fajo
(usa Debian)
Enviado em 14/04/2015 - 10:56h
wpa_supplicant v1.0
random: Trying to read entropy from /dev/random
Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
Priority group 0
id=0 ssid='ti'
WEXT: cfg80211-based driver detected
wext: interface wlan0 phy: phy0
rfkill: initial event: idx=0 type=1 op=0 soft=0 hard=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
capabilities: key_mgmt 0xf enc 0xf flags 0x0
netlink: Operstate: linkmode=1, operstate=5
wlan0: Own MAC address: 00:1a:13:06:07:d7
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_countermeasures
wlan0: RSN: flushing PMKID list in the driver
wlan0: Setting scan request: 0 sec 100000 usec
WPS: Set UUID for interface wlan0
WPS: UUID based on MAC address - hexdump(len=16): ff c2 2f 61 7b b3 52 13 95 b1 2c 2c 7b 06 75 7b
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
wlan0: Added interface wlan0
random: Got 20/20 bytes from /dev/random
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification
wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
Added BSSID 00:00:00:00:00:00 into blacklist
wlan0: Setting scan request: 0 sec 100000 usec
wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
wlan0: Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 10 seconds
wlan0: Failed to initiate AP scan
wlan0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 10 seconds
wlan0: Failed to initiate AP scan
wlan0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 2141 bytes of scan results (5 BSSes)
wlan0: BSS: Start scan result update 1
wlan0: BSS: Add new id 0 BSSID 00:1f:1f:16:66:0b SSID 'aula'
wlan0: BSS: Add new id 1 BSSID 54:e6:fc:99:f2:fe SSID 'ti'
wlan0: BSS: Add new id 2 BSSID 00:1a:3f:8f:6e:b6 SSID 'DEMOCRATAS'
wlan0: BSS: Add new id 3 BSSID a0:f3:c1:e7:90:ce SSID 'Parecer Contabil'
wlan0: BSS: Add new id 4 BSSID 52:36:89:b2:4d:91 SSID 'Portthru'
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: selected based on WPA IE
wlan0: selected BSS 54:e6:fc:99:f2:fe ssid='ti'
wlan0: Request association: reassociate: 0 selected: 54:e6:fc:99:f2:fe bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED
wlan0: Trying to associate with 54:e6:fc:99:f2:fe (SSID='ti' freq=2442 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: WPA: using IEEE 802.11i/D3.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: WPA: clearing AP RSN IE
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK TKIP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: No keys have been configured - skip key clearing
wlan0: State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=10
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=73
AssocResp IE wireless event - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 54:e6:fc:99:f2:fe
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=54:e6:fc:99:f2:fe
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 54:e6:fc:99:f2:fe
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: Process pending EAPOL frame that was received just before association notification
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: EAPOL-Key type=254
wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 54:e6:fc:99:f2:fe (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 22 21 3c e7 5b 34 d4 fe 11 ac 9c 79 e5 1c 22 da 3a a0 4b e6 68 3d b8 b9 da fc 18 75 07 fb 20 5e
WPA: PTK derivation - A1=00:1a:13:06:07:d7 A2=54:e6:fc:99:f2:fe
WPA: Nonce1 - hexdump(len=32): 22 21 3c e7 5b 34 d4 fe 11 ac 9c 79 e5 1c 22 da 3a a0 4b e6 68 3d b8 b9 da fc 18 75 07 fb 20 5e
WPA: Nonce2 - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4c
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 9b b7 d0 80 02 ce b7 b3 cd ed 46 d5 f4 a8 17 13
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=119
wlan0: EAPOL-Key type=254
wlan0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
wlan0: key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4c
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a6 42 a4 12 3d 41 d3 ae 52 84 fc 03 6a 8d e0 7b
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=127
wlan0: EAPOL-Key type=254
wlan0: key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
wlan0: key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 42
key_iv - hexdump(len=16): 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4d
key_rsc - hexdump(len=8): b7 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 37 a3 a2 de 9f 80 43 ca 2c 5f 06 ce 1a 11 c8 b2
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wlan0: Authentication with 54:e6:fc:99:f2:fe timed out.
