Opened 12 years ago
Closed 6 years ago
#9646 closed bug (not reproducible)
wpa_supplicant: cannot connect to network
Reported by: | dsjonny | Owned by: | nobody |
---|---|---|---|
Priority: | normal | Milestone: | R1 |
Component: | Network & Internet/Wireless | Version: | R1/Development |
Keywords: | Cc: | ||
Blocked By: | Blocking: | ||
Platform: | All |
Description
Using 45464 nightly I cannot connect to the network with WiFi.
The network has WPA2-PSK security mode. After I enter the password, It waits some seconds, popup the "Configuring" info window, and after some seconds I got wpa_supplicant window again. After this, in the Deskbar's NetworkStatus icon shows "No wireless network available".
I need to turn off and on the adapter to have wireless networks in the list again:
~/Desktop> ifconfig /dev/net/iprowifi4965/0 down ~/Desktop> ifconfig /dev/net/iprowifi4965/0 up
My network adapter is an Intel Centrino 6230, and there was no problem since some nightlies before.
I also checked the syslog, and there is nothing.
Attachments (1)
Change History (10)
comment:1 by , 12 years ago
comment:2 by , 12 years ago
Using 45487 nightly.
I have attached the syslog.
net_server debug output:
Welcome to the Haiku shell. ~/Desktop> /system/servers/net_server New service ssh Launch service: /boot/common/bin/sshd wpa_supplicant v2.0 failed to read keystore database Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver 'default' ctrl_interface 'N/A' bridge 'N/A' wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000 /dev/net/iprowifi4965/0: Own MAC address: 00:15:00:77:2c:02 bsd_set_key: alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 wpa_driver_bsd_set_countermeasures: enabled=0 /dev/net/iprowifi4965/0: RSN: flushing PMKID list in the driver /dev/net/iprowifi4965/0: State: DISCONNECTED -> INACTIVE /dev/net/iprowifi4965/0: Added interface /dev/net/iprowifi4965/0 /dev/net/iprowifi4965/0: State: INACTIVE -> DISCONNECTED ssid - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi scan_ssid=1 (0x1) proto: 0x3 key_mgmt: 0x2 pairwise: 0x19 group: 0x1e PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] /dev/net/iprowifi4965/0: Setting scan request: 0 sec 0 usec /dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi /dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error /dev/net/iprowifi4965/0: Failed to initiate AP scan /dev/net/iprowifi4965/0: State: SCANNING -> DISCONNECTED /dev/net/iprowifi4965/0: Setting scan request: 1 sec 0 usec /dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi /dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 /dev/net/iprowifi4965/0: Event SCAN_RESULTS (3) received Received 568 bytes of scan results (2 BSSes) Sorted scan results cc:5d:4e:47:99:bd freq=2472 qual=47 noise=-95 level=0 flags=0x0 IEs - hexdump(len=400): 00 07 44 52 2d 57 69 46 69 01 0c 82 84 8b 96 0c 12 18 24 30 48 60 6c 2a 01 00 00 07 44 52 2d 57 69 46 69 01 08 82 84 8b 96 0c 12 18 24 03 01 0d 2a 01 00 32 04 30 48 60 6c 2d 1a 6e 18 1e ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 0d 07 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd a9 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 3b 00 01 03 10 47 00 10 98 58 f6 64 7a e3 43 07 81 48 4c c9 e2 13 65 05 10 21 00 1a 5a 79 58 45 4c 20 43 6f 6d 6d 75 6e 69 63 61 74 69 6f 6e 73 20 43 6f 72 70 2e 10 23 00 18 5a 79 58 45 4c 20 4e 42 47 2d 34 31 38 4e 20 41 50 20 52 6f 75 74 65 72 10 24 00 08 4e 42 47 2d 34 31 38 4e 10 42 00 0a 30 30 30 30 30 30 30 30 30 30 10 54 00 08 00 06 00 50 f2 04 00 01 10 11 00 18 5a 79 58 45 4c 20 4e 42 47 2d 34 31 38 4e 20 41 50 20 52 6f 75 74 65 72 10 08 00 02 00 86 dd 1e 00 90 4c 33 6e 18 1e ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 0d 07 11 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 06 00 e0 4c 02 01 60 d8:5d:4c:86:24:b4 freq=2412 qual=46 noise=-95 level=0 flags=0x0 IEs - hexdump(len=89): 00 0a 54 50 4c 49 4e 4b 48 4f 4d 45 01 0c 82 84 8b 96 0c 