* ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
@ 2012-09-26 11:02 Ben Gray
2012-09-26 11:44 ` Mohammed Shafi
2012-09-26 11:49 ` Jonathan Bagg
0 siblings, 2 replies; 9+ messages in thread
From: Ben Gray @ 2012-09-26 11:02 UTC (permalink / raw)
To: linux-wireless; +Cc: ath6kl-devel
Hi,
I have a bunch of UB134 USB dongles which have a ath6kl chip with
H/W version 0x31c8088a, I'm trying to get them to work with the ath6kl
driver from the compat-wireless-3.6-rc5-1 package. I've applied this
(https://patchwork.kernel.org/patch/1203191/) patch to the source and
pulled the hw1.3 firmware from the linux-firmware git.
The driver works as far as it can scan AP's and connect to
unencrypted networks, however WPA/WPA2 doesn't work when I run
wpa_supplicant. I realise "WPA doesn't work" is a bit vague, and I can
post the wpa_supplicant and driver logs if that helps, but I've seen
another post which says they couldn't get WPA to work either, so I'd
like to know if this is a known issue with the driver and/or firmware?
Has anyone had any luck getting WPA/WPA2 working with ath6kl hw1.3 ?
If this is a known issue does anyone know when it might be fixed ?
Thanks in advance,
Ben.
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 11:02 ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ? Ben Gray
@ 2012-09-26 11:44 ` Mohammed Shafi
2012-09-26 11:49 ` Jonathan Bagg
1 sibling, 0 replies; 9+ messages in thread
From: Mohammed Shafi @ 2012-09-26 11:44 UTC (permalink / raw)
To: Ben Gray; +Cc: linux-wireless, ath6kl-devel
Hi,
On Wed, Sep 26, 2012 at 4:32 PM, Ben Gray <ben.r.gray@gmail.com> wrote:
> Hi,
>
> I have a bunch of UB134 USB dongles which have a ath6kl chip with H/W
> version 0x31c8088a, I'm trying to get them to work with the ath6kl driver
> from the compat-wireless-3.6-rc5-1 package. I've applied this
> (https://patchwork.kernel.org/patch/1203191/) patch to the source and pulled
> the hw1.3 firmware from the linux-firmware git.
>
> The driver works as far as it can scan AP's and connect to unencrypted
> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I realise
> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant and
> driver logs if that helps, but I've seen another post which says they
> couldn't get WPA to work either, so I'd like to know if this is a known
> issue with the driver and/or firmware? Has anyone had any luck getting
> WPA/WPA2 working with ath6kl hw1.3 ?
let us check this out and would let you know the fix. I will ask more
information, once i
start recreating the issue.
>
> If this is a known issue does anyone know when it might be fixed ?
>
>
> Thanks in advance,
> Ben.
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
thanks,
shafi
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 11:02 ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ? Ben Gray
2012-09-26 11:44 ` Mohammed Shafi
@ 2012-09-26 11:49 ` Jonathan Bagg
2012-09-26 11:57 ` Jouni Malinen
2012-09-26 12:19 ` Mohammed Shafi
1 sibling, 2 replies; 9+ messages in thread
From: Jonathan Bagg @ 2012-09-26 11:49 UTC (permalink / raw)
To: Ben Gray; +Cc: linux-wireless, ath6kl-devel
I've had the same experience, I can connect with iw, but not with
wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
(other devices on the same router will go faster). I'm probably the
other post you mentioned.
Jon
On 12-09-26 07:02 AM, Ben Gray wrote:
> Hi,
>
> I have a bunch of UB134 USB dongles which have a ath6kl chip with
> H/W version 0x31c8088a, I'm trying to get them to work with the ath6kl
> driver from the compat-wireless-3.6-rc5-1 package. I've applied this
> (https://patchwork.kernel.org/patch/1203191/) patch to the source and
> pulled the hw1.3 firmware from the linux-firmware git.
>
> The driver works as far as it can scan AP's and connect to
> unencrypted networks, however WPA/WPA2 doesn't work when I run
> wpa_supplicant. I realise "WPA doesn't work" is a bit vague, and I can
> post the wpa_supplicant and driver logs if that helps, but I've seen
> another post which says they couldn't get WPA to work either, so I'd
> like to know if this is a known issue with the driver and/or firmware?
> Has anyone had any luck getting WPA/WPA2 working with ath6kl hw1.3 ?
