wpa_supplicant v2.9 Successfully initialized wpa_supplicant Initializing interface 'iwn0' conf '/etc/wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant/' ctrl_interface_group='wheel' Line: 15 - start of a new network block ssid - hexdump_ascii(len=3): 46 42 49 FBI PSK (ASCII passphrase) - hexdump_ascii(len=9): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='FBI' Add interface iwn0 to a new radio N/A iwn0: Failed to attach pkt_type filter iwn0: Own MAC address: ac:72:89:ec:3b:1e bsd_set_key: alg=0 addr=0x0 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x0 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x0 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x0 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 bsd_set_key: alg=0 addr=0x0 key_idx=4 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=4 ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument bsd_set_key: alg=0 addr=0x0 key_idx=5 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=5 ioctl[SIOCS80211, op=20, val=0, arg_len=7]: Invalid argument wpa_driver_bsd_set_countermeasures: enabled=0 iwn0: RSN: flushing PMKID list in the driver iwn0: Setting scan request: 0.100000 sec iwn0: WPS: UUID based on MAC address: 658eeb7a-396c-56b9-adc0-ea9b38d2b5d7 ENGINE: Loading builtin engines ENGINE: Loading builtin engines EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED Using existing control interface directory. ctrl_interface_group=0 (from group name 'wheel') ctrl_iface bind(PF_UNIX) failed: Address already in use ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant//iwn0' iwn0: Added interface iwn0 iwn0: State: DISCONNECTED -> DISCONNECTED iwn0: State: DISCONNECTED -> SCANNING iwn0: Starting AP scan for wildcard SSID iwn0: Add radio work 'scan'@0x75ba025f3140 iwn0: First radio work item in the queue - schedule start immediately iwn0: Starting radio work 'scan'@0x75ba025f3140 after 0.000041 second wait wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 iwn0: Event SCAN_RESULTS (3) received Received 936 bytes of scan results (9 BSSes) Sorted scan results 00:7f:28:35:b7:ae freq=2462 qual=220 noise=0 level=220 flags=0x0 age=0 est=54000 IEs - hexdump(len=72): 00 03 52 48 31 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 18 00 50 f2 02 01 01 04 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 c0:38:96:da:92:2d freq=2462 qual=197 noise=0 level=197 flags=0x0 age=0 est=54000 IEs - hexdump(len=83): 00 10 50 53 34 2d 30 44 37 30 42 30 32 38 33 42 31 41 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 3c:37:86:67:9c:38 freq=2422 qual=184 noise=0 level=184 flags=0x0 age=0 est=54000 IEs - hexdump(len=77): 00 0a 46 42 49 20 56 61 6e 20 23 31 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 04 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 f4:39:09:68:bc:2e freq=2462 qual=178 noise=0 level=178 flags=0x0 age=0 est=54000 IEs - hexdump(len=94): 00 1f 44 49 52 45 43 54 2d 32 42 2d 48 50 20 4f 66 66 69 63 65 4a 65 74 20 50 72 6f 20 38 37 31 30 01 08 8c 12 98 24 b0 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 18 00 50 f2 02 01 01 88 00 03 64 00 00 27 a4 00 00 41 43 5e 00 61 32 2f 00 3c:37:86:67:9f:e0 freq=2462 qual=177 noise=0 level=177 flags=0x0 age=0 est=54000 IEs - hexdump(len=85): 00 12 46 72 6f 6e 74 69 65 72 37 33 34 34 5f 32 47 45 58 54 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 04 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 00:22:b0:ce:f1:dc freq=2437 qual=175 noise=0 level=175 flags=0x0 age=0 est=54000 IEs - hexdump(len=72): 00 03 46 42 49 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 18 00 50 f2 02 01 01 03 00 02 a3 40 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 6a:9a:87:dc:1f:bc freq=2462 