Disassociation notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID c0:3f:0e:87:f3:0e into blacklist
CTRL-EVENT-DISCONNECTED bssid=c0:3f:0e:87:f3:0e reason=3
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0xa009574 key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=c0:3f:0e:87:f3:0e
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (9 BSSes)
BSS: Start scan result update 2
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: c0:3f:0e:87:f3:0e ssid='test' wpa_ie_len=0 rsn_ie_len=20 caps=0x431
   selected based on RSN IE
   selected WPA AP c0:3f:0e:87:f3:0e ssid='test'
Trying to associate with c0:3f:0e:87:f3:0e (SSID='test' freq=2422 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
nl80211: Connect (ifindex=2)
  * bssid=c0:3f:0e:87:f3:0e
  * freq=2422
  * SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * Auth Type 0
  * WPA Version 2
nl80211: Connect request send successfully
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=c0:3f:0e:87:f3:0e
No keys have been configured - skip key clearing
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 7b bf cb 56 58 a8 77 3f bf 0b a2 db 0c 45 1f 85 c5 5f 77 e2 76 a9 a2 b8 51 97 8a f4 43 e2 bb e3
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 7b bf cb 56 58 a8 77 3f bf 0b a2 db 0c 45 1f 85 c5 5f 77 e2 76 a9 a2 b8 51 97 8a f4 43 e2 bb e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 04 96 c1 56 8d da d5 89 24 30 5c 29 af 10 40 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 7b bf cb 56 58 a8 77 3f bf 0b a2 db 0c 45 1f 85 c5 5f 77 e2 76 a9 a2 b8 51 97 8a f4 43 e2 bb e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cc 87 fa d1 bc 27 c1 58 dd c1 12 5c 11 1e e2 04 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 7b bf cb 56 58 a8 77 3f bf 0b a2 db 0c 45 1f 85 c5 5f 77 e2 76 a9 a2 b8 51 97 8a f4 43 e2 bb e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 a3 5e 75 f4 13 23 ab 1b 4b 95 f8 72 12 6d 42 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 46 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 7b bf cb 56 58 a8 77 3f bf 0b a2 db 0c 45 1f 85 c5 5f 77 e2 76 a9 a2 b8 51 97 8a f4 43 e2 bb e3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 df f1 ff 4d e9 9f 2c 3a 3f fc bb 00 89 48 6f 46 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): b3 66 ef ea 3b 6c 30 38 7a f3 57 34 61 97 bb 49 66 f6 8b a0 06 7d 29 45 53 75 8b 3f 69 71 1b 9d
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 b3 66 ef ea 3b 6c 30 38 7a f3 57 34 61 97 bb 49 66 f6 8b a0 06 7d 29 45 53 75 8b 3f 69 71 1b 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 b0 fb d2 3d b2 24 46 23 2b 24 d2 03 2f 9a d7 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 b3 66 ef ea 3b 6c 30 38 7a f3 57 34 61 97 bb 49 66 f6 8b a0 06 7d 29 45 53 75 8b 3f 69 71 1b 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b3 15 3b d8 8f c8 c9 34 a4 8d 81 09 53 2e 47 ad 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 b3 66 ef ea 3b 6c 30 38 7a f3 57 34 61 97 bb 49 66 f6 8b a0 06 7d 29 45 53 75 8b 3f 69 71 1b 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 87 2c 42 4e cb 8b d3 04 40 ae a9 32 49 c0 c2 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 47 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 b3 66 ef ea 3b 6c 30 38 7a f3 57 34 61 97 bb 49 66 f6 8b a0 06 7d 29 45 53 75 8b 3f 69 71 1b 9d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 8c 9d c2 e3 2f 99 06 91 ba 28 ab 24 fe 5a 42 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 6b a3 20 cb 42 f1 39 8c 7f 8f 1d 9b 73 43 1b 8c 43 dd b4 df 88 d8 8c 59 48 1f ee 4b a9 b9 c8 36
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 6b a3 20 cb 42 f1 39 8c 7f 8f 1d 9b 73 43 1b 8c 43 dd b4 df 88 d8 8c 59 48 1f ee 4b a9 b9 c8 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 30 d8 09 c5 8d 5a ec 12 6d 2b 7a 74 a3 64 6d 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 6b a3 20 cb 42 f1 39 8c 7f 8f 1d 9b 73 43 1b 8c 43 dd b4 df 88 d8 8c 59 48 1f ee 4b a9 b9 c8 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4a a4 cc 4f 43 a5 eb e3 e4 be 53 33 08 6b 87 c4 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 6b a3 20 cb 42 f1 39 8c 7f 8f 1d 9b 73 43 1b 8c 43 dd b4 df 88 d8 8c 59 48 1f ee 4b a9 b9 c8 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a8 05 61 4c dd 78 cb d6 e2 b9 84 78 92 e6 1a 67 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 6b a3 20 cb 42 f1 39 8c 7f 8f 1d 9b 73 43 1b 8c 43 dd b4 df 88 d8 8c 59 48 1f ee 4b a9 b9 c8 36 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 79 dc f0 cd ba 6b ec 35 c3 60 ba 2f a8 93 bc 57 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 49
