WPA supplicant log from current libertas-2.6 head

Dan Williams dcbw at redhat.com
Tue Jun 5 17:20:30 EDT 2007


Works as far as I got with the wpa_supplicant-0.5.7 from FC-6 updates.
That has a patch that increases the association timeout from 5 to 15
seconds when a driver doesn't support some of the random ioctls in the
associate function.  wpa_supplicant should really get fixed upstream to
not have a 5 second timeout when stuff like PRIVACYINVOKED fails, which
is what the patch worked around.

I get as far as the logs here indicate, which is actually 100% of the
way through an association, but a DHCP fails for some reason.


ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1
fast_reauth=1

network={
        ssid="fubartest"
        proto=WPA
        key_mgmt=WPA-PSK
        pairwise=CCMP TKIP
        group=CCMP TKIP
        psk="blorkblork"
        priority=2
}



/usr/sbin/wpa_supplicant -ddd -t -ieth2 -Dwext -c/etc/wpa_supplicant.conf
Jun 05 14:13:02.177251: Initializing interface 'eth2' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A'
Jun 05 14:13:02.177758: Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Jun 05 14:13:02.177867: Reading configuration file '/etc/wpa_supplicant.conf'
Jun 05 14:13:02.178040: ctrl_interface='/var/run/wpa_supplicant'
Jun 05 14:13:02.178826: ctrl_interface_group=0
Jun 05 14:13:02.178954: eapol_version=1
Jun 05 14:13:02.179056: ap_scan=1
Jun 05 14:13:02.179157: fast_reauth=1
Jun 05 14:13:02.179258: Line: 7 - start of a new network block
Jun 05 14:13:02.179374: ssid - hexdump_ascii(len=9):
     66 75 62 61 72 74 65 73 74                        fubartest       
Jun 05 14:13:02.179527: proto: 0x1
Jun 05 14:13:02.179562: key_mgmt: 0x2
Jun 05 14:13:02.179595: pairwise: 0x18
Jun 05 14:13:02.179628: group: 0x18
Jun 05 14:13:02.179659: PSK (ASCII passphrase) - hexdump_ascii(len=10): [REMOVED]
Jun 05 14:13:02.179706: priority=2 (0x2)
Jun 05 14:13:02.233826: PSK (from passphrase) - hexdump(len=32): [REMOVED]
Jun 05 14:13:02.234076: Priority group 2
Jun 05 14:13:02.234221:    id=0 ssid='fubartest'
Jun 05 14:13:02.234328: Initializing interface (2) 'eth2'
Jun 05 14:13:02.240462: EAPOL: SUPP_PAE entering state DISCONNECTED
Jun 05 14:13:02.240618: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
Jun 05 14:13:02.240718: EAPOL: SUPP_BE entering state INITIALIZE
Jun 05 14:13:02.240825: EAP: EAP entering state DISABLED
Jun 05 14:13:02.241000: EAPOL: External notification - portEnabled=0
Jun 05 14:13:02.241138: EAPOL: External notification - portValid=0
ioctl[SIOCSIWPMKSA]: Invalid argument
Jun 05 14:13:02.264773: SIOCGIWRANGE: WE(compiled)=21 WE(source)=15 enc_capa=0xf
Jun 05 14:13:02.264977:   capabilities: key_mgmt 0xf enc 0xf
Jun 05 14:13:02.267443: Own MAC address: 00:50:43:28:0b:88
Jun 05 14:13:02.267560: wpa_driver_wext_set_wpa
Jun 05 14:13:02.286203: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
Jun 05 14:13:02.312587: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
Jun 05 14:13:02.333833: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
Jun 05 14:13:02.353118: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
Jun 05 14:13:02.376965: wpa_driver_wext_set_countermeasures
Jun 05 14:13:02.399493: wpa_driver_wext_set_drop_unencrypted
Jun 05 14:13:02.421919: Setting scan request: 0 sec 100000 usec
Jun 05 14:13:02.422587: Added interface eth2
Jun 05 14:13:02.422885: Wireless event: cmd=0x8b06 len=8
Jun 05 14:13:02.423273: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
Jun 05 14:13:02.423417: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
Jun 05 14:13:02.522427: State: DISCONNECTED -> SCANNING
Jun 05 14:13:02.522652: Starting AP scan (broadcast SSID)
Jun 05 14:13:02.523371: Wireless event: cmd=0x8b19 len=8
Jun 05 14:13:02.523611: Received 0 bytes of scan results (0 BSSes)
Jun 05 14:13:02.523718: Scan results: 0
Jun 05 14:13:02.523820: Selecting BSS from priority group 2
Jun 05 14:13:02.523947: No suitable AP found.
