Re: prism54: WPA/RSN support for fullmac cards

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



You may want to try at linux-wireless@xxxxxxxxxxxxxxx instead...

On Mon, Apr 16, 2007 at 10:41:21AM +0200, Stefan Puch wrote:
> Hi everyone,
> 
> I found on this mailinglist the thread from chunkeey who added WPA support for
> prism54 fullmac cards
> 
> http://www.spinics.net/lists/netdev/msg16224.html
> 
> The last days I tried to get this driver working, but I was not able to. After
> "googling" and reading the mails I found that Jim Faulkner have had similar
> problems, see posting on this mailing list here:
> 
> http://www.spinics.net/lists/linux-net/msg14821.html
> 
> So I tried to make hopefully "useful" debug traces, perhaps anyone can tell me
> why it doesn't work?
> 
> The Hardware:
> Access point: AVM Fritz!Box Fon WLAN 7170 (last stable Firmware)
> Laptop: Fujitsu Siemens Lifebook C
> WLAN-Adapter: Netgear WG511 (Fullmac)
> 
> 
> The Software:
> - Vanilla Kernel 2.6.20.6 (WE-21)
> - Wireless Tools version 29-pre17 (The main features is WE-21 support)
> - firmware Version 1.0.4.3 (from www.prism54.org)
> - wpa_supplicant Version 0.5.5
> - as reference ndiswrapper version 1.41
> 
> First of all I tried the good old WEP encryption with the prism54 driver: No
> problem, it works fine with the firmware 1.0.4.3!!!
> 
> Next step was to try get a  WPA connection to the access point. I can load the
> kernel module, the firmware is loaded correctly, too.
> Only the connection with wpa_supplicant doesn't establish (debug trace attached
> this email), here's my wpa_supplicant.conf:
> 
> ctrl_interface=/var/run/wpa_supplicant
> network={
>     ssid="puch.home"
>     scan_ssid=1
>     proto=WPA
>     key_mgmt=WPA-PSK
>     psk="ThisIsATestWPA-Key"
> }
> 
> As reference I tried to connect to the access point using ndiswrapper and
> wpa_supplicant (same wpa_supplicant.conf). There the connection is established.
> I attached the debug trace, too so everyone can see where the differences are)
> 
> Please let me know, if there are important infos missing and CC me in any
> responses, because I'm not subscribed to this mailing list.
> 
> Thanks in advance for any comment or help,
> 
> Stefan Puch
> 
> ---------------------------------------------------------------------------------
> debug traces:
> ---------------------------------------------------------------------------------
> 

> Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 4 - start of a new network block
> ssid - hexdump_ascii(len=9):
>      70 75 63 68 2e 68 6f 6d 65                        puch.home       
> scan_ssid=1 (0x1)
> PSK (ASCII passphrase) - hexdump_ascii(len=18):
>      54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b   ThisIsATestWPA-K
>      65 79                                             ey              
> key_mgmt: 0x2
> proto: 0x1
> PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> Priority group 0
>    id=0 ssid='puch.home'
> Initializing interface (2) 'eth1'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=21 WE(source)=19 enc_capa=0x7
>   capabilities: key_mgmt 0xf enc 0x7
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:09:5b:c9:5b:52
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface eth1
> RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74  (00)'
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=9):
>      70 75 63 68 2e 68 6f 6d 65                        puch.home       
> Trying to get current scan results first without requesting a new scan to speed up initial association
> Received 207 bytes of scan results (1 BSSes)
> Scan results: 1
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:C0:49:E1:3B:61  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74  (00)'
> Authentication with 00:00:00:00:00:00 timed out.
> Added BSSID 00:15:0c:d6:c7:74 into blacklist
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Scan timeout - try to get results
> Received 383 bytes of scan results (2 BSSes)
> Scan results: 2
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74  : ACCEPTED  (00)'
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface eth1
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_drop_unencrypted
> wpa_driver_wext_set_countermeasures
> No keys have been configured - skip key clearing
> WEXT: Operstate: linkmode=0, operstate=6
> Removed BSSID 00:15:0c:d6:c7:74 from blacklist (clear)
> Cancelling scan request
> 

> Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 4 - start of a new network block
> ssid - hexdump_ascii(len=9):
>      70 75 63 68 2e 68 6f 6d 65                        puch.home       
> scan_ssid=1 (0x1)
> PSK (ASCII passphrase) - hexdump_ascii(len=18):
>      54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b   ThisIsATestWPA-K
>      65 79                                             ey              
> key_mgmt: 0x2
> proto: 0x1
> PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> Priority group 0
>    id=0 ssid='puch.home'
> Initializing interface (2) 'wlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
>   capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:09:5b:c9:5b:52
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface wlan0
> RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=9):
>      70 75 63 68 2e 68 6f 6d 65                        puch.home       
> Trying to get current scan results first without requesting a new scan to speed up initial association
> Received 489 bytes of scan results (2 BSSes)
> Scan results: 2
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
>    selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c07 len=59
> AssocReq IE wireless event - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c08 len=24
> AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:15:0c:d6:c7:74
> Association info event
> req_ies - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:15:0c:d6:c7:74
> No keys have been configured - skip key clearing
> Associated with 00:15:0c:d6:c7:74
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
>   key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
>   key_length=32 key_data_length=0
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
>   key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> WPA: Renewed SNonce - hexdump(len=32): 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01
> WPA: PMK - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> WPA: PTK - hexdump(len=64): 7c d3 49 82 93 2d fc 6f 23 41 7c 1b 33 cf 5d be c1 2f a2 39 d5 76 c1 20 e9 b3 b1 18 3e 9e 45 74 c2 b7 cb b8 b6 ae ab 63 d3 fd 23 b6 cb 6c 2b 11 1d eb 7a 29 09 97 da fa a4 ea e3 b5 0c a2 af 22
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 8f 0a 5a 75 f2 89 57 b0 1a 05 ce 6a 8d 81 bc 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> IEEE 802.1X RX: version=1 type=3 length=121
>   EAPOL-Key type=254
>   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
>   key_length=32 key_data_length=26
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
>   key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
>   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf
> WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 3 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e bb 0b 30 e4 9f aa f4 ba 44 93 4c 01 68 d3 97 00 00
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> IEEE 802.1X RX: version=1 type=3 length=127
>   EAPOL-Key type=254
>   key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
>   key_length=32 key_data_length=32
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
>   key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
>   key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 fb ed dc 79 e9 fd 4f 65 e1 41 67 42 97 c8 58 00 00
> WPA: Key negotiation completed with 00:15:0c:d6:c7:74 [PTK=TKIP GTK=TKIP]
> Cancelling authentication timeout
> State: GROUP_HANDSHAKE -> COMPLETED
> CTRL-EVENT-CONNECTED - Connection to 00:15:0c:d6:c7:74 completed (auth) [id=0 id_str=]
> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> WEXT: Operstate: linkmode=-1, operstate=6
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state DISABLED
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> IEEE 802.1X RX: version=1 type=3 length=127
>   EAPOL-Key type=254
>   key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
>   key_length=32 key_data_length=32
>   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
>   key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
>   key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
>   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
>   key_mic - hexdump(len=16): 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> State: COMPLETED -> GROUP_HANDSHAKE
> WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 1a 45 42 95 40 d8 d7 ab b5 58 53 40 e0 5a e8 00 00
> WPA: Group rekeying completed with 00:15:0c:d6:c7:74 [GTK=TKIP]
> State: GROUP_HANDSHAKE -> COMPLETED
> EAPOL: startWhen --> 0
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface wlan0
> State: COMPLETED -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_deauthenticate
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_drop_unencrypted
> wpa_driver_wext_set_countermeasures
> No keys have been configured - skip key clearing
> WEXT: Operstate: linkmode=0, operstate=6
> Cancelling scan request
> 

> DRIVER NDISWRAPPER:
> 
> [root@caelum space]# iwconfig -v 
> iwconfig  Wireless-Tools version 29
>           Compatible with Wireless Extension v11 to v21.
> 
> Kernel    Currently compiled with Wireless Extension v21.
> 
> wlan0     Recommend Wireless Extension v18 or later,
>           Currently compiled with Wireless Extension v21.
> 
> [root@caelum space]#
> 
> ----------------------------------------------------------
> 
> DRIVER PRISM54:
> 
> [root@caelum space]# iwconfig -v
> iwconfig  Wireless-Tools version 29
>           Compatible with Wireless Extension v11 to v21.
> 
> Kernel    Currently compiled with Wireless Extension v21.
> 
> eth1      Recommend Wireless Extension v19 or later,
>           Currently compiled with Wireless Extension v21.
> 
> [root@caelum space]# 
> 
> 
> 


-- 
John W. Linville
linville@xxxxxxxxxxxxx
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Netdev]     [Ethernet Bridging]     [Linux 802.1Q VLAN]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Git]     [Bugtraq]     [Yosemite News and Information]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux PCI]     [Linux Admin]     [Samba]

  Powered by Linux