Hi Fabien,

On Wed, Sep 15, 2010 at 05:31:20PM +0200, Fabien Marotte wrote:
> Hi,
> 
> I recently updated my meego build. With this build, I have connman 0.59.
> 
> I try to do a PEAP authentication. I put my peap.config in
> /var/lib/connman folder. (See it below)
> 
> [global]
> Name = EAP-PEAP
> Description = EAP PEAP connman configuration file
> 
> [service_peap]
> Type = wifi
> Name = MYNETWORK
> EAP = peap
> CACertFile = /var/lib/connman/ca.pem
> Phase2 = MSCHAPV2
> Identity = wifi-user
> 
> 
> When I launch connmand, I get this log:
> connmand[2423]: Connection Manager version 0.61
> connmand[2423]: Adding configuration peap
> connmand[2423]: Adding service configuration peap
> connmand[2423]: Checking loopback interface settings
> connmand[2423]: System hostname is localhost.localdomain
> connmand[2423]: System domainname is WRVS4400Nv2
> connmand[2423]: Adding profile default
> connmand[2423]: Failed to open RFKILL control device
> connmand[2423]: lo {newlink} index 1 operstate 0 <UNKNOWN>
> connmand[2423]: tunl0 {newlink} index 2 address 00:00:00:00:08:00 mtu 1480
> connmand[2423]: tunl0 {newlink} index 2 operstate 2 <DOWN>
> connmand[2423]: eth0 {create} index 3 type 1 <ETHER>
> connmand[2423]: eth0 {RX} 7519 packets 7520533 bytes
> connmand[2423]: eth0 {TX} 2178 packets 385909 bytes
> connmand[2423]: eth0 {update} flags 69699 <UP,RUNNING,LOWER_UP>
> connmand[2423]: eth0 {newlink} index 3 address 00:50:B6:05:D6:4D mtu 1500
> connmand[2423]: eth0 {newlink} index 3 operstate 6 <UP>
> connmand[2423]: Create interface eth0 [ ethernet ]
> connmand[2423]: eth0 up
> connmand[2423]: eth0 lower up
> connmand[2423]: wlan0 {create} index 4 type 1 <ETHER>
> connmand[2423]: wlan0 {RX} 75 packets 30704 bytes
> connmand[2423]: wlan0 {TX} 93 packets 11843 bytes
> connmand[2423]: wlan0 {update} flags 4099 <UP>
> connmand[2423]: wlan0 {newlink} index 4 address C6:D5:51:B2:87:93 mtu 1500
> connmand[2423]: wlan0 {newlink} index 4 operstate 2 <DOWN>
> connmand[2423]: Create interface wlan0 [ wifi ]
> connmand[2423]: wlan0 {scan} capabilities 0x01
> connmand[2423]: wlan0 {quality} flags 0x4b
> connmand[2423]: eth0 {add} address 172.28.193.221/24 label eth0
> connmand[2423]: eth0 ip bound
> connmand[2423]: eth0 {add} route 172.28.193.0 gw 0.0.0.0 scope 253 <LINK>
> connmand[2423]: lo {newlink} index 1 operstate 0 <UNKNOWN>
> connmand[2423]: tunl0 {newlink} index 2 address 00:00:00:00:08:00 mtu 1480
> connmand[2423]: tunl0 {newlink} index 2 operstate 2 <DOWN>
> connmand[2423]: eth0 {RX} 7519 packets 7520533 bytes
> connmand[2423]: eth0 {TX} 2179 packets 386503 bytes
> connmand[2423]: eth0 {newlink} index 3 address 00:50:B6:05:D6:4D mtu 1500
> connmand[2423]: eth0 {newlink} index 3 operstate 6 <UP>
> connmand[2423]: wlan0 {RX} 75 packets 30704 bytes
> connmand[2423]: wlan0 {TX} 93 packets 11843 bytes
> connmand[2423]: wlan0 {newlink} index 4 address C6:D5:51:B2:87:93 mtu 1500
> connmand[2423]: wlan0 {newlink} index 4 operstate 2 <DOWN>
> connmand[2423]: wlan0 SCANNING (scanning)
> connmand[2423]: wlan0 scanning started
> connmand[2423]: wlan0 scanning finished
> connmand[2423]: wlan0 INACTIVE (scanning)
> connmand[2423]: wlan0 up
> connmand[2423]: wlan0 lower down
> connmand[2423]: Aborting (signal 11)
> connmand[2423]: ++++++++ backtrace ++++++++
> connmand[2423]: [0]: [0xb7846400]
> connmand[2423]: [1]: /lib/libdbus-1.so.3() [0x76f7cb]
> connmand[2423]: [2]:
> /lib/libdbus-1.so.3(dbus_message_iter_append_basic+0x199) [0x773c99]
> connmand[2423]: [3]:
> connmand(connman_dbus_property_append_basic+0x6e) [0x808781e]
> connmand[2423]: [4]: connmand() [0x805c44d]
> connmand[2423]: [5]: connmand() [0x806f577]
> connmand[2423]: [6]: connmand() [0x80771d4]
> connmand[2423]: [7]: connmand() [0x8077850]
> connmand[2423]: [8]: connmand() [0x807834d]
> connmand[2423]: [9]: connmand() [0x807349b]
> connmand[2423]: [10]: connmand() [0x805ac45]
> connmand[2423]: [11]: /lib/libdbus-1.so.3() [0x778c02]
> connmand[2423]: [12]: /lib/libdbus-1.so.3() [0x765f27]
> connmand[2423]: [13]:
> /lib/libdbus-1.so.3(dbus_connection_dispatch+0xb1) [0x7661e1]
> connmand[2423]: [14]: connmand() [0x8051f20]
> connmand[2423]: [15]: /lib/libglib-2.0.so.0() [0x4cc9cd]
> connmand[2423]: [16]:
> /lib/libglib-2.0.so.0(g_main_context_dispatch+0x1b7) [0x4cb7f9]
> connmand[2423]: [17]: /lib/libglib-2.0.so.0() [0x4cbe20]
> connmand[2423]: [18]: /lib/libglib-2.0.so.0(g_main_loop_run+0x221)
> [0x4cc3b7]
> connmand[2423]: [19]: connmand() [0x8067022]
> connmand[2423]: [20]: /lib/libc.so.6(__libc_start_main+0xe7) [0x280bb7]
> connmand[2423]: [21]: connmand() [0x80517e1]
> connmand[2423]: +++++++++++++++++++++++++++
> 
> Note that this crash also appear with latest connman from git.
> 
> I look into the problem and discovered that set_network_peap() is
> called with a NULL passphrase at connman loading.
> 
> I added a check in the function to return an error if passphrase is
> NULL. It fixes the problem.
> 
> However, I don't understand why connman is trying to connect to the
> network. Note I remove every time default.profile before launching
> connman.
> 
> Is it the correct behavior ?
No, it's not. I'm going to try to reproduce this issue and will let you know.

Cheers,
Samuel.

-- 
Intel Open Source Technology Centre
http://oss.intel.com/
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman

Reply via email to