Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 153415 Details for
Bug 234685
rt2500pci drivers does not work
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
debug output from wpa_supplicant
wpa.out (text/plain), 26.08 KB, created by
Dave Neuer
on 2007-04-25 12:30:38 UTC
(
hide
)
Description:
debug output from wpa_supplicant
Filename:
MIME Type:
Creator:
Dave Neuer
Created:
2007-04-25 12:30:38 UTC
Size:
26.08 KB
patch
obsolete
>ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 5 value 0x1 - ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 5 value 0x1 - ioctl[SIOCSIWMODE]: Device or resource busy >Initializing interface 'wlan0' conf '/etc/wpa_supplicant/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' -> '/etc/wpa_supplicant/wpa_supplicant.conf' >Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' >ctrl_interface='/var/run/wpa_supplicant' >ctrl_interface_group='wheel' (DEPRECATED) >Line: 4 - start of a new network block >ssid - hexdump_ascii(len=5): > 72 6f 75 74 61 routa >PSK - hexdump(len=32): [REMOVED] >key_mgmt: 0x2 >Priority group 0 > id=0 ssid='routa' >Initializing interface (2) 'wlan0' >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:19:db:00:8e:c2 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >wpa_driver_wext_set_drop_unencrypted >Setting scan request: 0 sec 100000 usec >Using existing control interface directory. >ctrl_interface_group=10 (from group name 'wheel') >ctrl_iface bind(PF_UNIX) failed: Address already in use >ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination >Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/wlan0' >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1002 () >Wireless event: cmd=0x8b06 len=12 >Ignore event for foreign ifindex 3 >RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >Trying to get current scan results first without requesting a new scan to speed up initial association >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 0 sec 0 usec >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 369 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 0 >0: 00:0d:0b:04:ec:b7 ssid='routa' wpa_ie_len=30 rsn_ie_len=26 caps=0x11 > selected based on RSN IE >Trying to associate with 00:0d:0b:04:ec:b7 (SSID='routa' freq=2412 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >RSN: using IEEE 802.11i/D9.0 >WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 >WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00 >WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 >WPA: using GTK TKIP >WPA: using PTK CCMP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >wpa_driver_wext_associate: assoc failed because set_mode failed >Association request to the driver failed >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b04 len=16 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b1a len=21 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0005726f757461010802040b160c12182432043048606c30140100000fac020100000fac040100000fac020000 RespIEs=010882848b962430486c32040c121860dd06001018020301)' >Association info event >req_ies - hexdump(len=45): 00 05 72 6f 75 74 61 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 03 01 >WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:0d:0b:04:ec:b7 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0d:0b:04:ec:b7 >No keys have been configured - skip key clearing >Associated with 00:0d:0b:04:ec:b7 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 03 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: PMKID from Authenticator - hexdump(len=16): 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: no matching PMKID found >WPA: Renewed SNonce - hexdump(len=32): 88 ac fd f1 26 7d 03 f6 e6 9e 77 af 03 7a 62 a8 77 32 f1 ab 98 64 50 30 c2 43 a8 78 82 c9 8c d8 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 03 88 ac fd f1 26 7d 03 f6 e6 9e 77 af 03 7a 62 a8 77 32 f1 ab 98 64 50 30 c2 43 a8 78 82 c9 8c d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f9 be f8 2b 19 7d 20 d5 c3 c6 c5 75 b7 24 f6 ba 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 04 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 04 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: PMKID from Authenticator - hexdump(len=16): 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: no matching PMKID found >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 04 88 ac fd f1 26 7d 03 f6 e6 9e 77 af 03 7a 62 a8 77 32 f1 ab 98 64 50 30 c2 43 a8 78 82 c9 8c d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ae a0 3a fc 18 1c 3c d1 40 08 1b 4e c0 c6 1e 06 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 05 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: PMKID from Authenticator - hexdump(len=16): 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: no matching PMKID found >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 05 88 ac fd f1 26 7d 03 f6 e6 9e 77 af 03 7a 62 a8 77 32 f1 ab 98 64 50 30 c2 43 a8 78 82 c9 8c d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 8e f6 22 ef c6 22 56 3b 10 46 d4 f8 7e ff 6f 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 06 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cc 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: PMKID from Authenticator - hexdump(len=16): 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: no matching PMKID found >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 06 88 ac fd f1 26 7d 03 f6 e6 9e 77 af 03 7a 62 a8 77 32 f1 ab 98 64 50 30 c2 43 a8 78 82 c9 8c d8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4d 6c f2 f3 b4 b3 9b 59 39 03 a5 5e 19 5f 75 6d 