ioctl[SIOCSIWPMKSA]: No such device Initializing interface 'wlan0' conf '/usr/local/etc/wpa_supplicant.conf' driver 'ndiswrapper' Configuration file '/usr/local/etc/wpa_supplicant.conf' -> '/usr/local/etc/wpa_supplicant.conf' Reading configuration file '/usr/local/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' Priority group 0 id=0 ssid='WSHHFF84NF' Initializing interface (2) 'wlan0' SIOCGIWRANGE: too old (short) data - assuming WPA is not supported Own MAC address: 00:90:4b:f9:4b:1a Setting scan request: 0 sec 100000 usec Wireless event: cmd=0x8b06 len=12 RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added State: DISCONNECTED -> SCANNING Starting AP scan (broadcast SSID) Scan timeout - try to get results Received 1813 bytes of scan results (6 BSSes) Scan results: 6 Selecting BSS from priority group 0 0: 00:90:96:cf:36:6a ssid='WSHHFF84NF' wpa_ie_len=24 rsn_ie_len=0 caps=0x11 selected Trying to associate with 00:90:96:cf:36:6a (SSID='WSHHFF84NF' freq=2412 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING Setting authentication timeout: 5 sec 0 usec Wireless event: cmd=0x8c02 len=221 Custom wireless event: 'ASSOCINFO(ReqIEs=000a57534848464638344e46010882848b962430486c32040c121860dd06001018020000dd180050f20101000050f20201000050f20201000050f2020000 RespIEs=010882848b962430486c32040c121860dd050010180100)' Association info event req_ies - hexdump(len=62): 00 0a 57 53 48 48 46 46 38 34 4e 46 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 resp_ies - hexdump(len=23): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 00 WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:90:96:cf:36:6a State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=00:90:96:cf:36:6a No keys have been configured - skip key clearing Associated with 00:90:96:cf:36:6a WPA: Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:0e:50:26:6e:5a Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Renewed SNonce - hexdump(len=32): ec a0 91 64 c6 da 60 0a 94 ee 30 72 15 b1 a4 2b 57 d1 69 67 84 a2 6c 21 73 61 ab d2 1a d9 3a 65 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 Wireless event: cmd=0x8c02 len=221 Custom wireless event: 'ASSOCINFO(ReqIEs=000a57534848464638344e46010882848b962430486c32040c121860dd06001018020000dd180050f20101000050f20201000050f20201000050f2020000 RespIEs=010882848b962430486c32040c121860dd050010180101)' Association info event req_ies - hexdump(len=62): 00 0a 57 53 48 48 46 46 38 34 4e 46 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 resp_ies - hexdump(len=23): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 01 WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:90:96:cf:36:6a State: 4WAY_HANDSHAKE -> ASSOCIATED Associated with 00:90:96:cf:36:6a WPA: Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:0e:50:26:6e:5a Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Renewed SNonce - hexdump(len=32): 88 64 96 e1 a4 33 52 f5 a8 d0 30 20 a9 a5 09 a1 a8 93 bf 60 f9 30 c6 57 90 b3 86 90 c1 d3 25 c0 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 Wireless event: cmd=0x8c02 len=221 Custom wireless event: 'ASSOCINFO(ReqIEs=000a57534848464638344e46010882848b962430486c32040c121860dd06001018020000dd180050f20101000050f20201000050f20201000050f2020000 RespIEs=010882848b962430486c32040c121860dd050010180101)' Association info event req_ies - hexdump(len=62): 00 0a 57 53 48 48 46 46 38 34 4e 46 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 00 00 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 resp_ies - hexdump(len=23): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 05 00 10 18 01 01 WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 Wireless event: cmd=0x8b15 len=24 Wireless event: new AP: 00:90:96:cf:36:6a State: 4WAY_HANDSHAKE -> ASSOCIATED Associated with 00:90:96:cf:36:6a WPA: Association event - clear replay counter Setting authentication timeout: 10 sec 0 usec RX EAPOL from 00:0e:50:26:6e:5a Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Renewed SNonce - hexdump(len=32): 5e 92 23 c2 9b 4d 86 b2 c7 0b 1d 8d 6f 21 69 43 55 00 9e 88 5e 53 05 fa 17 62 07 01 fa 14 43 87 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 RX EAPOL from 00:0e:50:26:6e:5a IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:0e:50:26:6e:5a (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 Wireless event: cmd=0x8c02 len=221