Added BSSID 54:e6:fc:99:f2:fe into blacklist
wpa_driver_wext_disassociate
wlan0: No keys have been configured - skip key clearing
wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification
wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
BSSID 00:00:00:00:00:00 blacklist count incremented to 2
wlan0: Setting scan request: 0 sec 500000 usec
wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
wlan0: Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 30 seconds
wlan0: Failed to initiate AP scan
wlan0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 2143 bytes of scan results (5 BSSes)
wlan0: BSS: Start scan result update 2
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: skip - blacklisted (count=1 limit=0)
wlan0: 2: 00:1a:3f:8f:6e:b6 ssid='DEMOCRATAS' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-85
wlan0: skip - SSID mismatch
wlan0: 3: a0:f3:c1:e7:90:ce ssid='Parecer Contabil' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-87 wps
wlan0: skip - SSID mismatch
wlan0: 4: 52:36:89:b2:4d:91 ssid='Portthru' wpa_ie_len=0 rsn_ie_len=0 caps=0x2 level=-87
wlan0: skip - SSID mismatch
wlan0: No APs found - clear blacklist and try again
Removed BSSID 54:e6:fc:99:f2:fe from blacklist (clear)
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: selected based on WPA IE
wlan0: selected BSS 54:e6:fc:99:f2:fe ssid='ti'
wlan0: Request association: reassociate: 1 selected: 54:e6:fc:99:f2:fe bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED
wlan0: Trying to associate with 54:e6:fc:99:f2:fe (SSID='ti' freq=2442 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: WPA: using IEEE 802.11i/D3.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: WPA: clearing AP RSN IE
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK TKIP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: No keys have been configured - skip key clearing
wlan0: State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=10
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=73
AssocResp IE wireless event - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 54:e6:fc:99:f2:fe
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=54:e6:fc:99:f2:fe
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 54:e6:fc:99:f2:fe
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: Process pending EAPOL frame that was received just before association notification
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: EAPOL-Key type=254
wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 54:e6:fc:99:f2:fe (ver=1)
WPA: Renewed SNonce - hexdump(len=32): c6 77 e2 5e e2 64 3d f2 fa 01 02 7e 3b 81 d6 34 7f 27 d5 9a 9f aa d6 6d 58 be 74 dc 0f d6 56 61
WPA: PTK derivation - A1=00:1a:13:06:07:d7 A2=54:e6:fc:99:f2:fe
WPA: Nonce1 - hexdump(len=32): c6 77 e2 5e e2 64 3d f2 fa 01 02 7e 3b 81 d6 34 7f 27 d5 9a 9f aa d6 6d 58 be 74 dc 0f d6 56 61
WPA: Nonce2 - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4e
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 01 53 2e 2a 28 87 37 22 4e 50 93 e2 14 a3 43 35
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=119
wlan0: EAPOL-Key type=254
wlan0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
wlan0: key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4e
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4b 24 a3 07 5c 38 63 df 9c 5c 06 1a 4e 42 b0 65
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=127
wlan0: EAPOL-Key type=254
wlan0: key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
wlan0: key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 42
key_iv - hexdump(len=16): 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 4f
key_rsc - hexdump(len=8): c2 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 7f 8d 6b b1 07 e3 1b 7c d2 10 c7 38 9f 98 f9 7f
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wlan0: Authentication with 54:e6:fc:99:f2:fe timed out.
