[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

wpa_supplicant drops connection frequently



In the last two days, my wireless connection is very unstable. It drops
every few minutes and when it is connected, it's very slow and
unusable. Could you help me to debug this problem?

Here is the hardware, software and network info:
- thinkpad x201 with Intel Corporation Centrino Advanced-N 6200
  (used non-free firmware)
- Debian GNU/Linux 6.0.4 (squeeze)
- wpasupplicant 0.6.10-2.1
- wireless AP with SSID "1216" is provided on a TP-LINK router.
  using WPA2-PSK security.

Here is some of the non-debug outputs:
- seesion 1
  # /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
  Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
  Associated with d8:5d:4c:58:2a:32
  WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
  CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (auth) [id=2 id_str=nantong-1216]
  WPA: Invalid EAPOL-Key MIC when using TPTK - ignoring TPTK
  WPA: Invalid EAPOL-Key MIC - dropping packet

- session 2
  # /sbin/wpa_supplicant -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
  Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
  Associated with d8:5d:4c:58:2a:32
  WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
  CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
  WPA: EAPOL-Key Replay Counter did not increase - dropping packet
  WPA: EAPOL-Key Replay Counter did not increase - dropping packet
  WPA: Invalid EAPOL-Key MIC - dropping packet
  WPA: EAPOL-Key Replay Counter did not increase - dropping packet
  WPA: EAPOL-Key Replay Counter did not increase - dropping packet

google did not turn too much helpful information, but did suggest a
debug run of wpa_supplicant.  So I did a debug run using -ddt and also
run iwevent at the same time. the output is attached in this email.


I have been on this network for a few months, with no problem like this
before. Other laptops on this network running Windows XP/7 have no such
problem, i.e. their wireless connection is stable just as before.

I have also attached my wpa_supplicant.conf with passwords removed if
that is helpful. I haven't changed it recently.

I have also used to ping to test the network. packet loss and big
latency (800ms+) is very usual, which reflects why it's just unusable
even when connected.