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >EAPOL: startWhen --> 0 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: txStart >WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:00:00:00:00:00 >WPA: 4-Way Handshake failed - pre-shared key may be incorrect >Setting scan request: 0 sec 100000 usec >Added BSSID 00:0d:0b:04:ec:b7 into blacklist >CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >State: 4WAY_HANDSHAKE -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >State: DISCONNECTED -> SCANNING >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=181 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=0005726f757461010802040b160c12182432043048606c30140100000fac020100000fac040100000fac020000 RespIEs=010882848b962430486c32040c121860dd06001018020201)' >Association info event >req_ies - hexdump(len=45): 00 05 72 6f 75 74 61 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00 10 18 02 02 01 >WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=24 >Wireless event: new AP: 00:0d:0b:04:ec:b7 >State: SCANNING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0d:0b:04:ec:b7 >No keys have been configured - skip key clearing >Associated with 00:0d:0b:04:ec:b7 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b19 len=16 >Received 369 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 0 >0: 00:0d:0b:04:ec:b7 ssid='routa' wpa_ie_len=30 rsn_ie_len=26 caps=0x11 > selected based on RSN IE >Already associated with the selected AP. >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=2 type=3 length=117 > EAPOL-Key type=2 > key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > key_length=16 key_data_length=22 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 01 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: PMKID from Authenticator - hexdump(len=16): 78 9f 22 29 45 bd ea 51 b6 8a 1a 37 93 22 66 49 >RSN: no matching PMKID found >WPA: Renewed SNonce - hexdump(len=32): 22 69 18 02 36 1c e0 20 0e c0 ea dc b8 e3 bf 92 97 cb 50 36 30 0e c4 e7 16 d9 de 27 c0 40 d2 4a >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 22 69 18 02 36 1c e0 20 0e c0 ea dc b8 e3 bf 92 97 cb 50 36 30 0e c4 e7 16 d9 de 27 c0 40 d2 4a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 5a f6 a9 3c 91 35 f3 4f 68 3b d9 4e 31 21 97 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 >RX EAPOL from 00:0d:0b:04:ec:b7 >RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c ce 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 76 c9 1b db c7 73 52 e0 34 d4 30 61 27 5f 4b 00 50 db 84 02 42 e3 1d 3c 85 80 1f e9 59 f8 ba ed 69 24 f8 26 de 49 f4 d5 7c 60 09 44 fc e5 21 26 a3 f6 e7 73 8f 11 70 65 04 49 99 e0 a6 a9 eb 0c c2 e9 b3 75 38 b3 21 fe e3 0d d0 ed 99 01 ed c2 c3 61 9e 37 8f d1 c0 a7 16 c6 97 96 46 93 dd 73 42 >IEEE 802.1X RX: version=2 type=3 length=175 > EAPOL-Key type=2 > key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) > key_length=16 key_data_length=80 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd > key_iv - hexdump(len=16): 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c ce > key_rsc - hexdump(len=8): 10 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): a2 76 c9 1b db c7 73 52 e0 34 d4 30 61 27 5f 4b >WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 02 53 a2 b5 a5 eb 7c 6a bd ca 07 f9 34 b9 55 1f 29 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c cd 18 f6 c2 54 ed d4 df 84 18 8a d9 32 13 a1 1c ce 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a2 76 c9 1b db c7 73 52 e0 34 d4 30 61 27 5f 4b 00 50 db 84 02 42 e3 1d 3c 85 80 1f e9 59 f8 ba ed 69 24 f8 26 de 49 f4 d5 7c 60 09 44 fc e5 21 26 a3 f6 e7 73 8f 11 70 65 04 49 99 e0 a6 a9 eb 0c c2 e9 b3 75 38 b3 21 fe e3 0d d0 ed 99 01 ed c2 c3 61 9e 37 8f d1 c0 a7 16 c6 97 96 46 93 dd 73 42 >RSN: encrypted key data - hexdump(len=80): db 84 02 42 e3 1d 3c 85 80 1f e9 59 f8 ba ed 69 24 f8 26 de 49 f4 d5 7c 60 09 44 fc e5 21 26 a3 f6 e7 73 8f 11 70 65 04 49 99 e0 a6 a9 eb 0c c2 e9 b3 75 38 b3 21 fe e3 0d d0 ed 99 01 ed c2 c3 61 9e 37 8f d1 c0 a7 16 c6 97 96 46 93 dd 73 42 >WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:0d:0b:04:ec:b7 (ver=2) >WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 02 00 f0 ad f9 8e e7 e2 84 39 aa 86 e4 b1 26 ce 8e 96 28 05 d2 7f 14 cc 1b 7c 93 3c 18 ba 76 ab 50 31 dd 00 00 00 00 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd bf 98 c2 1b 9c ed d9 57 d1 d9 58 d4 3e 4a 0f 00 00 >WPA: Installing PTK to the driver. >wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16 >EAPOL: External notification - portValid=1 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=2 tx=0). >WPA: RSC - hexdump(len=6): 10 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32 >WPA: Key negotiation completed with 00:0d:0b:04:ec:b7 [PTK=CCMP GTK=TKIP] >Cancelliioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 5 value 0x0 - ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - ng authentication timeout >Removed BSSID 00:0d:0b:04:ec:b7 from blacklist >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:0d:0b:04:ec:b7 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: External notification - EAP success=1 >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state SUCCESS >EAP: EAP entering state DISABLED >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL: SUPP_BE entering state IDLE >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >EAPOL: startWhen --> 0 >CTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >No keys have been configured - skip key clearing >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 234685
:
152613
|
152615
| 153415