Added BSSID 54:e6:fc:99:f2:fe into blacklist
wpa_driver_wext_disassociate
wlan0: No keys have been configured - skip key clearing
wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification
wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
Added BSSID 00:00:00:00:00:00 into blacklist
wlan0: Setting scan request: 0 sec 100000 usec
wlan0: CTRL-EVENT-DISCONNECTED bssid=00:00:00:00:00:00 reason=0
wlan0: Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: DISCONNECTED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 30 seconds
wlan0: Failed to initiate AP scan
wlan0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Setting scan request: 1 sec 0 usec
EAPOL: Supplicant port status: Unauthorized
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=-1) - scan timeout 30 seconds
wlan0: Failed to initiate AP scan
wlan0: State: SCANNING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Setting scan request: 1 sec 0 usec
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 2069 bytes of scan results (5 BSSes)
wlan0: BSS: Start scan result update 3
wlan0: BSS: Add new id 5 BSSID 00:0e:f4:d5:6c:2e SSID 'DEMOCRATAS1'
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: skip - blacklisted (count=1 limit=0)
wlan0: 2: 00:1a:3f:8f:6e:b6 ssid='DEMOCRATAS' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-87
wlan0: skip - SSID mismatch
wlan0: 3: 00:0e:f4:d5:6c:2e ssid='DEMOCRATAS1' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=-91
wlan0: skip - SSID mismatch
wlan0: 4: 52:36:89:b2:4d:91 ssid='Portthru' wpa_ie_len=0 rsn_ie_len=0 caps=0x2 level=-87
wlan0: skip - SSID mismatch
wlan0: No APs found - clear blacklist and try again
Removed BSSID 00:00:00:00:00:00 from blacklist (clear)
Removed BSSID 54:e6:fc:99:f2:fe from blacklist (clear)
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: selected based on WPA IE
wlan0: selected BSS 54:e6:fc:99:f2:fe ssid='ti'
wlan0: Request association: reassociate: 1 selected: 54:e6:fc:99:f2:fe bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: DISCONNECTED
wlan0: Trying to associate with 54:e6:fc:99:f2:fe (SSID='ti' freq=2442 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: WPA: using IEEE 802.11i/D3.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: WPA: clearing AP RSN IE
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK TKIP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: No keys have been configured - skip key clearing
wlan0: State: DISCONNECTED -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=10
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=73
AssocResp IE wireless event - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 54:e6:fc:99:f2:fe
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=54:e6:fc:99:f2:fe
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 54:e6:fc:99:f2:fe
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: Process pending EAPOL frame that was received just before association notification
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: EAPOL-Key type=254
wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 50
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 54:e6:fc:99:f2:fe (ver=1)
WPA: Renewed SNonce - hexdump(len=32): fa 1c e7 8b 01 2f a3 02 c9 1c 82 4e ca 14 2c 3c 78 6a 7d b5 91 5c 23 1b 0a 2f a1 96 7a a7 15 09
WPA: PTK derivation - A1=00:1a:13:06:07:d7 A2=54:e6:fc:99:f2:fe
WPA: Nonce1 - hexdump(len=32): fa 1c e7 8b 01 2f a3 02 c9 1c 82 4e ca 14 2c 3c 78 6a 7d b5 91 5c 23 1b 0a 2f a1 96 7a a7 15 09
WPA: Nonce2 - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 50
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 2b 60 c4 4d a0 b2 96 d4 53 00 ff 54 66 42 95 dd
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=119
wlan0: EAPOL-Key type=254
wlan0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
wlan0: key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 50
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): b1 53 93 c0 f3 aa c5 cb 60 b2 fa 9e 31 8a c8 66
wlan0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 3 of 4-Way Handshake from 54:e6:fc:99:f2:fe (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: WPA IE in EAPOL-Key - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: WPA: Sending EAPOL-Key 4/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): b1 ee ec 90 75 49 ad 7e 40 d1 02 9d 08 38 56 34
