On Sun, 2007-06-03 at 16:49 +0200, Bernhard Kirchen wrote: > Hello. > I just installed Ubuntu 7.04 i386 on my computer and tried to use > NetworkManager to get WLAN working. It seems to work with WEP > encryption but fails on networks using WPA2 (couldn't test WPA...) > saying: "The requested wireless network requires security capabilities > unsupported by your hardware.". Using wpa_supplicant everything works
Is this the mac80211-based rtl8187 driver? This warning usually means the drivers enc_capa structure does not advertise WPA capability. The driver must be fixed if that's the case. Dan > fine. So I decided to try nm-supplicant-test as instructed on > http://live.gnome.org/DarrenAlbers/NetworkManagerFAQ#head-9f05a33be82ed12cc767099bb885456fa35c95bf > which also connects to the network. After calling dhclient the connection > to the internet is established. First, I want to give you the output of > "NetworkManager --no-daemon" till I want to connect to the wireless network > using WPA2 and the popup appears: > NetworkManager: <information> starting... > NetworkManager: <information> wlan0: Device is fully-supported using > driver 'rtl8187'. > NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode > (): error setting card wlan0 to Infrastructure mode: Device or > resource busy > NetworkManager: <information> nm_device_init(): waiting for device's > worker thread to start > NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode > (): error setting card wlan0 to Infrastructure mode: Device or > resource busy > NetworkManager: <information> nm_device_init(): device's worker > thread started, continuing. > NetworkManager: <information> Now managing wireless (802.11) device > 'wlan0'. > NetworkManager: <information> Deactivating device wlan0. > NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode > (): error setting card wlan0 to Infrastructure mode: Device or > resource busy > NetworkManager: <information> Updating allowed wireless network > lists. > NetworkManager: <WARNING> nm_dbus_get_networks_cb (): error > received: org.freedesktop.NetworkManagerInfo.NoNetworks - There are no > wireless networks stored.. > NetworkManager: <debug info> [1180881688.400603] > nm_device_802_11_wireless_get_activation_ap (): Forcing AP > 'linksys_std' > NetworkManager: <information> User > Switch: /org/freedesktop/NetworkManager/Devices/wlan0 / linksys_std > NetworkManager: <information> Deactivating device wlan0. > NetworkManager: <WARNING> nm_device_802_11_wireless_set_mode > (): error setting card wlan0 to Infrastructure mode: Device or > resource busy > NetworkManager: <information> Device wlan0 activation scheduled... > NetworkManager: <information> Activation (wlan0) started... > NetworkManager: <information> Activation (wlan0) Stage 1 of 5 > (Device Prepare) scheduled... > NetworkManager: <information> Activation (wlan0) Stage 1 of 5 > (Device Prepare) started... > NetworkManager: <information> Activation (wlan0) Stage 2 of 5 > (Device Configure) scheduled... > NetworkManager: <information> Activation (wlan0) Stage 1 of 5 > (Device Prepare) complete. > NetworkManager: <information> Activation (wlan0) Stage 2 of 5 > (Device Configure) starting... > NetworkManager: <information> Activation (wlan0/wireless): access > point 'linksys_std' is encrypted, but NO valid key exists. New key > needed. > NetworkManager: <information> Activation (wlan0) New wireless user > key requested for network 'linksys_std'. > NetworkManager: <information> Activation (wlan0) Stage 2 of 5 > (Device Configure) complete. > > > > > > > > Output of nm-supplicant-test is attached to this email. > > Hope emailing this to you was a good idea, > > Bernhard Kirchen > > > > ______________________________________________________________________ > Yahoo! Clever: Stellen Sie Fragen und finden Sie Antworten. Teilen Sie > Ihr Wissen. > plain text document attachment (output.txt), "1379444201-output.txt" > Key: ssid, Value: "linksys_std" > Key: scan_ssid, Value: 