Re: NM does not work with iwl4965 device



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ryan Novosielski wrote:
> Dan Williams wrote:
>> On Wed, 2007-08-08 at 22:58 -0200, Thomas M Steenholdt wrote:
>>> Dan Williams wrote:
>>>> Can you post the output of wpa_supplicant with the "-ddd" option please?
>>>> I'd love to see _why_ it works for you with a hidden network, because it
>>>> likely shouldn't.
> 
> This is not output of a success (which I can give you if you need), but
> output from a failure with -ddd. Hopefully this will provide some more
> data -- I think this is a problem with the Intel devices, not just with
> the newest one (though I hear 2200 is very good):

Below this I will attach a successful connection... read on.

> root novosirj-laptop:/etc/wpa_supplicant# wpa_supplicant -c
> /etc/wpa_supplicant/wpa_supplicant.conf -Dwext -ieth1 -ddd
> Initializing interface 'eth1' conf
> '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface
> 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
> '/etc/wpa_supplicant/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
> eapol_version=1
> ap_scan=2
> fast_reauth=1
> Line: 5 - start of a new network block
> ssid - hexdump_ascii(len=10):
>      55 4d 44 2d 57 49 46 49 2d 52                     UMD-WIFI-R
> scan_ssid=1 (0x1)
> proto: 0x1
> pairwise: 0x8
> group: 0x4
> eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00
> 00 00
> auth_alg: 0x4
> mode=0 (0x0)
> key_mgmt: 0x8
> identity - hexdump_ascii(len=8):
>      6e 6f 76 6f 73 69 72 6a                           novosirj
> password - hexdump_ascii(len=8): [REMOVED]
> Priority group 0
>    id=0 ssid='UMD-WIFI-R'
> Initializing interface (2) 'eth1'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=20 WE(source)=16 enc_capa=0xf
>   capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:19:d2:4f:b5:e4
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface eth1
> RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'UMD-WIFI-R'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x4
> Overriding auth_alg selection: 0x4
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: clearing own WPA/RSN IE
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=19
> Authentication with 00:00:00:00:00:00 timed out.
> Added BSSID 00:00:00:00:00:00 into blacklist
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'UMD-WIFI-R'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x4
> Overriding auth_alg selection: 0x4
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: clearing own WPA/RSN IE
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 60 sec 0 usec
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=19

And now for a success, without changing any of the parameters. All I did
was disable wireless in knetworkmanager, reboot, and ran the same
command as before (the booting with the wireless disabled is the key --
just disabling it does not work, and rebooting it with it on does not work):