wlan0: WPA: Installing PTK to the driver
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=127
wlan0: EAPOL-Key type=254
wlan0: key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
wlan0: key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 42
key_iv - hexdump(len=16): 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 51
key_rsc - hexdump(len=8): da 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): a9 b1 f5 ae 9a 43 f2 75 24 b5 4f be 49 e1 40 07
wlan0: WPA: RX message 1 of Group Key Handshake from 54:e6:fc:99:f2:fe (ver=1)
wlan0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
wlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32)
WPA: RSC - hexdump(len=6): da 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
wlan0: WPA: Sending EAPOL-Key 2/2
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 14 64 9c 22 ab f9 fe 7e ae e8 0e 86 25 d9 bb 65
wlan0: WPA: Key negotiation completed with 54:e6:fc:99:f2:fe [PTK=TKIP GTK=TKIP]
wlan0: Cancelling authentication timeout
wlan0: State: GROUP_HANDSHAKE -> COMPLETED
wlan0: CTRL-EVENT-CONNECTED - Connection to 54:e6:fc:99:f2:fe completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
netlink: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: Supplicant port status: Authorized
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed successfully
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan0: Event DISASSOC (1) received
wlan0: Disassociation notification
wlan0: WPA: Auto connect enabled: try to reconnect (wps=0)
wlan0: Setting scan request: 0 sec 100000 usec
Added BSSID 54:e6:fc:99:f2:fe into blacklist
wlan0: Setting scan request: 0 sec 100000 usec
wlan0: CTRL-EVENT-DISCONNECTED bssid=54:e6:fc:99:f2:fe reason=0
wlan0: Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=4 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=5 set_tx=0 seq_len=0 key_len=0
Driver did not support SIOCSIWENCODEEXT
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wlan0: State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wlan0: State: DISCONNECTED -> SCANNING
wlan0: Starting AP scan for wildcard SSID
Scan requested (ret=0) - scan timeout 30 seconds
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b19 len=8
wlan0: Event SCAN_RESULTS (3) received
Received 2588 bytes of scan results (6 BSSes)
wlan0: BSS: Start scan result update 4
wlan0: BSS: Add new id 6 BSSID 00:27:22:80:3a:83 SSID 'AMPLANET-VRP1'
wlan0: BSS: Expire BSS 3 due to no match in scan
wlan0: BSS: Remove id 3 BSSID a0:f3:c1:e7:90:ce SSID 'Parecer Contabil'
wlan0: New scan results available
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: skip - blacklisted (count=1 limit=0)
wlan0: 2: 00:1a:3f:8f:6e:b6 ssid='DEMOCRATAS' wpa_ie_len=26 rsn_ie_len=24 caps=0x11 level=-83
wlan0: skip - SSID mismatch
wlan0: 3: 00:0e:f4:d5:6c:2e ssid='DEMOCRATAS1' wpa_ie_len=28 rsn_ie_len=24 caps=0x11 level=-89
wlan0: skip - SSID mismatch
wlan0: 4: 52:36:89:b2:4d:91 ssid='Portthru' wpa_ie_len=0 rsn_ie_len=0 caps=0x2 level=-87
wlan0: skip - SSID mismatch
wlan0: 5: 00:27:22:80:3a:83 ssid='AMPLANET-VRP1' wpa_ie_len=0 rsn_ie_len=0 caps=0x1 level=-87
wlan0: skip - SSID mismatch
wlan0: No APs found - clear blacklist and try again
Removed BSSID 54:e6:fc:99:f2:fe from blacklist (clear)
wlan0: Selecting BSS from priority group 0
wlan0: 0: 00:1f:1f:16:66:0b ssid='aula' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=-13
wlan0: skip - SSID mismatch
wlan0: 1: 54:e6:fc:99:f2:fe ssid='ti' wpa_ie_len=22 rsn_ie_len=0 caps=0x11 level=-31 wps
wlan0: selected based on WPA IE
wlan0: selected BSS 54:e6:fc:99:f2:fe ssid='ti'
wlan0: Request association: reassociate: 0 selected: 54:e6:fc:99:f2:fe bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING
wlan0: Trying to associate with 54:e6:fc:99:f2:fe (SSID='ti' freq=2442 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Cancelling scan request
wlan0: WPA: clearing own WPA/RSN IE
wlan0: Automatic auth_alg selection: 0x1
wlan0: WPA: using IEEE 802.11i/D3.0
wlan0: WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: WPA: clearing AP RSN IE
wlan0: WPA: using GTK TKIP
wlan0: WPA: using PTK TKIP
wlan0: WPA: using KEY_MGMT WPA-PSK
wlan0: WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
wlan0: No keys have been configured - skip key clearing
wlan0: State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_psk
