* Re: prism54: WPA/RSN support for fullmac cards
[not found] <462336B1.4090006@mail.uni-oldenburg.de>
@ 2007-04-16 13:55 ` John W. Linville
2007-04-16 14:09 ` Dan Williams
[not found] ` <200704261228.01889.chunkeey@web.de>
1 sibling, 1 reply; 16+ messages in thread
From: John W. Linville @ 2007-04-16 13:55 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-net, linux-wireless
You may want to try at linux-wireless@vger.kernel.org instead...
On Mon, Apr 16, 2007 at 10:41:21AM +0200, Stefan Puch wrote:
> Hi everyone,
>
> I found on this mailinglist the thread from chunkeey who added WPA support for
> prism54 fullmac cards
>
> http://www.spinics.net/lists/netdev/msg16224.html
>
> The last days I tried to get this driver working, but I was not able to. After
> "googling" and reading the mails I found that Jim Faulkner have had similar
> problems, see posting on this mailing list here:
>
> http://www.spinics.net/lists/linux-net/msg14821.html
>
> So I tried to make hopefully "useful" debug traces, perhaps anyone can tell me
> why it doesn't work?
>
> The Hardware:
> Access point: AVM Fritz!Box Fon WLAN 7170 (last stable Firmware)
> Laptop: Fujitsu Siemens Lifebook C
> WLAN-Adapter: Netgear WG511 (Fullmac)
>
>
> The Software:
> - Vanilla Kernel 2.6.20.6 (WE-21)
> - Wireless Tools version 29-pre17 (The main features is WE-21 support)
> - firmware Version 1.0.4.3 (from www.prism54.org)
> - wpa_supplicant Version 0.5.5
> - as reference ndiswrapper version 1.41
>
> First of all I tried the good old WEP encryption with the prism54 driver: No
> problem, it works fine with the firmware 1.0.4.3!!!
>
> Next step was to try get a WPA connection to the access point. I can load the
> kernel module, the firmware is loaded correctly, too.
> Only the connection with wpa_supplicant doesn't establish (debug trace attached
> this email), here's my wpa_supplicant.conf:
>
> ctrl_interface=/var/run/wpa_supplicant
> network={
> ssid="puch.home"
> scan_ssid=1
> proto=WPA
> key_mgmt=WPA-PSK
> psk="ThisIsATestWPA-Key"
> }
>
> As reference I tried to connect to the access point using ndiswrapper and
> wpa_supplicant (same wpa_supplicant.conf). There the connection is established.
> I attached the debug trace, too so everyone can see where the differences are)
>
> Please let me know, if there are important infos missing and CC me in any
> responses, because I'm not subscribed to this mailing list.
>
> Thanks in advance for any comment or help,
>
> Stefan Puch
>
> ---------------------------------------------------------------------------------
> debug traces:
> ---------------------------------------------------------------------------------
>
> Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 4 - start of a new network block
> ssid - hexdump_ascii(len=9):
> 70 75 63 68 2e 68 6f 6d 65 puch.home
> scan_ssid=1 (0x1)
> PSK (ASCII passphrase) - hexdump_ascii(len=18):
> 54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b ThisIsATestWPA-K
> 65 79 ey
> key_mgmt: 0x2
> proto: 0x1
> PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> Priority group 0
> id=0 ssid='puch.home'
> Initializing interface (2) 'eth1'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=21 WE(source)=19 enc_capa=0x7
> capabilities: key_mgmt 0xf enc 0x7
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:09:5b:c9:5b:52
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface eth1
> RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=9):
> 70 75 63 68 2e 68 6f 6d 65 puch.home
> Trying to get current scan results first without requesting a new scan to speed up initial association
> Received 207 bytes of scan results (1 BSSes)
> Scan results: 1
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:C0:49:E1:3B:61 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> Authentication with 00:00:00:00:00:00 timed out.
> Added BSSID 00:15:0c:d6:c7:74 into blacklist
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Scan timeout - try to get results
> Received 383 bytes of scan results (2 BSSes)
> Scan results: 2
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=70
> WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=63
> WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c02 len=72
> WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface eth1
> State: ASSOCIATING -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> No keys have been configured - skip key clearing
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_drop_unencrypted
> wpa_driver_wext_set_countermeasures
> No keys have been configured - skip key clearing
> WEXT: Operstate: linkmode=0, operstate=6
> Removed BSSID 00:15:0c:d6:c7:74 from blacklist (clear)
> Cancelling scan request
>
> Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> Line: 4 - start of a new network block
> ssid - hexdump_ascii(len=9):
> 70 75 63 68 2e 68 6f 6d 65 puch.home
> scan_ssid=1 (0x1)
> PSK (ASCII passphrase) - hexdump_ascii(len=18):
> 54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b ThisIsATestWPA-K
> 65 79 ey
> key_mgmt: 0x2
> proto: 0x1
> PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> Priority group 0
> id=0 ssid='puch.home'
> Initializing interface (2) 'wlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
> capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:09:5b:c9:5b:52
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface wlan0
> RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> State: DISCONNECTED -> SCANNING
> Starting AP scan (specific SSID)
> Scan SSID - hexdump_ascii(len=9):
> 70 75 63 68 2e 68 6f 6d 65 puch.home
> Trying to get current scan results first without requesting a new scan to speed up initial association
> Received 489 bytes of scan results (2 BSSes)
> Scan results: 2
> Selecting BSS from priority group 0
> 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> selected based on WPA IE
> Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_associate
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b04 len=12
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=17
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c07 len=59
> AssocReq IE wireless event - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c08 len=24
> AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:15:0c:d6:c7:74
> Association info event
> req_ies - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated to a new BSS: BSSID=00:15:0c:d6:c7:74
> No keys have been configured - skip key clearing
> Associated with 00:15:0c:d6:c7:74
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
> EAPOL-Key type=254
> key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
> key_length=32 key_data_length=0
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> State: ASSOCIATED -> 4WAY_HANDSHAKE
> WPA: RX message 1 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> WPA: Renewed SNonce - hexdump(len=32): 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01
> WPA: PMK - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> WPA: PTK - hexdump(len=64): 7c d3 49 82 93 2d fc 6f 23 41 7c 1b 33 cf 5d be c1 2f a2 39 d5 76 c1 20 e9 b3 b1 18 3e 9e 45 74 c2 b7 cb b8 b6 ae ab 63 d3 fd 23 b6 cb 6c 2b 11 1d eb 7a 29 09 97 da fa a4 ea e3 b5 0c a2 af 22
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 8f 0a 5a 75 f2 89 57 b0 1a 05 ce 6a 8d 81 bc 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> IEEE 802.1X RX: version=1 type=3 length=121
> EAPOL-Key type=254
> key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
> key_length=32 key_data_length=26
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
> key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf
> WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> WPA: RX message 3 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e bb 0b 30 e4 9f aa f4 ba 44 93 4c 01 68 d3 97 00 00
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> IEEE 802.1X RX: version=1 type=3 length=127
> EAPOL-Key type=254
> key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
> key_length=32 key_data_length=32
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
> key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 fb ed dc 79 e9 fd 4f 65 e1 41 67 42 97 c8 58 00 00
> WPA: Key negotiation completed with 00:15:0c:d6:c7:74 [PTK=TKIP GTK=TKIP]
> Cancelling authentication timeout
> State: GROUP_HANDSHAKE -> COMPLETED
> CTRL-EVENT-CONNECTED - Connection to 00:15:0c:d6:c7:74 completed (auth) [id=0 id_str=]
> wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> WEXT: Operstate: linkmode=-1, operstate=6
> EAPOL: External notification - portValid=1
> EAPOL: External notification - EAP success=1
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state SUCCESS
> EAP: EAP entering state DISABLED
> EAPOL: SUPP_PAE entering state AUTHENTICATED
> EAPOL: SUPP_BE entering state IDLE
> RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> RX EAPOL from 00:15:0c:d6:c7:74
> RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> IEEE 802.1X RX: version=1 type=3 length=127
> EAPOL-Key type=254
> key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
> key_length=32 key_data_length=32
> replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
> key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
> key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
> key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> key_mic - hexdump(len=16): 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c
> WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> State: COMPLETED -> GROUP_HANDSHAKE
> WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> WPA: Installing GTK to the driver (keyidx=2 tx=0).