qual=175 noise=0 level=175 flags=0x0 age=0 est=54000 IEs - hexdump(len=84): 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 08 8c 12 98 24 b0 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 f6:f2:6d:b5:b5:70 freq=2462 qual=173 noise=0 level=173 flags=0x0 age=0 est=54000 IEs - hexdump(len=81): 00 0e 43 72 75 69 73 65 72 73 2d 67 75 65 73 74 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 f4:f2:6d:b5:b5:73 freq=2462 qual=172 noise=0 level=172 flags=0x0 age=0 est=54000 IEs - hexdump(len=75): 00 08 43 72 75 69 73 65 72 73 01 0c 82 84 8b 0c 12 96 18 24 30 48 60 6c 2a 01 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 iwn0: BSS: Start scan result update 1 iwn0: BSS: Add new id 0 BSSID 00:7f:28:35:b7:ae SSID 'RH1' freq 2462 iwn0: BSS: Add new id 1 BSSID c0:38:96:da:92:2d SSID 'PS4-0D70B0283B1A' freq 2462 iwn0: BSS: Add new id 2 BSSID 3c:37:86:67:9c:38 SSID 'FBI Van #1' freq 2422 iwn0: BSS: Add new id 3 BSSID f4:39:09:68:bc:2e SSID 'DIRECT-2B-HP OfficeJet Pro 8710' freq 2462 iwn0: BSS: Add new id 4 BSSID 3c:37:86:67:9f:e0 SSID 'Frontier7344_2GEXT' freq 2462 iwn0: BSS: Add new id 5 BSSID 00:22:b0:ce:f1:dc SSID 'FBI' freq 2437 iwn0: BSS: Add new id 6 BSSID 6a:9a:87:dc:1f:bc SSID '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00' freq 2462 iwn0: BSS: Add new id 7 BSSID f6:f2:6d:b5:b5:70 SSID 'Cruisers-guest' freq 2462 iwn0: BSS: Add new id 8 BSSID f4:f2:6d:b5:b5:73 SSID 'Cruisers' freq 2462 BSS: last_scan_res_used=9/32 Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=3 entropy=2 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=4 entropy=3 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=5 entropy=4 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=6 entropy=5 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=7 entropy=6 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=8 entropy=7 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=9 entropy=8 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] iwn0: New scan results available (own=0 ext=0) iwn0: Radio work 'scan'@0x75ba025f3140 done in 0.624030 seconds iwn0: radio_work_free('scan'@0x75ba025f3140): num_active_works --> 0 iwn0: Selecting BSS from priority group 0 iwn0: 0: 00:7f:28:35:b7:ae ssid='RH1' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=220 freq=2462 iwn0: skip - SSID mismatch iwn0: 1: c0:38:96:da:92:2d ssid='PS4-0D70B0283B1A' wpa_ie_len=0 rsn_ie_len=20 caps=0x31 level=197 freq=2462 iwn0: skip - SSID mismatch iwn0: 2: 3c:37:86:67:9c:38 ssid='FBI Van #1' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=184 freq=2422 iwn0: skip - SSID mismatch iwn0: 3: f4:39:09:68:bc:2e ssid='DIRECT-2B-HP OfficeJet Pro 8710' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=178 freq=2462 iwn0: skip - SSID mismatch iwn0: 4: 3c:37:86:67:9f:e0 ssid='Frontier7344_2GEXT' wpa_ie_len=0 rsn_ie_len=20 caps=0x11 level=177 freq=2462 iwn0: skip - SSID mismatch iwn0: 5: 00:22:b0:ce:f1:dc ssid='FBI' wpa_ie_len=22 rsn_ie_len=0 caps=0x31 level=175 freq=2437 iwn0: selected based on WPA IE iwn0: selected BSS 00:22:b0:ce:f1:dc ssid='FBI' iwn0: Considering connect request: reassociate: 0 selected: 00:22:b0:ce:f1:dc bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING ssid=0x75ba02525800 current_ssid=0x0 iwn0: Request association with 00:22:b0:ce:f1:dc iwn0: No ongoing scan/p2p-scan found to abort iwn0: Add radio work 'connect'@0x75ba025f3140 iwn0: First radio work item in the queue - schedule start immediately iwn0: Starting radio work 'connect'@0x75ba025f3140 after 0.000015 second wait iwn0: Trying to associate with 00:22:b0:ce:f1:dc (SSID='FBI' freq=2437 MHz) FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0): iwn0: Cancelling scan request iwn0: WPA: clearing own WPA/RSN IE RSN: PMKSA cache search - network_ctx=0x75ba02525800 try_opportunistic=0 akmp=0x0 RSN: Search for BSSID 00:22:b0:ce:f1:dc RSN: No PMKSA cache entry found iwn0: WPA: using IEEE 802.11i/D3.0 iwn0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 1 iwn0: WPA: Selected mgmt group cipher 0 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: WPA: clearing AP RSN IE iwn0: WPA: AP group 0x10 network profile group 0x18; available group 0x10 iwn0: WPA: using GTK CCMP iwn0: WPA: AP pairwise 0x10 network profile pairwise 0x18; available pairwise 0x10 iwn0: WPA: using PTK CCMP iwn0: WPA: AP key_mgmt 0x2 network profile key_mgmt 0x3; available key_mgmt 0x2 iwn0: WPA: using KEY_MGMT WPA-PSK iwn0: WPA: AP mgmt_group_cipher 0x0 network profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x0 iwn0: WPA: not using MGMT group cipher WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 PSK (set in config) - hexdump(len=32): [REMOVED] WPA: Set PMK based on external data - hexdump(len=32): [REMOVED] iwn0: Automatic auth_alg selection: 0x1 Failed to add supported operating classes IE iwn0: State: SCANNING -> ASSOCIATING Limit connection to BSSID 00:22:b0:ce:f1:dc freq=2437 MHz based on scan results (bssid_set=0 wps=0) wpa_driver_bsd_associate: ssid 'FBI' wpa ie len 24 pairwise 16 group 16 key mgmt 2 wpa_driver_bsd_set_drop_unencrypted: enabled=1 wpa_driver_bsd_associate: set PRIVACY 1 iwn0: Setting authentication timeout: 10 sec 0 usec Not configuring frame filtering - BSS 00:00:00:00:00:00 is not a Hotspot 2.0 network EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto iwn0: Event ASSOC (0) received iwn0: State: ASSOCIATING -> ASSOCIATED iwn0: Associated to a new BSS: BSSID=00:22:b0:ce:f1:dc Add randomness: count=10 entropy=9 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] iwn0: Associated with 00:22:b0:ce:f1:dc iwn0: WPA: Association event - clear replay counter iwn0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE iwn0: Setting authentication timeout: 10 sec 0 usec iwn0: Cancelling scan request iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: Setting authentication timeout: 10 sec 0 usec iwn0: IEEE 802.1X RX: version=2 type=3 length=95 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: EAPOL-Key type=254 iwn0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) iwn0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 iwn0: State: ASSOCIATED -> 4WAY_HANDSHAKE iwn0: WPA: RX message 1 of 4-Way Handshake from 00:22:b0:ce:f1:dc (ver=2) Get randomness: len=32 entropy=10 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): fb f9 9d 20 a5 53 4b 0b cc 99 50 8e d9 c4 62 40 71 c2 1c 37 d6 cd 3c f7 0f a3 7e 54 8c 73 07 28 WPA: PTK derivation using PRF(SHA1) WPA: PTK derivation - A1=ac:72:89:ec:3b:1e A2=00:22:b0:ce:f1:dc WPA: Nonce1 - hexdump(len=32): fb f9 9d 20 a5 53 4b 0b cc 99 50 8e d9 c4 62 40 71 c2 1c 37 d6 cd 3c f7 0f a3 7e 54 8c 73 07 28 WPA: Nonce2 - hexdump(len=32): 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 iwn0: WPA: Sending EAPOL-Key 2/4 WPA: Send EAPOL-Key frame to 00:22:b0:ce:f1:dc ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 78 3c 57 d1 3e ac 83 ef 56 29 cb 88 91 40 31 27 WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 fb f9 9d 20 a5 53 4b 0b cc 99 50 8e d9 c4 62 40 71 c2 1c 37 d6 cd 3c f7 0f a3 7e 54 8c 73 07 28 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 78 3c 57 d1 3e ac 83 ef 56 29 cb 88 91 40 31 27 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=123): 02 03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 77 24 5e f2 7d 2f fa 41 f3 49 c7 4f c0 15 08 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: IEEE 802.1X RX: version=2 type=3 length=119 