root novosirj-laptop:~# wpa_supplicant -c
/etc/wpa_supplicant/wpa_supplicant.conf -ddd -Dwext -ieth1
Initializing interface 'eth1' conf
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface
'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
eapol_version=1
ap_scan=2
fast_reauth=1
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=10):
     55 4d 44 2d 57 49 46 49 2d 52                     UMD-WIFI-R
scan_ssid=1 (0x1)
proto: 0x1
pairwise: 0x8
group: 0x4
eap methods - hexdump(len=16): 00 00 00 00 11 00 00 00 00 00 00 00 00 00
00 00
auth_alg: 0x4
mode=0 (0x0)
key_mgmt: 0x8
identity - hexdump_ascii(len=8):
     6e 6f 76 6f 73 69 72 6a                           novosirj
password - hexdump_ascii(len=8): [REMOVED]
Priority group 0
   id=0 ssid='UMD-WIFI-R'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=16 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:19:d2:4f:b5:e4
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'UMD-WIFI-R'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x4
Overriding auth_alg selection: 0x4
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=60): 01 00 00 38 01 01 00 38 01 00 6e 65 74 77 6f
72 6b 69 64 3d 55 4d 44 2d 57 49 46 49 2d 52 2c 6e 61 73 69 64 3d 53 53
2d 57 46 44 2d 46 4c 33 2d 41 50 31 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:07:50:ca:ab:0a
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:07:50:ca:ab:0a
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: clearing own WPA/RSN IE
EAPOL: External notification - portControl=Auto
Associated with 00:07:50:ca:ab:0a
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
EAPOL: startWhen --> 0
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
TX EAPOL - hexdump(len=4): 01 01 00 00
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=60): 01 00 00 38 01 02 00 38 01 00 6e 65 74 77 6f
72 6b 69 64 3d 55 4d 44 2d 57 49 46 49 2d 52 2c 6e 61 73 69 64 3d 53 53
2d 57 46 44 2d 46 4c 33 2d 41 50 31 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=2 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=51):
     00 6e 65 74 77 6f 72 6b 69 64 3d 55 4d 44 2d 57   _networkid=UMD-W
     49 46 49 2d 52 2c 6e 61 73 69 64 3d 53 53 2d 57   IFI-R,nasid=SS-W
     46 44 2d 46 4c 33 2d 41 50 31 2c 70 6f 72 74 69   FD-FL3-AP1,porti
     64 3d 30                                          d=0
EAP: using real identity - hexdump_ascii(len=8):
     6e 6f 76 6f 73 69 72 6a                           novosirj
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=17): 01 00 00 0d 02 02 00 0d 01 6e 6f 76 6f 73 69
72 6a
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=46): 01 00 00 18 01 5b 00 18 11 01 00 08 58 36 9f
29 2a b4 72 1a 6e 6f 76 6f 73 69 72 6a 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=91 method=17 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 17 (LEAP)
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): 58 36 9f 29 2a b4 72 1a
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): 98 de 1a f2 cc bd 01 62 9e cc 27
b8 2d d9 72 c2 8c 5f 25 66 3e 90 70 36