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 56 42 63 23 c7 51 68 24 48 fb 48 ad be 46 af 33 e9 01 84 c9 0d 92 a5 2f a2 c3 a0 76 74 93 c1 01
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 56 42 63 23 c7 51 68 24 48 fb 48 ad be 46 af 33 e9 01 84 c9 0d 92 a5 2f a2 c3 a0 76 74 93 c1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0b 94 50 94 5e bd e2 56 7e e0 aa ad 39 68 1f 68 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
Disassociation notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
BSSID c0:3f:0e:87:f3:0e blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED bssid=c0:3f:0e:87:f3:0e reason=3
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0x80e4f28 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=2 alg=0 addr=0xa009574 key_idx=0 set_tx=0 seq_len=0 key_len=0
   addr=c0:3f:0e:87:f3:0e
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
State: DISCONNECTED -> SCANNING
Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
nl80211: Event message available
nl80211: New scan results available
Received scan results (9 BSSes)
BSS: Start scan result update 3
BSS: Expire BSS 4 due to no match in scan
BSS: Remove id 4 BSSID 90:94:e4:55:d6:f4 SSID 'AW-Blue'
BSS: Expire BSS 10 due to no match in scan
BSS: Remove id 10 BSSID 00:16:c7:db:58:f0 SSID ''
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=9
WPS: attr type=0x1024 len=4
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=27
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: c0:3f:0e:87:f3:0e ssid='test' wpa_ie_len=0 rsn_ie_len=20 caps=0x431
   skip - blacklisted
1: 00:25:9c:a2:a2:f5 ssid='aw-linksys' wpa_ie_len=22 rsn_ie_len=0 caps=0x431
   skip - SSID mismatch
2: 04:4f:aa:5b:da:11 ssid='labtest' wpa_ie_len=22 rsn_ie_len=0 caps=0x431
   skip - SSID mismatch
3: 00:25:9c:a2:a2:f4 ssid='aw-linksys-5' wpa_ie_len=22 rsn_ie_len=0 caps=0x411
   skip - SSID mismatch
4: 00:16:c7:10:04:00 ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
5: 84:c9:b2:55:0f:b1 ssid='dlink' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - no WPA/RSN IE
6: 00:17:94:a6:8f:40 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - no WPA/RSN IE
7: 00:16:c7:db:5c:90 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - no WPA/RSN IE
8: 00:16:47:92:92:a0 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
Try to find non-WPA AP
0: c0:3f:0e:87:f3:0e ssid='test' wpa_ie_len=0 rsn_ie_len=20 caps=0x431
   skip - blacklisted
1: 00:25:9c:a2:a2:f5 ssid='aw-linksys' wpa_ie_len=22 rsn_ie_len=0 caps=0x431
   skip - SSID mismatch
2: 04:4f:aa:5b:da:11 ssid='labtest' wpa_ie_len=22 rsn_ie_len=0 caps=0x431
   skip - SSID mismatch
3: 00:25:9c:a2:a2:f4 ssid='aw-linksys-5' wpa_ie_len=22 rsn_ie_len=0 caps=0x411
   skip - SSID mismatch
4: 00:16:c7:10:04:00 ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
5: 84:c9:b2:55:0f:b1 ssid='dlink' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - SSID mismatch
6: 00:17:94:a6:8f:40 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - SSID mismatch
7: 00:16:c7:db:5c:90 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x421
   skip - SSID mismatch
8: 00:16:47:92:92:a0 ssid='' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - SSID mismatch
No APs found - clear blacklist and try again
Removed BSSID c0:3f:0e:87:f3:0e from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: c0:3f:0e:87:f3:0e ssid='test' wpa_ie_len=0 rsn_ie_len=20 caps=0x431
   selected based on RSN IE
   selected WPA AP c0:3f:0e:87:f3:0e ssid='test'
Trying to associate with c0:3f:0e:87:f3:0e (SSID='test' freq=2422 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
nl80211: Connect (ifindex=2)
  * bssid=c0:3f:0e:87:f3:0e
  * freq=2422
  * SSID - hexdump_ascii(len=4):
     74 65 73 74                                       test            
  * IEs - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  * Auth Type 0
  * WPA Version 2
nl80211: Connect request send successfully
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=c0:3f:0e:87:f3:0e
No keys have been configured - skip key clearing
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 22 c6 6d e1 15 06 1a 49 c2 f6 15 38 58 5e 03 c6 77 8a e7 1c f6 12 2b d0 2c 1f ae f8 8c 9a 80 9f
