wpa_supplicant v2.6 Successfully initialized wpa_supplicant Initializing interface 'iwn0' conf '/home/reed/tmp/wpa_supplicant.conf-FBI' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/home/reed/tmp/wpa_supplicant.conf-FBI' -> '/home/reed/tmp/wpa_supplicant.conf-FBI' Reading configuration file '/home/reed/tmp/wpa_supplicant.conf-FBI' ctrl_interface='/var/run/wpa_supplicant/' ctrl_interface_group='wheel' Line: 15 - start of a new network block ssid - hexdump_ascii(len=3): 46 42 49 FBI PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='FBI' Add interface iwn0 to a new radio N/A iwn0: Own MAC address: ac:72:89:ec:3b:1e bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 wpa_driver_bsd_set_countermeasures: enabled=0 iwn0: RSN: flushing PMKID list in the driver iwn0: Setting scan request: 0.100000 sec ENGINE: Loading dynamic engine ENGINE: Loading dynamic engine EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED Using existing control interface directory. ctrl_interface_group=0 (from group name 'wheel') ctrl_iface bind(PF_UNIX) failed: Address already in use ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant//iwn0' iwn0: Added interface iwn0 iwn0: State: DISCONNECTED -> DISCONNECTED iwn0: State: DISCONNECTED -> SCANNING iwn0: Starting AP scan for wildcard SSID iwn0: Add radio work 'scan'@0x7808855ed140 iwn0: First radio work item in the queue - schedule start immediately iwn0: Starting radio work 'scan'@0x7808855ed140 after 0.000008 second wait wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 iwn0: Event SCAN_RESULTS (3) received Received 604 bytes of scan results (6 BSSes) Sorted scan results 00:7f:28:35:b7:ae freq=2462 qual=211 noise=0 level=211 flags=0x0 age=0 est=54000 IEs - hexdump(len=72): 00 03 52 48 31 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 18 00 50 f2 02 01 01 04 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 c0:38:96:da:92:2d freq=2462 qual=197 noise=0 level=197 flags=0x0 age=0 est=54000 IEs - hexdump(len=83): 00 10 50 53 34 2d 30 44 37 30 42 30 32 38 33 42 31 41 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 3c:37:86:67:9c:38 freq=2422 qual=186 noise=0 level=186 flags=0x0 age=0 est=54000 IEs - hexdump(len=77): 00 0a 46 42 49 20 56 61 6e 20 23 31 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 04 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 14:59:c0:9b:b5:ea freq=2432 qual=181 noise=0 level=181 flags=0x0 age=0 est=54000 IEs - hexdump(len=79): 00 0c 46 72 6f 6e 74 69 65 72 37 33 34 34 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00:22:b0:ce:f1:dc freq=2437 qual=177 noise=0 level=177 flags=0x0 age=0 est=54000 IEs - hexdump(len=72): 00 03 46 42 49 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 18 00 50 f2 02 01 01 03 00 02 a3 40 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 78:d2:94:bf:03:c0 freq=2412 qual=175 noise=0 level=175 flags=0x0 age=0 est=54000 IEs - hexdump(len=86): 00 13 53 54 41 46 46 4f 52 44 20 57 49 46 49 5f 32 47 45 58 54 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 04 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 iwn0: BSS: Start scan result update 1 iwn0: BSS: Add new id 0 BSSID 00:7f:28:35:b7:ae SSID 'RH1' freq 2462 iwn0: BSS: Add new id 1 BSSID c0:38:96:da:92:2d SSID 'PS4-0D70B0283B1A' freq 2462 iwn0: BSS: Add new id 2 BSSID 3c:37:86:67:9c:38 SSID 'FBI Van #1' freq 2422 iwn0: BSS: Add new id 3 BSSID 14:59:c0:9b:b5:ea SSID 'Frontier7344' freq 2432 iwn0: BSS: Add new id 4 BSSID 00:22:b0:ce:f1:dc SSID 'FBI' freq 2437 iwn0: BSS: Add new id 5 BSSID 78:d2:94:bf:03:c0 SSID 'STAFFORD WIFI_2GEXT' freq 2412 BSS: last_scan_res_used=6/32 Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=3 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=4 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=5 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=6 entropy=5 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] iwn0: New scan results available (own=0 ext=0) iwn0: Radio work 'scan'@0x7808855ed140 done in 0.634304 seconds iwn0: radio_work_free('scan'@0x7808855ed140: num_active_works --> 0 iwn0: Selecting BSS from priority group 0 iwn0: 0: 00:7f:28:35:b7:ae