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=44): 01 00 00 28 02 5b 00 28 11 01 00 18 98 de 1a
f2 cc bd 01 62 9e cc 27 b8 2d d9 72 c2 8c 5f 25 66 3e 90 70 36 6e 6f 76
6f 73 69 72 6a
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=46): 01 00 00 04 03 5b 00 04 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): f3 6f c0 8b 99 42 2e e8
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=28): 01 00 00 18 01 5b 00 18 11 01 00 08 f3 6f c0
8b 99 42 2e e8 6e 6f 76 6f 73 69 72 6a
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=46): 01 00 00 28 02 5b 00 28 11 01 00 18 b1 06 b4
ba d2 1a e8 fd c7 06 a9 f9 b2 72 cb 88 30 e6 6a e8 39 a4 b8 23 6e 6f 76
6f 73 69 72 6a 00 00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Response for LEAP method=17 id=91
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Response
EAP-LEAP: Response from AP - hexdump(len=24): b1 06 b4 ba d2 1a e8 fd c7
06 a9 f9 b2 72 cb 88 30 e6 6a e8 39 a4 b8 23
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED]
EAP-LEAP: peer_challenge - hexdump(len=8): 58 36 9f 29 2a b4 72 1a
EAP-LEAP: peer_response - hexdump(len=24): 98 de 1a f2 cc bd 01 62 9e cc
27 b8 2d d9 72 c2 8c 5f 25 66 3e 90 70 36
EAP-LEAP: ap_challenge - hexdump(len=8): f3 6f c0 8b 99 42 2e e8
EAP-LEAP: ap_response - hexdump(len=24): b1 06 b4 ba d2 1a e8 fd c7 06
a9 f9 b2 72 cb 88 30 e6 6a e8 39 a4 b8 23
EAP-LEAP: master key - hexdump(len=16): [REMOVED]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=61): 01 03 00 39 01 00 0d 00 00 46 c3 3c 00 00 6b
22 c9 bf 80 da 41 17 79 be 8c 76 a6 a7 16 83 bc 01 64 20 35 77 d2 16 ea
31 3e 4a 5b bf 29 46 32 71 9b 02 4d c6 9a 41 bb 03 43 f3 f5 48 59
EAPOL: Received EAPOL-Key frame
EAPOL: KEY_RX entering state KEY_RECEIVE
EAPOL: processKey
EAPOL: RX IEEE 802.1X ver=1 type=3 len=57 EAPOL-Key: type=1
key_length=13 key_index=0x1
EAPOL: EAPOL-Key key signature verified
EAPOL: Decrypted(RC4) key - hexdump(len=13): [REMOVED]
EAPOL: Setting dynamic WEP key: broadcast keyidx 1 len 13
wpa_driver_wext_set_key: alg=1 key_idx=1 set_tx=0 seq_len=0 key_len=13
RX EAPOL from 00:07:50:ca:ab:0a
RX EAPOL - hexdump(len=48): 01 03 00 2c 01 00 0d 00 00 46 c3 3c 00 00 6c
eb 44 1a 7e ed f7 5b ca 08 7a 41 eb 4b 85 b9 ab 83 5e a9 2a 7d 1a 4c 72
a2 b1 ea 17 82 a8 e8 dd f4
EAPOL: Received EAPOL-Key frame
EAPOL: KEY_RX entering state KEY_RECEIVE
EAPOL: processKey
EAPOL: RX IEEE 802.1X ver=1 type=3 len=44 EAPOL-Key: type=1
key_length=13 key_index=0x83
EAPOL: EAPOL-Key key signature verified
EAPOL: using part of EAP keying material data encryption key -
hexdump(len=13): [REMOVED]
EAPOL: Setting dynamic WEP key: unicast keyidx 3 len 13
wpa_driver_wext_set_key: alg=1 key_idx=3 set_tx=128 seq_len=0 key_len=13
EAPOL: all required EAPOL-Key frames received
WPA: EAPOL processing complete
Cancelling authentication timeout
State: ASSOCIATED -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:07:50:ca:ab:0a completed (auth)
[id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: SUPP_PAE entering state AUTHENTICATED
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added