>
> If this is a known issue does anyone know when it might be fixed ?
>
>
> Thanks in advance,
> Ben.
>
> --
> To unsubscribe from this list: send the line "unsubscribe
> linux-wireless" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 11:49 ` Jonathan Bagg
@ 2012-09-26 11:57 ` Jouni Malinen
2012-09-26 12:19 ` Mohammed Shafi
1 sibling, 0 replies; 9+ messages in thread
From: Jouni Malinen @ 2012-09-26 11:57 UTC (permalink / raw)
To: Jonathan Bagg; +Cc: Ben Gray, linux-wireless, ath6kl-devel
On Wed, Sep 26, 2012 at 07:49:34AM -0400, Jonathan Bagg wrote:
> I've had the same experience, I can connect with iw, but not with
> wpa_supplicant with wpa.
Could someone please post some debug logs from wpa_supplicant showing
the issue? There is not much that can be done with "WPA doesn't work"..
--
Jouni Malinen PGP id EFC895FA
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 11:49 ` Jonathan Bagg
2012-09-26 11:57 ` Jouni Malinen
@ 2012-09-26 12:19 ` Mohammed Shafi
2012-09-26 12:35 ` Ben Gray
1 sibling, 1 reply; 9+ messages in thread
From: Mohammed Shafi @ 2012-09-26 12:19 UTC (permalink / raw)
To: Jonathan Bagg; +Cc: Ben Gray, linux-wireless
On Wed, Sep 26, 2012 at 5:19 PM, Jonathan Bagg <jbagg@lenbrook.com> wrote:
> I've had the same experience, I can connect with iw, but not with
> wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
> (other devices on the same router will go faster). I'm probably the other
> post you mentioned.
We have a fix, I shall validate it and send it upstream.
>
> Jon
>
>
> On 12-09-26 07:02 AM, Ben Gray wrote:
>>
>> Hi,
>>
>> I have a bunch of UB134 USB dongles which have a ath6kl chip with H/W
>> version 0x31c8088a, I'm trying to get them to work with the ath6kl driver
>> from the compat-wireless-3.6-rc5-1 package. I've applied this
>> (https://patchwork.kernel.org/patch/1203191/) patch to the source and pulled
>> the hw1.3 firmware from the linux-firmware git.
>>
>> The driver works as far as it can scan AP's and connect to unencrypted
>> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I realise
>> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant and
>> driver logs if that helps, but I've seen another post which says they
>> couldn't get WPA to work either, so I'd like to know if this is a known
>> issue with the driver and/or firmware? Has anyone had any luck getting
>> WPA/WPA2 working with ath6kl hw1.3 ?
>>
>> If this is a known issue does anyone know when it might be fixed ?
>>
>>
>> Thanks in advance,
>> Ben.
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-wireless"
>> in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
thanks,
shafi
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 12:19 ` Mohammed Shafi
@ 2012-09-26 12:35 ` Ben Gray
2012-09-26 14:02 ` Mohammed Shafi
0 siblings, 1 reply; 9+ messages in thread
From: Ben Gray @ 2012-09-26 12:35 UTC (permalink / raw)
To: Mohammed Shafi; +Cc: Jonathan Bagg, linux-wireless, jouni
[-- Attachment #1: Type: text/plain, Size: 2135 bytes --]
Wow that was quick, thanks very much. Any idea when it will make it
upstream ?
I've attached the wpa_supplicant (v0.7.3) log in case anyone is still
interested.
Thanks everyone for your replies,
Ben.
On 26/09/2012 13:19, Mohammed Shafi wrote:
> On Wed, Sep 26, 2012 at 5:19 PM, Jonathan Bagg <jbagg@lenbrook.com> wrote:
>> I've had the same experience, I can connect with iw, but not with
>> wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
>> (other devices on the same router will go faster). I'm probably the other
>> post you mentioned.
>
> We have a fix, I shall validate it and send it upstream.
>>
>> Jon
>>
>>
>> On 12-09-26 07:02 AM, Ben Gray wrote:
>>>
>>> Hi,
>>>
>>> I have a bunch of UB134 USB dongles which have a ath6kl chip with H/W
>>> version 0x31c8088a, I'm trying to get them to work with the ath6kl driver
>>> from the compat-wireless-3.6-rc5-1 package. I've applied this
>>> (https://patchwork.kernel.org/patch/1203191/) patch to the source and pulled
>>> the hw1.3 firmware from the linux-firmware git.