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> WPA: Sending EAPOL-Key 2/2
> WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 1a 45 42 95 40 d8 d7 ab b5 58 53 40 e0 5a e8 00 00
> WPA: Group rekeying completed with 00:15:0c:d6:c7:74 [GTK=TKIP]
> State: GROUP_HANDSHAKE -> COMPLETED
> EAPOL: startWhen --> 0
> CTRL-EVENT-TERMINATING - signal 2 received
> Removing interface wlan0
> State: COMPLETED -> DISCONNECTED
> wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> wpa_driver_wext_deauthenticate
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAPOL: External notification - portValid=0
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_drop_unencrypted
> wpa_driver_wext_set_countermeasures
> No keys have been configured - skip key clearing
> WEXT: Operstate: linkmode=0, operstate=6
> Cancelling scan request
>
> DRIVER NDISWRAPPER:
>
> [root@caelum space]# iwconfig -v
> iwconfig Wireless-Tools version 29
> Compatible with Wireless Extension v11 to v21.
>
> Kernel Currently compiled with Wireless Extension v21.
>
> wlan0 Recommend Wireless Extension v18 or later,
> Currently compiled with Wireless Extension v21.
>
> [root@caelum space]#
>
> ----------------------------------------------------------
>
> DRIVER PRISM54:
>
> [root@caelum space]# iwconfig -v
> iwconfig Wireless-Tools version 29
> Compatible with Wireless Extension v11 to v21.
>
> Kernel Currently compiled with Wireless Extension v21.
>
> eth1 Recommend Wireless Extension v19 or later,
> Currently compiled with Wireless Extension v21.
>
> [root@caelum space]#
>
>
>
--
John W. Linville
linville@tuxdriver.com
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-16 13:55 ` prism54: WPA/RSN support for fullmac cards John W. Linville
@ 2007-04-16 14:09 ` Dan Williams
2007-04-17 18:33 ` Stefan Puch
0 siblings, 1 reply; 16+ messages in thread
From: Dan Williams @ 2007-04-16 14:09 UTC (permalink / raw)
To: John W. Linville; +Cc: Stefan Puch, linux-net, linux-wireless
On Mon, 2007-04-16 at 09:55 -0400, John W. Linville wrote:
> You may want to try at linux-wireless@vger.kernel.org instead...
>
> On Mon, Apr 16, 2007 at 10:41:21AM +0200, Stefan Puch wrote:
> > Hi everyone,
> >
> > I found on this mailinglist the thread from chunkeey who added WPA support for
> > prism54 fullmac cards
> >
> > http://www.spinics.net/lists/netdev/msg16224.html
That patch had some issues that I think were brought up in replies. It
needs some cleanup. If you see the "triggering due to management
timeout" thing, that's the card not replying to commands from the driver
quickly enough, meaning the firmware crashed or hung, and so the driver
resets the card.
Basically, somebody needs to go through the patch from Chunkeey and
extract the useful parts. It wasn't the most easily readable patch and
there were some questionable decisions in there, but I don't think he
replied with rationale for some of the changes.
Dan
> > The last days I tried to get this driver working, but I was not able to. After
> > "googling" and reading the mails I found that Jim Faulkner have had similar
> > problems, see posting on this mailing list here:
> >
> > http://www.spinics.net/lists/linux-net/msg14821.html
> >
> > So I tried to make hopefully "useful" debug traces, perhaps anyone can tell me
> > why it doesn't work?
> >
> > The Hardware:
> > Access point: AVM Fritz!Box Fon WLAN 7170 (last stable Firmware)
> > Laptop: Fujitsu Siemens Lifebook C
> > WLAN-Adapter: Netgear WG511 (Fullmac)
> >
> >
> > The Software:
> > - Vanilla Kernel 2.6.20.6 (WE-21)
> > - Wireless Tools version 29-pre17 (The main features is WE-21 support)
> > - firmware Version 1.0.4.3 (from www.prism54.org)
> > - wpa_supplicant Version 0.5.5
> > - as reference ndiswrapper version 1.41
> >
> > First of all I tried the good old WEP encryption with the prism54 driver: No
> > problem, it works fine with the firmware 1.0.4.3!!!
> >
> > Next step was to try get a WPA connection to the access point. I can load the
> > kernel module, the firmware is loaded correctly, too.