> ...I killed it at this point. My supplicant.conf, in case that's
> interesting to anyone:
> 
> eapol_version=1
> ap_scan=2
> fast_reauth=1
> 
> network={
>        ssid="UMD-WIFI-R"
>        scan_ssid=1
>        proto=WPA
>        pairwise=TKIP
>        group=WEP104
>        eap=LEAP
>        auth_alg=LEAP
>        mode=0
>        key_mgmt=IEEE8021X
>        identity="novosirj"
>        password="XXXXXXXX"
> }
> 
>>> The ESSID is set correctly, and scanning starts. I can't tell for sure 
>>> if wpa_supplicant finds the right AP during this, logging differs, but 
>>> running an iwlist wlan0 scanning in another shell shows my hidden 
>>> network, so it should. Still, scanning just goes on and on and on - 
>>> never associates.
> 
> This is identical to the behavior I see with my card -- there is success
> in an iwlist, but there is no eventual association. This can be fixed by
> a reboot with the device disabled for some reason.
> 
>> Can you post the output of "iwlist wlan0 scan" that shows your AP?  The
>> other issue with AP_SCAN=2 is that you must set the _exact_ options your
>> AP supports, because wpa_supplicant isn't actually doing a scan, it's
>> just sending the options to the card and hoping they are correct.  So we
>> need to ensure that your network block in the wpa_supplicant config file
>> matches up with the options your network advertises in beacons.
> 
> This is what mine says when I have a problem. I'm somewhat late to the
> party, but I am going to post my information:
> 
> root novosirj-laptop:/etc/wpa_supplicant# iwlist eth1 scan
> eth1      Scan completed :
>           Cell 01 - Address: 00:07:50:CA:AB:0A
>                     ESSID:"<hidden>"
>                     Protocol:IEEE 802.11b
>                     Mode:Master
>                     Channel:11
>                     Encryption key:off
>                     Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
>                     Quality=76/100  Signal level=-58 dBm  Noise
> level=-58 dBm
>                     IE: WPA Version 1
>                         Group Cipher : WEP-104
>                         Pairwise Ciphers (1) : TKIP
>                         Authentication Suites (1) : 802.1X
>                     Extra: Last beacon: 508ms ago
>           Cell 02 - Address: 00:13:7F:C8:07:C0
>                     ESSID:"<hidden>"
>                     Protocol:IEEE 802.11bg
>                     Mode:Master
>                     Channel:1
>                     Encryption key:off
>                     Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 6 Mb/s; 9 Mb/s
>                               11 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s; 36 Mb/s
>                               48 Mb/s; 54 Mb/s
>                     Quality=45/100  Signal level=-82 dBm  Noise
> level=-82 dBm
>                     IE: WPA Version 1
>                         Group Cipher : WEP-104
>                         Pairwise Ciphers (1) : TKIP
>                         Authentication Suites (1) : 802.1X
>                     Extra: Last beacon: 472ms ago
>           Cell 03 - Address: 6E:9B:F3:DB:97:81
>                     ESSID:"HP Printer 1610"
>                     Protocol:IEEE 802.11b
>                     Mode:Ad-Hoc
>                     Channel:6
>                     Encryption key:off
>                     Bit Rates:1 Mb/s; 2 Mb/s; 5.5 Mb/s; 11 Mb/s
>                     Quality=42/100  Signal level=-84 dBm  Noise
> level=-84 dBm
>                     Extra: Last beacon: 13404ms ago
>           Cell 04 - Address: 00:12:DA:AD:0E:40
>                     ESSID:"<hidden>"
>                     Protocol:IEEE 802.11a
>                     Mode:Master
>                     Channel:36
>                     Encryption key:off
>                     Bit Rates:6 Mb/s; 9 Mb/s; 12 Mb/s; 18 Mb/s; 24 Mb/s
>                               36 Mb/s; 48 Mb/s; 54 Mb/s
>                     Quality=40/100  Signal level=-85 dBm  Noise
> level=-87 dBm
>                     IE: WPA Version 1
>                         Group Cipher : WEP-104
>                         Pairwise Ciphers (1) : TKIP
>                         Authentication Suites (1) : 802.1X
>                     Extra: Last beacon: 1960ms ago
> 
> 
>> Also, the scan_ssid=1 option might be an issue; are we sure that
>> mac80211 correctly handles specific SSID scans?  If it doesn't, then
>> maybe the driver doesn't find the BSSID it needs to associate with,
>> given that wpa_supplicant isn't actually doing any scans here.
> 
> I also use scan_ssid=1, but I'm not using the mac80211 stack (still
> using Intel's driver).
> 
>> Dan
> 
>>> So rather that showing it working with AP_SCAN=1 (since that has already 
>>> been explained - i set the ESSID manually) This is a clean (no help) 
>>> AP_SCAN=2 failing. Perhaps you'll be able to see something from this. 
>>> There are a few ioctl errors in there that I can't judge the severity of.
>>>
>>> This is the wpa_supplicant.conf used:
>>> -----
>>> ap_scan=1
>>>
>>> network={
>>>          ssid="tmus_wrt"
>>>          bssid=00:18:39:BF:EF:2B
>>>          scan_ssid=1
>>>          key_mgmt=WPA-PSK
>>>          proto=WPA2
>>>          group=CCMP
>>>          pairwise=CCMP
>>>          psk="rEmoVedfOrprIvacY"
>>> }
>>> -----
>>>
>>> wpa_supplicant output:
>>> -----
>>> Initializing interface 'wlan0' conf 
>>> '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 
>>> 'N/A' bridge 'N/A'
>>> Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> 
>>> '/etc/wpa_supplicant/wpa_supplicant.conf'
>>> Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
>>> ctrl_interface='/var/run/wpa_supplicant'
>>> ctrl_interface_group='wheel' (DEPRECATED)
