Works with wpa_supplicant -D wext, but not with NM



wpa_supplicant-0.4.8-10.1.fc6
NetworkManager-0.6.4-6.el5

The error message from NM is:
The requested wireless network requires security capabilities unsupported by your hardware.
(gnome/applet/passphrase-dialog.c)

wpa_applicant works fine. wifi-radar works fine. I am sending this over WPA wireless.

As instructed in FAQ, I am attaching log from nm-supplicant-test. First is the log from working wpa_supplicant in foreground with -ddddd for comparison.
[root julie Desktop]# wpa_supplicant -i eth1 -D wext -ddddd -c /etc/wpa*/wpa*
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=10 (from group name 'wheel')
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=7):
     47 61 74 68 6d 61 6e                              Gathman         
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
pairwise: 0x8
key_mgmt: 0x2
proto: 0x1
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 10: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Line: 12 - start of a new network block
ssid - hexdump_ascii(len=19):
     41 64 20 46 6f 6e 74 65 73 20 4e 65 74 20 28 32   Ad Fontes Net (2
     30 31 29                                          01)             
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
pairwise: 0x8
key_mgmt: 0x2
proto: 0x1
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 18: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Line: 20 - start of a new network block
ssid - hexdump_ascii(len=13):
     41 64 20 46 6f 6e 74 65 73 20 4e 65 74            Ad Fontes Net   
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
pairwise: 0x8
key_mgmt: 0x2
proto: 0x1
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 26: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 0
   id=0 ssid='Gathman'
   id=1 ssid='Ad Fontes Net (201)'
   id=2 ssid='Ad Fontes Net'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=20 enc_capa=0x0
  capabilities: key_mgmt 0x0 enc 0x3
Own MAC address: 00:12:0e:20:e7:8f
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 692 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:14:d1:35:b3:e4 ssid='Gathman' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:14:d1:35:b3:e4 (SSID='Gathman' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=16
Wireless event: cmd=0x8b19 len=8
Received 692 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 00:14:d1:35:b3:e4 ssid='Gathman' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:14:d1:35:b3:e4 (SSID='Gathman' freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: ASSOCIATING -> ASSOCIATING
wpa_driver_wext_associate
Setting authentication timeout: 15 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b1a len=16
Wireless event: cmd=0x8c02 len=21
Custom wireless event: 'authenticated'
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:14:d1:35:b3:e4
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:14:d1:35:b3:e4
No keys have been configured - skip key clearing
Associated with 00:14:d1:35:b3:e4
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:14:d1:35:b3:e4
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 2e 4b 07 fd 5c b5 79 f1 f1 1a 40 53 2a 60 35 90 ba c6 39 15 04 0e 75 45 0e eb 52 0c c1 d3 8e 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 2e 4b 07 fd 5c b5 79 f1 f1 1a 40 53 2a 60 35 90 ba c6 39 15 04 0e 75 45 0e eb 52 0c c1 d3 8e 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:d1:35:b3:e4 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): fb 0f 98 02 cb 6f 90 22 53 fd c6 53 12 fc 09 80 d4 65 26 b8 51 c4 f9 1a 1b b5 f0 12 a0 b7 81 a1
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 fb 0f 98 02 cb 6f 90 22 53 fd c6 53 12 fc 09 80 d4 65 26 b8 51 c4 f9 1a 1b b5 f0 12 a0 b7 81 a1 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 8f 18 46 21 07 49 78 56 b7 44 b2 55 26 cb ff 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:14:d1:35:b3:e4