1 > Key: psk, Value: > 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f > Key: proto, Value: WPA2 > Key: key_mgmt, Value: WPA-PSK > Key: pairwise, Value: CCMP TKIP > Key: group, Value: CCMP TKIP > SUP: sending command 'INTERFACE_ADD wlan0 wext > /var/run/wpa_supplicant ' > SUP: response was 'OK' > SUP: sending command 'AP_SCAN 1' > SUP: response was 'OK' > SUP: sending command 'ADD_NETWORK' > SUP: response was '0' > SUP: sending command 'SET_NETWORK 0 ssid "linksys_std"' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 scan_ssid 1' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 psk > 5da49954f593287de202152c13d53e2acf8ebd50375d46adb01dbbdc923c540f' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 proto WPA2' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 key_mgmt WPA-PSK' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 pairwise CCMP TKIP' > SUP: response was 'OK' > SUP: sending command 'SET_NETWORK 0 group CCMP TKIP' > SUP: response was 'OK' > SUP: sending command 'ENABLE_NETWORK 0' > SUP: response was 'OK' > wpa_supplicant(8049): Global control interface > '/var/run/wpa_supplicant-global' > wpa_supplicant(8049): RX global ctrl_iface - hexdump_ascii(len=50): > wpa_supplicant(8049): 49 4e 54 45 52 46 41 43 45 5f 41 44 44 20 77 6c > INTERFACE_ADD wl > wpa_supplicant(8049): 61 6e 30 09 09 77 65 78 74 09 2f 76 61 72 2f 72 > an0__wext_/var/r > wpa_supplicant(8049): 75 6e 2f 77 70 61 5f 73 75 70 70 6c 69 63 61 6e > un/wpa_supplican > wpa_supplicant(8049): 74 09 > t_ > wpa_supplicant(8049): CTRL_IFACE GLOBAL INTERFACE_ADD 'wlan0 wext > /var/run/wpa_supplicant ' > wpa_supplicant(8049): Initializing interface 'wlan0' conf 'N/A' driver 'wext' > ctrl_interface '/var/run/wpa_supplicant' bridge 'N/A' > wpa_supplicant(8049): Initializing interface (2) 'wlan0' > wpa_supplicant(8049): EAPOL: SUPP_PAE entering state DISCONNECTED > wpa_supplicant(8049): EAPOL: KEY_RX entering state NO_KEY_RECEIVE > wpa_supplicant(8049): EAPOL: SUPP_BE entering state INITIALIZE > wpa_supplicant(8049): EAP: EAP entering state DISABLED > wpa_supplicant(8049): EAPOL: External notification - portEnabled=0 > wpa_supplicant(8049): EAPOL: External notification - portValid=0 > wpa_supplicant(8049): Could not configure driver to use managed mode > wpa_supplicant(8049): SIOCGIWRANGE: WE(compiled)=21 WE(source)=14 enc_capa=0x0 > wpa_supplicant(8049): capabilities: key_mgmt 0x0 enc 0x3 > wpa_supplicant(8049): e=1, operstate=5 > wpa_supplicant(8049): Own MAC address: 00:15:af:09:01:4a > wpa_supplicant(8049): wpa_driver_wext_set_wpa > wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 > seq_len=0 key_len=0 > wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 > seq_len=0 key_len=0 > wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 > seq_len=0 key_len=0 > wpa_supplicant(8049): wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 > seq_len=0 key_len=0 > wpa_supplicant(8049): wpa_driver_wext_set_countermeasures > wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted > wpa_supplicant(8049): Setting scan request: 0 sec 100000 usec > wpa_supplicant(8049): Added interface wlan0 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=9): > wpa_supplicant(8049): 41 50 5f 53 43 41 4e 20 31 > AP_SCAN 1 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=11): > wpa_supplicant(8049): 41 44 44 5f 4e 45 54 57 4f 52 4b > ADD_NETWORK > wpa_supplicant(8049): CTRL_IFACE: ADD_NETWORK > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='ssid' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=13): [REMOVED] > wpa_supplicant(8049): ssid - hexdump_ascii(len=11): > wpa_supplicant(8049): 6c 69 6e 6b 73 79 73 5f 73 74 64 > linksys_std > wpa_supplicant(8049): MOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='scan_ssid' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=1): [REMOVED] > wpa_supplicant(8049): scan_ssid=1 (0x1) > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=82): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='psk' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=64): [REMOVED] > wpa_supplicant(8049): PSK - hexdump(len=32): [REMOVED] > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=24): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='proto' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=4): [REMOVED] > wpa_supplicant(8049): proto: 0x2 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=30): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='key_mgmt' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=7): [REMOVED] > wpa_supplicant(8049): key_mgmt: 0x2 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=32): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='pairwise' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] > wpa_supplicant(8049): pairwise: 0x18 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=29): [REMOVED] > wpa_supplicant(8049): CTRL_IFACE: SET_NETWORK id=0 name='group' > wpa_supplicant(8049): CTRL_IFACE: value - hexdump_ascii(len=9): [REMOVED] > wpa_supplicant(8049): group: 0x18 > wpa_supplicant(8049): RX ctrl_iface - hexdump_ascii(len=16): > wpa_supplicant(8049): NABLE_NETWORK 0 > wpa_supplicant(8049): CTRL_IFACE: ENABLE_NETWORK id=0 > wpa_supplicant(8049): Setting scan request: 0 sec 0 usec > wpa_supplicant(8049): State: DISCONNECTED -> SCANNING > wpa_supplicant(8049): Starting AP scan (specific SSID) > wpa_supplicant(8049): Scan SSID - hexdump_ascii(len=11): > wpa_supplicant(8049): 6c 69 6e 6b 73 79 73 5f 73 74 64 > linksys_std > wpa_supplicant(8049): Trying to get current scan results first without > requesting a new scan to speed up initial association > wpa_supplicant(8049): Received 0 bytes of scan results (0 BSSes) > wpa_supplicant(8049): Scan results: 0 > wpa_supplicant(8049): Selecting BSS from priority group 0 > wpa_supplicant(8049): No suitable AP found. > wpa_supplicant(8049): Setting scan request: 0 sec 0 usec > wpa_supplicant(8049): Starting AP scan (broadcast SSID) > wpa_supplicant(8049): CTRL_IFACE monitor attached - hexdump(len=17): 2f 77 70 > 61 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00 > wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 > ([UP][LOWER_UP]) > wpa_supplicant(8049): Wireless event: cmd=0x8b19 len=8 > wpa_supplicant(8049): Received 260 bytes of scan results (2 BSSes) > wpa_supplicant(8049): Scan results: 2 > wpa_supplicant(8049): Selecting BSS from priority group 0 > wpa_supplicant(8049): 0: 00:12:17:16:09:66 ssid='linksys_std' wpa_ie_len=0 > rsn_ie_len=22 caps=0x11 > wpa_supplicant(8049): selected based on RSN IE > wpa_supplicant(8049): Trying to associate with 00:12:17:16:09:66 > (SSID='linksys_std' freq=2437 MHz) > wpa_supplicant(8049): CE monitor send - hexdump(len=17): 2f 77 70 61 5f 63 74 > 72 6c 5f 38 30 34 37 2d 32 00 > wpa_supplicant(8049): Cancelling scan request > wpa_supplicant(8049): WPA: clearing own WPA/RSN IE > wpa_supplicant(8049): Automatic auth_alg selection: 0x1 > wpa_supplicant(8049): RSN: using IEEE 802.11i/D9.0 > wpa_supplicant(8049): WPA: Selected cipher suites: group 16 pairwise 16 > key_mgmt 2 proto 2 > wpa_supplicant(8049): WPA: clearing AP WPA IE > wpa_supplicant(8049): WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f > ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): WPA: using GTK CCMP > wpa_supplicant(8049): WPA: using PTK CCMP > wpa_supplicant(8049): WPA: using KEY_MGMT WPA-PSK > wpa_supplicant(8049): WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 > 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): No keys have been configured - skip key clearing > wpa_supplicant(8049): wpa_driver_wext_set_drop_unencrypted > wpa_supplicant(8049): State: SCANNING -> ASSOCIATING > wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) > wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5 > wpa_supplicant(8049): wpa_driver_wext_associate > wpa_supplicant(8049): Association request to the driver failed > wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 > 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00 > wpa_supplicant(8049): Setting authentication timeout: 5 sec 0 usec > wpa_supplicant(8049): cation - EAP success=0 > wpa_supplicant(8049): EAPOL: External notification - EAP fail=0 > wpa_supplicant(8049): EAPOL: External notification - portControl=Auto > wpa_supplicant(8049): RSN: Ignored PMKID candidate without preauth flag > wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 > ([UP][LOWER_UP]) > wpa_supplicant(8049): Wireless event: cmd=0x8b04 len=12 > wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 > ([UP][LOWER_UP]) > wpa_supplicant(8049): Wireless event: cmd=0x8b1a len=19 > wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 > ([UP][LOWER_UP]) > wpa_supplicant(8049): Wireless event: cmd=0x8c02 len=185 > wpa_supplicant(8049): WEXT: Custom wireless event: > 'ASSOCINFO(ReqIEs=000b6c696e6b7379735f737464010802040b160c12182432043048606c30140100000fac040100000fac040100000fac020000 > RespIEs=010882848b9624b0486c32048c129860dd06001018020000)' > wpa_supplicant(8049): Association info event > wpa_supplicant(8049): req_ies - hexdump(len=51): 00 0b 6c 69 6e 6b 73 79 73 > 5f 73 74 64 01 08 02 04 0b 16 0c 12 18 24 32 04 30 48 60 6c 30 14 01 00 00 0f > ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 b0 48 > 6c 32 04 8c 12 98 60 dd 06 00 10 18 02 00 00 > wpa_supplicant(8049): 4 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): RTM_NEWLINK: operstate=0 ifi_flags=0x11003 > ([UP][LOWER_UP]) > wpa_supplicant(8049): Wireless event: cmd=0x8b15 len=20 > wpa_supplicant(8049): Wireless event: new AP: 00:12:17:16:09:66 > wpa_supplicant(8049): State: ASSOCIATING -> ASSOCIATED > wpa_supplicant(8049): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT) > wpa_supplicant(8049): WEXT: Operstate: linkmode=-1, operstate=5 > wpa_supplicant(8049): Associated to a new BSS: BSSID=00:12:17:16:09:66 > wpa_supplicant(8049): No keys have been configured - skip key clearing > wpa_supplicant(8049): Associated with 00:12:17:16:09:66 > wpa_supplicant(8049): CTRL_IFACE monitor send - hexdump(len=17): 2f 77 70 61 > 5f 63 74 72 6c 5f 38 30 34 37 2d 32 00 > wpa_supplicant(8049): WPA: Association event - clear replay counter > wpa_supplicant(8049): EAPOL: External notification - portEnabled=0 > wpa_supplicant(8049): EAPOL: External notification - portValid=0 > wpa_supplicant(8049): EAPOL: External notification - EAP success=0 > wpa_supplicant(8049): EAPOL: External notification - portEnabled=1 > wpa_supplicant(8049): EAPOL: SUPP_PAE entering state CONNECTING > wpa_supplicant(8049): EAPOL: SUPP_BE entering state IDLE > wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec > wpa_supplicant(8049): Cancelling scan request > wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66 > wpa_supplicant(8049): 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e > b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 e7 a7 bf 75 a1 61 77 45 20 > 08 8c be 32 4b 79 a8 > wpa_supplicant(8049): Setting authentication timeout: 10 sec 0 usec > wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=117 > wpa_supplicant(8049): EAPOL-Key type=2 > wpa_supplicant(8049): key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) > wpa_supplicant(8049): key_length=16 key_data_length=22 > wpa_supplicant(8049): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 > 00 > wpa_supplicant(8049): key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e > 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 > wpa_supplicant(8049): key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 > wpa_supplicant(8049): key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 > wpa_supplicant(8049): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 > 00 00 > wpa_supplicant(8049): key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 > wpa_supplicant(8049): 00 00 00 00 00 00 00 00 19 1b 1d cf e8 84 b6 7e 87 6d > 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 > e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8 > wpa_supplicant(8049): State: ASSOCIATED -> 4WAY_HANDSHAKE > wpa_supplicant(8049): WPA: RX message 1 of 4-Way Handshake from > 00:12:17:16:09:66 (ver=2) > wpa_supplicant(8049): RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac > 04 e7 a7 bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8 > wpa_supplicant(8049): RSN: PMKID from Authenticator - hexdump(len=16): e7 a7 > bf 75 a1 61 77 45 20 08 8c be 32 4b 79 a8 > wpa_supplicant(8049): RSN: no matching PMKID found > wpa_supplicant(8049): WPA: Renewed SNonce - hexdump(len=32): 27 03 21 61 b0 > 8e c0 59 8b 7b f3 b7 3d c9 25 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a > c6 > wpa_supplicant(8049): WPA: PMK - hexdump(len=32): [REMOVED] > wpa_supplicant(8049): WPA: PTK - hexdump(len=64): [REMOVED] > wpa_supplicant(8049): WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 > 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): WPA: Sending EAPOL-Key 2/4 > wpa_supplicant(8049): A: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 > 0a 00 00 00 00 00 00 00 00 00 00 27 03 21 61 b0 8e c0 59 8b 7b f3 b7 3d c9 25 > 64 a2 39 8d e2 0e f4 3a 87 14 66 78 29 4b ca 7a c6 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef 70 e7 > 5b 60 22 d6 2e aa 0e 61 47 10 a2 33 bd 00 16 30 14 01 00 00 0f ac 04 01 00 00 > 0f ac 04 01 00 00 0f ac 02 00 00 > wpa_supplicant(8049): RX EAPOL from 00:12:17:16:09:66 > wpa_supplicant(8049): RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 > 00 00 00 00 00 00 00 01 19 1b 1d cf e8 84 b6 7e 87 6d 7f 5d ea 7a 5d 04 e5 d3 > 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b > c6 3c 27 5a e4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b1 03 0f 61 ad 2b > a6 39 4c 48 2f 27 76 cd bb 9e 00 38 29 75 70 aa 14 d8 a8 35 48 9c 0d 25 9d 12 > 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b de 08 b0 ef 5e 79 c1 c9 da cf > d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4 > wpa_supplicant(8049): IEEE 802.1X RX: version=2 type=3 length=151 > wpa_supplicant(8049): EAPOL-Key type=2 > wpa_supplicant(8049): svd=0 Pairwise Install Ack MIC Secure Encr) > wpa_supplicant(8049): key_length=16 key_data_length=56 > wpa_supplicant(8049): replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 > 01 > wpa_supplicant(8049): key_nonce - hexdump(len=32): 19 1b 1d cf e8 84 b6 7e > 87 6d 7f 5d ea 7a 5d 04 e5 d3 8e b0 03 74 4b 27 49 7b 4f 5b c6 3c 27 59 > wpa_supplicant(8049): key_iv - hexdump(len=16): e5 d3 8e b0 03 74 4b 27 49 > 7b 4f 5b c6 3c 27 5a > wpa_supplicant(8049): key_rsc - hexdump(len=8): e4 00 00 00 00 00 00 00 > wpa_supplicant(8049): key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 > 00 00 > wpa_supplicant(8049): key_mic - hexdump(len=16): b1 03 0f 61 ad 2b a6 39 4c > 48 2f 27 76 cd bb 9e > wpa_supplicant(8049): 70 fd 82 f4 > wpa_supplicant(8049): RSN: encrypted key data - hexdump(len=56): 29 75 70 aa > 14 d8 a8 35 48 9c 0d 25 9d 12 68 3c 83 9f 8e 8c 9e 90 55 72 f8 f4 db bf 1a 8b > de 08 b0 ef 5e 79 c1 c9 da cf d9 71 87 b9 58 cd b5 71 43 ac b2 4d 70 fd 82 f4 > wpa_supplicant(8049): WPA: decrypted EAPOL-Key key data - hexdump(len=48): > [REMOVED] > wpa_supplicant(8049): State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE > wpa_supplicant(8049): WPA: RX message 3 of 4-Way Handshake from > 00:12:17:16:09:66 (ver=2) > wpa_supplicant(8049): WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac > 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8a 60 f7 > f1 3e 4e 42 dc 54 76 04 3b 6e 96 62 00 dd 00 > wpa_supplicant(8049): WPA: Sending EAPOL-Key 4/4 > wpa_supplicant(8049): WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 > 0a 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 > _______________________________________________ NetworkManager-list mailing > list [email protected] > http://mail.gnome.org/mailman/listinfo/networkmanager-list _______________________________________________ NetworkManager-list mailing list [email protected] http://mail.gnome.org/mailman/listinfo/networkmanager-list