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 22 c6 6d e1 15 06 1a 49 c2 f6 15 38 58 5e 03 c6 77 8a e7 1c f6 12 2b d0 2c 1f ae f8 8c 9a 80 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 68 0f 25 c5 02 75 a5 f9 0f 31 e9 7d 4f 18 07 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 22 c6 6d e1 15 06 1a 49 c2 f6 15 38 58 5e 03 c6 77 8a e7 1c f6 12 2b d0 2c 1f ae f8 8c 9a 80 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4b 8d 02 86 56 f6 16 21 4c eb 0d a1 92 29 d9 51 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 22 c6 6d e1 15 06 1a 49 c2 f6 15 38 58 5e 03 c6 77 8a e7 1c f6 12 2b d0 2c 1f ae f8 8c 9a 80 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 ce 91 de 34 5a 8d 0f c7 f9 1f 3d c7 ce 4a 7e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 22 c6 6d e1 15 06 1a 49 c2 f6 15 38 58 5e 03 c6 77 8a e7 1c f6 12 2b d0 2c 1f ae f8 8c 9a 80 9f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 d7 bf 52 4c 21 2c ee 53 9f 26 b4 18 74 24 36 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 8d e6 cd 14 1d 12 92 62 18 50 b6 a9 f8 41 5e b3 17 a5 2d f5 39 35 65 eb 6d 8b 3e ab f9 61 bd 40
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 8d e6 cd 14 1d 12 92 62 18 50 b6 a9 f8 41 5e b3 17 a5 2d f5 39 35 65 eb 6d 8b 3e ab f9 61 bd 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e9 1b e7 d2 f1 0b 00 58 ad b6 bf be f3 1c 02 39 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 8d e6 cd 14 1d 12 92 62 18 50 b6 a9 f8 41 5e b3 17 a5 2d f5 39 35 65 eb 6d 8b 3e ab f9 61 bd 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d1 53 14 e8 ef a9 7d 2e 67 33 39 a4 a2 5e 83 b5 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 03 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 8d e6 cd 14 1d 12 92 62 18 50 b6 a9 f8 41 5e b3 17 a5 2d f5 39 35 65 eb 6d 8b 3e ab f9 61 bd 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 23 6b 05 93 be 1d 78 01 fd 4e 9c 61 5b b0 a5 5e 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 04 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 8d e6 cd 14 1d 12 92 62 18 50 b6 a9 f8 41 5e b3 17 a5 2d f5 39 35 65 eb 6d 8b 3e ab f9 61 bd 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68 76 67 d5 ba 05 92 98 3a c5 f5 7a a8 93 c3 d7 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
nl80211: Event message available
nl80211: Event message available
Association info event
req_ies - hexdump(len=84): 00 04 74 65 73 74 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 02 00 40 00 dd 1e 00 90 4c 33 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a 4e 11 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 03 0d 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c0:3f:0e:87:f3:0e
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan5' added
nl80211: Event message available
nl80211: Event message available
RX EAPOL from c0:3f:0e:87:f3:0e
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=95
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4c
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 be 75 c7 45 9a 2f 44 fc 3a bc 51 fc 82 10 60 d9 41 74 f3 e6 cb 86 0e 9f b0 56 c6 ab 8f b3 48 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c0:3f:0e:87:f3:0e (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
WPA: Renewed SNonce - hexdump(len=32): 05 de dc db a7 fb 0d dc 87 94 82 5b 66 47 08 3e 63 d6 97 59 2e 05 9d a6 43 6d db eb 37 24 e5 25
WPA: PTK derivation - A1=00:03:7f:20:48:79 A2=c0:3f:0e:87:f3:0e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 05 de dc db a7 fb 0d dc 87 94 82 5b 66 47 08 3e 63 d6 97 59 2e 05 9d a6 43 6d db eb 37 24 e5 25 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e4 08 65 46 9f c4 3f 28 f0 56 38 d2 bd 39 2f 59 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan5
wpa_driver_nl80211_disconnect
No keys have been configured - skip key clearing
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
No keys have been configured - skip key clearing
BSS: Remove id 0 BSSID c0:3f:0e:87:f3:0e SSID 'test'
BSS: Remove id 1 BSSID 00:25:9c:a2:a2:f5 SSID 'aw-linksys'
BSS: Remove id 2 BSSID 04:4f:aa:5b:da:11 SSID 'labtest'
BSS: Remove id 3 BSSID 00:25:9c:a2:a2:f4 SSID 'aw-linksys-5'
BSS: Remove id 5 BSSID 00:16:c7:10:04:00 SSID ''
BSS: Remove id 6 BSSID 84:c9:b2:55:0f:b1 SSID 'dlink'
BSS: Remove id 7 BSSID 00:17:94:a6:8f:40 SSID ''
BSS: Remove id 8 BSSID 00:16:c7:db:5c:90 SSID ''
BSS: Remove id 9 BSSID 00:16:47:92:92:a0 SSID ''
Cancelling scan request
Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-07-20 20:09             ` drwho
@ 2012-08-17  7:35               ` Kalle Valo
  2012-08-17 12:03                 ` Jonathan Bagg
  0 siblings, 1 reply; 11+ messages in thread
From: Kalle Valo @ 2012-08-17  7:35 UTC (permalink / raw)
  To: drwho; +Cc: bkamatch, linux-wireless, ath6kl-devel