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 2e 4b 07 fd 5c b5 79 f1 f1 1a 40 53 2a 60 35 90 ba c6 39 15 04 0e 75 45 0e eb 52 0c c1 d3 8e 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 b5 ce 5e 77 2d 77 79 b8 07 24 4f 4b d8 71 a3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 2e 4b 07 fd 5c b5 79 f1 f1 1a 40 53 2a 60 35 90 ba c6 39 15 04 0e 75 45 0e eb 52 0c c1 d3 8e 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d2 b5 ce 5e 77 2d 77 79 b8 07 24 4f 4b d8 71 a3 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:14:d1:35:b3:e4 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 84 32 70 e4 58 20 30 77 6f 56 28 0d c5 fe 52 f5 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:14:d1:35:b3:e4
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 dd cb 1f 12 77 08 53 e8 fe 92 3a c2 1b 86 41 57 5d c2 71 3a 8a b4 99 04 0d f7 bd 6b 5f d8 5d 89 a4 a5 a2 74 b2 8d e6 6d 05 a4 49 1a 73 d9 29 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a b4 e0 5f 28 b4 5d 1b d7 b8 2e 12 b1 7a 65 69 00 20 a5 cb ed 43 10 17 bf c7 8e b7 56 b3 3b 91 de 3a 6c 71 4d 7e 6e f7 88 af 42 08 0d e6 b9 99 f5 13
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00 00 00 03 dd cb 1f 12 77 08 53 e8 fe 92 3a c2 1b 86 41 57 5d c2 71 3a 8a b4 99 04 0d f7 bd 6b 5f d8 5d 89 a4 a5 a2 74 b2 8d e6 6d 05 a4 49 1a 73 d9 29 3c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1a b4 e0 5f 28 b4 5d 1b d7 b8 2e 12 b1 7a 65 69 00 20 a5 cb ed 43 10 17 bf c7 8e b7 56 b3 3b 91 de 3a 6c 71 4d 7e 6e f7 88 af 42 08 0d e6 b9 99 f5 13
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:14:d1:35:b3:e4 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 81 3c 66 fa aa 6b 07 df 5e 56 68 2a f8 0e 61 1d 00 00
WPA: Key negotiation completed with 00:14:d1:35:b3:e4 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:14:d1:35:b3:e4 completed (auth)
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: startWhen --> 0
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
[root julie Desktop]# ./nm-supplicant-test eth1 /etc/wpa*/wpa*
ap_scan: 2
Key: ssid, Value: "Gathman"
Key: psk, Value: "SECRETPW"
Key: pairwise, Value: TKIP
Key: key_mgmt, Value: WPA-PSK
Key: proto, Value: WPA
SUP: sending command 'INTERFACE_ADD eth1                wext    /var/run/wpa_supplicant '
SUP: response was 'OK'
SUP: sending command 'AP_SCAN 2'
SUP: response was 'OK'
SUP: sending command 'ADD_NETWORK'
SUP: response was '0'
SUP: sending command 'SET_NETWORK 0 ssid "Gathman"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 psk "SECRETPW"'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 pairwise TKIP'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK'
SUP: response was 'OK'
SUP: sending command 'SET_NETWORK 0 proto WPA'
SUP: response was 'OK'
SUP: sending command 'ENABLE_NETWORK 0'
SUP: response was 'OK'
wpa_supplicant(25932): Global control interface '/var/run/wpa_supplicant-global'
wpa_supplicant(25932): RX global ctrl_iface - hexdump_ascii(len=49):
wpa_supplicant(25932):      49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 65 74   INTERFACE_ADD et
wpa_supplicant(25932):      68 31 09 09 77 65 78 74 09 2f 76 61 72 2f 72 75   h1__wext_/var/ru
wpa_supplicant(25932):      6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e 74   n/wpa_supplicant
wpa_supplicant(25932):      09                                                _               
wpa_supplicant(25932): CTRL_IFACE GLOBAL INTERFACE_ADD 'eth1            wext   /var/run/wpa_supplicant  '
wpa_supplicant(25932): Initializing interface 'eth1' conf 'N/A' driver 'wext' ctrl_interface '/var/run/wpa_supplicant'
wpa_supplicant(25932): Initializing interface (2) 'eth1'
wpa_supplicant(25932): EAPOL: SUPP_PAE entering state DISCONNECTED
wpa_supplicant(25932): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
wpa_supplicant(25932): EAPOL: SUPP_BE entering state INITIALIZE
wpa_supplicant(25932): EAP: EAP entering state DISABLED
wpa_supplicant(25932): EAPOL: External notification - portEnabled=0
wpa_supplicant(25932): EAPOL: External notification - portValid=0
wpa_supplicant(25932): SIOCGIWRANGE: WE(compiled)=20 WE(source)=20 enc_capa=0x0
wpa_supplicant(25932):   capabilities: key_mgmt 0x0 enc 0x3
wpa_supplicant(25932): Own MAC address: 00:12:0e:20:e7:8f
wpa_supplicant(25932): wpa_driver_wext_set_wpa
wpa_supplicant(25932): =0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(25932): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(25932): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(25932): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_supplicant(25932): wpa_driver_wext_set_countermeasures