> > Only the connection with wpa_supplicant doesn't establish (debug trace attached
> > this email), here's my wpa_supplicant.conf:
> >
> > ctrl_interface=/var/run/wpa_supplicant
> > network={
> > ssid="puch.home"
> > scan_ssid=1
> > proto=WPA
> > key_mgmt=WPA-PSK
> > psk="ThisIsATestWPA-Key"
> > }
> >
> > As reference I tried to connect to the access point using ndiswrapper and
> > wpa_supplicant (same wpa_supplicant.conf). There the connection is established.
> > I attached the debug trace, too so everyone can see where the differences are)
> >
> > Please let me know, if there are important infos missing and CC me in any
> > responses, because I'm not subscribed to this mailing list.
> >
> > Thanks in advance for any comment or help,
> >
> > Stefan Puch
> >
> > ---------------------------------------------------------------------------------
> > debug traces:
> > ---------------------------------------------------------------------------------
> >
>
> > Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> > Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> > Reading configuration file '/etc/wpa_supplicant.conf'
> > ctrl_interface='/var/run/wpa_supplicant'
> > Line: 4 - start of a new network block
> > ssid - hexdump_ascii(len=9):
> > 70 75 63 68 2e 68 6f 6d 65 puch.home
> > scan_ssid=1 (0x1)
> > PSK (ASCII passphrase) - hexdump_ascii(len=18):
> > 54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b ThisIsATestWPA-K
> > 65 79 ey
> > key_mgmt: 0x2
> > proto: 0x1
> > PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> > Priority group 0
> > id=0 ssid='puch.home'
> > Initializing interface (2) 'eth1'
> > EAPOL: SUPP_PAE entering state DISCONNECTED
> > EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> > EAPOL: SUPP_BE entering state INITIALIZE
> > EAP: EAP entering state DISABLED
> > EAPOL: External notification - portEnabled=0
> > EAPOL: External notification - portValid=0
> > SIOCGIWRANGE: WE(compiled)=21 WE(source)=19 enc_capa=0x7
> > capabilities: key_mgmt 0xf enc 0x7
> > WEXT: Operstate: linkmode=1, operstate=5
> > Own MAC address: 00:09:5b:c9:5b:52
> > wpa_driver_wext_set_wpa
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_countermeasures
> > wpa_driver_wext_set_drop_unencrypted
> > Setting scan request: 0 sec 100000 usec
> > Added interface eth1
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> > Wireless event: cmd=0x8b06 len=8
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=70
> > WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> > State: DISCONNECTED -> SCANNING
> > Starting AP scan (specific SSID)
> > Scan SSID - hexdump_ascii(len=9):
> > 70 75 63 68 2e 68 6f 6d 65 puch.home
> > Trying to get current scan results first without requesting a new scan to speed up initial association
> > Received 207 bytes of scan results (1 BSSes)
> > Scan results: 1
> > Selecting BSS from priority group 0
> > 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> > selected based on WPA IE
> > Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> > Cancelling scan request
> > WPA: clearing own WPA/RSN IE
> > Automatic auth_alg selection: 0x1
> > WPA: using IEEE 802.11i/D3.0
> > WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> > WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > WPA: clearing AP RSN IE
> > WPA: using GTK TKIP
> > WPA: using PTK TKIP
> > WPA: using KEY_MGMT WPA-PSK
> > WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > No keys have been configured - skip key clearing
> > wpa_driver_wext_set_drop_unencrypted
> > State: SCANNING -> ASSOCIATING
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > wpa_driver_wext_associate
> > Setting authentication timeout: 10 sec 0 usec
> > EAPOL: External notification - EAP success=0
> > EAPOL: External notification - EAP fail=0
> > EAPOL: External notification - portControl=Auto
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b06 len=8
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b04 len=12
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b1a len=17
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=70
> > WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:C0:49:E1:3B:61 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=63
> > WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=70
> > WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=63
> > WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=63
> > WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> > Authentication with 00:00:00:00:00:00 timed out.
> > Added BSSID 00:15:0c:d6:c7:74 into blacklist
> > State: ASSOCIATING -> DISCONNECTED
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > No keys have been configured - skip key clearing
> > EAPOL: External notification - portEnabled=0
> > EAPOL: External notification - portValid=0
> > Setting scan request: 0 sec 0 usec
> > State: DISCONNECTED -> SCANNING
> > Starting AP scan (broadcast SSID)
> > Scan timeout - try to get results
> > Received 383 bytes of scan results (2 BSSes)
> > Scan results: 2
> > Selecting BSS from priority group 0
> > 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> > selected based on WPA IE
> > Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> > Cancelling scan request
> > WPA: clearing own WPA/RSN IE
> > Automatic auth_alg selection: 0x1
> > WPA: using IEEE 802.11i/D3.0
> > WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> > WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > WPA: clearing AP RSN IE
> > WPA: using GTK TKIP
> > WPA: using PTK TKIP
> > WPA: using KEY_MGMT WPA-PSK
> > WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > No keys have been configured - skip key clearing
> > wpa_driver_wext_set_drop_unencrypted
> > State: SCANNING -> ASSOCIATING
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > wpa_driver_wext_associate
> > Setting authentication timeout: 10 sec 0 usec
> > EAPOL: External notification - EAP success=0
> > EAPOL: External notification - EAP fail=0
> > EAPOL: External notification - portControl=Auto
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b06 len=8
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b04 len=12
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b1a len=17
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=63
> > WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=70
> > WEXT: Custom wireless event: 'Received a beacon from an unkown AP to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=63
> > WEXT: Custom wireless event: 'Received a probe from client to 00:15:0C:D6:C7:74 (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c02 len=72
> > WEXT: Custom wireless event: 'Authenticate request (ex) to 00:15:0C:D6:C7:74 : ACCEPTED (00)'
> > CTRL-EVENT-TERMINATING - signal 2 received
> > Removing interface eth1
> > State: ASSOCIATING -> DISCONNECTED
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > No keys have been configured - skip key clearing
> > EAPOL: External notification - portEnabled=0
> > EAPOL: External notification - portValid=0
> > wpa_driver_wext_set_wpa
> > wpa_driver_wext_set_drop_unencrypted
> > wpa_driver_wext_set_countermeasures
> > No keys have been configured - skip key clearing