ssid='RH1' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=211 freq=2462 iwn0: skip - SSID mismatch iwn0: 1: c0:38:96:da:92:2d ssid='PS4-0D70B0283B1A' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=197 freq=2462 iwn0: skip - SSID mismatch iwn0: 2: 3c:37:86:67:9c:38 ssid='FBI Van #1' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=186 freq=2422 iwn0: skip - SSID mismatch iwn0: 3: 14:59:c0:9b:b5:ea ssid='Frontier7344' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=181 freq=2432 iwn0: skip - SSID mismatch iwn0: 4: 00:22:b0:ce:f1:dc ssid='FBI' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=177 freq=2437 iwn0: selected based on WPA IE iwn0: selected BSS 00:22:b0:ce:f1:dc ssid='FBI' iwn0: Considering connect request: reassociate: 0 selected: 00:22:b0:ce:f1:dc bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x78088551c800 current_ssid=0x0 iwn0: Request association with 00:22:b0:ce:f1:dc iwn0: Add radio work 'connect'@0x7808855ed140 iwn0: First radio work item in the queue - schedule start immediately iwn0: Starting radio work 'connect'@0x7808855ed140 after 0.000010 second wait iwn0: Trying to associate with 00:22:b0:ce:f1:dc (SSID='FBI' freq=2437 MHz) iwn0: Cancelling scan request iwn0: WPA: clearing own WPA/RSN IE iwn0: Automatic auth_alg selection: 0x1 RSN: PMKSA cache search - network_ctx=0x78088551c800 try_opportunistic=0 RSN: Search for BSSID 00:22:b0:ce:f1:dc RSN: No PMKSA cache entry found iwn0: WPA: using IEEE 802.11i/D3.0 iwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: WPA: clearing AP RSN IE iwn0: WPA: using GTK CCMP iwn0: WPA: using PTK CCMP iwn0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: State: SCANNING -> ASSOCIATING Limit connection to BSSID 00:22:b0:ce:f1:dc freq=2437 MHz based on scan results (bssid_set=0) wpa_driver_bsd_associate: ssid 'FBI' wpa ie len 24 pairwise 16 group 16 key mgmt 2 wpa_driver_bsd_set_drop_unencrypted: enabled=1 wpa_driver_bsd_associate: set PRIVACY 1 iwn0: Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto iwn0: Event ASSOC (0) received iwn0: State: ASSOCIATING -> ASSOCIATED iwn0: Associated to a new BSS: BSSID=00:22:b0:ce:f1:dc Add randomness: count=7 entropy=6 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] iwn0: Associated with 00:22:b0:ce:f1:dc iwn0: WPA: Association event - clear replay counter iwn0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE iwn0: Setting authentication timeout: 10 sec 0 usec iwn0: Cancelling scan request iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: Setting authentication timeout: 10 sec 0 usec iwn0: IEEE 802.1X RX: version=2 type=3 length=95 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: EAPOL-Key type=254 iwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) iwn0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE iwn0: WPA: RX message 1 of 4-Way Handshake from 00:22:b0:ce:f1:dc (ver=2) Get randomness: len=32 entropy=7 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): fb 07 7a 37 6c 07 0b 0d ac 28 4d 2d 0b e1 7b ed 10 e6 b1 c4 38 3f 62 64 64 51 14 1b fb 4e 5b c0 WPA: PTK derivation - A1=ac:72:89:ec:3b:1e A2=00:22:b0:ce:f1:dc WPA: Nonce1 - hexdump(len=32): fb 07 7a 37 6c 07 0b 0d ac 28 4d 2d 0b e1 7b ed 10 e6 b1 c4 38 3f 62 64 64 51 14 1b fb 4e 5b c0 WPA: Nonce2 - hexdump(len=32): 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 iwn0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): c9 e6 af 7f ba c5 d3 b4 bd 07 92 9c 8c 1b ce 64 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 fb 07 7a 37 6c 07 0b 0d ac 28 4d 2d 0b e1 7b ed 10 e6 b1 c4 38 3f 62 64 64 51 14 1b fb 4e 5b c0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c9 e6 af 7f ba c5 d3 b4 bd 07 92 9c 8c 1b ce 64 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=123): 02 03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 df ab 7e d9 1b 74 a2 e0 bb 29 6a 60 ae f9 ca 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: IEEE 802.1X RX: version=2 type=3 length=119 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 df ab 7e d9 1b 74 a2 e0 bb 29 6a 60 ae f9 ca 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: EAPOL-Key type=254 iwn0: key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC) iwn0: key_length=16 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 54 20 63 6f 10 aa 88 46 41 ce 2b b1 9a 3d df 99 9b a4 81 a5 1a d6 46 9c 58 3f d5 2e 9f d0 d1 2c key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 59 df ab 7e d9 1b 74 a2 e0 bb 29 6a 60 ae f9 ca iwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE iwn0: WPA: RX message 3 of 4-Way Handshake from 00:22:b0:ce:f1:dc (ver=2) WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: WPA IE in EAPOL-Key - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 75 85 70 80 d2 c4 ed 5e 54 fc 5f 0e ee a7 1c f4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 85 70 80 d2 c4 ed 5e 54 fc 5f 0e ee a7 1c f4 00 00 iwn0: WPA: Installing PTK to the driver WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=3 addr=0x78088551ceb8 key_idx=0 set_tx=1 seq_len=6 key_len=16 iwn0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=123): 02 03 00 77 fe 03 a2 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee 53 34 df 18 29 cf c3 6f de 1c e5 95 c0 75 d6 00 18 c1 e8 1f 62 26 df bd 28 07 a0 3e 84 5d 07 9a 3e 23 43 3b c3 65 ff 9a 0b iwn0: IEEE 802.1X RX: version=2 type=3 length=119 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 03 a2 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ee 53 34 df 18 29 cf c3 6f de 1c e5 95 c0 75 d6 00 18 c1 e8 1f 62 26 df bd 28 07 a0 3e 84 5d 07 9a 3e 23 43 3b c3 65 ff 9a 0b iwn0: EAPOL-Key type=254 iwn0: key_info 0x3a2 (ver=2 keyidx=2 rsvd=0 Group Ack MIC Secure) iwn0: key_length=16 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): ee 53 34 df 18 29 cf c3 6f de 1c e5 95 c0 75 d6 iwn0: WPA: RX message 1 of Group Key Handshake from 00:22:b0:ce:f1:dc (ver=2) iwn0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] iwn0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=3 addr=0x114c71136 key_idx=2 set_tx=0 seq_len=6 key_len=16 iwn0: WPA: Sending EAPOL-Key 2/2 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 28 94 39 f8 03 bb 81 ec a9 0e a1 60 1d 64 a1 62 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 22 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 94 39 f8 03 bb 81 ec a9 0e a1 60 1d 64 a1 62 00 00 iwn0: WPA: Key negotiation completed with 00:22:b0:ce:f1:dc [PTK=CCMP GTK=CCMP] iwn0: Cancelling authentication timeout iwn0: State: GROUP_HANDSHAKE -> COMPLETED iwn0: Radio work 'connect'@0x7808855ed140 done in 0.090524 seconds iwn0: radio_work_free('connect'@0x7808855ed140: num_active_works --> 0 iwn0: CTRL-EVENT-CONNECTED - Connection to 00:22:b0:ce:f1:dc completed [id=0 id_str=] EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS EAPOL: startWhen --> 0 EAPOL: disable timer tick iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=123): 02 03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 b0 4e c3 52 f8 35 77 bb f5 17 16 5e 39 3f 8e 00 18 a2 71 a9 5c ca 97 a3 dc 2d 52 f1 b3 c6 ef 62 5f 6b 8f 66 b7 f9 64 a0 7d iwn0: IEEE 802.1X RX: version=2 type=3 length=119 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 48 b0 4e c3 52 f8 35 77 bb f5 17 16 5e 39 3f 8e 00 18 a2 71 a9 5c ca 97 a3 dc 2d 52 f1 b3 c6 ef 62 5f 6b 8f 66 b7 f9 64 a0 7d iwn0: EAPOL-Key type=254 iwn0: key_info 0x392 (ver=2 keyidx=1 rsvd=0 Group Ack MIC Secure) iwn0: key_length=16 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 key_nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 48 b0 4e c3 52 f8 35 77 bb f5 17 16 5e 39 3f 8e iwn0: WPA: RX message 1 of Group Key Handshake from 00:22:b0:ce:f1:dc (ver=2) iwn0: State: COMPLETED -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] iwn0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=3 addr=0x114c71136 key_idx=1 set_tx=0 seq_len=6 key_len=16 iwn0: WPA: Sending EAPOL-Key 2/2 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f6 fc 76 20 2e 93 6c d5 3a 05 9d 28 a1 13 3c 48 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 12 00 10 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 fc 76 20 2e 93 6c d5 3a 05 9d 28 a1 13 3c 48 00 00 iwn0: WPA: Group rekeying completed with 00:22:b0:ce:f1:dc [GTK=CCMP] iwn0: Cancelling authentication timeout iwn0: State: GROUP_HANDSHAKE -> COMPLETED