Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' Line: 100 - start of a new network block SSID - hexdump_ascii(len=7): 57 50 41 20 50 53 4b WPA PSK proto: 0x1 key_mgmt: 0x2 pairwise: 0x8 group: 0x8 PSK (from passphrase) - hexdump(len=32): dd 02 94 8d f2 b7 0f 11 62 b8 b6 49 3f e6 b6 ca c5 c4 15 08 05 d2 23 26 34 29 76 ee a1 31 96 d1 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 wpa_driver_atmel_set_wpa atml0 wpa_driver_atmel_set_wpa: enabled=1 wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_countermeasures - not yet implemented wpa_driver_atmel_set_drop_unencrypted - not yet implemented Starting AP scan (broadcast SSID) EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 Scan timeout - try to get results Received 1259 bytes of scan results (11 BSSes) Scan results: 11 0: 00:04:25:02:00:50 ssid='SOLARIS' wpa_ie_len=0 rsn_ie_len=0 1: 00:0b:fd:0a:ca:d9 ssid='1200_WPA1x' wpa_ie_len=24 rsn_ie_len=0 2: 00:02:2d:1f:f5:e1 ssid='1ff5e1' wpa_ie_len=24 rsn_ie_len=0 3: 00:08:21:31:2b:2b ssid='WPA PSK' wpa_ie_len=24 rsn_ie_len=0 Trying to associate with 00:08:21:31:2b:2b (SSID='WPA PSK' freq=0 MHz) WPA: using IEEE 802.11i/D3.0 WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_associate. EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 Wireless event: cmd=0x8b1a len=19 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 Starting AP scan (broadcast SSID) EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0 Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:08:21:31:2b:2b Association event - clear replay counter Associated to a new BSS: BSSID=00:08:21:31:2b:2b wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: txStart WPA: drop TX EAPOL in WPA-PSK mode (type=1 len=0) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAP: EAP entering state IDLE Wireless event: cmd=0x8c02 len=81 Custom wireless event: 'ASSOCINFO(ReqIEs=dd180050f20101000050f20201000050f20201000050f2020000' Association info event req_ies - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 assoc_wpa_ie - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 RX EAPOL from 00:08:21:31:2b:2b RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX message 1 of 4-Way Handshake from 00:08:21:31:2b:2b (ver=1) WPA: PMK - hexdump(len=32): dd 02 94 8d f2 b7 0f 11 62 b8 b6 49 3f e6 b6 ca c5 c4 15 08 05 d2 23 26 34 29 76 ee a1 31 96 d1 WPA: PTK - hexdump(len=64): 84 0f e8 3a ff 2b 3b 8c 8c 7b fb 16 00 a3 84 fc e8 d4 49 77 2d 41 26 3b ad df 9b f6 bf d6 ba e5 7f b5 21 bb 05 7f b9 83 37 e3 a6 54 f8 01 f7 85 13 e5 89 00 5b 8a 50 ee 54 61 7b 66 30 19 18 ff WPA: EAPOL-Key MIC - hexdump(len=16): 8a a4 b5 01 3e 60 3d d6 90 03 68 5d b7 5a d7 d1 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key 2/4 - hexdump(len=139): 00 08 21 31 2b 2b 00 04 25 00 01 1d 88 8e 01 03 00 79 fe 01 09 00 20 00 00 00 00 00 00 00 01 98 14 d8 e3 2f 96 62 c3 f1 12 89 29 c1 bd f8 c6 17 46 d5 89 15 46 6f 3d a3 88 36 eb 39 f8 bd 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8a a4 b5 01 3e 60 3d d6 90 03 68 5d b7 5a d7 d1 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 RX EAPOL from 00:08:21:31:2b:2b RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5a 82 5a a8 5b 15 a8 15 0b 05 55 c0 10 4a f7 14 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=119 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 b0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5a 82 5a a8 5b 15 a8 15 0b 05 55 c0 10 4a f7 14 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: RX message 3 of 4-Way Handshake from 00:08:21:31:2b:2b (ver=1) WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 08 21 31 2b 2b 00 04 25 00 01 1d 88 8e 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 98 14 d8 e3 2f 96 62 c3 f1 12 89 29 c1 bd f8 c6 17 46 d5 89 15 46 6f 3d a3 88 36 eb 39 f8 bd 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 ed a2 25 bb 29 3e 20 c6 8e 33 b4 d3 19 55 e9 00 00 WPA: Installing PTK to the driver. WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 wpa_driver_atmel_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59 RX EAPOL from 00:08:21:31:2b:2b RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 af 2e 2f 1b 8d ff 7a 96 1b c0 a6 81 f3 e9 92 96 37 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 09 3c e3 5e e5 01 28 d5 39 26 5f 28 1e 92 c8 00 20 37 af 14 db e1 3c e1 fa 7a 87 86 9a 75 7f 17 2c 3b 98 7c 4b b3 a4 a4 a8 7c a9 bd 29 f9 32 e1 92 EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines IEEE 802.1X RX: version=1 type=3 length=127 EAPOL-Key type=254 WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 04 cc 87 8e 90 54 4f c7 14 f2 60 67 7a 40 1d 5e 76 bc cc a4 3d 2f 19 ab c6 75 ff f6 8b ff 7d d1 af 2e 2f 1b 8d ff 7a 96 1b c0 a6 81 f3 e9 92 96 37 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 09 3c e3 5e e5 01 28 d5 39 26 5f 28 1e 92 c8 00 20 37 af 14 db e1 3c e1 fa 7a 87 86 9a 75 7f 17 2c 3b 98 7c 4b b3 a4 a4 a8 7c a9 bd 29 f9 32 e1 92 WPA: RX message 1 of Group Key Handshake from 00:08:21:31:2b:2b (ver=1) WPA: Group Key - hexdump(len=32): 58 d5 47 1f 36 da 64 09 5a c3 ba a6 e0 61 e9 0e 4c ea 65 32 78 30 22 3d 6a 97 30 ec 69 0a 9d 38 WPA: Installing GTK to the driver (keyidx=1 tx=0). WPA: RSC - hexdump(len=6): 1e 00 00 00 00 00 wpa_driver_atmel_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Sending EAPOL-Key 2/2 WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 08 21 31 2b 2b 00 04 25 00 01 1d 88 8e 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 85 55 18 b0 b3 26 7f 9e dc 32 37 9c e6 3c d1 3c 00 00 WPA: Key negotiation completed with 00:08:21:31:2b:2b EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state SUCCESS EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: SUPP_BE entering state IDLE EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58 Scan timeout - try to get results Received 769 bytes of scan results (6 BSSes) Scan results: 6 0: 00:04:25:02:00:50 ssid='SOLARIS' wpa_ie_len=0 rsn_ie_len=0 1: 00:08:21:31:2b:2b ssid='WPA PSK' wpa_ie_len=24 rsn_ie_len=0 Already associated with the selected AP. EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54 EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23 idleWhile=53 Signal 2 received - terminating wpa_driver_atmel_disassociate wpa_driver_atmel_disassociate wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0 wpa_driver_atmel_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0 EAPOL: External notification - portEnabled=0 EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portValid=0 wpa_driver_atmel_set_wpa atml0 wpa_driver_atmel_set_wpa: enabled=0 wpa_driver_atmel_set_drop_unencrypted - not yet implemented wpa_driver_atmel_set_countermeasures - not yet implemented