> > WEXT: Operstate: linkmode=0, operstate=6
> > Removed BSSID 00:15:0c:d6:c7:74 from blacklist (clear)
> > Cancelling scan request
> >
>
> > Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
> > Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> > Reading configuration file '/etc/wpa_supplicant.conf'
> > ctrl_interface='/var/run/wpa_supplicant'
> > Line: 4 - start of a new network block
> > ssid - hexdump_ascii(len=9):
> > 70 75 63 68 2e 68 6f 6d 65 puch.home
> > scan_ssid=1 (0x1)
> > PSK (ASCII passphrase) - hexdump_ascii(len=18):
> > 54 68 69 73 49 73 41 54 65 73 74 57 50 41 2d 4b ThisIsATestWPA-K
> > 65 79 ey
> > key_mgmt: 0x2
> > proto: 0x1
> > PSK (from passphrase) - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> > Priority group 0
> > id=0 ssid='puch.home'
> > Initializing interface (2) 'wlan0'
> > EAPOL: SUPP_PAE entering state DISCONNECTED
> > EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> > EAPOL: SUPP_BE entering state INITIALIZE
> > EAP: EAP entering state DISABLED
> > EAPOL: External notification - portEnabled=0
> > EAPOL: External notification - portValid=0
> > SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
> > capabilities: key_mgmt 0xf enc 0xf
> > WEXT: Operstate: linkmode=1, operstate=5
> > Own MAC address: 00:09:5b:c9:5b:52
> > wpa_driver_wext_set_wpa
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_countermeasures
> > wpa_driver_wext_set_drop_unencrypted
> > Setting scan request: 0 sec 100000 usec
> > Added interface wlan0
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
> > Wireless event: cmd=0x8b06 len=8
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> > State: DISCONNECTED -> SCANNING
> > Starting AP scan (specific SSID)
> > Scan SSID - hexdump_ascii(len=9):
> > 70 75 63 68 2e 68 6f 6d 65 puch.home
> > Trying to get current scan results first without requesting a new scan to speed up initial association
> > Received 489 bytes of scan results (2 BSSes)
> > Scan results: 2
> > Selecting BSS from priority group 0
> > 0: 00:15:0c:d6:c7:74 ssid='puch.home' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
> > selected based on WPA IE
> > Trying to associate with 00:15:0c:d6:c7:74 (SSID='puch.home' freq=2412 MHz)
> > Cancelling scan request
> > WPA: clearing own WPA/RSN IE
> > Automatic auth_alg selection: 0x1
> > WPA: using IEEE 802.11i/D3.0
> > WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
> > WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > WPA: clearing AP RSN IE
> > WPA: using GTK TKIP
> > WPA: using PTK TKIP
> > WPA: using KEY_MGMT WPA-PSK
> > WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > No keys have been configured - skip key clearing
> > wpa_driver_wext_set_drop_unencrypted
> > State: SCANNING -> ASSOCIATING
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > wpa_driver_wext_associate
> > Setting authentication timeout: 10 sec 0 usec
> > EAPOL: External notification - EAP success=0
> > EAPOL: External notification - EAP fail=0
> > EAPOL: External notification - portControl=Auto
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> > Wireless event: cmd=0x8b06 len=8
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> > Wireless event: cmd=0x8b04 len=12
> > RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> > Wireless event: cmd=0x8b1a len=17
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c07 len=59
> > AssocReq IE wireless event - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8c08 len=24
> > AssocResp IE wireless event - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> > RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> > Wireless event: cmd=0x8b15 len=20
> > Wireless event: new AP: 00:15:0c:d6:c7:74
> > Association info event
> > req_ies - hexdump(len=51): 00 09 70 75 63 68 2e 68 6f 6d 65 01 04 02 04 0b 16 32 08 0c 12 18 24 30 48 60 6c dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
> > WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > State: ASSOCIATING -> ASSOCIATED
> > wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > Associated to a new BSS: BSSID=00:15:0c:d6:c7:74
> > No keys have been configured - skip key clearing
> > Associated with 00:15:0c:d6:c7:74
> > WPA: Association event - clear replay counter
> > EAPOL: External notification - portEnabled=0
> > EAPOL: External notification - portValid=0
> > EAPOL: External notification - EAP success=0
> > EAPOL: External notification - portEnabled=1
> > EAPOL: SUPP_PAE entering state CONNECTING
> > EAPOL: SUPP_BE entering state IDLE
> > Setting authentication timeout: 10 sec 0 usec
> > Cancelling scan request
> > RX EAPOL from 00:15:0c:d6:c7:74
> > RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > Setting authentication timeout: 10 sec 0 usec
> > IEEE 802.1X RX: version=1 type=3 length=95
> > EAPOL-Key type=254
> > key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
> > key_length=32 key_data_length=0
> > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
> > key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
> > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > State: ASSOCIATED -> 4WAY_HANDSHAKE
> > WPA: RX message 1 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> > WPA: Renewed SNonce - hexdump(len=32): 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01
> > WPA: PMK - hexdump(len=32): 44 49 84 4d 00 d4 0c 0a 3a bd 2e 33 89 3b d2 39 bc e2 5c 9c 81 38 43 64 6c 9b c0 4b 00 34 5c e5
> > WPA: PTK - hexdump(len=64): 7c d3 49 82 93 2d fc 6f 23 41 7c 1b 33 cf 5d be c1 2f a2 39 d5 76 c1 20 e9 b3 b1 18 3e 9e 45 74 c2 b7 cb b8 b6 ae ab 63 d3 fd 23 b6 cb 6c 2b 11 1d eb 7a 29 09 97 da fa a4 ea e3 b5 0c a2 af 22
> > WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > WPA: Sending EAPOL-Key 2/4
> > WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 2e e3 7a cc cd 1e 3f e1 17 76 10 f1 8b 6e dc 53 5f c0 31 b9 71 40 e2 7b a3 04 75 0c 66 9d 95 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e7 8f 0a 5a 75 f2 89 57 b0 1a 05 ce 6a 8d 81 bc 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> > RX EAPOL from 00:15:0c:d6:c7:74
> > RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > IEEE 802.1X RX: version=1 type=3 length=121
> > EAPOL-Key type=254
> > key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
> > key_length=32 key_data_length=26
> > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
> > key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48
> > key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_mic - hexdump(len=16): 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf
> > WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 02 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 48 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a ab b0 de f9 2d d0 1f ca e3 17 b6 45 05 f2 bf 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
> > WPA: RX message 3 of 4-Way Handshake from 00:15:0c:d6:c7:74 (ver=1)
> > WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> > WPA: Sending EAPOL-Key 4/4
> > WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0e bb 0b 30 e4 9f aa f4 ba 44 93 4c 01 68 d3 97 00 00
> > WPA: Installing PTK to the driver.
> > WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> > wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
> > State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
> > RX EAPOL from 00:15:0c:d6:c7:74
> > RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> > IEEE 802.1X RX: version=1 type=3 length=127
> > EAPOL-Key type=254
> > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
> > key_length=32 key_data_length=32
> > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
> > key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
> > key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
> > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_mic - hexdump(len=16): 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13
> > WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2b a2 ed 59 9c 0f e7 1e 70 ba 81 11 44 29 8d 13 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> > WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> > State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
> > WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> > WPA: Installing GTK to the driver (keyidx=2 tx=0).
> > WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> > wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> > WPA: Sending EAPOL-Key 2/2
> > WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 59 fb ed dc 79 e9 fd 4f 65 e1 41 67 42 97 c8 58 00 00
> > WPA: Key negotiation completed with 00:15:0c:d6:c7:74 [PTK=TKIP GTK=TKIP]
> > Cancelling authentication timeout
> > State: GROUP_HANDSHAKE -> COMPLETED
> > CTRL-EVENT-CONNECTED - Connection to 00:15:0c:d6:c7:74 completed (auth) [id=0 id_str=]
> > wpa_driver_wext_set_operstate: operstate 0->1 (UP)
> > WEXT: Operstate: linkmode=-1, operstate=6
> > EAPOL: External notification - portValid=1
> > EAPOL: External notification - EAP success=1
> > EAPOL: SUPP_PAE entering state AUTHENTICATING
> > EAPOL: SUPP_BE entering state SUCCESS
> > EAP: EAP entering state DISABLED
> > EAPOL: SUPP_PAE entering state AUTHENTICATED
> > EAPOL: SUPP_BE entering state IDLE
> > RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> > RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
> > RX EAPOL from 00:15:0c:d6:c7:74
> > RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> > IEEE 802.1X RX: version=1 type=3 length=127
> > EAPOL-Key type=254
> > key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
> > key_length=32 key_data_length=32
> > replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
> > key_nonce - hexdump(len=32): 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47
> > key_iv - hexdump(len=16): 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49
> > key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
> > key_mic - hexdump(len=16): 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c
> > WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 04 33 dc ab 99 77 cb 37 23 57 10 d9 11 91 cf 06 17 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 47 49 f0 27 c7 a4 d3 9b fd b3 ab 25 fe 27 49 fa 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 97 6b 70 91 95 9e c6 ab 10 f1 d0 61 1d 55 7c 00 20 14 72 27 88 67 7e e5 bd e0 fb 45 25 aa ea f5 a3 9a f1 86 35 18 f4 95 e7 71 b6 c0 c1 62 ba 80 97
> > WPA: RX message 1 of Group Key or STAKey Handshake from 00:15:0c:d6:c7:74 (ver=1)
> > State: COMPLETED -> GROUP_HANDSHAKE
> > WPA: Group Key - hexdump(len=32): 4e 6c c3 3d 3a c5 a6 49 db 31 9d ab 2e b7 15 6f 38 e9 0a ef 7d 14 7a da a0 fa cb 3e c5 c1 b8 b6
> > WPA: Installing GTK to the driver (keyidx=2 tx=0).
> > WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> > wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
> > WPA: Sending EAPOL-Key 2/2
> > WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1e 1a 45 42 95 40 d8 d7 ab b5 58 53 40 e0 5a e8 00 00
> > WPA: Group rekeying completed with 00:15:0c:d6:c7:74 [GTK=TKIP]
> > State: GROUP_HANDSHAKE -> COMPLETED
> > EAPOL: startWhen --> 0
> > CTRL-EVENT-TERMINATING - signal 2 received
> > Removing interface wlan0
> > State: COMPLETED -> DISCONNECTED
> > wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
> > WEXT: Operstate: linkmode=-1, operstate=5
> > wpa_driver_wext_deauthenticate
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> > wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> > EAPOL: External notification - portEnabled=0
> > EAPOL: SUPP_PAE entering state DISCONNECTED
> > EAPOL: SUPP_BE entering state INITIALIZE
> > EAPOL: External notification - portValid=0
> > wpa_driver_wext_set_wpa
> > wpa_driver_wext_set_drop_unencrypted
> > wpa_driver_wext_set_countermeasures
> > No keys have been configured - skip key clearing
> > WEXT: Operstate: linkmode=0, operstate=6
> > Cancelling scan request
> >
>
> > DRIVER NDISWRAPPER:
> >
> > [root@caelum space]# iwconfig -v
> > iwconfig Wireless-Tools version 29
> > Compatible with Wireless Extension v11 to v21.
> >
> > Kernel Currently compiled with Wireless Extension v21.
> >
> > wlan0 Recommend Wireless Extension v18 or later,
> > Currently compiled with Wireless Extension v21.
> >
> > [root@caelum space]#
> >
> > ----------------------------------------------------------
> >
> > DRIVER PRISM54:
> >
> > [root@caelum space]# iwconfig -v
> > iwconfig Wireless-Tools version 29
> > Compatible with Wireless Extension v11 to v21.
> >
> > Kernel Currently compiled with Wireless Extension v21.
> >
> > eth1 Recommend Wireless Extension v19 or later,
> > Currently compiled with Wireless Extension v21.
> >
> > [root@caelum space]#
> >
> >
> >
>
>
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-16 14:09 ` Dan Williams
@ 2007-04-17 18:33 ` Stefan Puch
2007-04-17 19:12 ` Michael Wu
2007-04-17 19:23 ` Chr
0 siblings, 2 replies; 16+ messages in thread
From: Stefan Puch @ 2007-04-17 18:33 UTC (permalink / raw)
To: linux-net; +Cc: linux-wireless
http://www.spinics.net/lists/netdev/msg16224.html
>
> That patch had some issues that I think were brought up in replies. It
> needs some cleanup. If you see the "triggering due to management
> timeout" thing, that's the card not replying to commands from the driver
> quickly enough, meaning the firmware crashed or hung, and so the driver
> resets the card.
>
> Basically, somebody needs to go through the patch from Chunkeey and
> extract the useful parts. It wasn't the most easily readable patch and
> there were some questionable decisions in there, but I don't think he
> replied with rationale for some of the changes.
>
> Dan
I thought that at least chunkeey got a working connection.... obviously not.
Is there anything else I can do if I'm no Kernel Programmer (perhaps provide
more infos, do some other beta testings)?
When I looked on the prism54.org homepage or their svn-repository it seems that
the driver is not developed any longer.