Hi Jon,

sorry for the late answer, I was again on vacation.

On 07/20/2012 11:09 PM, drwho@infidigm.net wrote:
> Kalle,
> 
> Gave the firmware a try using your ath6kl-next branch (pulled yesterday). 
> I can connect and move data to open networks only.  WPA connections appear
> to keep trying to associate over and over at these states....
> 
> ASSOCIATED -> 4WAY_HANDSHAKE
> 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> 
> wpa_supplicant log attached.  I tried a couple of routers / APs.

There's a developer working on this issue. I don't know when he will
send the fix but let's hope that it will happen soon.

Thanks for the report, keep them coming.

Kalle

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-08-17  7:35               ` Kalle Valo
@ 2012-08-17 12:03                 ` Jonathan Bagg
  2012-08-17 14:03                   ` Kalle Valo
  0 siblings, 1 reply; 11+ messages in thread
From: Jonathan Bagg @ 2012-08-17 12:03 UTC (permalink / raw)
  To: Kalle Valo; +Cc: bkamatch, linux-wireless, ath6kl-devel


> Hi Jon,
>
> sorry for the late answer, I was again on vacation.
No worries.

Also, I was only able to get a max of 65Mbps / MCS7.  I think the 9374 
is capable of faster? I've never used a 2-stream device....not sure if I 
need to configure it to use the 2-streams, or if the ath6kl driver only 
supports up to MCS7?

Jon

^ permalink raw reply	[flat|nested] 11+ messages in thread

* Re: ath6kl: Add support for AR6004 hardware version 1.3
  2012-08-17 12:03                 ` Jonathan Bagg
@ 2012-08-17 14:03                   ` Kalle Valo
  0 siblings, 0 replies; 11+ messages in thread
From: Kalle Valo @ 2012-08-17 14:03 UTC (permalink / raw)
  To: Jonathan Bagg; +Cc: bkamatch, linux-wireless, ath6kl-devel

On 08/17/2012 03:03 PM, Jonathan Bagg wrote:
> Also, I was only able to get a max of 65Mbps / MCS7.  I think the 9374 
> is capable of faster? I've never used a 2-stream device....not sure if I 
> need to configure it to use the 2-streams, or if the ath6kl driver only 
> supports up to MCS7?

I don't actually know. I need to find out from the team who added ar6004
support to ath6kl and I will get back to you (or preferably someone from
that team will).

Kalle

^ permalink raw reply	[flat|nested] 11+ messages in thread

end of thread, other threads:[~2012-08-17 14:03 UTC | newest]

Thread overview: 11+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2012-06-27 21:28 ar6004 / ar9374 firmware drwho
2012-07-10 10:49 ` Kalle Valo
2012-07-10 13:42   ` ar6004 / ar9374 drwho
2012-07-11 12:48     ` Kalle Valo
2012-07-17 14:53       ` ath6kl: Add support for AR6004 hardware version 1.3 drwho
2012-07-17 16:40         ` Kalle Valo
2012-07-19  9:36           ` Kalle Valo
2012-07-20 20:09             ` drwho
2012-08-17  7:35               ` Kalle Valo
2012-08-17 12:03                 ` Jonathan Bagg
2012-08-17 14:03                   ` Kalle Valo

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.