Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 314248 Details for
Bug 459027
Network Manager 0.7.0 TLS and certs
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
wpa_supplicant running on the T61 with F9
eap-f9-wpa.txt (text/plain), 42.59 KB, created by
Traxtopel
on 2008-08-13 20:08:34 UTC
(
hide
)
Description:
wpa_supplicant running on the T61 with F9
Filename:
MIME Type:
Creator:
Traxtopel
Created:
2008-08-13 20:08:34 UTC
Size:
42.59 KB
patch
obsolete
>Script started on Tue 29 Jul 2008 11:35:23 AM EDT >[root@lc4eb6632784342 test-ibm-wireless]# ifconfig wlan0 up >ctrl_interface=/var/run/wpa_supplicant >ap_scan=1 >network={ > ssid="IBM" > scan_ssid=1 > eap=TLS > #key_mgmt=IEEE8021X > key_mgmt=WPA-EAP > pairwise=TKIP > group=WEP104 > identity="grant_williamson@nl.ibm.com" > ca_cert="/root/test-ibm-wireless/eap/ca_certificate.pem" > client_cert="/root/test-ibm-wireless/eap/user_certificate.pem" > private_key="/root/test-ibm-wireless/eap/private_key.pem" > private_key_passwd="password" >} >Initializing interface 'wlan0' conf 'eap.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A' >Configuration file 'eap.conf' -> '/root/test-ibm-wireless/eap.conf' >Reading configuration file '/root/test-ibm-wireless/eap.conf' >ctrl_interface='/var/run/wpa_supplicant' >ap_scan=1 >Line: 3 - start of a new network block >ssid - hexdump_ascii(len=3): > 49 42 4d IBM >scan_ssid=1 (0x1) >eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00 >key_mgmt: 0x1 >pairwise: 0x8 >group: 0x4 >identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >ca_cert - hexdump_ascii(len=46): > 2f 72 6f 6f 74 2f 74 65 73 74 2d 69 62 6d 2d 77 /root/test-ibm-w > 69 72 65 6c 65 73 73 2f 65 61 70 2f 63 61 5f 63 ireless/eap/ca_c > 65 72 74 69 66 69 63 61 74 65 2e 70 65 6d ertificate.pem >client_cert - hexdump_ascii(len=48): > 2f 72 6f 6f 74 2f 74 65 73 74 2d 69 62 6d 2d 77 /root/test-ibm-w > 69 72 65 6c 65 73 73 2f 65 61 70 2f 75 73 65 72 ireless/eap/user > 5f 63 65 72 74 69 66 69 63 61 74 65 2e 70 65 6d _certificate.pem >private_key - hexdump_ascii(len=43): > 2f 72 6f 6f 74 2f 74 65 73 74 2d 69 62 6d 2d 77 /root/test-ibm-w > 69 72 65 6c 65 73 73 2f 65 61 70 2f 70 72 69 76 ireless/eap/priv > 61 74 65 5f 6b 65 79 2e 70 65 6d ate_key.pem >private_key_passwd - hexdump_ascii(len=10): [REMOVED] >Priority group 0 > id=0 ssid='IBM' >Initializing interface (2) 'wlan0' >SIOCGIWRANGE: WE(compiled)=22 WE(source)=21 enc_capa=0xf > capabilities: key_mgmt 0xf enc 0xf >WEXT: Operstate: linkmode=1, operstate=5 >Own MAC address: 00:1f:3b:39:50:17 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - wpa_driver_wext_set_drop_unencrypted >RSN: flushing PMKID list in the driver >Setting scan request: 0 sec 100000 usec >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: KEY_RX entering state NO_KEY_RECEIVE >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >Added interface wlan0 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >State: DISCONNECTED -> SCANNING >Starting AP scan (specific SSID) >Scan SSID - hexdump_ascii(len=3): > 49 42 4d IBM >Trying to get current scan results first without requesting a new scan to speed up initial association >Scan results did not fit - trying larger buffer (8192 bytes) >Received 6788 bytes of scan results (25 BSSes) >CTRL-EVENT-SCAN-RESULTS >Selecting BSS from priority group 0 >Try to find WPA-enabled AP >0: 00:0e:83:60:02:80 ssid='IBM' wpa_ie_len=24 rsn_ie_len=20 caps=0x11 > skip RSN IE - PTK cipher mismatch > selected based on WPA IE > selected WPA AP 00:0e:83:60:02:80 ssid='IBM' >Try to find non-WPA AP >Trying to associate with 00:0e:83:60:02:80 (SSID='IBM' freq=2437 MHz) >Cancelling scan request >WPA: clearing own WPA/RSN IE >Automatic auth_alg selection: 0x1 >WPA: using IEEE 802.11i/D3.0 >WPA: Selected cipher suites: group 4 pairwise 8 key_mgmt 1 proto 1 >WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 05 01 00 00 0f ac 04 01 00 00 0f ac 01 28 00 >WPA: using GTK WEP104 >WPA: using PTK TKIP >WPA: using KEY_MGMT 802.1X >WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 >No keys have been configured - skip key clearing >wpa_driver_wext_set_drop_unencrypted >State: SCANNING -> ASSOCIATING >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_associate >Setting authentication timeout: 20 sec 0 usec >EAPOL: External notification - portControl=Auto >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RSN: Ignored PMKID candidate without preauth flag >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b06 len=8 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8b04 len=12 >RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) >Wireless event: cmd=0x8c02 len=157 >WEXT: Custom wireless event: 'ASSOCINFO(ReqIEs=000349424d010802040b160c12182432043048606cdd160050f20101000050f20501000050f20201000050f201 RespIEs=010882848b960c12182432043048606c)' >Association info event >req_ies - hexdump(len=45): 00 03 49 42 4d 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 >resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 12 18 24 32 04 30 48 60 6c >WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >Wireless event: cmd=0x8b15 len=20 >Wireless event: new AP: 00:0e:83:60:02:80 >State: ASSOCIATING -> ASSOCIATED >wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >Associated to a new BSS: BSSID=00:0e:83:60:02:80 >No keys have been configured - skip key clearing >Associated with 00:0e:83:60:02:80 >WPA: Association event - clear replay counter >EAPOL: External notification - portEnabled=0 >EAPOL: External notification - portValid=0 >EAPOL: External notification - portEnabled=1 >EAPOL: SUPP_PAE entering state CONNECTING >EAPOL: SUPP_BE entering state IDLE >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >Setting authentication timeout: 10 sec 0 usec >Cancelling scan request >RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=51): 01 00 00 2f 01 01 00 2f 01 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 35 74 2d 31 2c 70 6f 72 74 69 64 3d 30 >Setting authentication timeout: 70 sec 0 usec >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_PAE entering state RESTART >EAP: EAP entering state INITIALIZE >EAP: EAP entering state IDLE >EAPOL: SUPP_PAE entering state AUTHENTICATING >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=1 method=1 vendor=0 vendorMethod=0 >EAP: EAP entering state IDENTITY >CTRL-EVENT-EAP-STARTED EAP authentication started >EAP: EAP-Request Identity data - hexdump_ascii(len=42): > 00 6e 65 74 77 6f 72 6b 69 64 3d 49 42 4d 2c 6e _networkid=IBM,n > 61 73 69 64 3d 72 63 78 2d 61 70 2d 30 35 74 2d asid=rcx-ap-05t- > 31 2c 70 6f 72 74 69 64 3d 30 1,portid=0 >EAP: using real identity - hexdump_ascii(len=27): > 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e grant_williamson > 40 6e 6c 2e 69 62 6d 2e 63 6f 6d @nl.ibm.com >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=36): 01 00 00 20 02 01 00 20 01 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=47): 01 00 00 2b 01 96 00 2b 11 01 00 08 cd 09 67 ba d4 e9 e5 7e 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=150 method=17 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: configuration does not allow: vendor 0 method 17 >EAP: vendor 0 method 17 not allowed >EAP: Building EAP-Nak (requested type 17 vendor=0 method=0 not allowed) >EAP: allowed methods - hexdump(len=1): 0d >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 96 00 06 03 0d >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=46): 01 00 00 06 01 97 00 06 0d 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=151 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state GET_METHOD >EAP: Initialize selected EAP method: vendor 0 method 13 (TLS) >TLS: Trusted root certificate(s) loaded >OpenSSL: tls_connection_client_cert - SSL_use_certificate_file (DER) failed error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag >OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error >OpenSSL: pending error: error:140C800D:SSL routines:SSL_use_certificate_file:ASN1 lib >OpenSSL: SSL_use_certificate_file (PEM) --> OK >OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) failed error:0D094065:asn1 encoding routines:d2i_ASN1_SET:bad class >OpenSSL: pending error: error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag >OpenSSL: pending error: error:0D07803A:asn1 encoding routines:ASN1_ITEM_EX_D2I:nested asn1 error >OpenSSL: pending error: error:0D09A00D:asn1 encoding routines:d2i_PrivateKey:ASN1 lib >OpenSSL: pending error: error:140CB00D:SSL routines:SSL_use_PrivateKey_file:ASN1 lib >OpenSSL: SSL_use_PrivateKey_File (PEM) --> OK >SSL: Private key loaded successfully >CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x20 >EAP-TLS: Start >SSL: (where=0x10 ret=0x1) >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:before/connect initialization >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client hello A >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read server hello A >SSL: SSL_connect - want more data >SSL: 111 bytes pending from ssl_out >SSL: 111 bytes left to be sent out (of total 111 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=121): 01 00 00 75 02 97 00 75 0d 00 16 03 01 00 6a 01 00 00 66 03 01 48 8f 38 c8 bb d3 84 19 89 2f 29 74 05 c1 e7 2b 09 90 c0 fd 76 cf f7 af ee 9a f3 d9 3b 49 df 62 00 00 38 00 39 00 38 00 35 00 88 00 87 00 84 00 16 00 13 00 0a 00 33 00 32 00 2f 00 9a 00 99 00 96 00 45 00 44 00 41 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 02 01 00 00 04 00 23 00 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=1016): 01 00 03 f4 01 98 03 f4 0d c0 00 00 06 53 16 03 01 00 4a 02 00 00 46 03 01 48 8f 39 92 c2 61 2e 5c 15 41 ad 77 a5 1d 03 9e 6f 7d 71 b8 61 1b e0 90 ca 1f 6c 86 82 95 59 1e 20 9f 21 2d dd 0a 45 bd 6a 50 a6 7a ab 98 a8 59 89 2a 6a 47 10 96 54 99 90 20 4b fc 7c 5e 0d c5 60 00 35 00 16 03 01 05 ed 0b 00 05 e9 00 05 e6 00 02 bc 30 82 02 b8 30 82 02 21 a0 03 02 01 02 02 03 07 08 96 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 4e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 0a 13 07 45 71 75 69 66 61 78 31 2d 30 2b 06 03 55 04 0b 13 24 45 71 75 69 66 61 78 20 53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 30 37 30 33 30 32 32 31 35 31 32 36 5a 17 0d 31 30 30 33 30 32 32 31 35 31 32 36 5a 30 43 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 0c 30 0a 06 03 55 04 0a 13 03 49 42 4d 31 26 30 24 06 03 55 04 03 13 1d 75 73 61 63 73 77 30 31 2e 62 6c 75 65 77 69 72 65 6c 65 73 73 2e 69 62 6d 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 c8 8b b7 80 b8 f7 80 7f 7b b3 58 b6 da 77 fc 25 d3 a4 32 47 ac 42 a9 4b 00 2c 1e 63 cd bc 11 b7 fc 77 3e 0f 91 b6 6d 23 07 3e 3b da 5f fb 9a 33 fa cb e2 68 75 f7 c6 c8 39 53 47 85 3b cf 5b b7 22 d6 b9 da 32 ad 14 27 fc fe 9f d1 8f 13 48 76 48 15 b3 57 26 98 c7 4e 7d e4 62 d0 68 87 6e 97 c4 b0 79 fa 56 61 25 7b 17 d6 76 61 b2 14 f0 ef 86 7e 42 07 c7 0b b1 3b d8 fc e6 69 8f b7 71 c3 02 03 01 00 01 a3 81 ae 30 81 ab 30 0e 06 03 55 1d 0f 01 01 ff 04 04 03 02 04 f0 30 1d 06 03 55 1d 0e 04 16 04 14 75 0a 3c ab e3 b9 1f 35 1e f8 8c 94 5f b2 db 2b c3 8a dc 40 30 3a 06 03 55 1d 1f 04 33 30 31 30 2f a0 2d a0 2b 86 29 68 74 74 70 3a 2f 2f 63 72 6c 2e 67 65 6f 74 72 75 73 74 2e 63 6f 6d 2f 63 72 6c 73 2f 73 65 63 75 72 65 63 61 2e 63 72 6c 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 e6 68 f9 2b d2 b2 95 d7 47 d8 23 20 10 4f 33 98 90 9f d4 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 01 06 08 2b 06 01 05 05 07 03 02 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 62 69 99 e6 62 d0 14 b2 e9 c4 fd d1 8c 14 58 52 34 04 f5 d2 0a f5 3f ad 4f f5 79 16 62 37 68 25 07 47 d2 79 5d d9 f9 97 07 92 03 54 84 60 3e 72 7a 9e fb 02 be d3 d7 d9 36 49 c2 9d 22 f4 82 da 45 be ab c0 00 58 62 33 ee f0 7a 5a d3 b0 0c f1 e7 6d a3 38 5f 10 05 65 b9 93 10 a0 88 dd 35 45 cb a5 13 31 e6 3c c6 51 ba bf ae f3 1b 26 ad c4 4d 67 0d e6 47 81 55 44 74 58 a5 db a0 ac a3 b8 00 03 24 30 82 03 20 30 82 02 89 a0 03 02 01 02 02 04 35 de f4 cf 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 4e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 0a 13 07 45 71 75 69 66 61 78 31 2d 30 2b 06 03 55 04 0b 13 24 45 71 75 69 66 61 78 20 53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 39 38 30 38 32 32 31 36 34 31 35 31 5a 17 0d 31 38 30 38 32 32 31 36 34 31 35 31 5a 30 4e 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 0a 13 07 45 71 75 69 66 61 78 31 2d 30 2b 06 03 55 04 0b 13 24 45 71 75 69 66 61 78 20 53 65 63 75 72 65 20 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=152 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=1012) - Flags 0xc0 >SSL: TLS Message Length: 1619 >SSL: Need 617 bytes more input data >SSL: Building ACK (type=13 id=152 