Thanks,
Yuanle
root@sylecn:/home/sylecn/d/t2# /sbin/wpa_supplicant -ddt -i wlan0 -c /home/sylecn/texts/config/wpa_current.conf
1336023993.215649: Initializing interface 'wlan0' conf '/home/sylecn/texts/config/wpa_current.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
1336023993.215701: Configuration file '/home/sylecn/texts/config/wpa_current.conf' -> '/home/sylecn/texts/config/wpa_current.conf'
1336023993.215709: Reading configuration file '/home/sylecn/texts/config/wpa_current.conf'
1336023993.215757: fast_reauth=0
1336023993.215765: Line: 17 - start of a new network block
1336023993.215778: ssid - hexdump_ascii(len=3):
     41 56 50                                          AVP             
1336023993.215797: key_mgmt: 0x2
1336023993.215803: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.215812: priority=20 (0x14)
1336023993.215822: id_str - hexdump_ascii(len=3):
     41 56 50                                          AVP             
1336023993.226865: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.226891: Line: 30 - start of a new network block
1336023993.226897: ssid - hexdump_ascii(len=21):
     72 65 73 74 72 69 63 74 65 64 2e 75 74 65 78 61   restricted.utexa
     73 2e 65 64 75                                    s.edu           
1336023993.226907: key_mgmt: 0x1
1336023993.226910: eap methods - hexdump(len=16): 00 00 00 00 15 00 00 00 00 00 00 00 00 00 00 00
1336023993.226916: ca_cert - hexdump_ascii(len=30):
     2f 68 6f 6d 65 2f 73 79 6c 65 63 6e 2f 74 65 78   /home/sylecn/tex
     74 73 2f 63 61 63 65 72 74 73 2e 70 65 6d         ts/cacerts.pem  
1336023993.226924: subject_match - hexdump_ascii(len=24):
     43 4e 3d 72 65 73 74 72 69 63 74 65 64 2e 75 74   CN=restricted.ut
     65 78 61 73 2e 65 64 75                           exas.edu        
1336023993.226933: anonymous_identity - hexdump_ascii(len=9):
     61 6e 6f 6e 79 6d 6f 75 73                        anonymous       
1336023993.226938: identity - hexdump_ascii(len=6):
     79 73 34 35 37 33                                 ys4573          
1336023993.226942: password - hexdump_ascii(len=9): [REMOVED]
1336023993.226945: phase2 - hexdump_ascii(len=13):
     61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2   
1336023993.226951: priority=20 (0x14)
1336023993.226953: Line: 47 - start of a new network block
1336023993.226955: ssid - hexdump_ascii(len=4):
     31 32 31 36                                       1216            
1336023993.226959: key_mgmt: 0x2
1336023993.226961: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.226963: proto: 0x3
1336023993.226966: priority=20 (0x14)
1336023993.226969: id_str - hexdump_ascii(len=12):
     6e 61 6e 74 6f 6e 67 2d 31 32 31 36               nantong-1216    
1336023993.235005: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.235023: Line: 57 - start of a new network block
1336023993.235028: ssid - hexdump_ascii(len=3):
     31 38 38                                          188             
1336023993.235035: key_mgmt: 0x4
1336023993.235050: wep_key0 - hexdump(len=13): [REMOVED]
1336023993.235055: wep_tx_keyidx=0 (0x0)
1336023993.235058: priority=20 (0x14)
1336023993.235061: id_str - hexdump_ascii(len=10):
     6b 65 71 69 61 6f 2d 31 38 38                     keqiao-188      
1336023993.235067: Line: 78 - start of a new network block
1336023993.235072: ssid - hexdump_ascii(len=13):
     79 78 79 2d 33 72 64 2d 66 6c 6f 6f 72            yxy-3rd-floor   
1336023993.235078: key_mgmt: 0x2
1336023993.235080: PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
1336023993.235083: proto: 0x3
1336023993.235085: priority=19 (0x13)
1336023993.235089: id_str - hexdump_ascii(len=13):
     79 78 79 2d 33 72 64 2d 66 6c 6f 6f 72            yxy-3rd-floor   
1336023993.243017: PSK (from passphrase) - hexdump(len=32): [REMOVED]
1336023993.243032: Line: 90 - start of a new network block
1336023993.243038: key_mgmt: 0x4
1336023993.243044: priority=1 (0x1)
1336023993.243070: Priority group 20
1336023993.243073:    id=0 ssid='AVP'
1336023993.243075:    id=1 ssid='restricted.utexas.edu'
1336023993.243076:    id=2 ssid='1216'
1336023993.243078:    id=3 ssid='188'
1336023993.243079: Priority group 19
1336023993.243081:    id=4 ssid='yxy-3rd-floor'
1336023993.243082: Priority group 1
1336023993.243083:    id=5 ssid=''
1336023993.243086: Initializing interface (2) 'wlan0'
1336023993.243122: WEXT: cfg80211-based driver detected
1336023993.326592: Interface wlan0 set UP - waiting a second for the driver to complete initialization
1336023994.326802: SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
1336023994.326821:   capabilities: key_mgmt 0xf enc 0xf flags 0x0
1336023994.328479: WEXT: Operstate: linkmode=1, operstate=5
1336023994.341774: Own MAC address: 00:27:10:25:55:50
1336023994.341793: wpa_driver_wext_set_wpa
1336023994.341803: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336023994.341815: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336023994.341823: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336023994.341831: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336023994.341838: wpa_driver_wext_set_countermeasures
1336023994.341844: wpa_driver_wext_set_drop_unencrypted
1336023994.341849: RSN: flushing PMKID list in the driver
1336023994.341866: Setting scan request: 0 sec 100000 usec
1336023994.341887: WPS: UUID based on MAC address - hexdump(len=16): bd f0 5a 85 4b 8c 55 6f 88 36 22 11 92 9f 09 2f
1336023994.341901: WPS: Build Beacon and Probe Response IEs
1336023994.341908: WPS:  * Version
1336023994.341913: WPS:  * Wi-Fi Protected Setup State (0)
1336023994.341918: WPS:  * Version
1336023994.341920: WPS:  * Wi-Fi Protected Setup State (0)
1336023994.341923: WPS:  * Response Type (2)
1336023994.341926: WPS:  * UUID-E
1336023994.341930: WPS:  * Manufacturer
1336023994.341933: WPS:  * Model Name
1336023994.341935: WPS:  * Model Number
1336023994.341938: WPS:  * Serial Number
1336023994.341940: WPS:  * Primary Device Type
1336023994.341943: WPS:  * Device Name
1336023994.341945: WPS:  * Config Methods (0)
1336023994.341948: WPS:  * RF Bands (3)
1336023994.343174: EAPOL: SUPP_PAE entering state DISCONNECTED
1336023994.343183: EAPOL: KEY_RX entering state NO_KEY_RECEIVE
1336023994.343186: EAPOL: SUPP_BE entering state INITIALIZE
1336023994.343192: EAP: EAP entering state DISABLED
1336023994.343201: Added interface wlan0
1336023994.343231: RTM_NEWLINK: operstate=0 ifi_flags=0x1102 ()
1336023994.343238: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343246: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023994.343251: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343257: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023994.343261: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023994.343264: Wireless event: cmd=0x8b06 len=12
1336023994.442071: State: DISCONNECTED -> SCANNING
1336023994.442093: Starting AP scan (broadcast SSID)
1336023994.442097: Trying to get current scan results first without requesting a new scan to speed up initial association
1336023994.442123: Received 0 bytes of scan results (0 BSSes)
1336023994.442139: Cached scan results are empty - not posting
1336023994.442145: Selecting BSS from priority group 20
1336023994.442148: Try to find WPA-enabled AP
1336023994.442151: Try to find non-WPA AP
1336023994.442154: Selecting BSS from priority group 19
1336023994.442157: Try to find WPA-enabled AP
1336023994.442159: Try to find non-WPA AP
1336023994.442162: Selecting BSS from priority group 1
1336023994.442165: Try to find WPA-enabled AP
1336023994.442167: Try to find non-WPA AP
1336023994.442170: No suitable AP found.
1336023994.442174: Setting scan request: 0 sec 0 usec
1336023994.442182: Starting AP scan (broadcast SSID)
1336023994.442608: Scan requested (ret=0) - scan timeout 5 seconds
1336023995.344179: EAPOL: disable timer tick
1336023997.669444: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669466: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669473: Wireless event: cmd=0x8b19 len=16
1336023997.669532: Received 2607 bytes of scan results (5 BSSes)
1336023997.669548: New scan results available
1336023997.669560: WPS: attr type=0x104a len=1
1336023997.669565: WPS: attr type=0x1044 len=1
1336023997.669569: WPS: attr type=0x103b len=1
1336023997.669572: WPS: attr type=0x1047 len=16
1336023997.669574: WPS: attr type=0x1021 len=7
1336023997.669577: WPS: attr type=0x1023 len=9
1336023997.669580: WPS: attr type=0x1024 len=3
1336023997.669583: WPS: attr type=0x1042 len=3
1336023997.669586: WPS: attr type=0x1054 len=8
1336023997.669589: WPS: attr type=0x1011 len=25
1336023997.669592: WPS: attr type=0x1008 len=2
1336023997.669594: WPS: attr type=0x103c len=1
1336023997.669598: WPS: attr type=0x104a len=1
1336023997.669600: WPS: attr type=0x1044 len=1
1336023997.669603: WPS: attr type=0x103b len=1
1336023997.669606: WPS: attr type=0x1047 len=16
1336023997.669608: WPS: attr type=0x1021 len=7
1336023997.669611: WPS: attr type=0x1023 len=9
1336023997.669614: WPS: attr type=0x1024 len=3
1336023997.669616: WPS: attr type=0x1042 len=3
1336023997.669619: WPS: attr type=0x1054 len=8
1336023997.669622: WPS: attr type=0x1011 len=25
1336023997.669624: WPS: attr type=0x1008 len=2
1336023997.669627: WPS: attr type=0x103c len=1
1336023997.669631: Selecting BSS from priority group 20
1336023997.669634: Try to find WPA-enabled AP
1336023997.669637: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336023997.669643:    skip - SSID mismatch
1336023997.669646:    skip - SSID mismatch
1336023997.669653:    selected based on RSN IE
1336023997.669656:    selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336023997.669676: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336023997.669683: Cancelling scan request
1336023997.669687: WPA: clearing own WPA/RSN IE
1336023997.669699: Automatic auth_alg selection: 0x1
1336023997.669710: RSN: using IEEE 802.11i/D9.0
1336023997.669713: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336023997.669720: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336023997.669732: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336023997.669743: WPA: using GTK TKIP
1336023997.669746: WPA: using PTK CCMP
1336023997.669749: WPA: using KEY_MGMT WPA-PSK
1336023997.669753: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023997.669763: No keys have been configured - skip key clearing
1336023997.669767: wpa_driver_wext_set_drop_unencrypted
1336023997.669771: State: SCANNING -> ASSOCIATING
1336023997.669775: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336023997.669779: WEXT: Operstate: linkmode=-1, operstate=5
1336023997.669795: wpa_driver_wext_associate
1336023997.669806: wpa_driver_wext_set_psk
1336023997.669832: Setting authentication timeout: 10 sec 0 usec
1336023997.669840: EAPOL: External notification - EAP success=0
1336023997.669848: EAPOL: External notification - EAP fail=0
1336023997.669854: EAPOL: External notification - portControl=Auto
1336023997.669865: RSN: Ignored PMKID candidate without preauth flag
