Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 189201 Details for
Bug 244179
iwl3945 driver doesn't works in fedora 7
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
Log of failed association to WPA hidden AP, with subsequent association after manually specifying the ESSID
iwl3945.log (text/plain), 16.34 KB, created by
Josh Miller
on 2007-09-06 20:10:02 UTC
(
hide
)
Description:
Log of failed association to WPA hidden AP, with subsequent association after manually specifying the ESSID
Filename:
MIME Type:
Creator:
Josh Miller
Created:
2007-09-06 20:10:02 UTC
Size:
16.34 KB
patch
obsolete
>Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 223 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 6 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 5 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 0 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch > skip - SSID mismatch >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=12): > 45 6e 74 65 72 70 72 69 73 65 34 31 Enterprise41 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 223 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 6 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 5 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 0 >0: 00:14:1b:59:19:b0 ssid='' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch > skip - SSID mismatch >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=11): > 45 6e 74 65 72 70 72 69 73 65 31 Enterprise1 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=6): > 67 64 66 31 30 30 gdf100 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=20 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 61 6e 79 any >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 484 bytes of scan results (2 BSSes) >Scan results: 2 >Selecting BSS from priority group 6 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:14:1b:59:17:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 5 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >1: 00:14:1b:59:17:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 0 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Trying to associate with 00:14:1b:59:19:b0 (SSID='Enterprise41' freq=2457 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 28 00 >WPA: clearing AP RSN IE >WPA: using GTK TKIP >WPA: using PTK TKIP >WPA: using KEY_MGMT WPA-PSK >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 15 sec 0 usec >EAPOL: External notification - EAP success=0 >EAPOL: External notification - EAP fail=0 >EAPOL: External notification - portControl=Auto >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b1a len=20 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8c02 len=241 >Association info event >req_ies - hexdump(len=63): 00 0c 45 6e 74 65 72 70 72 69 73 65 34 31 01 08 0c 12 18 24 30 48 60 6c 32 04 02 04 0b 16 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00 >resp_ies - hexdump(len=40): 01 08 82 84 8b 0c 12 96 18 24 32 02 30 48 dd 18 00 50 f2 02 01 01 82 00 03 a4 00 00 27 a4 00 00 42 43 bc 00 62 32 66 00 >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:14:1b:59:19:b0 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:14:1b:59:19:b0 >No keys have been configured - skip key clearing >Associated with 00:14:1b:59:19:b0 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - EAP success=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:14:1b:59:19:b0 >Setting authentication timeout: 10 sec 0 usec >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 57 15 cc 3f f4 35 b5 a4 7d 09 0f d4 7c 21 21 ce 03 16 4b 8c 17 33 63 d3 2f ef 92 fb c0 8c 91 aa > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:14:1b:59:19:b0 (ver=1) >WPA: Renewed SNonce - hexdump(len=32): 92 48 3a 32 dd b5 bf 7c c5 bb 93 b0 05 f5 28 97 ed c9 03 6b b6 e0 b6 75 7e 14 d4 96 4c 1b af d6 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 >WPA: Sending EAPOL-Key 2/4 >RX EAPOL from 00:14:1b:59:19:b0 >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 57 15 cc 3f f4 35 b5 a4 7d 09 0f d4 7c 21 21 ce 03 16 4b 8c 17 33 63 d3 2f ef 92 fb c0 8c 91 aa > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): c9 da d1 60 3d 8a 84 ad a7 a0 c0 73 c4 fb 6c 2c >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:14:1b:59:19:b0 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 28 00 >WPA: Sending EAPOL-Key 4/4 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:14:1b:59:19:b0 >IEEE 802.1X RX: version=1 type=3 length=127 > EAPOL-Key type=254 > key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) > key_length=32 key_data_length=32 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 57 15 cc 3f f4 35 b5 a4 7d 09 0f d4 7c 21 21 ce 03 16 4b 8c 17 33 63 d3 2f ef 92 fb c0 8c 8a 45 > key_iv - hexdump(len=16): c8 a6 cf 52 24 09 04 b0 f1 ba 83 45 7e 8e 4b 80 > key_rsc - hexdump(len=8): 2c dc 08 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 66 7d 66 21 76 7a 57 3c f9 4a b2 4c a4 a8 b4 95 >WPA: RX message 1 of Group Key Handshake from 00:14:1b:59:19:b0 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=32): [REMOVED] >WPA: Installing GTK to the driver (keyidx=1 tx=0). >WPA: RSC - hexdump(len=6): 2c dc 08 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=1 set_tx=0 seq_len=6 key_len=32 >WPA: Sending EAPOL-Key 2/2 >WPA: Key negotiation completed with 00:14:1b:59:19:b0 [PTK=TKIP GTK=TKIP] >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:14:1b:59:19:b0 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: External notification - EAP success=1 >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state SUCCESS >EAP: EAP entering state DISABLED >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL: SUPP_BE entering state IDLE >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >EAPOL: startWhen --> 0 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=12): > 45 6e 74 65 72 70 72 69 73 65 34 31 Enterprise41 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=11): > 45 6e 74 65 72 70 72 69 73 65 31 Enterprise1 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=6): > 67 64 66 31 30 30 gdf100 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 234 bytes of scan results (1 BSSes) >Scan results: 1 >Selecting BSS from priority group 6 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 5 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > skip - SSID mismatch >Selecting BSS from priority group 0 >0: 00:14:1b:59:19:b0 ssid='Enterprise41' wpa_ie_len=26 rsn_ie_len=0 caps=0x11 > selected based on WPA IE >Already associated with the selected AP. >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b2a len=8 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b1a len=8 >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 61 6e 79 any >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Ignore event for foreign ifindex 4 >RTM_NEWLINK: operstate=1 ifi_flags=0x1002 () >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >Ignore event for foreign ifindex 4 >RTM_NEWLINK: operstate=1 ifi_flags=0x1043 ([UP][RUNNING]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >Starting AP scan (broadcast SSID) >RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=12): > 45 6e 74 65 72 70 72 69 73 65 34 31 Enterprise41 >RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=11): > 45 6e 74 65 72 70 72 69 73 65 31 Enterprise1 >RTM_NEWLINK: operstate=1 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b19 len=8 >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Ignore event for foreign ifindex 4 >RTM_NEWLINK: operstate=1 ifi_flags=0x1002 () >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=6): > 67 64 66 31 30 30 gdf100 >Failed to initiate AP scan. >Setting scan request: 10 sec 0 usec >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 61 6e 79 any >Failed to initiate AP scan. >Setting scan request: 10 sec 0 usec >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (broadcast SSID) >Failed to initiate AP scan. >Setting scan request: 10 sec 0 usec >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0 >No suitable AP found. >Setting scan request: 5 sec 0 usec >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=12): > 45 6e 74 65 72 70 72 69 73 65 34 31 Enterprise41 >Failed to initiate AP scan. >Setting scan request: 10 sec 0 usec >Scan timeout - try to get results >Received 0 bytes of scan results (0 BSSes) >Scan results: 0 >Selecting BSS from priority group 6 >Selecting BSS from priority group 5 >Selecting BSS from priority group 0
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 244179
: 189201