Jun 05 14:13:02.524051: Setting scan request: 5 sec 0 usec
Jun 05 14:13:07.524670: Starting AP scan (broadcast SSID)
Jun 05 14:13:07.525113: Wireless event: cmd=0x8b19 len=8
Jun 05 14:13:07.525215: Received 814 bytes of scan results (5 BSSes)
Jun 05 14:13:07.525249: Scan results: 5
Jun 05 14:13:07.525281: Selecting BSS from priority group 2
Jun 05 14:13:07.525312: 0: 00:0b:85:53:29:4f ssid='iscradius' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
Jun 05 14:13:07.525350:    skip - SSID mismatch
Jun 05 14:13:07.525380: 1: 00:0b:85:53:29:4e ssid='iscwireless' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
Jun 05 14:13:07.525416:    skip - SSID mismatch
Jun 05 14:13:07.525445: 2: 00:1a:a2:be:0d:c0 ssid='media lab 802.11' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
Jun 05 14:13:07.525482:    skip - no WPA/RSN IE
Jun 05 14:13:07.525511: 3: 02:22:b2:08:51:fd ssid='olpc-mesh-1.25.42' wpa_ie_len=0 rsn_ie_len=0 caps=0x2
Jun 05 14:13:07.525548:    skip - no WPA/RSN IE
Jun 05 14:13:07.525577: 4: 00:40:96:34:70:aa ssid='sick2' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
Jun 05 14:13:07.525612:    skip - no WPA/RSN IE
Jun 05 14:13:07.525659: No suitable AP found.
Jun 05 14:13:07.525693: Setting scan request: 5 sec 0 usec
Jun 05 14:13:12.525904: Starting AP scan (broadcast SSID)
Jun 05 14:13:12.526403: Wireless event: cmd=0x8b19 len=8
Jun 05 14:13:12.526758: Received 1805 bytes of scan results (11 BSSes)
Jun 05 14:13:12.526793: Scan results: 11
Jun 05 14:13:12.526826: Selecting BSS from priority group 2
Jun 05 14:13:12.527985: 0: 00:0f:66:85:48:de ssid='fubartest' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
Jun 05 14:13:12.528037:    selected based on WPA IE
Jun 05 14:13:12.528078: Trying to associate with 00:0f:66:85:48:de (SSID='fubartest' freq=2462 MHz)
Jun 05 14:13:12.528114: Cancelling scan request
Jun 05 14:13:12.528144: WPA: clearing own WPA/RSN IE
Jun 05 14:13:12.528173: Automatic auth_alg selection: 0x1
Jun 05 14:13:12.546487: WPA: using IEEE 802.11i/D3.0
Jun 05 14:13:12.546519: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
Jun 05 14:13:12.546552: WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:12.546603: WPA: clearing AP RSN IE
Jun 05 14:13:12.546634: WPA: using GTK TKIP
Jun 05 14:13:12.546667: WPA: using PTK TKIP
Jun 05 14:13:12.546699: WPA: using KEY_MGMT WPA-PSK
Jun 05 14:13:12.546731: WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:12.546782: No keys have been configured - skip key clearing
Jun 05 14:13:12.546813: wpa_driver_wext_set_drop_unencrypted
Jun 05 14:13:12.565107: State: SCANNING -> ASSOCIATING
Jun 05 14:13:12.565139: wpa_driver_wext_associate
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 10 value 0x1 - Jun 05 14:13:12.699029: wpa_driver_wext_associate: assoc failed because set_auth_param(PRIVACY_INVOKED) failed
ioctl[SIOCSIWAUTH]: Operation not supported
WEXT auth param 8 value 0x0 - Jun 05 14:13:12.717766: wpa_driver_wext_associate: assoc failed because set_auth_param(RX_UNENCRYPTED_EAPOL) failed
Jun 05 14:13:12.773735: Association request to the driver failed
Jun 05 14:13:12.773774: Setting authentication timeout: 15 sec 0 usec
Jun 05 14:13:12.773810: EAPOL: External notification - EAP success=0
Jun 05 14:13:12.773894: EAPOL: External notification - EAP fail=0
Jun 05 14:13:12.773962: EAPOL: External notification - portControl=Auto
Jun 05 14:13:12.774070: Wireless event: cmd=0x8b06 len=8
Jun 05 14:13:12.774116: Wireless event: cmd=0x8b04 len=12
Jun 05 14:13:12.774161: Wireless event: cmd=0x8b1a len=17
Jun 05 14:13:13.407742: Wireless event: cmd=0x8b15 len=20
Jun 05 14:13:13.407829: Wireless event: new AP: 00:0f:66:85:48:de
Jun 05 14:13:13.407865: State: ASSOCIATING -> ASSOCIATED
Jun 05 14:13:13.407928: Associated to a new BSS: BSSID=00:0f:66:85:48:de
Jun 05 14:13:13.407962: No keys have been configured - skip key clearing
Jun 05 14:13:13.407998: Associated with 00:0f:66:85:48:de
Jun 05 14:13:13.408029: WPA: Association event - clear replay counter