1336023997.669903: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669914: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669918: Wireless event: cmd=0x8b06 len=12
1336023997.669924: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336023997.669928: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.669932: Wireless event: cmd=0x8b04 len=16
1336023997.685667: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685694: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685708: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685717: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685723: Wireless event: cmd=0x8c08 len=193
1336023997.685730: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023997.685818: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336023997.685827: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336023997.685834: Wireless event: cmd=0x8b15 len=24
1336023997.685841: Wireless event: new AP: d8:5d:4c:58:2a:32
1336023997.685850: Association info event
1336023997.685855: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023997.685943: State: ASSOCIATING -> ASSOCIATED
1336023997.685954: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336023997.685961: WEXT: Operstate: linkmode=-1, operstate=5
1336023997.685986: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336023997.685992: No keys have been configured - skip key clearing
1336023997.685998: Associated with d8:5d:4c:58:2a:32
1336023997.686002: WPA: Association event - clear replay counter
1336023997.686006: WPA: Clear old PTK
1336023997.686009: EAPOL: External notification - portEnabled=0
1336023997.686016: EAPOL: External notification - portValid=0
1336023997.686020: EAPOL: External notification - EAP success=0
1336023997.686023: EAPOL: External notification - portEnabled=1
1336023997.686027: EAPOL: SUPP_PAE entering state CONNECTING
1336023997.686030: EAPOL: enable timer tick
1336023997.686034: EAPOL: SUPP_BE entering state IDLE
1336023997.686039: Setting authentication timeout: 10 sec 0 usec
1336023997.686045: Cancelling scan request
1336023998.685084: RX EAPOL from d8:5d:4c:58:2a:32
1336023998.685104: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685140: Setting authentication timeout: 10 sec 0 usec
1336023998.685154: IEEE 802.1X RX: version=2 type=3 length=95
1336023998.685160:   EAPOL-Key type=2
1336023998.685163:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336023998.685168:   key_length=16 key_data_length=0
1336023998.685172:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336023998.685177:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b
1336023998.685187:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685193:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.685198:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.685203:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685213: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.685254: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336023998.685260: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336023998.685265: RSN: msg 1/4 key data - hexdump(len=0):
1336023998.686309: WPA: Renewed SNonce - hexdump(len=32): 21 21 d9 63 a9 2d e4 6b f8 46 c8 bb 84 a1 c6 9b ef 43 0f 12 67 3f 5c e3 f6 8d de 05 1e 1e 8b bb
1336023998.686338: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336023998.686343: WPA: PMK - hexdump(len=32): [REMOVED]
1336023998.686346: WPA: PTK - hexdump(len=48): [REMOVED]
1336023998.686350: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023998.686363: WPA: Sending EAPOL-Key 2/4
1336023998.686369: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 21 21 d9 63 a9 2d e4 6b f8 46 c8 bb 84 a1 c6 9b ef 43 0f 12 67 3f 5c e3 f6 8d de 05 1e 1e 8b bb 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3b e9 d0 08 f9 fb 44 01 77 a0 11 e9 1e 34 4f c1 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336023998.686425: EAPOL: startWhen --> 0
1336023998.686430: EAPOL: disable timer tick
1336023998.686433: EAPOL: SUPP_PAE entering state CONNECTING
1336023998.686436: EAPOL: enable timer tick
1336023998.686439: EAPOL: txStart
1336023998.686442: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336023998.691153: RX EAPOL from d8:5d:4c:58:2a:32
1336023998.691167: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e 00 68 db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691230: IEEE 802.1X RX: version=2 type=3 length=199
1336023998.691236:   EAPOL-Key type=2
1336023998.691239:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336023998.691246:   key_length=16 key_data_length=104
1336023998.691250:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336023998.691256:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b
1336023998.691268:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336023998.691277:   key_rsc - hexdump(len=8): e0 56 00 00 00 00 00 00
1336023998.691282:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336023998.691288:   key_mic - hexdump(len=16): 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e
1336023998.691297: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 56 00 00 00 00 00 00 00 00 00 00 00 00 00 00 08 ca 5c d2 5f a7 23 e5 77 8b 2f 92 2e 1c 6f 8e 00 68 db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691364: RSN: encrypted key data - hexdump(len=104): db 44 9e 81 fc e8 42 2a d1 a8 3e c0 80 40 b0 85 63 2a 93 c9 4b 22 9b f6 a0 98 c7 75 e4 91 f7 29 a4 0c d6 76 c3 e5 c0 94 cb 21 4d 31 46 04 8b 69 cc 50 c4 a2 c8 5c da 08 8f 4c 2f 68 c9 00 10 79 71 88 6c 2c c6 f3 fd f5 57 7b 1a 28 4c f1 33 97 c1 e4 21 cd 40 12 c9 1f 50 77 8f a0 7e e2 ad a4 2d 2c f2 bf dd 73 b0 02
1336023998.691435: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336023998.691442: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336023998.691446: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336023998.691452: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336023998.691486: WPA: Sending EAPOL-Key 4/4
1336023998.691493: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 22 66 2c 10 68 75 6b 36 89 78 53 12 e9 33 7d 6d 00 00
1336023998.691545: WPA: Installing PTK to the driver.
1336023998.691551: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336023998.691579: EAPOL: External notification - portValid=1
1336023998.691585: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336023998.691589: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336023998.691594: WPA: Group Key - hexdump(len=32): [REMOVED]
1336023998.691598: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336023998.691602: WPA: RSC - hexdump(len=6): e0 56 00 00 00 00
1336023998.691608: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336023998.691622: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336023998.691629: Cancelling authentication timeout
1336023998.691633: State: GROUP_HANDSHAKE -> COMPLETED
1336023998.691639: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (auth) [id=2 id_str=nantong-1216]
1336023998.691644: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336023998.691649: WEXT: Operstate: linkmode=-1, operstate=6
1336023998.692394: EAPOL: External notification - portValid=1
1336023998.692404: EAPOL: External notification - EAP success=1
1336023998.692408: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336023998.692411: EAPOL: SUPP_BE entering state SUCCESS
1336023998.692415: EAP: EAP entering state DISABLED
1336023998.692418: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336023998.692421: EAPOL: SUPP_BE entering state IDLE
1336023998.692425: EAPOL authentication completed successfully
1336023998.692441: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336023998.692448: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024028.715938: EAPOL: startWhen --> 0
1336024028.715957: EAPOL: disable timer tick
1336024300.904892: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024300.904914: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024300.936349: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024300.936364: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024300.936372: Wireless event: cmd=0x8b15 len=24
1336024300.936378: Wireless event: new AP: 00:00:00:00:00:00
1336024300.936394: Setting scan request: 0 sec 100000 usec
1336024300.936405: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024300.936413: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024300.936419: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024300.936438: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024300.936449: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024300.936459: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024300.936469: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024300.936479: State: COMPLETED -> DISCONNECTED
1336024300.936486: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024300.936493: WEXT: Operstate: linkmode=-1, operstate=5
1336024300.936508: EAPOL: External notification - portEnabled=0
1336024300.936515: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024300.936520: EAPOL: SUPP_BE entering state INITIALIZE
1336024300.936527: EAPOL: External notification - portValid=0
1336024300.936533: EAPOL: External notification - EAP success=0
1336024301.036605: State: DISCONNECTED -> SCANNING
1336024301.036628: Starting AP scan (broadcast SSID)
1336024301.037041: Scan requested (ret=0) - scan timeout 30 seconds
1336024304.242219: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242242: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242251: Wireless event: cmd=0x8b19 len=16
1336024304.242293: Received 694 bytes of scan results (1 BSSes)
1336024304.242302: New scan results available
1336024304.242309: WPS: attr type=0x104a len=1
1336024304.242313: WPS: attr type=0x1044 len=1
1336024304.242317: WPS: attr type=0x103b len=1
1336024304.242320: WPS: attr type=0x1047 len=16
1336024304.242324: WPS: attr type=0x1021 len=7
1336024304.242327: WPS: attr type=0x1023 len=9
1336024304.242330: WPS: attr type=0x1024 len=3
1336024304.242334: WPS: attr type=0x1042 len=3
1336024304.242337: WPS: attr type=0x1054 len=8
1336024304.242341: WPS: attr type=0x1011 len=25
1336024304.242344: WPS: attr type=0x1008 len=2
1336024304.242348: WPS: attr type=0x103c len=1
1336024304.242352: WPS: attr type=0x104a len=1
1336024304.242355: WPS: attr type=0x1044 len=1
1336024304.242358: WPS: attr type=0x103b len=1
1336024304.242361: WPS: attr type=0x1047 len=16
1336024304.242365: WPS: attr type=0x1021 len=7
1336024304.242368: WPS: attr type=0x1023 len=9
1336024304.242371: WPS: attr type=0x1024 len=3
1336024304.242375: WPS: attr type=0x1042 len=3
1336024304.242378: WPS: attr type=0x1054 len=8
1336024304.242381: WPS: attr type=0x1011 len=25
1336024304.242385: WPS: attr type=0x1008 len=2
1336024304.242388: WPS: attr type=0x103c len=1
1336024304.242392: Selecting BSS from priority group 20
1336024304.242396: Try to find WPA-enabled AP
1336024304.242399: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336024304.242406:    skip - SSID mismatch