wpa_supplicant(25932): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(25932): Setting scan request: 0 sec 100000 usec
wpa_supplicant(25932): Added interface eth1
wpa_supplicant(25932): Wireless event: cmd=0x8b06 len=8
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=9):
wpa_supplicant(25932):      41 50 5f 53 43 41 4e 20 32                        AP_SCAN 2       
wpa_supplicant(25932): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=11):
wpa_supplicant(25932):      41 44 44 5f 4e 45 54 57 4f 52 4b                  ADD_NETWORK     
wpa_supplicant(25932): CTRL_IFACE: ADD_NETWORK
wpa_supplicant(25932): RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=28):
wpa_supplicant(25932):      53 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 73 73   SET_NETWORK 0 ss
wpa_supplicant(25932):      69 64 20 22 47 61 74 68 6d 61 6e 22               id "Gathman"    
wpa_supplicant(25932): CTRL_IFACE: SET_NETWORK id=0 name='ssid' value='"Gathman"'
wpa_supplicant(25932): i(len=7):
wpa_supplicant(25932):      47 61 74 68 6d 61 6e                              Gathman         
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=28): [REMOVED]
wpa_supplicant(25932): CTRL_IFACE: SET_NETWORK id=0 name='psk' value='[REMOVED]'
wpa_supplicant(25932): PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
wpa_supplicant(25932): PSK (from passphrase) - hexdump(len=32): [REMOVED]
wpa_supplicant(25932): State: DISCONNECTED -> SCANNING
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=27):
wpa_supplicant(25932):      53 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 70 61   SET_NETWORK 0 pa
wpa_supplicant(25932):      69 72 77 69 73 65 20 54 4b 49 50                  irwise TKIP     
wpa_supplicant(25932): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' value='TKIP'
wpa_supplicant(25932): pairwise: 0x8
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=30):
wpa_supplicant(25932):      53 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 6b 65   SET_NETWORK 0 ke
wpa_supplicant(25932):      79 5f 6d 67 6d 74 20 57 50 41 2d 50 53 4b         y_mgmt WPA-PSK  
wpa_supplicant(25932): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' value='WPA-PSK'
wpa_supplicant(25932): key_mgmt: 0x2
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=23):
wpa_supplicant(25932):      53 45 54 5f 4e 45 54 57 4f 52 4b 20 30 20 70 72   SET_NETWORK 0 pr
wpa_supplicant(25932):  
wpa_supplicant(25932): CTRL_IFACE: SET_NETWORK id=0 name='proto' value='WPA'
wpa_supplicant(25932): proto: 0x1
wpa_supplicant(25932): RX ctrl_iface - hexdump_ascii(len=16):
wpa_supplicant(25932):      45 4e 41 42 4c 45 5f 4e 45 54 57 4f 52 4b 20 30   ENABLE_NETWORK 0
wpa_supplicant(25932): CTRL_IFACE: ENABLE_NETWORK id=0
wpa_supplicant(25932): Setting scan request: 0 sec 0 usec
wpa_supplicant(25932): Trying to associate with SSID 'Gathman'
wpa_supplicant(25932): Cancelling scan request
wpa_supplicant(25932): WPA: clearing own WPA/RSN IE
wpa_supplicant(25932): Automatic auth_alg selection: 0x1
wpa_supplicant(25932): WPA: No WPA/RSN IE available from association info
wpa_supplicant(25932): WPA: Set cipher suites based on configuration
wpa_supplicant(25932): WPA: Selected cipher suites: group 30 pairwise 8 key_mgmt 2
wpa_supplicant(25932): WPA: clearing AP WPA IE
wpa_supplicant(25932): WPA: clearing AP RSN IE
wpa_supplicant(25932): WPA: using GTK CCMP
wpa_supplicant(25932): WPA: using PTK TKIP
wpa_supplicant(25932): WPA: using KEY_MGMT WPA-PSK
wpa_supplicant(25932): WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 02 01 00 00 50 f2 02
wpa_supplicant(25932): No keys have been configured - skip key clearing
wpa_supplicant(25932): wpa_driver_wext_set_drop_unencrypted
wpa_supplicant(25932): State: SCANNING -> ASSOCIATING
wpa_supplicant(25932): wpa_driver_wext_associate
wpa_supplicant(25932): Setting authentication timeout: 60 sec 0 usec
wpa_supplicant(25932): EAPOL: External notification - EAP success=0
Activation (eth1/wireless): association took too long (>20s), failing activation.
sendmsg(CTRL_IFACE monitor): No such file or directory


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]