ver=0) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 98 00 06 0d 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=627): 01 00 02 6f 01 99 02 6f 0d 00 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 c1 5d b1 58 67 08 62 ee a0 9a 2d 1f 08 6d 91 14 68 98 0a 1e fe da 04 6f 13 84 62 21 c3 d1 7c ce 9f 05 e0 b8 01 f0 4e 34 ec e2 8a 95 04 64 ac f1 6b 53 5f 05 b3 cb 67 80 bf 42 02 8e fe dd 01 09 ec e1 00 14 4f fc fb f0 0c dd 43 ba 5b 2b e1 1f 80 70 99 15 57 93 16 f1 0f 97 6a b7 c2 68 23 1c cc 4d 59 30 ac 51 1e 3b af 2b d6 ee 63 45 7b c5 d9 5f 50 d2 e3 50 0f 3a 88 e7 bf 14 fd e0 c7 b9 02 03 01 00 01 a3 82 01 09 30 82 01 05 30 70 06 03 55 1d 1f 04 69 30 67 30 65 a0 63 a0 61 a4 5f 30 5d 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 10 30 0e 06 03 55 04 0a 13 07 45 71 75 69 66 61 78 31 2d 30 2b 06 03 55 04 0b 13 24 45 71 75 69 66 61 78 20 53 65 63 75 72 65 20 43 65 72 74 69 66 69 63 61 74 65 20 41 75 74 68 6f 72 69 74 79 31 0d 30 0b 06 03 55 04 03 13 04 43 52 4c 31 30 1a 06 03 55 1d 10 04 13 30 11 81 0f 32 30 31 38 30 38 32 32 31 36 34 31 35 31 5a 30 0b 06 03 55 1d 0f 04 04 03 02 01 06 30 1f 06 03 55 1d 23 04 18 30 16 80 14 48 e6 68 f9 2b d2 b2 95 d7 47 d8 23 20 10 4f 33 98 90 9f d4 30 1d 06 03 55 1d 0e 04 16 04 14 48 e6 68 f9 2b d2 b2 95 d7 47 d8 23 20 10 4f 33 98 90 9f d4 30 0c 06 03 55 1d 13 04 05 30 03 01 01 ff 30 1a 06 09 2a 86 48 86 f6 7d 07 41 00 04 0d 30 0b 1b 05 56 33 2e 30 63 03 02 06 c0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 58 ce 29 ea fc f7 de b5 ce 02 b9 17 b5 85 d1 b9 e3 e0 95 cc 25 31 0d 00 a6 92 6e 7f b6 92 63 9e 50 95 d1 9a 6f e4 11 de 63 85 6e 98 ee a8 ff 5a c8 d3 55 b2 66 71 57 de c0 21 eb 3d 2a a7 23 49 01 04 86 42 7b fc ee 7f a2 16 52 b5 67 67 d3 40 db 3b 26 58 b2 28 77 3d ae 14 77 61 d6 fa 2a 66 27 a0 0d fa a7 73 5c ea 70 f1 94 21 65 44 5f fa fc ef 29 68 a9 a2 87 79 ef 79 ef 4f ac 07 77 38 16 03 01 00 0d 0d 00 00 05 02 01 02 00 00 0e 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=153 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=623) - Flags 0x00 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server hello A >TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1 buf='/C=US/O=Equifax/OU=Equifax Secure Certificate Authority' >TLS: tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0 buf='/C=US/O=IBM/CN=usacsw01.bluewireless.ibm.com' >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server certificate request A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read server done A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client certificate A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write client key exchange A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write certificate verify A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write change cipher spec A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 write finished A >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 flush data >SSL: (where=0x1002 ret=0xffffffff) >SSL: SSL_connect:error in SSLv3 read finished A >SSL: SSL_connect - want more data >SSL: 3856 bytes pending from ssl_out >SSL: 3856 bytes left to be sent out (of total 3856 bytes) >SSL: sending 1398 bytes, more fragments will follow >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=1412): 01 00 05 80 02 99 05 80 0d c0 00 00 0f 10 16 03 01 0d ba 0b 00 0d b6 00 0d b3 00 05 73 30 82 05 6f 30 82 04 d8 a0 03 02 01 02 02 10 2b ec 4d 22 9b c2 fb 23 af 5a db db 6e 59 f9 06 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 f9 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 34 30 32 06 03 55 04 0a 13 2b 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 42 75 73 69 6e 65 73 73 20 4d 61 63 68 69 6e 65 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3b 30 39 06 03 55 04 0b 13 32 54 65 72 6d 73 20 6f 66 20 75 73 65 20 61 74 20 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 20 28 63 29 30 33 31 30 30 2e 06 03 55 04 0b 13 27 43 6c 61 73 73 20 32 20 4f 6e 53 69 74 65 20 49 6e 64 69 76 69 64 75 61 6c 20 53 75 62 73 63 72 69 62 65 72 20 43 41 31 24 30 22 06 03 55 04 03 13 1b 49 42 4d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 30 1e 17 0d 30 37 30 39 32 37 30 30 30 30 30 30 5a 17 0d 30 38 30 39 32 36 32 33 35 39 35 39 5a 30 81 92 31 2e 