>>>
>>> The driver works as far as it can scan AP's and connect to unencrypted
>>> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I realise
>>> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant and
>>> driver logs if that helps, but I've seen another post which says they
>>> couldn't get WPA to work either, so I'd like to know if this is a known
>>> issue with the driver and/or firmware? Has anyone had any luck getting
>>> WPA/WPA2 working with ath6kl hw1.3 ?
>>>
>>> If this is a known issue does anyone know when it might be fixed ?
>>>
>>>
>>> Thanks in advance,
>>> Ben.
>>>
>>> --
>>> To unsubscribe from this list: send the line "unsubscribe linux-wireless"
>>> in
>>> the body of a message to majordomo@vger.kernel.org
>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>
>>
>> --
>> To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
>> the body of a message to majordomo@vger.kernel.org
>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
>
>
[-- Attachment #2: wpa_supp.log --]
[-- Type: text/plain, Size: 34128 bytes --]
Initializing interface 'wlan0' conf '/tmp/wpa_supp.conf' driver 'nl80211' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/tmp/wpa_supp.conf' -> '/tmp/wpa_supp.conf'
Reading configuration file '/tmp/wpa_supp.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Line: 4 - start of a new network block
ssid - hexdump_ascii(len=8):
53 4b 59 34 36 31 36 45 SKY4616E
proto: 0x1
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK - hexdump(len=32): [REMOVED]
Priority group 0
id=0 ssid='SKY4616E'
netlink: Operstate: linkmode=1, operstate=5
Own MAC address: 00:03:7f:20:49:12
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=5 set_tx=0 seq_len=0 key_len=0
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 89 22 27 6c 5f ea 52 33 93 f7 92 9a 11 5e b7 1c
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: Supplicant port status: Unauthorized
EAPOL: Supplicant port status: Unauthorized
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 10 seconds
nl80211: Event message available
nl80211: Scan trigger
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
nl80211: Event message available
nl80211: New scan results available
Received scan results (29 BSSes)
BSS: Start scan result update 1
BSS: Add new id 0 BSSID c8:cd:72:c4:61:6f SSID '<<removed>>'
BSS: Add new id 1 BSSID 00:19:fb:5b:92:75 SSID '<<removed>>'
BSS: Add new id 2 BSSID a8:b1:d4:6c:ed:7e SSID '<<removed>>'
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x1041 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=8
WPS: attr type=0x1024 len=8
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=8
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x1041 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=13
WPS: attr type=0x1023 len=8
WPS: attr type=0x1024 len=8
WPS: attr type=0x1042 len=2
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=8
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: c8:cd:72:c4:61:6f ssid='SKY4616E' wpa_ie_len=28 rsn_ie_len=0 caps=0x411
selected based on WPA IE
selected WPA AP c8:cd:72:c4:61:6f ssid='SKY4616E'
Trying to associate with c8:cd:72:c4:61:6f (SSID='SKY4616E' freq=2437 MHz)
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 0c 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
nl80211: Connect (ifindex=4)
* bssid=c8:cd:72:c4:61:6f
* freq=2437
* SSID - hexdump_ascii(len=8):
53 4b 59 34 36 31 36 45 SKY4616E
* IEs - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
* Auth Type 0
* WPA Version 1
nl80211: Connect request send successfully
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
nl80211: Event message available
Association info event
req_ies - hexdump(len=90): 00 08 53 4b 59 34 36 31 36 45 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=105): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 01 f0 04 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: ASSOCIATING -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=c8:cd:72:c4:61:6f
No keys have been configured - skip key clearing