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 77 24 5e f2 7d 2f fa 41 f3 49 c7 4f c0 15 08 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: EAPOL-Key type=254 iwn0: key_info 0x1ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC) iwn0: key_length=16 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 19 a3 9f 1e 5a d3 1d 85 4e ab a9 a1 26 43 a5 0e c3 c0 61 aa 8c 7d 2d 6a 12 da 91 92 a7 7f 52 75 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 1e 77 24 5e f2 7d 2f fa 41 f3 49 c7 4f c0 15 08 WPA: EAPOL-Key MIC using HMAC-SHA1 iwn0: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE iwn0: WPA: RX message 3 of 4-Way Handshake from 00:22:b0:ce:f1:dc (ver=2) WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 WPA: WPA IE in EAPOL-Key - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50 f2 02 iwn0: WPA: Sending EAPOL-Key 4/4 WPA: Send EAPOL-Key frame to 00:22:b0:ce:f1:dc ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 75 00 71 76 ae d4 bb e2 a8 1d c4 ef 37 20 7a 64 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 0a 00 10 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 75 00 71 76 ae d4 bb e2 a8 1d c4 ef 37 20 7a 64 00 00 iwn0: WPA: Installing PTK to the driver WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=3 addr=0x75ba02526c48 key_idx=0 set_tx=1 seq_len=6 key_len=16 iwn0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE iwn0: RX EAPOL from 00:22:b0:ce:f1:dc RX EAPOL - hexdump(len=123): 02 03 00 77 fe 03 a2 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 6d e2 4f ac cb 96 25 70 73 9e 2e 63 a3 7b 85 00 18 77 11 d5 d7 93 5f 34 5d f7 09 ee 97 ef 4a ba 0a 29 fe 56 3a 93 d5 dd d6 iwn0: IEEE 802.1X RX: version=2 type=3 length=119 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 77 fe 03 a2 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6f 6d e2 4f ac cb 96 25 70 73 9e 2e 63 a3 7b 85 00 18 77 11 d5 d7 93 5f 34 5d f7 09 ee 97 ef 4a ba 0a 29 fe 56 3a 93 d5 dd d6 iwn0: EAPOL-Key type=254 iwn0: key_info 0x3a2 (ver=2 keyidx=2 rsvd=0 Group Ack MIC Secure) iwn0: key_length=16 key_data_length=24 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 6f 6d e2 4f ac cb 96 25 70 73 9e 2e 63 a3 7b 85 WPA: EAPOL-Key MIC using HMAC-SHA1 iwn0: WPA: RX message 1 of Group Key Handshake from 00:22:b0:ce:f1:dc (ver=2) iwn0: State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE WPA: Group Key - hexdump(len=16): [REMOVED] iwn0: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=3 addr=0x4c32a9 key_idx=2 set_tx=0 seq_len=6 key_len=16 iwn0: WPA: Sending EAPOL-Key 2/2 WPA: Send EAPOL-Key frame to 00:22:b0:ce:f1:dc ver=2 mic_len=16 key_mgmt=0x2 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): a2 ba 48 ad bc 37 b5 91 f9 cc 5a 7a 6b 56 7f f5 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 22 00 10 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 ba 48 ad bc 37 b5 91 f9 cc 5a 7a 6b 56 7f f5 00 00 iwn0: WPA: Key negotiation completed with 00:22:b0:ce:f1:dc [PTK=CCMP GTK=CCMP] iwn0: Cancelling authentication timeout iwn0: State: GROUP_HANDSHAKE -> COMPLETED iwn0: Radio work 'connect'@0x75ba025f3140 done in 0.022054 seconds iwn0: radio_work_free('connect'@0x75ba025f3140): num_active_works --> 0 iwn0: CTRL-EVENT-CONNECTED - Connection to 00:22:b0:ce:f1:dc completed [id=0 id_str=] EAPOL: External notification - portValid=1 EAPOL: External notification - EAP success=1 EAPOL: SUPP_PAE entering state AUTHENTICATING EAPOL: SUPP_BE entering state SUCCESS EAP: EAP entering state DISABLED EAPOL: SUPP_PAE entering state AUTHENTICATED EAPOL: Supplicant port status: Authorized EAPOL: SUPP_BE entering state IDLE EAPOL authentication completed - result=SUCCESS EAPOL: startWhen --> 0 EAPOL: disable timer tick