1336024304.242410:    skip - SSID mismatch
1336024304.242415:    selected based on RSN IE
1336024304.242418:    selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336024304.242428: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336024304.242434: Cancelling scan request
1336024304.242438: WPA: clearing own WPA/RSN IE
1336024304.242449: Automatic auth_alg selection: 0x1
1336024304.242458: RSN: using IEEE 802.11i/D9.0
1336024304.242462: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336024304.242468: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336024304.242482: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336024304.242495: WPA: using GTK TKIP
1336024304.242499: WPA: using PTK CCMP
1336024304.242502: WPA: using KEY_MGMT WPA-PSK
1336024304.242507: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024304.242518: No keys have been configured - skip key clearing
1336024304.242522: wpa_driver_wext_set_drop_unencrypted
1336024304.242527: State: SCANNING -> ASSOCIATING
1336024304.242531: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024304.242536: WEXT: Operstate: linkmode=-1, operstate=5
1336024304.242550: wpa_driver_wext_associate
1336024304.242563: wpa_driver_wext_set_psk
1336024304.242590: Setting authentication timeout: 10 sec 0 usec
1336024304.242597: EAPOL: External notification - EAP success=0
1336024304.242604: EAPOL: External notification - EAP fail=0
1336024304.242608: EAPOL: External notification - portControl=Auto
1336024304.242746: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242754: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242759: Wireless event: cmd=0x8b06 len=12
1336024304.242765: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024304.242769: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.242774: Wireless event: cmd=0x8b04 len=16
1336024304.258639: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258660: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258670: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258675: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258680: Wireless event: cmd=0x8c08 len=193
1336024304.258685: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.258746: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024304.258752: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024304.258756: Wireless event: cmd=0x8b15 len=24
1336024304.258760: Wireless event: new AP: d8:5d:4c:58:2a:32
1336024304.258765: Association info event
1336024304.258768: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.258826: State: ASSOCIATING -> ASSOCIATED
1336024304.258831: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024304.258837: WEXT: Operstate: linkmode=-1, operstate=5
1336024304.258859: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336024304.258865: No keys have been configured - skip key clearing
1336024304.258870: Associated with d8:5d:4c:58:2a:32
1336024304.258874: WPA: Association event - clear replay counter
1336024304.258878: WPA: Clear old PTK
1336024304.258882: EAPOL: External notification - portEnabled=0
1336024304.258888: EAPOL: External notification - portValid=0
1336024304.258892: EAPOL: External notification - EAP success=0
1336024304.258896: EAPOL: External notification - portEnabled=1
1336024304.258899: EAPOL: SUPP_PAE entering state CONNECTING
1336024304.258903: EAPOL: enable timer tick
1336024304.258907: EAPOL: SUPP_BE entering state IDLE
1336024304.258912: Setting authentication timeout: 10 sec 0 usec
1336024304.258918: Cancelling scan request
1336024304.456352: RX EAPOL from d8:5d:4c:58:2a:32
1336024304.456374: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456417: Setting authentication timeout: 10 sec 0 usec
1336024304.456426: IEEE 802.1X RX: version=2 type=3 length=95
1336024304.456432:   EAPOL-Key type=2
1336024304.456436:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024304.456442:   key_length=16 key_data_length=0
1336024304.456446:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1336024304.456452:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024304.456464:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456472:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024304.456478:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024304.456484:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456496: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024304.456543: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336024304.456550: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024304.456556: RSN: msg 1/4 key data - hexdump(len=0):
1336024304.457930: WPA: Renewed SNonce - hexdump(len=32): a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85
1336024304.457964: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024304.457971: WPA: PMK - hexdump(len=32): [REMOVED]
1336024304.457974: WPA: PTK - hexdump(len=48): [REMOVED]
1336024304.457979: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024304.457990: WPA: Sending EAPOL-Key 2/4
1336024304.457998: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b ef 56 2d 7b 9d e7 52 2e 17 fa 08 ba f4 dc 88 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258190: RX EAPOL from d8:5d:4c:58:2a:32
1336024305.258209: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258242: IEEE 802.1X RX: version=2 type=3 length=95
1336024305.258247:   EAPOL-Key type=2
1336024305.258250:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024305.258256:   key_length=16 key_data_length=0
1336024305.258259:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336024305.258264:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024305.258275:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258281:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.258286:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.258291:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258301: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.258340: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024305.258346: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024305.258351: RSN: msg 1/4 key data - hexdump(len=0):
1336024305.258370: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024305.258375: WPA: PMK - hexdump(len=32): [REMOVED]
1336024305.258378: WPA: PTK - hexdump(len=48): [REMOVED]
1336024305.258382: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258392: WPA: Sending EAPOL-Key 2/4
1336024305.258398: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 a6 10 d5 d3 f7 c8 9d 09 be 7b 04 d6 c1 65 31 ec 5c 8c ab 3b f8 dc f0 43 51 f2 da ef 3e 15 80 85 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 73 1e 2d 0c 33 82 6c 9f ca dd 2d 2c f2 e6 e5 f9 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024305.258966: EAPOL: startWhen --> 0
1336024305.258972: EAPOL: disable timer tick
1336024305.258975: EAPOL: SUPP_PAE entering state CONNECTING
1336024305.258978: EAPOL: enable timer tick
1336024305.258982: EAPOL: txStart
1336024305.258984: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336024305.263516: RX EAPOL from d8:5d:4c:58:2a:32
1336024305.263531: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1 00 68 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263595: IEEE 802.1X RX: version=2 type=3 length=199
1336024305.263601:   EAPOL-Key type=2
1336024305.263604:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336024305.263611:   key_length=16 key_data_length=104
1336024305.263615:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336024305.263621:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e
1336024305.263633:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024305.263641:   key_rsc - hexdump(len=8): a6 57 00 00 00 00 00 00
1336024305.263647:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024305.263653:   key_mic - hexdump(len=16): ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1
1336024305.263662: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 57 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ec a2 bb 1e 53 14 85 b3 aa bc a1 b4 42 78 20 b1 00 68 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263729: RSN: encrypted key data - hexdump(len=104): 70 14 47 d6 8c d3 82 e5 ee a7 ad be 8f 1e b1 aa be 35 b3 db 45 24 83 9d b3 67 bd c2 82 ad f0 96 96 62 88 3f 2e d1 a3 e0 de 29 75 9c 22 3a 49 ea bc 0e 5c 79 23 6d 2a 12 3f 11 37 9d ed f7 20 a6 ac 73 cd f7 a6 46 37 58 6c 43 23 ca 6f bc 6c 95 0c b4 a3 8a 42 70 a5 4e af 50 ec 10 aa c4 52 05 da 41 05 fe 02 57 4c 08
1336024305.263784: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336024305.263790: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024305.263794: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024305.263800: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336024305.263833: WPA: Sending EAPOL-Key 4/4
1336024305.263840: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 97 3d 90 2a e4 a2 bb 5e 59 c9 48 c3 e3 01 87 c7 00 00
1336024305.263892: WPA: Installing PTK to the driver.
1336024305.263899: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336024305.263928: EAPOL: External notification - portValid=1
1336024305.263934: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336024305.263938: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336024305.263943: WPA: Group Key - hexdump(len=32): [REMOVED]
1336024305.263947: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336024305.263951: WPA: RSC - hexdump(len=6): a6 57 00 00 00 00
1336024305.263956: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336024305.263971: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336024305.263977: Cancelling authentication timeout
1336024305.263982: Removed BSSID d8:5d:4c:58:2a:32 from blacklist
1336024305.263987: State: GROUP_HANDSHAKE -> COMPLETED
1336024305.263993: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
1336024305.263998: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336024305.264003: WEXT: Operstate: linkmode=-1, operstate=6
1336024305.264763: EAPOL: External notification - portValid=1
1336024305.264774: EAPOL: External notification - EAP success=1
1336024305.264778: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336024305.264781: EAPOL: SUPP_BE entering state SUCCESS
1336024305.264785: EAP: EAP entering state DISABLED
1336024305.264788: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336024305.264791: EAPOL: SUPP_BE entering state IDLE
1336024305.264795: EAPOL authentication completed successfully
1336024305.264810: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336024305.264818: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024335.291164: EAPOL: startWhen --> 0
1336024335.291182: EAPOL: disable timer tick
1336024481.296988: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024481.297009: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024481.328372: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024481.328396: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024481.328406: Wireless event: cmd=0x8b15 len=24
1336024481.328414: Wireless event: new AP: 00:00:00:00:00:00
