Re: nm-supplicant-test with rtl8187
- From: Dan Williams <dcbw redhat com>
- To: Bernhard Kirchen <schlimmchen yahoo de>
- Cc: networkmanager-list gnome org
- Subject: Re: nm-supplicant-test with rtl8187
- Date: Tue, 05 Jun 2007 13:02:04 -0400
On Sun, 2007-06-03 at 16:49 +0200, Bernhard Kirchen wrote:
> Hello.
> I just installed Ubuntu 7.04 i386 on my computer and tried to use
> NetworkManager to get WLAN working. It seems to work with WEP
> encryption but fails on networks using WPA2 (couldn't test WPA...)
> saying: "The requested wireless network requires security capabilities
> unsupported by your hardware.". Using wpa_supplicant everything works
Is this the mac80211-based rtl8187 driver?
This warning usually means the drivers enc_capa structure does not
advertise WPA capability. The driver must be fixed if that's the case.
Dan
> fine. So I decided to try nm-supplicant-test as instructed on
> http://live.gnome.org/DarrenAlbers/NetworkManagerFAQ#head-9f05a33be82ed12cc767099bb885456fa35c95bf which also connects to the network. After calling dhclient the connection to the internet is established. First, I want to give you the output of "NetworkManager --no-daemon" till I want to connect to the wireless network using WPA2 and the popup appears:
> NetworkManager: <information> starting...
> NetworkManager: <information> wlan0: Device is fully-supported using
> driver 'rtl8187'.
> NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode
> (): error setting card wlan0 to Infrastructure mode: Device or
> resource busy
> NetworkManager: <information> nm_device_init(): waiting for device's
> worker thread to start
> NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode
> (): error setting card wlan0 to Infrastructure mode: Device or
> resource busy
> NetworkManager: <information> nm_device_init(): device's worker
> thread started, continuing.
> NetworkManager: <information> Now managing wireless (802.11) device
> 'wlan0'.
> NetworkManager: <information> Deactivating device wlan0.
> NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode
> (): error setting card wlan0 to Infrastructure mode: Device or
> resource busy
> NetworkManager: <information> Updating allowed wireless network
> lists.
> NetworkManager: <WARNING> nm_dbus_get_networks_cb (): error
> received: org.freedesktop.NetworkManagerInfo.NoNetworks - There are no
> wireless networks stored..
> NetworkManager: <debug info> [1180881688.400603]
> nm_device_802_11_wireless_get_activation_ap (): Forcing AP
> 'linksys_std'
> NetworkManager: <information> User
> Switch: /org/freedesktop/NetworkManager/Devices/wlan0 / linksys_std
> NetworkManager: <information> Deactivating device wlan0.
> NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode
> (): error setting card wlan0 to Infrastructure mode: Device or
> resource busy
> NetworkManager: <information> Device wlan0 activation scheduled...
> NetworkManager: <information> Activation (wlan0) started...
> NetworkManager: <information> Activation (wlan0) Stage 1 of 5
> (Device Prepare) scheduled...
> NetworkManager: <information> Activation (wlan0) Stage 1 of 5
> (Device Prepare) started...
> NetworkManager: <information> Activation (wlan0) Stage 2 of 5
> (Device Configure) scheduled...
> NetworkManager: <information> Activation (wlan0) Stage 1 of 5
> (Device Prepare) complete.
> NetworkManager: <information> Activation (wlan0) Stage 2 of 5
> (Device Configure) starting...
> NetworkManager: <information> Activation (wlan0/wireless): access
> point 'linksys_std' is encrypted, but NO valid key exists. New key
> needed.
> NetworkManager: <information> Activation (wlan0) New wireless user
> key requested for network 'linksys_std'.
> NetworkManager: <information> Activation (wlan0) Stage 2 of 5
> (Device Configure) complete.
>
>
>
>
>
>
>
> Output of nm-supplicant-test is attached to this email.
>
> Hope emailing this to you was a good idea,
>
> Bernhard Kirchen
>
>
>
> ______________________________________________________________________
> Yahoo! Clever: Stellen Sie Fragen und finden Sie Antworten. Teilen Sie
> Ihr Wissen.