Associated with c8:cd:72:c4:61:6f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: Renewed SNonce - hexdump(len=32): 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 4e ea db 34 73 85 f4 21 c1 38 4d 2f 5e b9 bc 11 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b8 35 5d 40 74 0e 60 dc b6 fb d7 ca 33 c1 b8 27 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 02 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 33 ab cb bc de 39 fd 0c 7c 55 3e 77 72 84 78 b0 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 03 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 c2 55 c3 eb a0 13 dd 4a 9d 6e 6f 18 c5 b2 69 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 04 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 04
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 04 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 04 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 aa 26 6f 2e da af 00 ca 9a cf c7 70 53 f3 3e 57 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 05 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 05
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 05 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 05 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b4 1a 54 8f a6 f8 a7 48 63 57 1a db 48 4b 7c b1 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 06 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 06
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 06 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 06 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 74 0e c4 f5 58 a6 22 e0 73 1b 63 0a 56 12 59 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 07 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 07
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 07 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 1f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 07 1c 6c bd 77 3d c7 c4 ee 38 ca 7d 4e e5 a6 01 4f 79 69 7b e6 b7 7b 35 55 68 a0 2e 6f 5c 89 64 6d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1f 99 09 4f 0d c2 1e b2 1e d9 67 24 47 6f f5 c6 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
nl80211: Event message available
Association info event
req_ies - hexdump(len=90): 00 08 53 4b 59 34 36 31 36 45 01 08 82 84 8b 0c 12 96 18 24 32 04 30 48 60 6c 2d 1a ac 01 02 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 01 01 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02 dd 07 00 50 f2 02 00 01 00
resp_ies - hexdump(len=105): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 2d 1a 6c 18 1b ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 15 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 09 00 10 18 02 02 f0 04 00 00 dd 18 00 50 f2 02 01 01 80 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
FT: Stored MDIE and FTIE from (Re)Association Response - hexdump(len=0):
State: 4WAY_HANDSHAKE -> ASSOCIATED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
Associated with c8:cd:72:c4:61:6f
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 00 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: Renewed SNonce - hexdump(len=32): fc 69 21 9a ee 02 ce cf 51 ac b3 8f 14 32 4c 3b cd 5f 8c 5e bb 0b 99 0a 4e 8a 3a bd bc 90 16 79
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 00 fc 69 21 9a ee 02 ce cf 51 ac b3 8f 14 32 4c 3b cd 5f 8c 5e bb 0b 99 0a 4e 8a 3a bd bc 90 16 79 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1b 03 f8 d6 fd 8c c6 a2 5a f7 eb 00 09 7a 81 78 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RX EAPOL from c8:cd:72:c4:61:6f
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
IEEE 802.1X RX: version=1 type=3 length=95
EAPOL-Key type=254
key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 4a 25 ab 9b 70 c8 d3 d3 1c 6c 57 31 ad 8e 4f 1b e0 5b 9e 0f b7 de 91 44 a6 16 14 ee 57 e1 20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from c8:cd:72:c4:61:6f (ver=2)
WPA: PTK derivation - A1=00:03:7f:20:49:12 A2=c8:cd:72:c4:61:6f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 0a 00 10 00 00 00 00 00 00 00 01 fc 69 21 9a ee 02 ce cf 51 ac b3 8f 14 32 4c 3b cd 5f 8c 5e bb 0b 99 0a 4e 8a 3a bd bc 90 16 79 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f8 42 ca 36 14 23 44 5b f9 64 69 28 ea 5c 30 43 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
nl80211: Event message available
Disassociation notification
WPA: 4-Way Handshake failed - pre-shared key may be incorrect
Setting scan request: 0 sec 100000 usec
Added BSSID c8:cd:72:c4:61:6f into blacklist