1336024481.328427: Setting scan request: 0 sec 100000 usec
1336024481.328434: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024481.328440: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024481.328448: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024481.328460: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024481.328464: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024481.328467: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024481.328470: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024481.328473: State: COMPLETED -> DISCONNECTED
1336024481.328477: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024481.328479: WEXT: Operstate: linkmode=-1, operstate=5
1336024481.328488: EAPOL: External notification - portEnabled=0
1336024481.328491: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024481.328493: EAPOL: SUPP_BE entering state INITIALIZE
1336024481.328496: EAPOL: External notification - portValid=0
1336024481.328498: EAPOL: External notification - EAP success=0
1336024481.428617: State: DISCONNECTED -> SCANNING
1336024481.428638: Starting AP scan (broadcast SSID)
1336024481.429050: Scan requested (ret=0) - scan timeout 30 seconds
1336024484.688969: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.688992: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.688999: Wireless event: cmd=0x8b19 len=16
1336024484.689063: Received 3991 bytes of scan results (7 BSSes)
1336024484.689077: New scan results available
1336024484.689083: WPS: attr type=0x104a len=1
1336024484.689087: WPS: attr type=0x1044 len=1
1336024484.689090: WPS: attr type=0x103b len=1
1336024484.689093: WPS: attr type=0x1047 len=16
1336024484.689095: WPS: attr type=0x1021 len=7
1336024484.689098: WPS: attr type=0x1023 len=9
1336024484.689101: WPS: attr type=0x1024 len=3
1336024484.689104: WPS: attr type=0x1042 len=3
1336024484.689107: WPS: attr type=0x1054 len=8
1336024484.689110: WPS: attr type=0x1011 len=25
1336024484.689112: WPS: attr type=0x1008 len=2
1336024484.689115: WPS: attr type=0x103c len=1
1336024484.689118: WPS: attr type=0x104a len=1
1336024484.689121: WPS: attr type=0x1044 len=1
1336024484.689124: WPS: attr type=0x103b len=1
1336024484.689126: WPS: attr type=0x1047 len=16
1336024484.689129: WPS: attr type=0x1021 len=7
1336024484.689132: WPS: attr type=0x1023 len=9
1336024484.689135: WPS: attr type=0x1024 len=3
1336024484.689137: WPS: attr type=0x1042 len=3
1336024484.689140: WPS: attr type=0x1054 len=8
1336024484.689143: WPS: attr type=0x1011 len=25
1336024484.689146: WPS: attr type=0x1008 len=2
1336024484.689148: WPS: attr type=0x103c len=1
1336024484.689152: Selecting BSS from priority group 20
1336024484.689155: Try to find WPA-enabled AP
1336024484.689158: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336024484.689164:    skip - SSID mismatch
1336024484.689166:    skip - SSID mismatch
1336024484.689171:    selected based on RSN IE
1336024484.689174:    selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336024484.689183: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336024484.689188: Cancelling scan request
1336024484.689192: WPA: clearing own WPA/RSN IE
1336024484.689207: Automatic auth_alg selection: 0x1
1336024484.689219: RSN: using IEEE 802.11i/D9.0
1336024484.689228: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336024484.689234: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336024484.689246: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336024484.689257: WPA: using GTK TKIP
1336024484.689260: WPA: using PTK CCMP
1336024484.689263: WPA: using KEY_MGMT WPA-PSK
1336024484.689267: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024484.689277: No keys have been configured - skip key clearing
1336024484.689280: wpa_driver_wext_set_drop_unencrypted
1336024484.689285: State: SCANNING -> ASSOCIATING
1336024484.689288: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024484.689292: WEXT: Operstate: linkmode=-1, operstate=5
1336024484.689305: wpa_driver_wext_associate
1336024484.689317: wpa_driver_wext_set_psk
1336024484.689342: Setting authentication timeout: 10 sec 0 usec
1336024484.689350: EAPOL: External notification - EAP success=0
1336024484.689358: EAPOL: External notification - EAP fail=0
1336024484.689364: EAPOL: External notification - portControl=Auto
1336024484.689402: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.689412: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.689416: Wireless event: cmd=0x8b06 len=12
1336024484.689421: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024484.689425: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.689428: Wireless event: cmd=0x8b04 len=16
1336024484.710822: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710842: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710848: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710850: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710852: Wireless event: cmd=0x8c08 len=193
1336024484.710855: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.710884: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024484.710886: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024484.710888: Wireless event: cmd=0x8b15 len=24
1336024484.710890: Wireless event: new AP: d8:5d:4c:58:2a:32
1336024484.710892: Association info event
1336024484.710894: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 0f 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.710919: State: ASSOCIATING -> ASSOCIATED
1336024484.710922: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024484.710925: WEXT: Operstate: linkmode=-1, operstate=5
1336024484.710941: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336024484.710944: No keys have been configured - skip key clearing
1336024484.710947: Associated with d8:5d:4c:58:2a:32
1336024484.710949: WPA: Association event - clear replay counter
1336024484.710950: WPA: Clear old PTK
1336024484.710952: EAPOL: External notification - portEnabled=0
1336024484.710957: EAPOL: External notification - portValid=0
1336024484.710959: EAPOL: External notification - EAP success=0
1336024484.710960: EAPOL: External notification - portEnabled=1
1336024484.710962: EAPOL: SUPP_PAE entering state CONNECTING
1336024484.710963: EAPOL: enable timer tick
1336024484.710966: EAPOL: SUPP_BE entering state IDLE
1336024484.710968: Setting authentication timeout: 10 sec 0 usec
1336024484.710971: Cancelling scan request
1336024484.901203: RX EAPOL from d8:5d:4c:58:2a:32
1336024484.901223: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901259: Setting authentication timeout: 10 sec 0 usec
1336024484.901267: IEEE 802.1X RX: version=2 type=3 length=95
1336024484.901272:   EAPOL-Key type=2
1336024484.901275:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024484.901281:   key_length=16 key_data_length=0
1336024484.901284:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1336024484.901289:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024484.901299:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901306:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024484.901311:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024484.901316:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901326: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024484.901364: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336024484.901370: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024484.901375: RSN: msg 1/4 key data - hexdump(len=0):
1336024484.902500: WPA: Renewed SNonce - hexdump(len=32): f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc
1336024484.902528: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024484.902533: WPA: PMK - hexdump(len=32): [REMOVED]
1336024484.902537: WPA: PTK - hexdump(len=48): [REMOVED]
1336024484.902540: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024484.902550: WPA: Sending EAPOL-Key 2/4
1336024484.902556: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 96 0f ae f1 54 c9 db 78 c7 9f 29 e2 d1 df 88 ae 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.706891: RX EAPOL from d8:5d:4c:58:2a:32
1336024485.706910: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.706944: IEEE 802.1X RX: version=2 type=3 length=95
1336024485.706949:   EAPOL-Key type=2
1336024485.706952:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024485.706957:   key_length=16 key_data_length=0
1336024485.706961:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336024485.706966:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024485.706976:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.706983:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.706988:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.706993:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.707003: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.707042: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024485.707048: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024485.707053: RSN: msg 1/4 key data - hexdump(len=0):
1336024485.707072: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024485.707077: WPA: PMK - hexdump(len=32): [REMOVED]
1336024485.707080: WPA: PTK - hexdump(len=48): [REMOVED]
1336024485.707084: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.707094: WPA: Sending EAPOL-Key 2/4
1336024485.707100: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 f7 dc 43 da 46 5f fe cd b2 08 70 fb 7d 9f ea a1 ab f2 4a 12 a1 e2 ba 18 8a 6b a3 9a 15 3c 10 fc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 31 3e 1d 18 bd 1b 1f d0 0e 4c 9f c3 d6 0c c1 ce 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024485.711039: EAPOL: startWhen --> 0
1336024485.711054: EAPOL: disable timer tick
1336024485.711061: EAPOL: SUPP_PAE entering state CONNECTING
1336024485.711068: EAPOL: enable timer tick
1336024485.711075: EAPOL: txStart
1336024485.711082: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336024485.713406: RX EAPOL from d8:5d:4c:58:2a:32
1336024485.713414: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a 00 68 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713463: IEEE 802.1X RX: version=2 type=3 length=199
1336024485.713467:   EAPOL-Key type=2
1336024485.713469:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336024485.713474:   key_length=16 key_data_length=104
1336024485.713476:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336024485.713480:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20
1336024485.713489:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024485.713494:   key_rsc - hexdump(len=8): 25 58 00 00 00 00 00 00
1336024485.713498:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024485.713503:   key_mic - hexdump(len=16): 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a