> plain text document attachment (output.txt), "1379444201-output.txt"
> Key: ssid, Value: "linksys_std"
> Key: scan_ssid, Value: 1
> Key: psk, Value: 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f
> Key: proto, Value: WPA2
> Key: key_mgmt, Value: WPA-PSK
> Key: pairwise, Value: CCMP TKIP
> Key: group, Value: CCMP TKIP
> SUP: sending command 'INTERFACE_ADD wlan0 wext /var/run/wpa_supplicant '
> SUP: response was 'OK'
> SUP: sending command 'AP_SCAN 1'
> SUP: response was 'OK'
> SUP: sending command 'ADD_NETWORK'
> SUP: response was '0'
> SUP: sending command 'SET_NETWORK 0 ssid "linksys_std"'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 scan_ssid 1'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 psk 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 proto WPA2'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'SET_NETWORK 0 group CCMP TKIP'
> SUP: response was 'OK'
> SUP: sending command 'ENABLE_NETWORK 0'
> SUP: response was 'OK'
> wpa_supplicant(8049): Global control interface '/var/run/wpa_supplicant-global'
> wpa_supplicant(8049): RX global ctrl_iface - hexdump_ascii(len=50):
> wpa_supplicant(8049): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 77 6c INTERFACE_ADD wl
> wpa_supplicant(8049): 61 6e 30 09 09 77 65 78 74 09 2f 76 61 72 2f 72 an0__wext_/var/r
> wpa_supplicant(8049): 75 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e un/wpa_supplican
> wpa_supplicant(8049): 74 09 t_
> wpa_supplicant(8049): CTRL_IFACE GLOBAL INTERFACE_ADD 'wlan0 wext /var/run/wpa_supplicant '
> wpa_supplicant(8049): Initializing interface 'wlan0' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A'
> wpa_supplicant(8049): Initializing interface (2) 'wlan0'
> wpa_supplicant(8049): EAPOL: SUPP_PAE entering state DISCONNECTED
> wpa_supplicant(8049): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> wpa_supplicant(8049): EAPOL: SUPP_BE entering state INITIALIZE
> wpa_supplicant(8049): EAP: EAP entering state DISABLED
> wpa_supplicant(8049): EAPOL: External notification - portEnabled=0
> wpa_supplicant(8049): EAPOL: External notification - portValid=0
> wpa_supplicant(8049): Could not configure driver to use managed mode
> wpa_supplicant(8049): SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0
> wpa_supplicant(8049): capabilities: key_mgmt 0x0 enc 0x3
> wpa_supplicant(8049): e=1, operstate=5
> wpa_supplicant(8049): Own MAC address: 00:15:af:09:01:4a
> wpa_supplicant(8049): wpa_driver_wext_set_wpa
> wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_supplicant(8049): wpa_driver_wext_set_countermeasures
> wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(8049): Setting scan request: 0 sec 100000 usec
> wpa_supplicant(8049): Added interface wlan0
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=9):
> wpa_supplicant(8049): 41 50 5f 53 43 41 4e 20 31 AP_SCAN 1
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=11):
> wpa_supplicant(8049): 41 44 44 5f 4e 45 54 57 4f 52 4b ADD_NETWORK
> wpa_supplicant(8049): CTRL_IFACE: ADD_NETWORK
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='ssid'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=13): [REMOVED]
> wpa_supplicant(8049): ssid - hexdump_ascii(len=11):
> wpa_supplicant(8049): 6c 69 6e 6b 73 79 73 5f 73 74 64 linksys_std
> wpa_supplicant(8049): MOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED]
> wpa_supplicant(8049): scan_ssid=1 (0x1)
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='psk'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED]
> wpa_supplicant(8049): PSK - hexdump(len=32): [REMOVED]
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=24): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='proto'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=4): [REMOVED]
> wpa_supplicant(8049): proto: 0x2
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED]
> wpa_supplicant(8049): key_mgmt: 0x2
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='pairwise'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(8049): pairwise: 0x18
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=29): [REMOVED]
> wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='group'
> wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED]
> wpa_supplicant(8049): group: 0x18
> wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=16):
> wpa_supplicant(8049): NABLE_NETWORK 0
> wpa_supplicant(8049): CTRL_IFACE: ENABLE_NETWORK id=0
> wpa_supplicant(8049): Setting scan request: 0 sec 0 usec
> wpa_supplicant(8049): State: DISCONNECTED -> SCANNING
> wpa_supplicant(8049): Starting AP scan (specific SSID)
> wpa_supplicant(8049): Scan SSID - hexdump_ascii(len=11):
> wpa_supplicant(8049): 6c 69 6e 6b 73 79 73 5f 73 74 64 linksys_std
> wpa_supplicant(8049): Trying to get current scan results first without requesting a new scan to speed up initial association
> wpa_supplicant(8049): Received 0 bytes of scan results (0 BSSes)
> wpa_supplicant(8049): Scan results: 0
> wpa_supplicant(8049): Selecting BSS from priority group 0
> wpa_supplicant(8049): No suitable AP found.