CTRL-EVENT-DISCONNECTED bssid=c8:cd:72:c4:61:6f reason=3
Disconnect event - remove keys
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=4 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x80e4f28 key_idx=5 set_tx=0 seq_len=0 key_len=0
wpa_driver_nl80211_set_key: ifindex=4 alg=0 addr=0x8e01574 key_idx=0 set_tx=0 seq_len=0 key_len=0
addr=c8:cd:72:c4:61:6f
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_nl80211_set_operstate: operstate 0->0 (DORMANT)
netlink: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: Supplicant port status: Unauthorized
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portValid=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: Supplicant port status: Unauthorized
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
nl80211: Scan SSID - hexdump_ascii(len=0): [NULL]
Scan requested (ret=0) - scan timeout 30 seconds
nl80211: Event message available
nl80211: Scan trigger
EAPOL: Supplicant port status: Unauthorized
nl80211: Event message available
nl80211: New scan results available
Received scan results (29 BSSes)
BSS: Start scan result update 2
BSS: Add new id 29 BSSID 74:44:01:8d:7e:1b SSID '<<removed>>'
BSS: Add new id 30 BSSID a8:b1:d4:6c:ed:7c SSID '<<removed>>'
BSS: Add new id 31 BSSID a8:b1:d4:6c:ed:72 SSID '<<removed>>'
BSS: Add new id 32 BSSID a8:b1:d4:21:43:8d SSID '<<removed>>'
New scan results available
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=8
WPS: attr type=0x1023 len=8
WPS: attr type=0x1024 len=6
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x1049 len=6
WPS: Unsupported attribute type 0x1049 len=6
WPS: attr type=0x104a len=1
WPS: attr type=0x1044 len=1
WPS: attr type=0x103b len=1
WPS: attr type=0x1047 len=16
WPS: attr type=0x1021 len=8
WPS: attr type=0x1023 len=8
WPS: attr type=0x1024 len=6
WPS: attr type=0x1042 len=4
WPS: attr type=0x1054 len=8
WPS: attr type=0x1011 len=10
WPS: attr type=0x1008 len=2
WPS: attr type=0x103c len=1
WPS: attr type=0x1049 len=6
WPS: Unsupported attribute type 0x1049 len=6
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 12:35 ` Ben Gray
@ 2012-09-26 14:02 ` Mohammed Shafi
2012-09-26 15:11 ` Ben Gray
0 siblings, 1 reply; 9+ messages in thread
From: Mohammed Shafi @ 2012-09-26 14:02 UTC (permalink / raw)
To: Ben Gray; +Cc: Jonathan Bagg, linux-wireless, jouni
[-- Attachment #1: Type: text/plain, Size: 2470 bytes --]
On Wed, Sep 26, 2012 at 6:05 PM, Ben Gray <ben.r.gray@gmail.com> wrote:
> Wow that was quick, thanks very much. Any idea when it will make it
> upstream ?
can you please try the attached patch. I will just put tested-by if it
works for you too.
It works for me.
>
> I've attached the wpa_supplicant (v0.7.3) log in case anyone is still
> interested.
>
> Thanks everyone for your replies,
>
> Ben.
>
>
>
> On 26/09/2012 13:19, Mohammed Shafi wrote:
>>
>> On Wed, Sep 26, 2012 at 5:19 PM, Jonathan Bagg <jbagg@lenbrook.com> wrote:
>>>
>>> I've had the same experience, I can connect with iw, but not with
>>> wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
>>> (other devices on the same router will go faster). I'm probably the
>>> other
>>> post you mentioned.
>>
>>
>> We have a fix, I shall validate it and send it upstream.
>>>
>>>
>>> Jon
>>>
>>>
>>> On 12-09-26 07:02 AM, Ben Gray wrote:
>>>>
>>>>
>>>> Hi,
>>>>
>>>> I have a bunch of UB134 USB dongles which have a ath6kl chip with
>>>> H/W
>>>> version 0x31c8088a, I'm trying to get them to work with the ath6kl
>>>> driver
>>>> from the compat-wireless-3.6-rc5-1 package. I've applied this
>>>> (https://patchwork.kernel.org/patch/1203191/) patch to the source and
>>>> pulled
>>>> the hw1.3 firmware from the linux-firmware git.
>>>>
>>>> The driver works as far as it can scan AP's and connect to
>>>> unencrypted
>>>> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I
>>>> realise
>>>> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant and
>>>> driver logs if that helps, but I've seen another post which says they
>>>> couldn't get WPA to work either, so I'd like to know if this is a known
>>>> issue with the driver and/or firmware? Has anyone had any luck getting
>>>> WPA/WPA2 working with ath6kl hw1.3 ?
>>>>
>>>> If this is a known issue does anyone know when it might be fixed ?
>>>>
>>>>
>>>> Thanks in advance,
>>>> Ben.