What is about Christian Lamparter (chunkee) or Luis R. Rodriguez (mcgrof) are
they still working on it?
Regards Stefan
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 18:33 ` Stefan Puch
@ 2007-04-17 19:12 ` Michael Wu
2007-04-17 20:24 ` Luis R. Rodriguez
2007-04-17 19:23 ` Chr
1 sibling, 1 reply; 16+ messages in thread
From: Michael Wu @ 2007-04-17 19:12 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-wireless
[-- Attachment #1: Type: text/plain, Size: 734 bytes --]
On Tuesday 17 April 2007 14:33, Stefan Puch wrote:
> I thought that at least chunkeey got a working connection.... obviously
> not.
>
> Is there anything else I can do if I'm no Kernel Programmer (perhaps
> provide more infos, do some other beta testings)?
>
> When I looked on the prism54.org homepage or their svn-repository it seems
> that the driver is not developed any longer.
> What is about Christian Lamparter (chunkee) or Luis R. Rodriguez (mcgrof)
> are they still working on it?
>
Christian Lamparter now works on the mac80211 softmac driver (p54 in
wireless-dev) and Luis gave up on getting WPA to work on fullmac IIRC.
Easiest way to get WPA working right now is to run a softmac driver.
-Michael Wu
[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 18:33 ` Stefan Puch
2007-04-17 19:12 ` Michael Wu
@ 2007-04-17 19:23 ` Chr
2007-04-18 9:00 ` Stefan Puch
2007-04-24 19:09 ` Stefan Puch
1 sibling, 2 replies; 16+ messages in thread
From: Chr @ 2007-04-17 19:23 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-net, linux-wireless
On Tuesday, 17. April 2007 20:33, you wrote:
> http://www.spinics.net/lists/netdev/msg16224.html
> >
> > That patch had some issues that I think were brought up in replies. It
> > needs some cleanup. If you see the "triggering due to management
> > timeout" thing, that's the card not replying to commands from the driver
> > quickly enough, meaning the firmware crashed or hung, and so the driver
> > resets the card.
> >
> > Basically, somebody needs to go through the patch from Chunkeey and
> > extract the useful parts. It wasn't the most easily readable patch and
> > there were some questionable decisions in there, but I don't think he
> > replied with rationale for some of the changes.
> >
> > Dan
>
> I thought that at least chunkeey got a working connection.... obviously not.
>
Of course it works! But not with every AP... only with "hostapd".
(I don't have anything else to try).
But please, before you waste your time with _some_ fullmac anomalies,
get the last wireless-dev.git tree.
There is a SOFTMAC driver for all prism54 chips now!
You only need a firmware:
http://daemonizer.de/prism54/prism54-fw/fw-softmac/lmac_2.7.0.0.arm
(rename it to "isl3886" and put it in the right place).
> Is there anything else I can do if I'm no Kernel Programmer (perhaps provide
> more infos, do some other beta testings)?
>
> When I looked on the prism54.org homepage or their svn-repository it seems that
> the driver is not developed any longer.
> What is about Christian Lamparter (chunkee) or Luis R. Rodriguez (mcgrof) are
> they still working on it?
>
> Regards Stefan
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 19:12 ` Michael Wu
@ 2007-04-17 20:24 ` Luis R. Rodriguez
2007-04-24 18:49 ` Stefan Puch
0 siblings, 1 reply; 16+ messages in thread
From: Luis R. Rodriguez @ 2007-04-17 20:24 UTC (permalink / raw)
To: Michael Wu; +Cc: Stefan Puch, linux-wireless
On 4/17/07, Michael Wu <flamingice@sourmilk.net> wrote:
> On Tuesday 17 April 2007 14:33, Stefan Puch wrote:
> > I thought that at least chunkeey got a working connection.... obviously
> > not.
> >
> > Is there anything else I can do if I'm no Kernel Programmer (perhaps
> > provide more infos, do some other beta testings)?
> >
> > When I looked on the prism54.org homepage or their svn-repository it seems
> > that the driver is not developed any longer.
> > What is about Christian Lamparter (chunkee) or Luis R. Rodriguez (mcgrof)
> > are they still working on it?
> >
> Christian Lamparter now works on the mac80211 softmac driver (p54 in
> wireless-dev) and Luis gave up on getting WPA to work on fullmac IIRC.
> Easiest way to get WPA working right now is to run a softmac driver.
I'm here but am swamped with other work right that prevents me from
working on this at the moment. What I'd suggest is try skipping
DOT11_OID_PSM when in extended mode on the commit. I remember always
seeing issues with setting this specific OID when in extended mode, I
have a hunch this may be the issue.
Also -- I think having both drivers is a good thing, they both do
serve different purposes. Apparently going with a FullMAC design can
save you some power so prism54 should be good for those purposes. We
need to update this on the descriptions when we get a chance.
Luis
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 19:23 ` Chr
@ 2007-04-18 9:00 ` Stefan Puch
2007-04-18 9:49 ` Chr
2007-04-24 19:09 ` Stefan Puch
1 sibling, 1 reply; 16+ messages in thread
From: Stefan Puch @ 2007-04-18 9:00 UTC (permalink / raw)
To: chunkeey; +Cc: linux-net, linux-wireless
> But please, before you waste your time with _some_ fullmac anomalies,
>
> get the last wireless-dev.git tree.
> There is a SOFTMAC driver for all prism54 chips now!
Thanks, I will try that SOFTMAC driver.
I thought about that before, because Netgear provides only one driver (a Softmac
driver) for both versions of the WG511 (Made in China and made in Taiwan)
(see here: http://de.gentoo-wiki.com/WG511)
> You only need a firmware:
> http://daemonizer.de/prism54/prism54-fw/fw-softmac/lmac_2.7.0.0.arm
> (rename it to "isl3886" and put it in the right place).
I did some further test with different firmware versions using Windows which I
reported in the prism54.org Forum, but the posting is gone (the Link doesn't
work anymore perhaps it was removed by an admin?)