1336024485.713509: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 25 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 8a 4f 72 82 9b f7 32 d8 1d 9e a3 a7 44 a9 8a 00 68 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713561: RSN: encrypted key data - hexdump(len=104): 06 d4 40 59 28 87 ba 56 df 95 85 a2 c3 0f 4c b6 65 a6 ef 6b 55 31 9e c2 5d 11 ab ae fb db 7f 3d bf 3d 95 95 72 7f 97 e3 78 35 28 0f 8b ec 11 44 b6 04 12 f0 93 c3 98 33 12 12 89 b2 96 24 8a 41 01 57 01 d9 fa cd 5b 1d 6a 46 82 18 f0 1a ab 6c 99 80 57 e0 64 8d f6 c8 66 17 1d b7 6b 24 f1 a6 a4 cc 4f 0e 8b 91 02 3c
1336024485.713601: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336024485.713605: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024485.713608: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024485.713612: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336024485.713638: WPA: Sending EAPOL-Key 4/4
1336024485.713643: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7c 76 84 74 41 b1 02 c3 fe 03 1a ca 11 45 aa d5 00 00
1336024485.713683: WPA: Installing PTK to the driver.
1336024485.713688: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336024485.713709: EAPOL: External notification - portValid=1
1336024485.713715: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336024485.713717: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336024485.713721: WPA: Group Key - hexdump(len=32): [REMOVED]
1336024485.713724: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336024485.713727: WPA: RSC - hexdump(len=6): 25 58 00 00 00 00
1336024485.713731: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336024485.713742: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336024485.713747: Cancelling authentication timeout
1336024485.713750: Removed BSSID d8:5d:4c:58:2a:32 from blacklist
1336024485.713754: State: GROUP_HANDSHAKE -> COMPLETED
1336024485.713759: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
1336024485.713762: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336024485.713766: WEXT: Operstate: linkmode=-1, operstate=6
1336024485.714287: EAPOL: External notification - portValid=1
1336024485.714296: EAPOL: External notification - EAP success=1
1336024485.714299: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336024485.714302: EAPOL: SUPP_BE entering state SUCCESS
1336024485.714304: EAP: EAP entering state DISABLED
1336024485.714307: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336024485.714309: EAPOL: SUPP_BE entering state IDLE
1336024485.714312: EAPOL authentication completed successfully
1336024485.714325: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336024485.714330: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024515.742384: EAPOL: startWhen --> 0
1336024515.742403: EAPOL: disable timer tick
1336024661.477540: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024661.477565: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024661.508797: RTM_NEWLINK: operstate=1 ifi_flags=0x1103 ([UP])
1336024661.508811: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024661.508820: Wireless event: cmd=0x8b15 len=24
1336024661.508827: Wireless event: new AP: 00:00:00:00:00:00
1336024661.508842: Setting scan request: 0 sec 100000 usec
1336024661.508853: Added BSSID d8:5d:4c:58:2a:32 into blacklist
1336024661.508864: CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
1336024661.508872: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024661.508893: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024661.508907: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024661.508919: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024661.508932: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024661.508944: State: COMPLETED -> DISCONNECTED
1336024661.508953: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024661.508961: WEXT: Operstate: linkmode=-1, operstate=5
1336024661.508978: EAPOL: External notification - portEnabled=0
1336024661.508987: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024661.508993: EAPOL: SUPP_BE entering state INITIALIZE
1336024661.509001: EAPOL: External notification - portValid=0
1336024661.509008: EAPOL: External notification - EAP success=0
1336024661.609020: State: DISCONNECTED -> SCANNING
1336024661.609040: Starting AP scan (broadcast SSID)
1336024661.612109: Scan requested (ret=0) - scan timeout 30 seconds
1336024664.840435: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024664.840454: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.840461: Wireless event: cmd=0x8b19 len=16
1336024664.840514: Received 2600 bytes of scan results (4 BSSes)
1336024664.840526: New scan results available
1336024664.840532: WPS: attr type=0x104a len=1
1336024664.840536: WPS: attr type=0x1044 len=1
1336024664.840538: WPS: attr type=0x103b len=1
1336024664.840541: WPS: attr type=0x1047 len=16
1336024664.840544: WPS: attr type=0x1021 len=7
1336024664.840547: WPS: attr type=0x1023 len=9
1336024664.840550: WPS: attr type=0x1024 len=3
1336024664.840553: WPS: attr type=0x1042 len=3
1336024664.840555: WPS: attr type=0x1054 len=8
1336024664.840558: WPS: attr type=0x1011 len=25
1336024664.840561: WPS: attr type=0x1008 len=2
1336024664.840564: WPS: attr type=0x103c len=1
1336024664.840567: WPS: attr type=0x104a len=1
1336024664.840570: WPS: attr type=0x1044 len=1
1336024664.840572: WPS: attr type=0x103b len=1
1336024664.840575: WPS: attr type=0x1047 len=16
1336024664.840578: WPS: attr type=0x1021 len=7
1336024664.840581: WPS: attr type=0x1023 len=9
1336024664.840583: WPS: attr type=0x1024 len=3
1336024664.840586: WPS: attr type=0x1042 len=3
1336024664.840589: WPS: attr type=0x1054 len=8
1336024664.840591: WPS: attr type=0x1011 len=25
1336024664.840594: WPS: attr type=0x1008 len=2
1336024664.840597: WPS: attr type=0x103c len=1
1336024664.840600: Selecting BSS from priority group 20
1336024664.840603: Try to find WPA-enabled AP
1336024664.840606: 0: d8:5d:4c:58:2a:32 ssid='1216' wpa_ie_len=26 rsn_ie_len=24 caps=0x11
1336024664.840612:    skip - SSID mismatch
1336024664.840615:    skip - SSID mismatch
1336024664.840619:    selected based on RSN IE
1336024664.840622:    selected WPA AP d8:5d:4c:58:2a:32 ssid='1216'
1336024664.840631: Trying to associate with d8:5d:4c:58:2a:32 (SSID='1216' freq=2437 MHz)
1336024664.840635: Cancelling scan request
1336024664.840639: WPA: clearing own WPA/RSN IE
1336024664.840650: Automatic auth_alg selection: 0x1
1336024664.840658: RSN: using IEEE 802.11i/D9.0
1336024664.840661: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
1336024664.840666: WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02
1336024664.840677: WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
1336024664.840688: WPA: using GTK TKIP
1336024664.840691: WPA: using PTK CCMP
1336024664.840694: WPA: using KEY_MGMT WPA-PSK
1336024664.840698: WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024664.840708: No keys have been configured - skip key clearing
1336024664.840711: wpa_driver_wext_set_drop_unencrypted
1336024664.840715: State: SCANNING -> ASSOCIATING
1336024664.840720: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024664.840724: WEXT: Operstate: linkmode=-1, operstate=5
1336024664.840736: wpa_driver_wext_associate
1336024664.840748: wpa_driver_wext_set_psk
1336024664.840772: Setting authentication timeout: 10 sec 0 usec
1336024664.840778: EAPOL: External notification - EAP success=0
1336024664.840784: EAPOL: External notification - EAP fail=0
1336024664.840787: EAPOL: External notification - portControl=Auto
1336024664.840824: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024664.840833: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.840837: Wireless event: cmd=0x8b06 len=12
1336024664.840842: RTM_NEWLINK: operstate=0 ifi_flags=0x1103 ([UP])
1336024664.840846: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.840850: Wireless event: cmd=0x8b04 len=16
1336024664.856225: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024664.856249: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.856262: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024664.856272: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.856279: Wireless event: cmd=0x8c08 len=193
1336024664.856287: AssocResp IE wireless event - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024664.856380: RTM_NEWLINK: operstate=0 ifi_flags=0x11103 ([UP][LOWER_UP])
1336024664.856387: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024664.856391: Wireless event: cmd=0x8b15 len=24
1336024664.856395: Wireless event: new AP: d8:5d:4c:58:2a:32
1336024664.856400: Association info event
1336024664.856403: resp_ies - hexdump(len=177): 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c dd 18 00 50 f2 02 01 01 85 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 09 00 03 7f 01 01 00 00 ff 7f dd 0a 00 03 7f 04 01 00 00 00 40 00 dd 1e 00 90 4c 33 ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2d 1a ce 11 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 07 19 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024664.856461: State: ASSOCIATING -> ASSOCIATED
1336024664.856466: wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
1336024664.856471: WEXT: Operstate: linkmode=-1, operstate=5
1336024664.856495: Associated to a new BSS: BSSID=d8:5d:4c:58:2a:32
1336024664.856501: No keys have been configured - skip key clearing
1336024664.856506: Associated with d8:5d:4c:58:2a:32
1336024664.856510: WPA: Association event - clear replay counter
1336024664.856514: WPA: Clear old PTK
1336024664.856517: EAPOL: External notification - portEnabled=0
1336024664.856524: EAPOL: External notification - portValid=0
1336024664.856528: EAPOL: External notification - EAP success=0
1336024664.856531: EAPOL: External notification - portEnabled=1
1336024664.856535: EAPOL: SUPP_PAE entering state CONNECTING
1336024664.856538: EAPOL: enable timer tick
1336024664.856543: EAPOL: SUPP_BE entering state IDLE
1336024664.856548: Setting authentication timeout: 10 sec 0 usec
1336024664.856554: Cancelling scan request
1336024665.051363: RX EAPOL from d8:5d:4c:58:2a:32
1336024665.051384: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.051421: Setting authentication timeout: 10 sec 0 usec
1336024665.051429: IEEE 802.1X RX: version=2 type=3 length=95
1336024665.051437:   EAPOL-Key type=2
1336024665.051439:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024665.051441:   key_length=16 key_data_length=0
1336024665.051443:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
1336024665.051445:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22
1336024665.051450:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.051454:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024665.051456:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024665.051459:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.051465: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.051488: State: ASSOCIATED -> 4WAY_HANDSHAKE
1336024665.051492: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024665.051494: RSN: msg 1/4 key data - hexdump(len=0):
1336024665.052042: WPA: Renewed SNonce - hexdump(len=32): c6 3f ab 7d 50 a0 14 3d 76 7a 7e f2 93 94 a7 84 cf 3f a0 20 56 04 ca f6 8d a6 50 87 9a 9f 5a 6e