>>>>
>>>> --
>>>> To unsubscribe from this list: send the line "unsubscribe
>>>> linux-wireless"
>>>> in
>>>> the body of a message to majordomo@vger.kernel.org
>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>
>>>
>>>
>>> --
>>> To unsubscribe from this list: send the line "unsubscribe linux-wireless"
>>> in
>>> the body of a message to majordomo@vger.kernel.org
>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>
>>
>>
>>
>
--
thanks,
shafi
[-- Attachment #2: wpa2-ath6kl-fix.patch --]
[-- Type: application/octet-stream, Size: 1089 bytes --]
diff --git a/drivers/net/wireless/ath/ath6kl/usb.c b/drivers/net/wireless/ath/ath6kl/usb.c
index a6d1377..5c8886c 100644
--- a/drivers/net/wireless/ath/ath6kl/usb.c
+++ b/drivers/net/wireless/ath/ath6kl/usb.c
@@ -803,7 +803,11 @@ static int ath6kl_usb_map_service_pipe(struct ath6kl *ar, u16 svc_id,
*dl_pipe = ATH6KL_USB_PIPE_RX_DATA;
break;
case WMI_DATA_VI_SVC:
- *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
+
+ if (ar->version.target_ver == AR6004_HW_1_3_VERSION)
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_LP;
+ else
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
/*
* Disable rxdata2 directly, it will be enabled
* if FW enable rxdata2
@@ -811,7 +815,11 @@ static int ath6kl_usb_map_service_pipe(struct ath6kl *ar, u16 svc_id,
*dl_pipe = ATH6KL_USB_PIPE_RX_DATA;
break;
case WMI_DATA_VO_SVC:
- *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_HP;
+
+ if (ar->version.target_ver == AR6004_HW_1_3_VERSION)
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_LP;
+ else
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
/*
* Disable rxdata2 directly, it will be enabled
* if FW enable rxdata2
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 14:02 ` Mohammed Shafi
@ 2012-09-26 15:11 ` Ben Gray
2012-09-26 15:14 ` Mohammed Shafi
0 siblings, 1 reply; 9+ messages in thread
From: Ben Gray @ 2012-09-26 15:11 UTC (permalink / raw)
To: Mohammed Shafi; +Cc: Jonathan Bagg, linux-wireless, jouni
> On Wed, Sep 26, 2012 at 6:05 PM, Ben Gray <ben.r.gray@gmail.com> wrote:
>> Wow that was quick, thanks very much. Any idea when it will make it
>> upstream ?
>
> can you please try the attached patch. I will just put tested-by if it
> works for you too.
> It works for me.
Yes, that works for me :), I've tried both WPA and WPA2 and both work so
far.
Many thanks Mohammed, it's much appreciated.
>
>>
>> I've attached the wpa_supplicant (v0.7.3) log in case anyone is still
>> interested.
>>
>> Thanks everyone for your replies,
>>
>> Ben.
>>
>>
>>
>> On 26/09/2012 13:19, Mohammed Shafi wrote:
>>>
>>> On Wed, Sep 26, 2012 at 5:19 PM, Jonathan Bagg <jbagg@lenbrook.com> wrote:
>>>>
>>>> I've had the same experience, I can connect with iw, but not with
>>>> wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
>>>> (other devices on the same router will go faster). I'm probably the
>>>> other
>>>> post you mentioned.
>>>
>>>
>>> We have a fix, I shall validate it and send it upstream.
>>>>
>>>>
>>>> Jon
>>>>
>>>>
>>>> On 12-09-26 07:02 AM, Ben Gray wrote:
>>>>>
>>>>>
>>>>> Hi,
>>>>>
>>>>> I have a bunch of UB134 USB dongles which have a ath6kl chip with
>>>>> H/W
>>>>> version 0x31c8088a, I'm trying to get them to work with the ath6kl
>>>>> driver
>>>>> from the compat-wireless-3.6-rc5-1 package. I've applied this
>>>>> (https://patchwork.kernel.org/patch/1203191/) patch to the source and
>>>>> pulled
>>>>> the hw1.3 firmware from the linux-firmware git.
>>>>>
>>>>> The driver works as far as it can scan AP's and connect to
>>>>> unencrypted
>>>>> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I
>>>>> realise
>>>>> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant and
>>>>> driver logs if that helps, but I've seen another post which says they
>>>>> couldn't get WPA to work either, so I'd like to know if this is a known
>>>>> issue with the driver and/or firmware? Has anyone had any luck getting
>>>>> WPA/WPA2 working with ath6kl hw1.3 ?
>>>>>
>>>>> If this is a known issue does anyone know when it might be fixed ?
>>>>>
>>>>>
>>>>> Thanks in advance,
>>>>> Ben.
>>>>>
>>>>> --
>>>>> To unsubscribe from this list: send the line "unsubscribe
>>>>> linux-wireless"
>>>>> in
>>>>> the body of a message to majordomo@vger.kernel.org
>>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>>
>>>>
>>>>
>>>> --
>>>> To unsubscribe from this list: send the line "unsubscribe linux-wireless"
>>>> in
>>>> the body of a message to majordomo@vger.kernel.org
>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>
>>>
>>>
>>>
>>
>
>
>
^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ?