I will try to summarize it here:
- first of all, I use the Netgear WG511 FULLMAC version (Made in Taiwan)
- The best encryption of the (Fullmac) firmware is WPA2 + TKIP. (1.0.4.3.arm)
- The windows driver on Netgear Homepage for WG511 contains a Softmac Firmware
(2.4.12.0.arm) included in WG511ICB.sys and supports only WPA + TKIP
- I tried to use the driver from MC2835WV2-V3_112WW.zip (2.13.1.0.arm) included
in 2835wc51.sys for my Netgear card successfully with WPA2 + AES using windows
or Linux with Ndiswrapper
- I found another firmware (2.13.8.0.arm) which is not listed on
http://daemonizer.de/prism54/prism54-fw/
If someone knows how to extract the firmware from the windows driver (named
wlanCIG.sys) you can get it here:
http://www.funkwerk-ec.com/portal/downloadcenter/dateien/FEC_W-Clients/FEC_W-Client_CB_PCI_mPCI_11g_v3320_1.zip
It works although fine with Netgear WG511 and WPA2 + AES encryption.
Conclusion:
It seems that Softmac firmware version greater than 2.13.x.x have WPA2 + AES
Support, perhaps this helps for further development or reverse engineering of
the firmware.
(I could although provide debug traces from wpa_supplicant when using WPA2 + AES
with ndiswrapper if that helps)
Regards Stefan
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-18 9:00 ` Stefan Puch
@ 2007-04-18 9:49 ` Chr
0 siblings, 0 replies; 16+ messages in thread
From: Chr @ 2007-04-18 9:49 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-net, linux-wireless
On Wednesday, 18. April 2007 11:00, you wrote:
>
> Conclusion:
> It seems that Softmac firmware version greater than 2.13.x.x have WPA2 + AES
> Support, perhaps this helps for further development or reverse engineering of
> the firmware.
> (I could although provide debug traces from wpa_supplicant when using WPA2 + AES
> with ndiswrapper if that helps)
>
No, that's why they are called "Softmac" FW. Now the whole encryption
(WEP/WPA/RSN with RC4, TKIP and CCMP) is done in software by your
host CPU and not by the card...
But please stick with the 2.7.0.0 FW, the all drivers are written for/from ;) it.
Oh, and if you're interested in the FW, you should take a look @ the freemac project.
AFAIK, it doesn't work yet, but it contains some "helpful" hints about these devices.
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-24 18:49 ` Stefan Puch
@ 2007-04-24 18:48 ` Michael Wu
2007-04-24 19:07 ` Stefan Puch
0 siblings, 1 reply; 16+ messages in thread
From: Michael Wu @ 2007-04-24 18:48 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-wireless, linux-net
[-- Attachment #1: Type: text/plain, Size: 255 bytes --]
On Tuesday 24 April 2007 14:49, Stefan Puch wrote:
> You can also use the FullMAC design to do some wlan sniffing/hacking
> because it supports packet injection in Monitor mode!
.. and so does p54, with the appropriate patches by Andy Green.
-Michael Wu
[-- Attachment #2: Type: application/pgp-signature, Size: 189 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 20:24 ` Luis R. Rodriguez
@ 2007-04-24 18:49 ` Stefan Puch
2007-04-24 18:48 ` Michael Wu
0 siblings, 1 reply; 16+ messages in thread
From: Stefan Puch @ 2007-04-24 18:49 UTC (permalink / raw)
To: linux-wireless; +Cc: linux-net
> Also -- I think having both drivers is a good thing, they both do
> serve different purposes. Apparently going with a FullMAC design can
> save you some power so prism54 should be good for those purposes. We
> need to update this on the descriptions when we get a chance.
You can also use the FullMAC design to do some wlan sniffing/hacking because it
supports packet injection in Monitor mode!
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-24 18:48 ` Michael Wu
@ 2007-04-24 19:07 ` Stefan Puch
0 siblings, 0 replies; 16+ messages in thread
From: Stefan Puch @ 2007-04-24 19:07 UTC (permalink / raw)
To: Michael Wu; +Cc: linux-wireless, linux-net
Michael Wu wrote
> On Tuesday 24 April 2007 14:49, Stefan Puch wrote:
>> You can also use the FullMAC design to do some wlan sniffing/hacking
>> because it supports packet injection in Monitor mode!
> .. and so does p54, with the appropriate patches by Andy Green.
Sorry, obviously I ignored that fact :-(
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-17 19:23 ` Chr
2007-04-18 9:00 ` Stefan Puch
@ 2007-04-24 19:09 ` Stefan Puch
2007-04-25 13:47 ` Chr
1 sibling, 1 reply; 16+ messages in thread
From: Stefan Puch @ 2007-04-24 19:09 UTC (permalink / raw)
To: linux-net; +Cc: linux-wireless
Chr wrote:
>> I thought that at least chunkeey got a working connection.... obviously not.
>>
> Of course it works! But not with every AP... only with "hostapd".
> (I don't have anything else to try).
Perhaps we can do a meeting after your ABI and do some tests with another AP?
> But please, before you waste your time with _some_ fullmac anomalies,
>
> get the last wireless-dev.git tree.
> There is a SOFTMAC driver for all prism54 chips now!
>
> You only need a firmware:
> http://daemonizer.de/prism54/prism54-fw/fw-softmac/lmac_2.7.0.0.arm
> (rename it to "isl3886" and put it in the right place).
- I got the wireless-dev.git tree version g5363171f.
- I could successfully use the SOFTMAC driver with my Netgear WG511 and the
Fritz!Box Fon WLAN 7170
- WPA and WPA2 encryption worked fine (very good work Thanks!)
- only the "Act" (yellow) LED on the WLAN-Adapter was flashing very very fast
the whole time, I hope it doesn't give up to fast (perhaps someone could set
the rate a little bit down?)
- if I can do some further testings that may help you let me know
Regards Stefan
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-24 19:09 ` Stefan Puch
@ 2007-04-25 13:47 ` Chr
0 siblings, 0 replies; 16+ messages in thread
From: Chr @ 2007-04-25 13:47 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-net, linux-wireless
On Tuesday, 24. April 2007, Stefan Puch wrote:
> Chr wrote:
> >> I thought that at least chunkeey got a working connection.... obviously not.
> >>
> > Of course it works! But not with every AP... only with "hostapd".
> > (I don't have anything else to try).
>
> Perhaps we can do a meeting after your ABI and do some tests with another AP?
Now, I'm "finish" with the "practical" part... ;-).
But, I won't be here the next few weeks, (field excursion, another field excursion
and did I mention lots of field excursion?) .
>
> > But please, before you waste your time with _some_ fullmac anomalies,
> >
> > get the last wireless-dev.git tree.
> > There is a SOFTMAC driver for all prism54 chips now!
> >
> > You only need a firmware:
> > http://daemonizer.de/prism54/prism54-fw/fw-softmac/lmac_2.7.0.0.arm
> > (rename it to "isl3886" and put it in the right place).
>
> - I got the wireless-dev.git tree version g5363171f.
> - I could successfully use the SOFTMAC driver with my Netgear WG511 and the
> Fritz!Box Fon WLAN 7170
> - WPA and WPA2 encryption worked fine (very good work Thanks!)
> - only the "Act" (yellow) LED on the WLAN-Adapter was flashing very very fast
> the whole time, I hope it doesn't give up to fast (perhaps someone could set
> the rate a little bit down?)
>
Na, don't worry, I've copied more than 4 GB over the WIFI link, it should be stable.
But, I know that some cheap APs may have "stability" problems, I ditched my old
Netgear WG624 for that reason.
> - if I can do some further testings that may help you let me know
>
(Do you know why your AP rejects the FULLMAC driver?
If you have another card you can "monitor" for "deauth" or
"disassoc" mlmes, they include a "reason" code)
Thanks,
Chr.
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
[not found] ` <46320D71.60409@mail.uni-oldenburg.de>
@ 2007-04-27 16:21 ` Chr
2007-04-28 15:31 ` Stefan Puch
2007-04-28 18:02 ` Stefan Puch
0 siblings, 2 replies; 16+ messages in thread
From: Chr @ 2007-04-27 16:21 UTC (permalink / raw)
To: Stefan Puch; +Cc: linux-net, linux-wireless
[-- Attachment #1: Type: text/plain, Size: 1287 bytes --]
On Friday, 27. April 2007, you wrote:
> Hi,
> [...]
> Gruß Stefan
>
(I just add a few cc, maybe someone else is interested too... )
It looks like you've tried your luck with the unmodified kernel driver, right?
Here is an older driver (updated, compiled & tested with 2.6.21-rc5 (actually,
it's an older wireless-dev git) and a Makefile to build it outside of the kernel tree).
Unfortunatly, It can a while until you get an connection. (So, please wait about 5 mins)
untar it, run make and insmod prism54.ko (don't use modprobe, or you may end up
with the wrong kernel module). Also, please check your wpa_supplicant.conf too,
you must enable ONLY TKIP (for group & pairwise) and nothing else!
(this driver changes the iwevent's auth & assoc requests layout slightly: (I added a few spaces to make it readable))
MAC STATE REASON_CODE AID
17:59:18.935038 eth4 Custom driver event:Authenticate request to 00:0F:XX:XX:XX:XX [03 00 0001]
17:59:18.937387 eth4 Custom driver event:Associate request to 00:0F:XX:XX:XX:XX [05 00 0001])
Thanks,
Chr.
[-- Attachment #2: prism54.tar.gz --]
[-- Type: application/x-tgz, Size: 53335 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-27 16:21 ` Chr
@ 2007-04-28 15:31 ` Stefan Puch
2007-04-28 18:02 ` Stefan Puch
1 sibling, 0 replies; 16+ messages in thread
From: Stefan Puch @ 2007-04-28 15:31 UTC (permalink / raw)
To: Chr; +Cc: linux-net, linux-wireless
> It looks like you've tried your luck with the unmodified kernel driver, right?
Yes, I did not modify to driver, I used the one provided with kernel-2.6.20
> Here is an older driver (updated, compiled & tested with 2.6.21-rc5 (actually,
> it's an older wireless-dev git) and a Makefile to build it outside of the kernel tree).
> Unfortunatly, It can a while until you get an connection. (So, please wait about 5 mins)
I compiled the driver and tested it with kernel-2.6.21.2 and
kernel-2.6.21-rc6-g5363171f
I've attached the logfile from wpa_supplicant and iwevent, and an iwevent output
when using p54 (SOFTMAC driver) as reference, too. The logfiles show only a
short time, but I did some further test (one about 10mins) with the same output,
too. But I did never get a connection, for this Mail I'm using the p54 one...
> untar it, run make and insmod prism54.ko (don't use modprobe, or you may end up
> with the wrong kernel module). Also, please check your wpa_supplicant.conf too,
> you must enable ONLY TKIP (for group & pairwise) and nothing else!
I attached the wpa_supplicant.conf, too. (I think the options "ssid, key_mgmt,
proto and psk" must be set, too don't they?)
If there are important infos missing or if I could test something new, let me
know, I'm still looking forward to get the prism54 one working, too ;-)
Regards Stefan
^ permalink raw reply [flat|nested] 16+ messages in thread
* Re: prism54: WPA/RSN support for fullmac cards
2007-04-27 16:21 ` Chr
2007-04-28 15:31 ` Stefan Puch
@ 2007-04-28 18:02 ` Stefan Puch
1 sibling, 0 replies; 16+ messages in thread
From: Stefan Puch @ 2007-04-28 18:02 UTC (permalink / raw)
To: linux-net; +Cc: linux-wireless
[-- Attachment #1: Type: text/plain, Size: 228 bytes --]
> If there are important infos missing or if I could test something new, let me
> know, I'm still looking forward to get the prism54 one working, too ;-)
Ups, it seems that I've forgotten the logfiles... ;-)
Regards Stefan
[-- Attachment #2: prism54-logs.tar.gz --]
[-- Type: application/x-gzip, Size: 2559 bytes --]
^ permalink raw reply [flat|nested] 16+ messages in thread
end of thread, other threads:[~2007-04-28 18:03 UTC | newest]
Thread overview: 16+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <462336B1.4090006@mail.uni-oldenburg.de>
2007-04-16 13:55 ` prism54: WPA/RSN support for fullmac cards John W. Linville
2007-04-16 14:09 ` Dan Williams
2007-04-17 18:33 ` Stefan Puch
2007-04-17 19:12 ` Michael Wu
2007-04-17 20:24 ` Luis R. Rodriguez
2007-04-24 18:49 ` Stefan Puch
2007-04-24 18:48 ` Michael Wu
2007-04-24 19:07 ` Stefan Puch
2007-04-17 19:23 ` Chr
2007-04-18 9:00 ` Stefan Puch
2007-04-18 9:49 ` Chr
2007-04-24 19:09 ` Stefan Puch
2007-04-25 13:47 ` Chr
[not found] ` <200704261228.01889.chunkeey@web.de>
[not found] ` <46320D71.60409@mail.uni-oldenburg.de>
2007-04-27 16:21 ` Chr
2007-04-28 15:31 ` Stefan Puch
2007-04-28 18:02 ` Stefan Puch
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).