Jun 05 14:13:13.408060: EAPOL: External notification - portEnabled=0
Jun 05 14:13:13.408198: EAPOL: External notification - portValid=0
Jun 05 14:13:13.408266: EAPOL: External notification - EAP success=0
Jun 05 14:13:13.408334: EAPOL: External notification - portEnabled=1
Jun 05 14:13:13.408365: EAPOL: SUPP_PAE entering state CONNECTING
Jun 05 14:13:13.408395: EAPOL: SUPP_BE entering state IDLE
Jun 05 14:13:13.408448: Setting authentication timeout: 10 sec 0 usec
Jun 05 14:13:13.408500: RTM_NEWLINK, IFLA_IFNAME: Interface 'eth2' added
Jun 05 14:13:13.408540: RX EAPOL from 00:0f:66:85:48:de
Jun 05 14:13:13.408574: RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 23 c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jun 05 14:13:13.408684: Setting authentication timeout: 10 sec 0 usec
Jun 05 14:13:13.408796: IEEE 802.1X RX: version=1 type=3 length=95
Jun 05 14:13:13.408834:   EAPOL-Key type=254
Jun 05 14:13:13.408868:   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
Jun 05 14:13:13.408903:   key_length=32 key_data_length=0
Jun 05 14:13:13.408933:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 23
Jun 05 14:13:13.408970:   key_nonce - hexdump(len=32): c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4
Jun 05 14:13:13.409023:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jun 05 14:13:13.409066:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
Jun 05 14:13:13.409271:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
Jun 05 14:13:13.409309:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jun 05 14:13:13.409353: WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 23 c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jun 05 14:13:13.409487: State: ASSOCIATED -> 4WAY_HANDSHAKE
Jun 05 14:13:13.409518: WPA: RX message 1 of 4-Way Handshake from 00:0f:66:85:48:de (ver=1)
Jun 05 14:13:13.409553: WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:13.414061: WPA: Renewed SNonce - hexdump(len=32): c5 cb 73 cc ca 52 42 a8 56 73 5b f4 54 95 27 1b 1e 93 ca 52 ec c1 f9 97 a5 73 ea 57 a7 f0 60 9a
Jun 05 14:13:13.414319: WPA: PMK - hexdump(len=32): [REMOVED]
Jun 05 14:13:13.414352: WPA: PTK - hexdump(len=64): [REMOVED]
Jun 05 14:13:13.414383: WPA: Sending EAPOL-Key 2/4
Jun 05 14:13:13.414443: WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 23 c5 cb 73 cc ca 52 42 a8 56 73 5b f4 54 95 27 1b 1e 93 ca 52 ec c1 f9 97 a5 73 ea 57 a7 f0 60 9a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 ae 02 f9 fd 58 96 53 b8 a6 7d 31 b1 67 be 1f 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:13.419143: RX EAPOL from 00:0f:66:85:48:de
Jun 05 14:13:13.419182: RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 24 c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 c7 1a 40 15 3c 9d 85 5d 1f d9 87 30 31 41 0d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:13.419307: IEEE 802.1X RX: version=1 type=3 length=119
Jun 05 14:13:13.419338:   EAPOL-Key type=254
Jun 05 14:13:13.419368:   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
Jun 05 14:13:13.419403:   key_length=32 key_data_length=24
Jun 05 14:13:13.419433:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 24
Jun 05 14:13:13.419469:   key_nonce - hexdump(len=32): c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4
Jun 05 14:13:13.419522:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Jun 05 14:13:13.419565:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
Jun 05 14:13:13.419601:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
Jun 05 14:13:13.419638:   key_mic - hexdump(len=16): e6 c7 1a 40 15 3c 9d 85 5d 1f d9 87 30 31 41 0d
Jun 05 14:13:13.419679: WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 24 c9 13 ff a6 94 d0 22 07 7d 71 2e c8 cf 96 c5 74 d0 89 06 03 5c dd 19 a9 5b 81 7f 16 5d d2 33 a4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e6 c7 1a 40 15 3c 9d 85 5d 1f d9 87 30 31 41 0d 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:13.419821: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
Jun 05 14:13:13.419852: WPA: RX message 3 of 4-Way Handshake from 00:0f:66:85:48:de (ver=1)
Jun 05 14:13:13.419886: WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
Jun 05 14:13:13.419939: WPA: Sending EAPOL-Key 4/4
Jun 05 14:13:13.419974: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c cd 81 e7 6c e5 85 3a bc d1 95 56 9f aa 79 96 00 00
Jun 05 14:13:13.420114: WPA: Installing PTK to the driver.
Jun 05 14:13:13.420145: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
Jun 05 14:13:13.420181: wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
Jun 05 14:13:13.439143: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
Jun 05 14:13:14.106071: RX EAPOL from 00:0f:66:85:48:de
Jun 05 14:13:14.106145: RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 26 d7 a6 fd 74 86 8e 81 81 cc e0 57 a3 8d 5b 74 9f da 7e eb 24 6c 5d 1d 59 90 7e d6 05 d7 ea 57 b9 13 a6 d0 09 f0 78 2d 44 59 e8 19 de 0f 73 e2 01 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 63 42 55 37 17 8e 12 18 27 e2 f0 fe 8c 4f 96 00 20 e5 8f 41 2b 56 55 cb e0 d2 b9 26 ed 90 ff a2 17 3a f1 0c 1d 18 5c 07 63 f3 8e 9e b1 14 f6 12 cb
Jun 05 14:13:14.106276: IEEE 802.1X RX: version=1 type=3 length=127
Jun 05 14:13:14.106310:   EAPOL-Key type=254
Jun 05 14:13:14.106340:   key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
Jun 05 14:13:14.106375:   key_length=32 key_data_length=32
Jun 05 14:13:14.106406:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 26
Jun 05 14:13:14.106443:   key_nonce - hexdump(len=32): d7 a6 fd 74 86 8e 81 81 cc e0 57 a3 8d 5b 74 9f da 7e eb 24 6c 5d 1d 59 90 7e d6 05 d7 ea 57 b9
Jun 05 14:13:14.106495:   key_iv - hexdump(len=16): 13 a6 d0 09 f0 78 2d 44 59 e8 19 de 0f 73 e2 01
Jun 05 14:13:14.106537:   key_rsc - hexdump(len=8): 03 00 00 00 00 00 00 00
Jun 05 14:13:14.106574:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
Jun 05 14:13:14.106624:   key_mic - hexdump(len=16): a9 63 42 55 37 17 8e 12 18 27 e2 f0 fe 8c 4f 96
Jun 05 14:13:14.106668: WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 26 d7 a6 fd 74 86 8e 81 81 cc e0 57 a3 8d 5b 74 9f da 7e eb 24 6c 5d 1d 59 90 7e d6 05 d7 ea 57 b9 13 a6 d0 09 f0 78 2d 44 59 e8 19 de 0f 73 e2 01 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 63 42 55 37 17 8e 12 18 27 e2 f0 fe 8c 4f 96 00 20 e5 8f 41 2b 56 55 cb e0 d2 b9 26 ed 90 ff a2 17 3a f1 0c 1d 18 5c 07 63 f3 8e 9e b1 14 f6 12 cb
Jun 05 14:13:14.106809: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
Jun 05 14:13:14.106841: WPA: RX message 1 of Group Key Handshake from 00:0f:66:85:48:de (ver=1)
Jun 05 14:13:14.106888: WPA: Group Key - hexdump(len=32): [REMOVED]
Jun 05 14:13:14.106919: WPA: Installing GTK to the driver (keyidx=1 tx=0).
Jun 05 14:13:14.106950: WPA: RSC - hexdump(len=6): 03 00 00 00 00 00
Jun 05 14:13:14.106987: wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
Jun 05 14:13:14.125736: WPA: Sending EAPOL-Key 2/2
Jun 05 14:13:14.125772: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 99 fa 74 93 5c e3 25 c6 fa 5c af ef 59 fb f0 00 00
Jun 05 14:13:14.125939: WPA: Key negotiation completed with 00:0f:66:85:48:de [PTK=TKIP GTK=TKIP]
Jun 05 14:13:14.125976: Cancelling authentication timeout
Jun 05 14:13:14.126007: State: GROUP_HANDSHAKE -> COMPLETED
Jun 05 14:13:14.126046: CTRL-EVENT-CONNECTED - Connection to 00:0f:66:85:48:de completed (auth)
Jun 05 14:13:14.126077: EAPOL: External notification - portValid=1
Jun 05 14:13:14.126130: EAPOL: External notification - EAP success=1
Jun 05 14:13:14.126161: EAPOL: SUPP_PAE entering state AUTHENTICATING
Jun 05 14:13:14.126191: EAPOL: SUPP_BE entering state SUCCESS
Jun 05 14:13:14.126221: EAP: EAP entering state DISABLED
Jun 05 14:13:14.126251: EAPOL: SUPP_PAE entering state AUTHENTICATED
Jun 05 14:13:14.126281: EAPOL: SUPP_BE entering state IDLE
Jun 05 14:13:16.268329: EAPOL: startWhen --> 0





More information about the libertas-dev mailing list