1336024665.052059: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024665.052062: WPA: PMK - hexdump(len=32): [REMOVED]
1336024665.052063: WPA: PTK - hexdump(len=48): [REMOVED]
1336024665.052065: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024665.052070: WPA: Sending EAPOL-Key 2/4
1336024665.052073: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 c6 3f ab 7d 50 a0 14 3d 76 7a 7e f2 93 94 a7 84 cf 3f a0 20 56 04 ca f6 8d a6 50 87 9a 9f 5a 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5b c9 fb f5 d0 83 ed db b0 18 3a cf fc 39 18 fb 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024665.857428: EAPOL: startWhen --> 0
1336024665.857446: EAPOL: disable timer tick
1336024665.857450: EAPOL: SUPP_PAE entering state CONNECTING
1336024665.857454: EAPOL: enable timer tick
1336024665.857459: EAPOL: txStart
1336024665.857463: WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
1336024665.868802: RX EAPOL from d8:5d:4c:58:2a:32
1336024665.868825: RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.868854: IEEE 802.1X RX: version=2 type=3 length=95
1336024665.868857:   EAPOL-Key type=2
1336024665.868859:   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
1336024665.868864:   key_length=16 key_data_length=0
1336024665.868866:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
1336024665.868870:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22
1336024665.868882:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.868887:   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024665.868890:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024665.868894:   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.868901: WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 02 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.868932: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024665.868936: WPA: RX message 1 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024665.868940: RSN: msg 1/4 key data - hexdump(len=0):
1336024665.868955: WPA: PTK derivation - A1=00:27:10:25:55:50 A2=d8:5d:4c:58:2a:32
1336024665.868959: WPA: PMK - hexdump(len=32): [REMOVED]
1336024665.868961: WPA: PTK - hexdump(len=48): [REMOVED]
1336024665.868963: WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024665.868971: WPA: Sending EAPOL-Key 2/4
1336024665.868975: WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 c6 3f ab 7d 50 a0 14 3d 76 7a 7e f2 93 94 a7 84 cf 3f a0 20 56 04 ca f6 8d a6 50 87 9a 9f 5a 6e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bd 49 b0 dd 05 ea 3f e0 aa 74 0c 4b 24 9f d8 c6 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
1336024665.876649: RX EAPOL from d8:5d:4c:58:2a:32
1336024665.876664: RX EAPOL - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8c 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 98 b2 9c ea a3 00 72 e3 7a 3c 3e f6 89 4d 9d 00 68 ad e0 2b 94 14 fb 78 bf f4 ba 6c b3 94 fd d1 b1 50 f2 27 4b 7d 58 db c0 7a 5d d4 4e 3f 1e f3 bd 99 b0 44 d8 8b cf b5 c2 db a9 32 7f 3e ec d4 28 da cb cd 18 b6 8b 1d 88 21 a1 de ce 77 9e ef a2 be 1a 47 59 ff 93 b2 80 2f 22 e1 a6 86 ea 96 fa 24 d0 a5 01 f7 27 d5 7f 61 d5 c7 d1 b4 8c 5b 3b cd fd 42 77 01 16 9b 8f
1336024665.876730: IEEE 802.1X RX: version=2 type=3 length=199
1336024665.876732:   EAPOL-Key type=2
1336024665.876734:   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
1336024665.876737:   key_length=16 key_data_length=104
1336024665.876738:   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
1336024665.876741:   key_nonce - hexdump(len=32): fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22
1336024665.876746:   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
1336024665.876750:   key_rsc - hexdump(len=8): 8c 58 00 00 00 00 00 00
1336024665.876752:   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
1336024665.876755:   key_mic - hexdump(len=16): f9 98 b2 9c ea a3 00 72 e3 7a 3c 3e f6 89 4d 9d
1336024665.876759: WPA: RX EAPOL-Key - hexdump(len=203): 02 03 00 c7 02 13 ca 00 10 00 00 00 00 00 00 00 03 fb fc 13 ae 13 16 1c a9 de f1 47 74 46 25 f9 d4 b2 27 e9 0b 20 35 27 6a d7 a9 e5 2e 88 34 72 22 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8c 58 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 98 b2 9c ea a3 00 72 e3 7a 3c 3e f6 89 4d 9d 00 68 ad e0 2b 94 14 fb 78 bf f4 ba 6c b3 94 fd d1 b1 50 f2 27 4b 7d 58 db c0 7a 5d d4 4e 3f 1e f3 bd 99 b0 44 d8 8b cf b5 c2 db a9 32 7f 3e ec d4 28 da cb cd 18 b6 8b 1d 88 21 a1 de ce 77 9e ef a2 be 1a 47 59 ff 93 b2 80 2f 22 e1 a6 86 ea 96 fa 24 d0 a5 01 f7 27 d5 7f 61 d5 c7 d1 b4 8c 5b 3b cd fd 42 77 01 16 9b 8f
1336024665.876793: RSN: encrypted key data - hexdump(len=104): ad e0 2b 94 14 fb 78 bf f4 ba 6c b3 94 fd d1 b1 50 f2 27 4b 7d 58 db c0 7a 5d d4 4e 3f 1e f3 bd 99 b0 44 d8 8b cf b5 c2 db a9 32 7f 3e ec d4 28 da cb cd 18 b6 8b 1d 88 21 a1 de ce 77 9e ef a2 be 1a 47 59 ff 93 b2 80 2f 22 e1 a6 86 ea 96 fa 24 d0 a5 01 f7 27 d5 7f 61 d5 c7 d1 b4 8c 5b 3b cd fd 42 77 01 16 9b 8f
1336024665.876816: WPA: decrypted EAPOL-Key key data - hexdump(len=96): [REMOVED]
1336024665.876819: State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
1336024665.876821: WPA: RX message 3 of 4-Way Handshake from d8:5d:4c:58:2a:32 (ver=2)
1336024665.876823: WPA: IE KeyData - hexdump(len=96): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 dd 26 00 0f ac 01 02 00 d2 ff 31 c0 29 77 1e 92 0e 8c 18 97 9b c1 1a 3b 01 87 3a 6d a0 cb 48 22 aa 97 68 83 ec df 2b 4a dd 00
1336024665.876838: WPA: Sending EAPOL-Key 4/4
1336024665.876840: WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 94 a7 5c eb d2 db 27 35 e2 e4 17 59 c5 f3 5a d5 00 00
1336024665.876864: WPA: Installing PTK to the driver.
1336024665.876867: wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
1336024665.876885: EAPOL: External notification - portValid=1
1336024665.876887: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
1336024665.876889: RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
1336024665.876891: WPA: Group Key - hexdump(len=32): [REMOVED]
1336024665.876893: WPA: Installing GTK to the driver (keyidx=2 tx=0 len=32).
1336024665.876894: WPA: RSC - hexdump(len=6): 8c 58 00 00 00 00
1336024665.876897: wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
1336024665.876904: WPA: Key negotiation completed with d8:5d:4c:58:2a:32 [PTK=CCMP GTK=TKIP]
1336024665.876907: Cancelling authentication timeout
1336024665.876909: Removed BSSID d8:5d:4c:58:2a:32 from blacklist
1336024665.876911: State: GROUP_HANDSHAKE -> COMPLETED
1336024665.876914: CTRL-EVENT-CONNECTED - Connection to d8:5d:4c:58:2a:32 completed (reauth) [id=2 id_str=nantong-1216]
1336024665.876916: wpa_driver_wext_set_operstate: operstate 0->1 (UP)
1336024665.876918: WEXT: Operstate: linkmode=-1, operstate=6
1336024665.877273: EAPOL: External notification - portValid=1
1336024665.877278: EAPOL: External notification - EAP success=1
1336024665.877283: EAPOL: SUPP_PAE entering state AUTHENTICATING
1336024665.877285: EAPOL: SUPP_BE entering state SUCCESS
1336024665.877287: EAP: EAP entering state DISABLED
1336024665.877288: EAPOL: SUPP_PAE entering state AUTHENTICATED
1336024665.877290: EAPOL: SUPP_BE entering state IDLE
1336024665.877291: EAPOL authentication completed successfully
1336024665.877301: RTM_NEWLINK: operstate=1 ifi_flags=0x11143 ([UP][RUNNING][LOWER_UP])
1336024665.877304: RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
1336024695.888768: EAPOL: startWhen --> 0
1336024695.888785: EAPOL: disable timer tick
  C-c C-c1336024777.283815: CTRL-EVENT-TERMINATING - signal 2 received
1336024777.283837: Removing interface wlan0
1336024777.283845: wpa_driver_wext_deauthenticate
1336024777.296852: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024777.296873: wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
1336024777.296882: wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
1336024777.296888: wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
1336024777.296894: wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
1336024777.296900: State: COMPLETED -> DISCONNECTED
1336024777.296905: wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
1336024777.296909: WEXT: Operstate: linkmode=-1, operstate=5
1336024777.297565: EAPOL: External notification - portEnabled=0
1336024777.297574: EAPOL: SUPP_PAE entering state DISCONNECTED
1336024777.297577: EAPOL: SUPP_BE entering state INITIALIZE
1336024777.297582: EAPOL: External notification - portValid=0
1336024777.297585: EAPOL: External notification - EAP success=0
1336024777.297589: wpa_driver_wext_set_wpa
1336024777.297595: wpa_driver_wext_set_drop_unencrypted
1336024777.297599: wpa_driver_wext_set_countermeasures
1336024777.297604: No keys have been configured - skip key clearing
1336024777.317593: Cancelling scan request
1336024777.317608: Cancelling authentication timeout
1336024777.317628: WEXT: Operstate: linkmode=0, operstate=6
root@sylecn:/home/sylecn/d/t2# 
root@sylecn:/home/sylecn# iwevent
Waiting for Wireless Events from interfaces...
13:51:40.936561   wlan0    New Access Point/Cell address:Not-Associated
13:51:44.242210   wlan0    Scan request completed
13:51:44.242639   wlan0    Set Mode:Managed
13:51:44.242659   wlan0    Set Frequency:2.437 GHz (Channel 6)
13:51:44.258618   wlan0    Association Response IEs:010882848B0C1296182432043048606CDD180050F2020101850003A4000027A4000042435E0062322F00DD0900037F01010000FF7FDD0A00037F04010000004
13:51:44.258752   wlan0    New Access Point/Cell address:D8:5D:4C:58:2A:32
13:54:41.328376   wlan0    New Access Point/Cell address:Not-Associated
13:54:44.689003   wlan0    Scan request completed
13:54:44.689446   wlan0    Set Mode:Managed
13:54:44.689463   wlan0    Set Frequency:2.437 GHz (Channel 6)
13:54:44.710825   wlan0    Association Response IEs:010882848B0C1296182432043048606CDD180050F2020101850003A4000027A4000042435E0062322F00DD0900037F01010000FF7FDD0A00037F04010000004
13:54:44.710883   wlan0    New Access Point/Cell address:D8:5D:4C:58:2A:32
13:57:41.508755   wlan0    New Access Point/Cell address:Not-Associated
13:57:44.840441   wlan0    Scan request completed
13:57:44.840822   wlan0    Set Mode:Managed
13:57:44.840841   wlan0    Set Frequency:2.437 GHz (Channel 6)
13:57:44.856211   wlan0    Association Response IEs:010882848B0C1296182432043048606CDD180050F2020101850003A4000027A4000042435E0062322F00DD0900037F01010000FF7FDD0A00037F04010000004
13:57:44.856326   wlan0    New Access Point/Cell address:D8:5D:4C:58:2A:32
13:59:37.428409   wlan0    New Access Point/Cell address:Not-Associated
  C-c C-c
root@sylecn:/home/sylecn# 
#ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=wheel
# you should not add this if you are using wpa-roam in /etc/network/interfaces,
# otherwise, ifup will print:
# wpa_supplicant: /sbin/wpa_supplicant daemon failed to start
# run-parts: /etc/network/if-pre-up.d/wpasupplicant exited with return code 1
# Failed to connect to wpa_supplicant - wpa_ctrl_open: No such file or directory
# wpa_supplicant: /sbin/wpa_cli daemon failed to start
# run-parts: /etc/network/if-up.d/wpasupplicant exited with return code 1