> wpa_supplicant(8049): Setting scan request: 0 sec 0 usec
> wpa_supplicant(8049): Starting AP scan (broadcast SSID)
> wpa_supplicant(8049): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
> wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(8049): Wireless event: cmd=0x8b19 len=8
> wpa_supplicant(8049): Received 260 bytes of scan results (2 BSSes)
> wpa_supplicant(8049): Scan results: 2
> wpa_supplicant(8049): Selecting BSS from priority group 0
> wpa_supplicant(8049): 0: 00:12:17:16:09:66 ssid='linksys_std' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
> wpa_supplicant(8049): selected based on RSN IE
> wpa_supplicant(8049): Trying to associate with 00:12:17:16:09:66 (SSID='linksys_std' freq=2437 MHz)
> wpa_supplicant(8049): CE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
> wpa_supplicant(8049): Cancelling scan request
> wpa_supplicant(8049): WPA: clearing own WPA/RSN IE
> wpa_supplicant(8049): Automatic auth_alg selection: 0x1
> wpa_supplicant(8049): RSN: using IEEE 802.11i/D9.0
> wpa_supplicant(8049): WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
> wpa_supplicant(8049): WPA: clearing AP WPA IE
> wpa_supplicant(8049): WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): WPA: using GTK CCMP
> wpa_supplicant(8049): WPA: using PTK CCMP
> wpa_supplicant(8049): WPA: using KEY_MGMT WPA-PSK
> wpa_supplicant(8049): WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): No keys have been configured - skip key clearing
> wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted
> wpa_supplicant(8049): State: SCANNING -> ASSOCIATING
> wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5
> wpa_supplicant(8049): wpa_driver_wext_associate
> wpa_supplicant(8049): Association request to the driver failed
> wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
> wpa_supplicant(8049): Setting authentication timeout: 5 sec 0 usec
> wpa_supplicant(8049): cation - EAP success=0
> wpa_supplicant(8049): EAPOL: External notification - EAP fail=0
> wpa_supplicant(8049): EAPOL: External notification - portControl=Auto
> wpa_supplicant(8049): RSN: Ignored PMKID candidate without preauth flag
> wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(8049): Wireless event: cmd=0x8b04 len=12
> wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(8049): Wireless event: cmd=0x8b1a len=19
> wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(8049): Wireless event: cmd=0x8c02 len=185
> wpa_supplicant(8049): WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000b6c696e6b7379735f737464010802040b160c12182432043048606c30140100000fac040100000fac040100000fac020000 RespIEs=010882848b9624b0486c32048c129860dd06001018020000)'
> wpa_supplicant(8049): Association info event
> wpa_supplicant(8049): req_ies - hexdump(len=51): 00 0b 6c 69 6e 6b 73 79 73 5f 73 74 64 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 b0 48 6c 32 04 8c 12 98 60 dd 06 00 10 18 02 00 00
> wpa_supplicant(8049): 4 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> wpa_supplicant(8049): Wireless event: cmd=0x8b15 len=20
> wpa_supplicant(8049): Wireless event: new AP: 00:12:17:16:09:66
> wpa_supplicant(8049): State: ASSOCIATING -> ASSOCIATED
> wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5
> wpa_supplicant(8049): Associated to a new BSS: BSSID=00:12:17:16:09:66
> wpa_supplicant(8049): No keys have been configured - skip key clearing
> wpa_supplicant(8049): Associated with 00:12:17:16:09:66
> wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00
> wpa_supplicant(8049): WPA: Association event - clear replay counter
> wpa_supplicant(8049): EAPOL: External notification - portEnabled=0
> wpa_supplicant(8049): EAPOL: External notification - portValid=0
> wpa_supplicant(8049): EAPOL: External notification - EAP success=0
> wpa_supplicant(8049): EAPOL: External notification - portEnabled=1
> wpa_supplicant(8049): EAPOL: SUPP_PAE entering state CONNECTING
> wpa_supplicant(8049): EAPOL: SUPP_BE entering state IDLE
> wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec
> wpa_supplicant(8049): Cancelling scan request
> wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66
> wpa_supplicant(8049): 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
> wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec
> wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=117
> wpa_supplicant(8049): EAPOL-Key type=2
> wpa_supplicant(8049): key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
> wpa_supplicant(8049): key_length=16 key_data_length=22
> wpa_supplicant(8049): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59
> wpa_supplicant(8049): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): 00 00 00 00 00 00 00 00 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
> wpa_supplicant(8049): State: ASSOCIATED -> 4WAY_HANDSHAKE
> wpa_supplicant(8049): WPA: RX message 1 of 4-Way Handshake from 00:12:17:16:09:66 (ver=2)
> wpa_supplicant(8049): RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
> wpa_supplicant(8049): RSN: PMKID from Authenticator - hexdump(len=16): e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8
> wpa_supplicant(8049): RSN: no matching PMKID found
> wpa_supplicant(8049): WPA: Renewed SNonce - hexdump(len=32): 27 03 21 61 b0 8e c0 59 8b 7b f3 b7 3d c9 25 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a c6
> wpa_supplicant(8049): WPA: PMK - hexdump(len=32): [REMOVED]
> wpa_supplicant(8049): WPA: PTK - hexdump(len=64): [REMOVED]
> wpa_supplicant(8049): WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): WPA: Sending EAPOL-Key 2/4
> wpa_supplicant(8049): A: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 00 27 03 21 61 b0 8e c0 59 8b 7b f3 b7 3d c9 25 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef 70 e7 5b 60 22 d6 2e aa 0e 61 47 10 a2 33 bd 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66
> wpa_supplicant(8049): RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 5a e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 03 0f 61 ad 2b a6 39 4c 48 2f 27 76 cd bb 9e 00 38 29 75 70 aa 14 d8 a8 35 48 9c 0d 25 9d 12 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b de 08 b0 ef 5e 79 c1 c9 da cf d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4
> wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=151
> wpa_supplicant(8049): EAPOL-Key type=2
> wpa_supplicant(8049): svd=0 Pairwise Install Ack MIC Secure Encr)
> wpa_supplicant(8049): key_length=16 key_data_length=56
> wpa_supplicant(8049): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> wpa_supplicant(8049): key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59
> wpa_supplicant(8049): key_iv - hexdump(len=16): e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 5a
> wpa_supplicant(8049): key_rsc - hexdump(len=8): e4 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> wpa_supplicant(8049): key_mic - hexdump(len=16): b1 03 0f 61 ad 2b a6 39 4c 48 2f 27 76 cd bb 9e
> wpa_supplicant(8049): 70 fd 82 f4
> wpa_supplicant(8049): RSN: encrypted key data - hexdump(len=56): 29 75 70 aa 14 d8 a8 35 48 9c 0d 25 9d 12 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b de 08 b0 ef 5e 79 c1 c9 da cf d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4
> wpa_supplicant(8049): WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
> wpa_supplicant(8049): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> wpa_supplicant(8049): WPA: RX message 3 of 4-Way Handshake from 00:12:17:16:09:66 (ver=2)
> wpa_supplicant(8049): WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8a 60 f7 f1 3e 4e 42 dc 54 76 04 3b 6e 96 62 00 dd 00
> wpa_supplicant(8049): WPA: Sending EAPOL-Key 4/4
> wpa_supplicant(8049): WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> _______________________________________________ NetworkManager-list mailing list NetworkManager-list gnome org http://mail.gnome.org/mailman/listinfo/networkmanager-list
[
Date Prev][
Date Next] [
Thread Prev][
Thread Next]
[
Thread Index]
[
Date Index]
[
Author Index]