>>> ap_scan=2
>>> Line: 11 - start of a new network block
>>> ssid - hexdump_ascii(len=8):
>>>       74 6d 75 73 5f 77 72 74                           tmus_wrt
>>> BSSID - hexdump(len=6): 00 18 39 bf ef 2b
>>> scan_ssid=1 (0x1)
>>> key_mgmt: 0x2
>>> proto: 0x2
>>> group: 0x10
>>> pairwise: 0x10
>>> PSK (ASCII passphrase) - hexdump_ascii(len=16): [REMOVED]
>>> PSK (from passphrase) - hexdump(len=32): [REMOVED]
>>> Priority group 0
>>>     id=0 ssid='tmus_wrt'
>>> Initializing interface (2) 'wlan0'
>>> EAPOL: SUPP_PAE entering state DISCONNECTED
>>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
>>> EAPOL: SUPP_BE entering state INITIALIZE
>>> EAP: EAP entering state DISABLED
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf
>>>    capabilities: key_mgmt 0xf enc 0xf
>>> WEXT: Operstate: linkmode=1, operstate=5
>>> Own MAC address: 00:13:e8:47:98:19
>>> wpa_driver_wext_set_wpa
>>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
>>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
>>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
>>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
>>> wpa_driver_wext_set_countermeasures
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - Setting scan request: 0 sec 100000 usec
>>> ctrl_interface_group=10 (from group name 'wheel')
>>> Added interface wlan0
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 730 bytes of scan results (3 BSSes)
>>> Scan results: 3
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> Added BSSID 00:00:00:00:00:00 into blacklist
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 1181 bytes of scan results (5 BSSes)
>>> Scan results: 5
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 2
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 972 bytes of scan results (4 BSSes)
>>> Scan results: 4
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 3
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 972 bytes of scan results (4 BSSes)
>>> Scan results: 4
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 4
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 698 bytes of scan results (3 BSSes)
>>> Scan results: 3
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 5
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 698 bytes of scan results (3 BSSes)
>>> Scan results: 3
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 6
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 698 bytes of scan results (3 BSSes)
>>> Scan results: 3
>>> Authentication with 00:00:00:00:00:00 timed out.
>>> BSSID 00:00:00:00:00:00 blacklist count incremented to 7
>>> State: ASSOCIATING -> DISCONNECTED
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> No keys have been configured - skip key clearing
>>> EAPOL: External notification - portEnabled=0
>>> EAPOL: External notification - portValid=0
>>> Setting scan request: 0 sec 0 usec
>>> State: DISCONNECTED -> SCANNING
>>> Trying to associate with SSID 'tmus_wrt'
>>> Cancelling scan request
>>> WPA: clearing own WPA/RSN IE
>>> Automatic auth_alg selection: 0x1
>>> WPA: No WPA/RSN IE available from association info
>>> WPA: Set cipher suites based on configuration
>>> WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
>>> WPA: clearing AP WPA IE
>>> WPA: clearing AP RSN IE
>>> WPA: using GTK CCMP
>>> WPA: using PTK CCMP
>>> WPA: using KEY_MGMT WPA-PSK
>>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
>>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
>>> No keys have been configured - skip key clearing
>>> wpa_driver_wext_set_drop_unencrypted
>>> ioctl[SIOCSIWAUTH]: Operation not supported
>>> WEXT auth param 5 value 0x1 - State: SCANNING -> ASSOCIATING
>>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
>>> WEXT: Operstate: linkmode=-1, operstate=5
>>> wpa_driver_wext_associate
>>> Setting authentication timeout: 60 sec 0 usec
>>> EAPOL: External notification - EAP success=0
>>> EAPOL: External notification - EAP fail=0
>>> EAPOL: External notification - portControl=Auto
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b06 len=8
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b1a len=16
>>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
>>> Wireless event: cmd=0x8b19 len=8
>>> Received 698 bytes of scan results (3 BSSes)
>>> Scan results: 3
>>> ...
>>> -----
>>>
>>> /Thomas
>>>
>>> _______________________________________________
>>> NetworkManager-list mailing list
>>> NetworkManager-list gnome org
>>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
>> _______________________________________________
>> NetworkManager-list mailing list
>> NetworkManager-list gnome org
>> http://mail.gnome.org/mailman/listinfo/networkmanager-list
> 

_______________________________________________
NetworkManager-list mailing list
NetworkManager-list gnome org
http://mail.gnome.org/mailman/listinfo/networkmanager-list


- --
 ---- _  _ _  _ ___  _  _  _
 |Y#| |  | |\/| |  \ |\ |  | |Ryan Novosielski - Systems Programmer II
 |$&| |__| |  | |__/ | \| _| |novosirj umdnj edu - 973/972.0922 (2-0922)
 \__/ Univ. of Med. and Dent.|IST/AST - NJMS Medical Science Bldg - C630
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFGwz0qmb+gadEcsb4RAkuNAJ47wy5jGsKbBGFu40Y2fN8h0lIk+wCgvkWM
+9XwBQMbUwO5NeUO/HViGtU=
=wPYM
-----END PGP SIGNATURE-----
begin:vcard
fn:Ryan Novosielski
n:Novosielski;Ryan
org:UMDNJ;IST/AST
adr;dom:MSB C630;;185 South Orange Avenue;Newark;NJ;07103
email;internet:novosirj umdnj edu
title:Systems Programmer III
tel;work:(973) 972-0922
tel;fax:(973) 972-7412
tel;pager:(866) 20-UMDNJ
x-mozilla-html:FALSE
version:2.1
end:vcard



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]