wlan0: Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
wlan0: Checking for other virtual interfaces sharing same radio (phy0) in event_scan_results
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b1a len=10
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Not associated - Delay processing of received EAPOL frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8c08 len=73
AssocResp IE wireless event - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 54:e6:fc:99:f2:fe
wlan0: Event ASSOCINFO (4) received
wlan0: Association info event
resp_ies - hexdump(len=65): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 06 00 40 00
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
wlan0: Event ASSOC (0) received
wlan0: State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
wlan0: Associated to a new BSS: BSSID=54:e6:fc:99:f2:fe
wlan0: No keys have been configured - skip key clearing
wlan0: Associated with 54:e6:fc:99:f2:fe
wlan0: WPA: Association event - clear replay counter
wlan0: WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: Cancelling scan request
wlan0: Process pending EAPOL frame that was received just before association notification
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: Setting authentication timeout: 10 sec 0 usec
wlan0: IEEE 802.1X RX: version=2 type=3 length=95
wlan0: EAPOL-Key type=254
wlan0: key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
wlan0: key_length=32 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 52
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wlan0: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan0: WPA: RX message 1 of 4-Way Handshake from 54:e6:fc:99:f2:fe (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 85 9b 65 df ad 2d 3f b9 07 2e 4b 1d 63 95 c8 d8 92 e6 44 b3 19 6c 2a 18 69 3e 2c ba 2f ef ec f5
WPA: PTK derivation - A1=00:1a:13:06:07:d7 A2=54:e6:fc:99:f2:fe
WPA: Nonce1 - hexdump(len=32): 85 9b 65 df ad 2d 3f b9 07 2e 4b 1d 63 95 c8 d8 92 e6 44 b3 19 6c 2a 18 69 3e 2c ba 2f ef ec f5
WPA: Nonce2 - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 52
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan0: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 27 c6 9b ef 40 99 25 c1 fd cd 3e ff 47 cb c8 af
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=119
wlan0: EAPOL-Key type=254
wlan0: key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
wlan0: key_length=32 key_data_length=24
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 52
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 66 33 af 15 b3 a8 39 cb e4 76 6d 63 c8 d4 bc 7b
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
wlan0: RX EAPOL from 54:e6:fc:99:f2:fe
wlan0: IEEE 802.1X RX: version=2 type=3 length=127
wlan0: EAPOL-Key type=254
wlan0: key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure)
wlan0: key_length=32 key_data_length=32
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): fd 35 63 f2 9a e1 20 ed 4f 9c 8e ee cd 2e 7e c9 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 42
key_iv - hexdump(len=16): 5d b9 09 81 5d 26 2e 79 83 62 8e e3 55 20 a1 53
key_rsc - hexdump(len=8): e4 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 4a f8 89 1c 48 6e d7 68 fb a4 ac 90 01 84 38 da
wlan0: WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
wlan0: WPA: Could not verify EAPOL-Key MIC - dropping packet
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
WEXT: if_removed already cleared - ignore event
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
wlan0: CTRL-EVENT-TERMINATING - signal 2 received
wlan0: Removing interface wlan0
wpa_driver_wext_deauthenticate
wlan0: No keys have been configured - skip key clearing
wlan0: State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
wpa_driver_wext_set_countermeasures
wlan0: No keys have been configured - skip key clearing
wlan0: BSS: Remove id 0 BSSID 00:1f:1f:16:66:0b SSID 'aula'
wlan0: BSS: Remove id 1 BSSID 54:e6:fc:99:f2:fe SSID 'ti'
wlan0: BSS: Remove id 2 BSSID 00:1a:3f:8f:6e:b6 SSID 'DEMOCRATAS'
wlan0: BSS: Remove id 5 BSSID 00:0e:f4:d5:6c:2e SSID 'DEMOCRATAS1'
wlan0: BSS: Remove id 4 BSSID 52:36:89:b2:4d:91 SSID 'Portthru'
wlan0: BSS: Remove id 6 BSSID 00:27:22:80:3a:83 SSID 'AMPLANET-VRP1'
wlan0: Cancelling scan request
wlan0: Cancelling authentication timeout
netlink: Operstate: linkmode=0, operstate=6