30 2c 06 03 55 04 0a 14 25 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 42 75 73 69 6e 65 73 73 20 4d 61 63 68 69 6e 65 73 20 43 6f 72 70 2e 31 19 30 17 06 03 55 04 03 0c 10 44 2e 20 4d 2e 20 57 69 6c 6c 69 61 6d 73 6f 6e 31 19 30 17 06 0a 09 92 26 89 93 f2 2c 64 01 01 14 09 30 39 36 31 33 37 37 38 38 31 2a 30 28 06 09 2a 86 48 86 f7 0d 01 09 01 16 1b 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 c1 5b 20 a4 47 f9 44 4e 74 ae 6a 51 8e 98 06 f4 a1 2e 1a 11 31 88 27 2b 01 e6 e9 4f 70 23 62 09 93 32 80 b0 03 00 44 1c f7 ce 99 56 25 16 7b b9 57 88 b8 7d 28 d4 b9 37 6f 88 c8 9b 0d d5 eb a3 df a8 b0 b6 46 a3 bf 8e d3 2d b2 d3 11 31 0e 8b b9 a0 4d 91 6d 80 e2 2d 15 29 d0 f3 fc 49 1b 95 2a dc 27 5c 0c d9 13 98 5c cd 7f 16 7c f6 f9 23 63 ca af 66 cd 74 17 b7 34 a4 6d d2 9e 05 ae e1 02 03 01 00 01 a3 82 02 5b 30 82 02 57 30 09 06 03 55 1d 13 04 02 30 00 30 0b 06 03 55 1d 0f 04 04 03 02 05 a0 30 66 06 03 55 1d 1f 04 5f 30 5d 30 5b a0 59 a0 57 86 55 68 74 74 70 3a 2f 2f 6f 6e 73 69 74 65 63 72 6c 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 42 75 73 69 6e 65 73 73 4d 61 63 68 69 6e 65 73 43 6f 72 70 43 6f 72 70 6f 72 61 74 65 43 49 4f 2f 4c 61 74 65 73 74 43 52 4c 30 82 01 29 06 03 55 1d 20 04 82 01 20 30 82 01 1c 30 82 01 18 06 0b 60 86 48 01 86 f8 45 01 07 17 02 30 82 01 07 30 2b 06 08 2b 06 01 05 05 07 02 01 16 1f 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 2d 6b 72 30 81 d7 06 08 2b 06 01 05 05 07 02 02 30 81 ca 1a 81 c7 4e 6f 74 69 63 65 20 54 65 78 74 3d 4e 4f 54 49 43 45 3a 20 50 72 69 76 61 74 65 20 6b 65 79 20 6d 61 79 20 62 65 20 72 65 63 6f 76 65 72 65 64 20 62 79 20 56 65 72 69 53 69 67 6e 27 73 20 63 75 73 74 6f 6d 65 72 20 77 68 6f 20 6d 61 79 20 62 65 20 61 62 6c 65 20 74 6f 20 64 65 63 72 79 70 74 20 6d 65 73 73 61 67 65 73 20 79 6f 75 20 73 65 6e 64 20 74 6f 20 63 65 72 74 69 66 69 63 61 74 65 20 68 6f 6c 64 65 72 2e 20 20 55 73 65 20 69 73 20 73 75 62 6a 65 63 74 20 74 6f 20 74 65 72 6d 73 20 61 74 20 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 2d 6b 72 30 1f 06 03 55 1d 23 04 18 30 16 80 14 91 c1 73 b0 73 d5 d9 92 74 67 cd 1b f1 51 14 34 31 b6 2c 5a 30 1d 06 03 55 1d 0e 04 16 04 14 9e 70 f9 01 b4 67 66 96 3e 24 0e a1 17 8c b1 06 75 a5 0e 51 30 36 06 03 55 1d 11 04 2f 30 2d a0 2b 06 0a 2b 06 01 04 01 82 37 14 02 03 a0 1d 0c 1b 67 72 61 6e 74 5f 77 69 6c 6c 69 61 6d 73 6f 6e 40 6e 6c 2e 69 62 6d 2e 63 6f 6d 30 1d 06 03 55 1d 25 04 16 30 14 06 08 2b 06 01 05 05 07 03 02 06 08 2b 06 01 05 05 07 03 04 30 11 06 09 60 86 48 01 86 f8 42 01 01 04 04 03 02 05 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 c5 35 2d be ad fa bb b6 f6 6b 22 15 e6 05 db 51 37 44 ba 0f 77 61 eb 6a 53 0e 75 86 e1 1f 66 22 83 01 38 b2 b0 a3 88 7a 1c 14 ae cc 30 b7 3b d8 2c 55 d3 77 69 bb bd c5 d1 11 3f bd 4b ef 29 12 78 3c 81 75 2e fb 30 bb 22 d2 9e 8f 38 7a 69 62 27 bd fd af 64 3f b3 26 b1 22 82 f9 b9 e5 a4 ba da 84 0d ec c6 78 36 6d bb 10 3a 51 c1 60 18 1d 4c 21 82 83 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=46): 01 00 00 06 01 9a 00 06 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=154 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x00 >SSL: 2458 bytes left to be sent out (of total 3856 bytes) >SSL: sending 1398 bytes, more fragments will follow >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=1408): 01 00 05 7c 02 9a 05 7c 0d 40 d5 d5 82 f3 c3 dc 6d 65 ba 68 51 f8 00 05 30 30 82 05 2c 30 82 04 95 a0 03 02 01 02 02 10 3a 9c 37 ad 1e c8 53 16 1b 45 c8 55 00 4b 35 98 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 30 1e 17 0d 30 33 30 35 30 36 30 30 30 30 30 30 5a 17 0d 31 33 30 35 30 35 32 33 35 39 35 39 5a 30 81 f9 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 34 30 32 06 03 55 04 0a 13 2b 49 6e 74 65 72 6e 61 74 69 6f 6e 61 6c 20 42 75 73 69 6e 65 73 73 20 4d 61 63 68 69 6e 65 73 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 31 3b 30 39 06 03 55 04 0b 13 32 54 65 72 6d 73 20 6f 66 20 75 73 65 20 61 74 20 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 20 28 63 29 30 33 31 30 30 2e 06 03 55 04 0b 13 27 43 6c 61 73 73 20 32 20 4f 6e 53 69 74 65 20 49 6e 64 69 76 69 64 75 61 6c 20 53 75 62 73 63 72 69 62 65 72 20 43 41 31 24 30 22 06 03 55 04 03 13 1b 49 42 4d 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 d5 67 ad 35 dd a0 7e fd 57 61 d6 9d a7 17 cb b9 a3 8d 23 5c 9c e8 b7 67 e7 17 48 18 7d b9 20 e1 08 b0 14 51 eb af a0 7b 9b b8 0e 48 9a b2 48 e6 4f dd 03 e4 34 2f e5 8d cd 1e ce 66 be 13 46 9c 37 0c e9 2c 61 2f f4 a3 e4 59 e7 e9 6e 27 b9 6d 5d c7 55 82 c1 d4 ea aa 87 0e 9b c5 d6 10 1e 82 aa 4d cf ae f4 25 55 5f 52 ce 13 84 2d 40 69 f3 08 04 7c 26 25 ba 85 1b 82 32 df d3 87 df ba 01 02 03 01 00 01 a3 82 01 e9 30 82 01 e5 30 12 06 03 55 1d 13 01 01 ff 04 08 30 06 01 01 ff 02 01 00 30 44 06 03 55 1d 20 04 3d 30 3b 30 39 06 0b 60 86 48 01 86 f8 45 01 07 17 02 30 2a 30 28 06 08 2b 06 01 05 05 07 02 01 16 1c 68 74 74 70 73 3a 2f 2f 77 77 77 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 72 70 61 30 34 06 03 55 1d 1f 04 2d 30 2b 30 29 a0 27 a0 25 86 23 68 74 74 70 3a 2f 2f 63 72 6c 2e 76 65 72 69 73 69 67 6e 2e 63 6f 6d 2f 70 63 61 32 2d 67 32 2e 63 72 6c 30 0b 06 03 55 1d 0f 04 04 03 02 01 06 30 11 06 09 60 86 48 01 86 f8 42 01 01 04 04 03 02 01 06 30 29 06 03 55 1d 11 04 22 30 20 a4 1e 30 1c 31 1a 30 18 06 03 55 04 03 13 11 50 72 69 76 61 74 65 4c 61 62 65 6c 32 2d 31 32 37 30 1d 06 03 55 1d 0e 04 16 04 14 91 c1 73 b0 73 d5 d9 92 74 67 cd 1b f1 51 14 34 31 b6 2c 5a 30 81 e8 06 03 55 1d 23 04 81 e0 30 81 dd a1 81 c7 a4 81 c4 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 82 11 00 b9 2f 60 cc 88 9f a1 7a 46 09 b8 5b 70 6c 8a af 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 97 0c 50 4f c6 33 b0 d2 19 64 9f 11 a5 04 2d 7f 05 75 4e 54 83 95 94 7c 95 4b 4d ce 2c e7 10 e3 f9 df 4f fe cc 68 df da 1f 09 87 32 06 b5 45 a5 eb 2c 6a 90 ca 0c 92 8a 0a ee b3 6d 23 70 29 2b 4c 37 bb 26 53 a4 d8 8b 24 f6 14 fd b5 e8 07 5b e7 0b 2e f7 88 31 6e 53 9b 16 89 ac da a1 bf 06 e1 87 6c 5c 6d 6c 80 40 88 23 65 15 c4 64 eb da cf 50 6b bf 10 eb d0 79 40 11 f9 46 f5 36 48 cf 00 03 07 30 82 03 03 30 82 02 6c 02 11 00 b9 2f 60 cc 88 9f a1 7a 46 09 b8 5b 70 6c 8a af 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 30 81 c1 31 0b 30 09 06 03 55 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=46): 01 00 00 06 01 9b 00 06 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=155 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=6) - Flags 0x00 >SSL: 1060 bytes left to be sent out (of total 3856 bytes) >EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=1070): 01 00 04 2a 02 9b 04 2a 0d 00 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 30 1e 17 0d 39 38 30 35 31 38 30 30 30 30 30 30 5a 17 0d 32 38 30 38 30 31 32 33 35 39 35 39 5a 30 81 c1 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 17 30 15 06 03 55 04 0a 13 0e 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 31 3c 30 3a 06 03 55 04 0b 13 33 43 6c 61 73 73 20 32 20 50 75 62 6c 69 63 20 50 72 69 6d 61 72 79 20 43 65 72 74 69 66 69 63 61 74 69 6f 6e 20 41 75 74 68 6f 72 69 74 79 20 2d 20 47 32 31 3a 30 38 06 03 55 04 0b 13 31 28 63 29 20 31 39 39 38 20 56 65 72 69 53 69 67 6e 2c 20 49 6e 63 2e 20 2d 20 46 6f 72 20 61 75 74 68 6f 72 69 7a 65 64 20 75 73 65 20 6f 6e 6c 79 31 1f 30 1d 06 03 55 04 0b 13 16 56 65 72 69 53 69 67 6e 20 54 72 75 73 74 20 4e 65 74 77 6f 72 6b 30 81 9f 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 81 8d 00 30 81 89 02 81 81 00 a7 88 01 21 74 2c e7 1a 03 f0 98 e1 97 3c 0f 21 08 f1 9c db 97 e9 9a fc c2 04 06 13 be 5f 52 c8 cc 1e 2c 12 56 2c b8 01 69 2c cc 99 1f ad b0 96 ae 79 04 f2 13 39 c1 7b 98 ba 08 2c e8 c2 84 13 2c aa 69 e9 09 f4 c7 a9 02 a4 42 c2 23 4f 4a d8 f0 0e a2 fb 31 6c c9 e6 6f 99 27 07 f5 e6 f4 4c 78 9e 6d eb 46 86 fa b9 86 c9 54 f2 b2 c4 af d4 46 1c 5a c9 15 30 ff 0d 6c f5 2d 0e 6d ce 7f 77 02 03 01 00 01 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 72 2e f9 7f d1 f1 71 fb c4 9e f6 c5 5e 51 8a 40 98 b8 68 f8 9b 1c 83 d8 e2 9d bd ff ed a1 e6 66 ea 2f 09 f4 ca d7 ea a5 2b 95 f6 24 60 86 4d 44 2e 83 a5 c4 2d a0 d3 ae 78 69 6f 72 da 6c ae 08 f0 63 92 37 e6 bb c4 30 17 ad 77 cc 49 35 aa cf d8 8f d1 be b7 18 96 47 73 6a 54 22 34 64 2d b6 16 9b 59 5b b4 51 59 3a b3 0b 14 f4 12 df 67 a0 f4 ad 32 64 5e b1 46 72 27 8c 12 7b c5 44 b4 ae 16 03 01 00 86 10 00 00 82 00 80 25 a7 5c 44 aa 1c f2 a7 8d b6 a2 97 e7 0f 29 a6 73 76 03 16 ea 10 90 59 9a 7b 41 a5 b0 61 51 03 78 c0 fb 83 1a c8 54 c3 ac a4 22 d6 20 1e ac 44 eb c2 fe 40 76 24 42 4a 31 ad 49 34 8d a1 31 29 1c a4 d6 92 c0 45 6a 1b 34 09 a4 13 eb 18 a0 e5 92 85 a9 53 4a e1 74 fd 23 98 62 d9 62 1c ac 00 aa 70 a1 6a 9a b1 c5 3d 23 79 80 d1 9f 93 48 b5 31 2b cb 46 b6 45 99 74 60 aa 85 a4 fa 1c c6 ed 16 03 01 00 86 0f 00 00 82 00 80 43 ae 1c 3b 45 59 92 c7 eb 69 6f fc c2 44 c3 64 db 3a 9b c5 78 f3 92 0f 59 9c 3b cb 9d e4 d5 5b cb 26 c6 2d e7 a8 da a8 c1 74 cf 51 15 84 34 dd ea 0e cf 1f 8a 46 d2 b8 ef e0 a0 57 d5 3a e2 6e 24 61 01 9a 7e 57 c0 a2 7d de 8d 73 6b 31 4c c6 ff 38 ed 53 86 dd 07 f1 3e 9c 3d 4d 5f ed 88 45 f6 3b bd b2 bd af e1 1e bc 8e 4e ba 91 91 2d 9e 35 05 3e c9 ca 4b 17 d4 72 9b c1 29 41 ad 2d f7 14 03 01 00 01 01 16 03 01 00 30 2a d3 df 29 70 46 3f 2f 85 a0 c3 9e 8c 1c bb c6 b0 7a df 42 7b 85 31 4c 0a b8 4c d2 0c d6 a7 ec 69 d1 72 e4 7a 7a a3 6d 04 20 86 dc e3 d9 37 fa >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=73): 01 00 00 45 01 9c 00 45 0d 80 00 00 00 3b 14 03 01 00 01 01 16 03 01 00 30 f7 c4 2b 49 c7 fe d7 90 9a 70 d1 67 2d 01 77 96 11 1d 55 ff 33 3b 87 28 dd 1b f1 61 15 8d d9 cb dc 80 cb 75 7d 7b de 9e 2b 8a a0 bf 84 3c 95 ee >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Request id=156 method=13 vendor=0 vendorMethod=0 >EAP: EAP entering state METHOD >SSL: Received packet(len=69) - Flags 0x80 >SSL: TLS Message Length: 59 >SSL: (where=0x1001 ret=0x1) >SSL: SSL_connect:SSLv3 read finished A >SSL: (where=0x20 ret=0x1) >SSL: (where=0x1002 ret=0x1) >SSL: 0 bytes pending from ssl_out >OpenSSL: tls_connection_handshake - Failed to read possible Application Data error:00000000:lib(0):func(0):reason(0) >SSL: No data to be sent out >EAP-TLS: Done >EAP-TLS: Derived key - hexdump(len=64): [REMOVED] >EAP-TLS: Derived EMSK - hexdump(len=64): [REMOVED] >SSL: Building ACK (type=13 id=156 ver=0) >EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC >EAP: EAP entering state SEND_RESPONSE >EAP: EAP entering state IDLE >EAPOL: SUPP_BE entering state RESPONSE >EAPOL: txSuppRsp >TX EAPOL: dst=00:0e:83:60:02:80 >TX EAPOL - hexdump(len=10): 01 00 00 06 02 9c 00 06 0d 00 >EAPOL: SUPP_BE entering state RECEIVE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=46): 01 00 00 04 03 9c 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Received EAP-Packet frame >EAPOL: SUPP_BE entering state REQUEST >EAPOL: getSuppRsp >EAP: EAP entering state RECEIVED >EAP: Received EAP-Success >EAP: EAP entering state SUCCESS >CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully >EAPOL: SUPP_BE entering state RECEIVE >EAPOL: SUPP_BE entering state SUCCESS >EAPOL: SUPP_BE entering state IDLE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=95 > EAPOL-Key type=254 > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) > key_length=32 key_data_length=0 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 > key_nonce - hexdump(len=32): 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >State: ASSOCIATED -> 4WAY_HANDSHAKE >WPA: RX message 1 of 4-Way Handshake from 00:0e:83:60:02:80 (ver=1) >EAPOL: Successfully fetched key (len=32) >WPA: PMK from EAPOL state machines - hexdump(len=32): [REMOVED] >WPA: Renewed SNonce - hexdump(len=32): cf f2 86 51 93 84 c2 d6 74 e4 f2 1a 64 7e a9 0a bf 1d 08 dd 3a 01 3d 55 e7 4c 6e 6f 22 58 ef e8 >WPA: PTK derivation - A1=00:1f:3b:39:50:17 A2=00:0e:83:60:02:80 >WPA: PMK - hexdump(len=32): [REMOVED] >WPA: PTK - hexdump(len=64): [REMOVED] >WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 >WPA: Sending EAPOL-Key 2/4 >WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 cf f2 86 51 93 84 c2 d6 74 e4 f2 1a 64 7e a9 0a bf 1d 08 dd 3a 01 3d 55 e7 4c 6e 6f 22 58 ef e8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f 29 99 e2 a9 d3 41 16 51 68 09 2a fe 29 05 ba 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 da 38 28 b6 86 6c bc 07 a3 1d d2 77 c6 25 d2 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=121 > EAPOL-Key type=254 > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC) > key_length=32 key_data_length=26 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 > key_nonce - hexdump(len=32): 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): e8 da 38 28 b6 86 6c bc 07 a3 1d d2 77 c6 25 d2 >WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 4c d4 3f 3b ff c9 e1 94 61 33 ac 4d db f2 c0 31 fc 1d 7c d0 ee 70 6c b7 43 61 7b d5 ed 63 9c 1e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 da 38 28 b6 86 6c bc 07 a3 1d d2 77 c6 25 d2 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE >WPA: RX message 3 of 4-Way Handshake from 00:0e:83:60:02:80 (ver=1) >WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 05 01 00 00 50 f2 02 01 00 00 50 f2 01 28 00 >WPA: Sending EAPOL-Key 4/4 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7d 9d 69 64 28 7f c6 60 fd 6f 06 57 63 49 00 13 00 00 >WPA: Installing PTK to the driver. >WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 >wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32 >State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE >RX EAPOL from 00:0e:83:60:02:80 >RX EAPOL - hexdump(len=112): 01 03 00 6c fe 03 91 00 0d 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 b2 11 18 3c 4c 88 18 a0 9d c5 0b dd 16 6d 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 22 44 84 5c a5 3c 9a cf 97 6a d7 f3 f9 e9 df 00 0d ce 0a 44 b6 ce 80 5d e8 3c 44 52 de f6 >EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines >IEEE 802.1X RX: version=1 type=3 length=108 > EAPOL-Key type=254 > key_info 0x391 (ver=1 keyidx=1 rsvd=0 Group Ack MIC Secure) > key_length=13 key_data_length=13 > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 > key_nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > key_iv - hexdump(len=16): c4 b2 11 18 3c 4c 88 18 a0 9d c5 0b dd 16 6d 60 > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 > key_mic - hexdump(len=16): bf 22 44 84 5c a5 3c 9a cf 97 6a d7 f3 f9 e9 df >WPA: RX EAPOL-Key - hexdump(len=112): 01 03 00 6c fe 03 91 00 0d 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c4 b2 11 18 3c 4c 88 18 a0 9d c5 0b dd 16 6d 60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 bf 22 44 84 5c a5 3c 9a cf 97 6a d7 f3 f9 e9 df 00 0d ce 0a 44 b6 ce 80 5d e8 3c 44 52 de f6 >WPA: RX message 1 of Group Key Handshake from 00:0e:83:60:02:80 (ver=1) >State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE >WPA: Group Key - hexdump(len=13): [REMOVED] >WPA: Installing GTK to the driver (keyidx=1 tx=0 len=13). >WPA: RSC - hexdump(len=0): >wpa_driver_wext_set_key: alg=1 key_idx=1 set_tx=0 seq_len=0 key_len=13 >WPA: Sending EAPOL-Key 2/2 >WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 11 00 0d 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 e8 b6 76 59 08 51 53 95 b6 79 fc f0 da a0 65 00 00 >WPA: Key negotiation completed with 00:0e:83:60:02:80 [PTK=TKIP GTK=WEP-104] >Cancelling scan request >Cancelling authentication timeout >State: GROUP_HANDSHAKE -> COMPLETED >CTRL-EVENT-CONNECTED - Connection to 00:0e:83:60:02:80 completed (auth) [id=0 id_str=] >wpa_driver_wext_set_operstate: operstate 0->1 (UP) >WEXT: Operstate: linkmode=-1, operstate=6 >EAPOL: External notification - portValid=1 >EAPOL: SUPP_PAE entering state AUTHENTICATED >EAPOL authentication completed successfully >RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) >RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added >^CCTRL-EVENT-TERMINATING - signal 2 received >Removing interface wlan0 >State: COMPLETED -> DISCONNECTED >wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT) >WEXT: Operstate: linkmode=-1, operstate=5 >wpa_driver_wext_deauthenticate >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0 >wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0 >EAPOL: External notification - portEnabled=0 >EAPOL: SUPP_PAE entering state DISCONNECTED >EAPOL: SUPP_BE entering state INITIALIZE >EAP: EAP entering state DISABLED >EAPOL: External notification - portValid=0 >wpa_driver_wext_set_wpa >wpa_driver_wext_set_drop_unencrypted >wpa_driver_wext_set_countermeasures >ioctl[SIOCSIWAUTH]: Operation not supported >WEXT auth param 4 value 0x0 - No keys have been configured - skip key clearing >EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit >ENGINE: engine deinit >Cancelling scan request >Cancelling authentication timeout >WEXT: Operstate: linkmode=0, operstate=6 >[root@lc4eb6632784342 test-ibm-wireless]# exit > >Script done on Tue 29 Jul 2008 11:35:41 AM EDT
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 459027
: 314248 |
314249
|
314250