2012-09-26 15:11 ` Ben Gray
@ 2012-09-26 15:14 ` Mohammed Shafi
0 siblings, 0 replies; 9+ messages in thread
From: Mohammed Shafi @ 2012-09-26 15:14 UTC (permalink / raw)
To: Ben Gray; +Cc: Jonathan Bagg, linux-wireless, jouni
[-- Attachment #1: Type: text/plain, Size: 3016 bytes --]
On Wed, Sep 26, 2012 at 8:41 PM, Ben Gray <ben.r.gray@gmail.com> wrote:
>
>> On Wed, Sep 26, 2012 at 6:05 PM, Ben Gray <ben.r.gray@gmail.com> wrote:
>>>
>>> Wow that was quick, thanks very much. Any idea when it will make it
>>> upstream ?
>>
>>
>> can you please try the attached patch. I will just put tested-by if it
>> works for you too.
>> It works for me.
>
> Yes, that works for me :), I've tried both WPA and WPA2 and both work so
> far.
>
> Many thanks Mohammed, it's much appreciated.
thanks i will add tested-by with the attached to be sent patch
>
>>
>>>
>>> I've attached the wpa_supplicant (v0.7.3) log in case anyone is still
>>> interested.
>>>
>>> Thanks everyone for your replies,
>>>
>>> Ben.
>>>
>>>
>>>
>>> On 26/09/2012 13:19, Mohammed Shafi wrote:
>>>>
>>>>
>>>> On Wed, Sep 26, 2012 at 5:19 PM, Jonathan Bagg <jbagg@lenbrook.com>
>>>> wrote:
>>>>>
>>>>>
>>>>> I've had the same experience, I can connect with iw, but not with
>>>>> wpa_supplicant with wpa. I also couldn't get higher than 65Mbps, MCS7
>>>>> (other devices on the same router will go faster). I'm probably the
>>>>> other
>>>>> post you mentioned.
>>>>
>>>>
>>>>
>>>> We have a fix, I shall validate it and send it upstream.
>>>>>
>>>>>
>>>>>
>>>>> Jon
>>>>>
>>>>>
>>>>> On 12-09-26 07:02 AM, Ben Gray wrote:
>>>>>>
>>>>>>
>>>>>>
>>>>>> Hi,
>>>>>>
>>>>>> I have a bunch of UB134 USB dongles which have a ath6kl chip
>>>>>> with
>>>>>> H/W
>>>>>> version 0x31c8088a, I'm trying to get them to work with the ath6kl
>>>>>> driver
>>>>>> from the compat-wireless-3.6-rc5-1 package. I've applied this
>>>>>> (https://patchwork.kernel.org/patch/1203191/) patch to the source and
>>>>>> pulled
>>>>>> the hw1.3 firmware from the linux-firmware git.
>>>>>>
>>>>>> The driver works as far as it can scan AP's and connect to
>>>>>> unencrypted
>>>>>> networks, however WPA/WPA2 doesn't work when I run wpa_supplicant. I
>>>>>> realise
>>>>>> "WPA doesn't work" is a bit vague, and I can post the wpa_supplicant
>>>>>> and
>>>>>> driver logs if that helps, but I've seen another post which says they
>>>>>> couldn't get WPA to work either, so I'd like to know if this is a
>>>>>> known
>>>>>> issue with the driver and/or firmware? Has anyone had any luck getting
>>>>>> WPA/WPA2 working with ath6kl hw1.3 ?
>>>>>>
>>>>>> If this is a known issue does anyone know when it might be fixed
>>>>>> ?
>>>>>>
>>>>>>
>>>>>> Thanks in advance,
>>>>>> Ben.
>>>>>>
>>>>>> --
>>>>>> To unsubscribe from this list: send the line "unsubscribe
>>>>>> linux-wireless"
>>>>>> in
>>>>>> the body of a message to majordomo@vger.kernel.org
>>>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> --
>>>>> To unsubscribe from this list: send the line "unsubscribe
>>>>> linux-wireless"
>>>>> in
>>>>> the body of a message to majordomo@vger.kernel.org
>>>>> More majordomo info at http://vger.kernel.org/majordomo-info.html
>>>>
>>>>
>>>>
>>>>
>>>>
>>>
>>
>>
>>
>
--
thanks,
shafi
[-- Attachment #2: 0001-ath6kl-Fix-mapping-uplink-endpoint-for-AR6004.patch --]
[-- Type: application/octet-stream, Size: 2882 bytes --]
From 4c73c431e16a1b5baa15f00b219ee5a690b51bf0 Mon Sep 17 00:00:00 2001
From: Mohammed Shafi Shajakhan <mohammed@qca.qualcomm.com>
Date: Wed, 26 Sep 2012 19:41:35 +0530
Subject: [PATCH] ath6kl: Fix mapping uplink endpoint for AR6004
AR6004 (UB134) firmware supports only LP Endpoint, So map
all Access Categories to Low endpoints. This fixes a WPA2
connection issue as the uplink(tx) endpoint is appropriately
mapped in sync with the firmware.