# UT restricted.utexas.edu network is said to require this.
# quote:
#   You are turning off fast_reauth with the line fast_reauth=0 because this
#   feature of wpa_supplicant does not work properly in this environment.
fast_reauth=0

# AVP
network={
	ssid="AVP"
	key_mgmt=WPA-PSK
	psk="REMOVED"

	priority=20
	# for scripting only, see
	# /usr/share/doc/wpasupplicant/examples/wpa_supplicant.conf.gz
	# "network block fields:" for more info
	id_str="AVP"
}

# UT
network={
	ssid="restricted.utexas.edu"
	key_mgmt=WPA-EAP
	eap=TTLS
	ca_cert="/home/sylecn/texts/cacerts.pem"
 	subject_match="CN=restricted.utexas.edu"
	anonymous_identity="anonymous"
	identity="REMOVED"
	password="REMOVED"
	phase2="auth=MSCHAPV2"

	priority=20
}

#nantong

# TP-LINK WR841N v3 (white, PPPoE)
network={
	ssid="1216"
	key_mgmt=WPA-PSK
	psk="REMOVED"
	proto=RSN WPA

	priority=20
	id_str="nantong-1216"
}

network={
	ssid="188"
	key_mgmt=NONE
	wep_key0="REMOVED"
	wep_tx_keyidx=0
	priority=20
	id_str="keqiao-188"
}

# Tenda wireless AP
# network={
# 	ssid="Tenda"
# 	key_mgmt=WPA-PSK
# 	psk="REMOVED"
# 	proto=RSN WPA

# 	priority=15
# 	id_str="nantong-Tenda"
# }

# TP-LINK WR840N v1 (WDS AP mode)
network={
	ssid="yxy-3rd-floor"
	key_mgmt=WPA-PSK
	psk="REMOVED"
	proto=RSN WPA

	# priority=21
	priority=19
	id_str="yxy-3rd-floor"
}

#open network
network={
	key_mgmt=NONE

	priority=1
}

Reply to: