nm-supplicant-test with rtl8187



Hello.
I just installed Ubuntu 7.04 i386 on my computer and tried to use NetworkManager to get WLAN working. It seems to work with WEP encryption but fails on networks using WPA2 (couldn't test WPA...) saying: "The requested wireless network requires security capabilities unsupported by your hardware.". Using wpa_supplicant everything works fine. So I decided to try nm-supplicant-test as instructed on http://live.gnome.org/DarrenAlbers/NetworkManagerFAQ#head-9f05a33be82ed12cc767099bb885456fa35c95bf  which also connects to the network. After calling dhclient the connection to the internet is established. First, I want to give you the output of "NetworkManager --no-daemon" till I want to connect to the wireless network using WPA2 and the popup appears:
NetworkManager: <information>   starting...
NetworkManager: <information>   wlan0: Device is fully-supported using driver 'rtl8187'.
NetworkManager: <WARNING>        nm_device_802_11_wireless_set_mode (): error setting card wlan0 to Infrastructure mode: Device or resource busy
NetworkManager: <information>   nm_device_init(): waiting for device's worker thread to start
NetworkManager: <WARNING>        nm_device_802_11_wireless_set_mode (): error setting card wlan0 to Infrastructure mode: Device or resource busy
NetworkManager: <information>   nm_device_init(): device's worker thread started, continuing.
NetworkManager: <information>   Now managing wireless (802.11) device 'wlan0'.
NetworkManager: <information>   Deactivating device wlan0.
NetworkManager: <WARNING>        nm_device_802_11_wireless_set_mode (): error setting card wlan0 to Infrastructure mode: Device or resource busy
NetworkManager: <information>   Updating allowed wireless network lists.
NetworkManager: <WARNING>        nm_dbus_get_networks_cb (): error received: org.freedesktop.NetworkManagerInfo.NoNetworks - There are no wireless networks stored..
NetworkManager: <debug info>    [1180881688.400603] nm_device_802_11_wireless_get_activation_ap (): Forcing AP 'linksys_std'
NetworkManager: <information>   User Switch: /org/freedesktop/NetworkManager/Devices/wlan0 / linksys_std
NetworkManager: <information>   Deactivating device wlan0.
NetworkManager: <WARNING>        nm_device_802_11_wireless_set_mode (): error setting card wlan0 to Infrastructure mode: Device or resource busy
NetworkManager: <information>   Device wlan0 activation scheduled...
NetworkManager: <information>   Activation (wlan0) started...
NetworkManager: <information>   Activation (wlan0) Stage 1 of 5 (Device Prepare) scheduled...
NetworkManager: <information>   Activation (wlan0) Stage 1 of 5 (Device Prepare) started...
NetworkManager: <information>   Activation (wlan0) Stage 2 of 5 (Device Configure) scheduled...
NetworkManager: <information>   Activation (wlan0) Stage 1 of 5 (Device Prepare) complete.
NetworkManager: <information>   Activation (wlan0) Stage 2 of 5 (Device Configure) starting...
NetworkManager: <information>   Activation (wlan0/wireless): access point 'linksys_std' is encrypted, but NO valid key exists.  New key needed.
NetworkManager: <information>   Activation (wlan0) New wireless user key requested for network 'linksys_std'.
NetworkManager: <information>   Activation (wlan0) Stage 2 of 5 (Device Configure) complete.







Output of nm-supplicant-test is attached to this email.

Hope emailing this to you was a good idea,

Bernhard Kirchen


Yahoo! Clever: Stellen Sie Fragen und finden Sie Antworten. Teilen Sie Ihr Wissen.
Key: ssid, Value: "linksys_std"
Key: scan_ssid, Value: 1
Key: psk, Value: 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f
Key: proto, Value: WPA2
Key: key_mgmt, Value: WPA-PSK
Key: pairwise, Value: CCMP TKIP
Key: group, Value: CCMP TKIP
SUP: sending command 'INTERFACE_ADD wlan0		wext	/var/run/wpa_supplicant	'
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 1'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "linksys_std"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA2'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 group CCMP TKIP'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(8049): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(8049): RX global ctrl_iface - hexdump_ascii(len=50):
wpa_supplicant(8049):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 77 6c   INTERFACE_ADD wl
wpa_supplicant(8049):      61 6e 30 09 09 77 65 78 74 09 2f 76 61 72 2f 72   an0__wext_/var/r
wpa_supplicant(8049):      75 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e   un/wpa_supplican
wpa_supplicant(8049):      74 09                                             t_              
wpa_supplicant(8049): CTRL_IFACE GLOBAL INTERFACE_ADD 'wlan0		wext	/var/run/wpa_supplicant	'
wpa_supplicant(8049): Initializing interface 'wlan0' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
wpa_supplicant(8049): Initializing interface (2) 'wlan0'
wpa_supplicant(8049): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(8049): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(8049): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(8049): EAP: EAP entering state DISABLED
wpa_supplicant(8049): EAPOL: External notification - portEnabled=0
wpa_supplicant(8049): EAPOL: External notification - portValid=0
wpa_supplicant(8049): Could not configure driver to use managed mode
wpa_supplicant(8049): SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
wpa_supplicant(8049):   capabilities: key_mgmt 0x0 enc 0x3
wpa_supplicant(8049): e=1, operstate=5
wpa_supplicant(8049): Own MAC address: 00:15:af:09:01:4a
wpa_supplicant(8049): wpa_driver_wext_set_wpa
wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(8049): wpa_driver_wext_set_countermeasures
wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(8049): Setting scan request: 0 sec 100000 usec
wpa_supplicant(8049): Added interface wlan0
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(8049):      41 50 5f 53 43 41 4e 20 31                        AP_SCAN 1       
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=11):
wpa_supplicant(8049):      41 44 44 5f 4e 45 54 57 4f 52 4b                  ADD_NETWORK     
wpa_supplicant(8049): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='ssid'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=13): [REMOVED]
wpa_supplicant(8049): ssid - hexdump_ascii(len=11):
wpa_supplicant(8049):      6c 69 6e 6b 73 79 73 5f 73 74 64                  linksys_std     
wpa_supplicant(8049): MOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
wpa_supplicant(8049): scan_ssid=1 (0x1)
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='psk'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
wpa_supplicant(8049): PSK - hexdump(len=32): [REMOVED]
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=24): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='proto'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=4): [REMOVED]
wpa_supplicant(8049): proto: 0x2
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
wpa_supplicant(8049): key_mgmt: 0x2
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(8049): pairwise: 0x18
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=29): [REMOVED]
wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='group'
wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
wpa_supplicant(8049): group: 0x18
wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=16):
wpa_supplicant(8049): NABLE_NETWORK 0
wpa_supplicant(8049): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(8049): Setting scan request: 0 sec 0 usec
wpa_supplicant(8049): State: DISCONNECTED -> SCANNING
wpa_supplicant(8049): Starting AP scan (specific SSID)
wpa_supplicant(8049): Scan SSID - hexdump_ascii(len=11):
wpa_supplicant(8049):      6c 69 6e 6b 73 79 73 5f 73 74 64                  linksys_std     
wpa_supplicant(8049): Trying to get current scan results first without requesting a new scan to speed up initial association
wpa_supplicant(8049): Received 0 bytes of scan results (0 BSSes)
wpa_supplicant(8049): Scan results: 0
wpa_supplicant(8049): Selecting BSS from priority group 0
wpa_supplicant(8049): No suitable AP found.
wpa_supplicant(8049): Setting scan request: 0 sec 0 usec
wpa_supplicant(8049): Starting AP scan (broadcast SSID)
wpa_supplicant(8049): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(8049): Wireless event: cmd=0x8b19 len=8
wpa_supplicant(8049): Received 260 bytes of scan results (2 BSSes)
wpa_supplicant(8049): Scan results: 2
wpa_supplicant(8049): Selecting BSS from priority group 0
wpa_supplicant(8049): 0: 00:12:17:16:09:66 ssid='linksys_std' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
wpa_supplicant(8049):    selected based on RSN IE
wpa_supplicant(8049): Trying to associate with 00:12:17:16:09:66 (SSID='linksys_std' freq=2437 MHz)
wpa_supplicant(8049): CE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
wpa_supplicant(8049): Cancelling scan request
wpa_supplicant(8049): WPA: clearing own WPA/RSN IE
wpa_supplicant(8049): Automatic auth_alg selection: 0x1
wpa_supplicant(8049): RSN: using IEEE 802.11i/D9.0
wpa_supplicant(8049): WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
wpa_supplicant(8049): WPA: clearing AP WPA IE
wpa_supplicant(8049): WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): WPA: using GTK CCMP
wpa_supplicant(8049): WPA: using PTK CCMP
wpa_supplicant(8049): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(8049): WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): No keys have been configured - skip key clearing
wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(8049): State: SCANNING -> ASSOCIATING
wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5
wpa_supplicant(8049): wpa_driver_wext_associate
wpa_supplicant(8049): Association request to the driver failed
wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
wpa_supplicant(8049): Setting authentication timeout: 5 sec 0 usec
wpa_supplicant(8049): cation - EAP success=0
wpa_supplicant(8049): EAPOL: External notification - EAP fail=0
wpa_supplicant(8049): EAPOL: External notification - portControl=Auto
wpa_supplicant(8049): RSN: Ignored PMKID candidate without preauth flag
wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(8049): Wireless event: cmd=0x8b04 len=12
wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(8049): Wireless event: cmd=0x8b1a len=19
wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(8049): Wireless event: cmd=0x8c02 len=185
wpa_supplicant(8049): WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b6c696e6b7379735f737464010802040b160c12182432043048606c30140100000fac040100000fac040100000fac020000 RespIEs=010882848b9624b0486c32048c129860dd06001018020000)'
wpa_supplicant(8049): Association info event
wpa_supplicant(8049): req_ies - hexdump(len=51): 00 0b 6c 69 6e 6b 73 79 73 5f 73 74 64 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 b0 48 6c 32 04 8c 12 98 60 dd 06 00 10 18 02 00 00
wpa_supplicant(8049): 4 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
wpa_supplicant(8049): Wireless event: cmd=0x8b15 len=20
wpa_supplicant(8049): Wireless event: new AP: 00:12:17:16:09:66
wpa_supplicant(8049): State: ASSOCIATING -> ASSOCIATED
wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5
wpa_supplicant(8049): Associated to a new BSS: BSSID=00:12:17:16:09:66
wpa_supplicant(8049): No keys have been configured - skip key clearing
wpa_supplicant(8049): Associated with 00:12:17:16:09:66
wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
wpa_supplicant(8049): WPA: Association event - clear replay counter
wpa_supplicant(8049): EAPOL: External notification - portEnabled=0
wpa_supplicant(8049): EAPOL: External notification - portValid=0
wpa_supplicant(8049): EAPOL: External notification - EAP success=0
wpa_supplicant(8049): EAPOL: External notification - portEnabled=1
wpa_supplicant(8049): EAPOL: SUPP_PAE entering state CONNECTING
wpa_supplicant(8049): EAPOL: SUPP_BE entering state IDLE
wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec
wpa_supplicant(8049): Cancelling scan request
wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66
wpa_supplicant(8049): 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec
wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=117
wpa_supplicant(8049):   EAPOL-Key type=2
wpa_supplicant(8049):   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wpa_supplicant(8049):   key_length=16 key_data_length=22
wpa_supplicant(8049):   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59
wpa_supplicant(8049):   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
wpa_supplicant(8049):  00 00 00 00 00 00 00 00 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
wpa_supplicant(8049): State: ASSOCIATED -> 4WAY_HANDSHAKE
wpa_supplicant(8049): WPA: RX message 1 of 4-Way Handshake from 00:12:17:16:09:66 (ver=2)
wpa_supplicant(8049): RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
wpa_supplicant(8049): RSN: PMKID from Authenticator - hexdump(len=16): e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
wpa_supplicant(8049): RSN: no matching PMKID found
wpa_supplicant(8049): WPA: Renewed SNonce - hexdump(len=32): 27 03 21 61 b0 8e c0 59 8b 7b f3 b7 3d c9 25 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a c6
wpa_supplicant(8049): WPA: PMK - hexdump(len=32): [REMOVED]
wpa_supplicant(8049): WPA: PTK - hexdump(len=64): [REMOVED]
wpa_supplicant(8049): WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): WPA: Sending EAPOL-Key 2/4
wpa_supplicant(8049): A: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 27 03 21 61 b0 8e c0 59 8b 7b f3 b7 3d c9 25 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef 70 e7 5b 60 22 d6 2e aa 0e 61 47 10 a2 33 bd 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66
wpa_supplicant(8049): RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 5a e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 03 0f 61 ad 2b a6 39 4c 48 2f 27 76 cd bb 9e 00 38 29 75 70 aa 14 d8 a8 35 48 9c 0d 25 9d 12 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b de 08 b0 ef 5e 79 c1 c9 da cf d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4
wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=151
wpa_supplicant(8049):   EAPOL-Key type=2
wpa_supplicant(8049): svd=0 Pairwise Install Ack MIC Secure Encr)
wpa_supplicant(8049):   key_length=16 key_data_length=56
wpa_supplicant(8049):   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wpa_supplicant(8049):   key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59
wpa_supplicant(8049):   key_iv - hexdump(len=16): e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 5a
wpa_supplicant(8049):   key_rsc - hexdump(len=8): e4 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
wpa_supplicant(8049):   key_mic - hexdump(len=16): b1 03 0f 61 ad 2b a6 39 4c 48 2f 27 76 cd bb 9e
wpa_supplicant(8049): 70 fd 82 f4
wpa_supplicant(8049): RSN: encrypted key data - hexdump(len=56): 29 75 70 aa 14 d8 a8 35 48 9c 0d 25 9d 12 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b de 08 b0 ef 5e 79 c1 c9 da cf d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4
wpa_supplicant(8049): WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
wpa_supplicant(8049): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
wpa_supplicant(8049): WPA: RX message 3 of 4-Way Handshake from 00:12:17:16:09:66 (ver=2)
wpa_supplicant(8049): WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8a 60 f7 f1 3e 4e 42 dc 54 76 04 3b 6e 96 62 00 dd 00
wpa_supplicant(8049): WPA: Sending EAPOL-Key 4/4
wpa_supplicant(8049): WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]