Reported-by: Ben Gray <ben.r.gray@gmail.com>
Signed-off-by: Mohammed Shafi Shajakhan <mohammed@qca.qualcomm.com>
---
drivers/net/wireless/ath/ath6kl/init.c | 5 +++--
drivers/net/wireless/ath/ath6kl/usb.c | 12 ++++++++++--
2 files changed, 13 insertions(+), 4 deletions(-)
diff --git a/drivers/net/wireless/ath/ath6kl/init.c b/drivers/net/wireless/ath/ath6kl/init.c
index e5e9b2c..de9d91c 100644
--- a/drivers/net/wireless/ath/ath6kl/init.c
+++ b/drivers/net/wireless/ath/ath6kl/init.c
@@ -360,7 +360,7 @@ static int ath6kl_init_service_ep(struct ath6kl *ar)
if (ath6kl_connectservice(ar, &connect, "WMI DATA BK"))
return -EIO;
- /* connect to Video service, map this to to HI PRI */
+ /* connect to Video service, map this to to LOW_PRI */
connect.svc_id = WMI_DATA_VI_SVC;
if (ath6kl_connectservice(ar, &connect, "WMI DATA VI"))
return -EIO;
@@ -370,7 +370,8 @@ static int ath6kl_init_service_ep(struct ath6kl *ar)
* priority stream due to historical reasons. WMI originally
* defined 3 priorities over 3 mailboxes We can change this when
* WMI is reworked so that priorities are not dependent on
- * mailboxes.
+ * mailboxes. This is also mapped to LOW_PRI endpoint in sync with
+ * the firmware.
*/
connect.svc_id = WMI_DATA_VO_SVC;
if (ath6kl_connectservice(ar, &connect, "WMI DATA VO"))
diff --git a/drivers/net/wireless/ath/ath6kl/usb.c b/drivers/net/wireless/ath/ath6kl/usb.c
index a6d1377..5c8886c 100644
--- a/drivers/net/wireless/ath/ath6kl/usb.c
+++ b/drivers/net/wireless/ath/ath6kl/usb.c
@@ -803,7 +803,11 @@ static int ath6kl_usb_map_service_pipe(struct ath6kl *ar, u16 svc_id,
*dl_pipe = ATH6KL_USB_PIPE_RX_DATA;
break;
case WMI_DATA_VI_SVC:
- *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
+
+ if (ar->version.target_ver == AR6004_HW_1_3_VERSION)
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_LP;
+ else
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
/*
* Disable rxdata2 directly, it will be enabled
* if FW enable rxdata2
@@ -811,7 +815,11 @@ static int ath6kl_usb_map_service_pipe(struct ath6kl *ar, u16 svc_id,
*dl_pipe = ATH6KL_USB_PIPE_RX_DATA;
break;
case WMI_DATA_VO_SVC:
- *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_HP;
+
+ if (ar->version.target_ver == AR6004_HW_1_3_VERSION)
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_LP;
+ else
+ *ul_pipe = ATH6KL_USB_PIPE_TX_DATA_MP;
/*
* Disable rxdata2 directly, it will be enabled
* if FW enable rxdata2
--
1.7.0.4
^ permalink raw reply related [flat|nested] 9+ messages in thread
end of thread, other threads:[~2012-09-26 15:14 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-09-26 11:02 ath6kl ar6004/ar9374 (hw 1.3) WPA/WPA2 supported ? Ben Gray
2012-09-26 11:44 ` Mohammed Shafi
2012-09-26 11:49 ` Jonathan Bagg
2012-09-26 11:57 ` Jouni Malinen
2012-09-26 12:19 ` Mohammed Shafi
2012-09-26 12:35 ` Ben Gray
2012-09-26 14:02 ` Mohammed Shafi
2012-09-26 15:11 ` Ben Gray
2012-09-26 15:14 ` Mohammed Shafi
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).