18 30 48 12 24 60 6c 2a 01 00 00 0a 54 50 4c 49 4e 4b 48 4f 4d 45 01 08 82 84 8b 96 0c 18 30 48 03 01 01 2a 01 00 32 04 12 24 60 6c 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 01 00 /dev/net/iprowifi4965/0: BSS: Start scan result update 1 /dev/net/iprowifi4965/0: BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi' /dev/net/iprowifi4965/0: BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME' BSS: last_scan_res_used=2/32 last_scan_full=0 Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] Add randomness: count=2 entropy=1 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=5): [REMOVED] random pool - hexdump(len=128): [REMOVED] /dev/net/iprowifi4965/0: New scan results available /dev/net/iprowifi4965/0: Selecting BSS from priority group 0 /dev/net/iprowifi4965/0: 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 level=0 wps /dev/net/iprowifi4965/0: selected based on RSN IE /dev/net/iprowifi4965/0: selected BSS cc:5d:4e:47:99:bd ssid='DR-WiFi' /dev/net/iprowifi4965/0: Request association: reassociate: 1 selected: cc:5d:4e:47:99:bd bssid: 00:00:00:00:00:00 pending: 00:00:00:00:00:00 wpa_state: SCANNING /dev/net/iprowifi4965/0: Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz) /dev/net/iprowifi4965/0: Cancelling scan request /dev/net/iprowifi4965/0: WPA: clearing own WPA/RSN IE /dev/net/iprowifi4965/0: Automatic auth_alg selection: 0x1 /dev/net/iprowifi4965/0: RSN: using IEEE 802.11i/D9.0 /dev/net/iprowifi4965/0: WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 /dev/net/iprowifi4965/0: WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 /dev/net/iprowifi4965/0: WPA: using GTK TKIP /dev/net/iprowifi4965/0: WPA: using PTK CCMP /dev/net/iprowifi4965/0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 /dev/net/iprowifi4965/0: No keys have been configured - skip key clearing /dev/net/iprowifi4965/0: State: SCANNING -> ASSOCIATING Limit connection to BSSID cc:5d:4e:47:99:bd freq=2472 MHz based on scan results (bssid_set=0) wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 /dev/net/iprowifi4965/0: Setting authentication timeout: 10 sec 0 usec /dev/net/iprowifi4965/0: Authentication with cc:5d:4e:47:99:bd timed out. Added BSSID cc:5d:4e:47:99:bd into blacklist /dev/net/iprowifi4965/0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=cc:5d:4e:47:99:bd reason=3 state=ASSOCIATING /dev/net/iprowifi4965/0: Event DEAUTH (12) received /dev/net/iprowifi4965/0: Deauthentication notification /dev/net/iprowifi4965/0: * reason 3 (locally generated) Deauthentication frame IE(s) - hexdump(len=0): [NULL] /dev/net/iprowifi4965/0: CTRL-EVENT-DISCONNECTED bssid=cc:5d:4e:47:99:bd reason=3 locally_generated=1 /dev/net/iprowifi4965/0: Auto connect enabled: try to reconnect (wps=0 wpa_state=5) /dev/net/iprowifi4965/0: Setting scan request: 0 sec 100000 usec BSSID cc:5d:4e:47:99:bd blacklist count incremented to 2 /dev/net/iprowifi4965/0: Blacklist count 2 --> request scan in 500 ms /dev/net/iprowifi4965/0: Not rescheduling scan to ensure that specific SSID scans occur /dev/net/iprowifi4965/0: Disconnect event - remove keys bsd_set_key: alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 bsd_set_key: alg=0 addr=0x1809e6f8 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: addr=00:00:00:00:00:00 /dev/net/iprowifi4965/0: State: ASSOCIATING -> DISCONNECTED /dev/net/iprowifi4965/0: No keys have been configured - skip key clearing /dev/net/iprowifi4965/0: State: DISCONNECTED -> DISCONNECTED /dev/net/iprowifi4965/0: Not rescheduling scan to ensure that specific SSID scans occur /dev/net/iprowifi4965/0: State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi /dev/net/iprowifi4965/0: Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 /dev/net/iprowifi4965/0: Removing interface /dev/net/iprowifi4965/0 /dev/net/iprowifi4965/0: Request to deauthenticate - bssid=00:00:00:00:00:00 pending_bssid=00:00:00:00:00:00 reason=3 state=SCANNING /dev/net/iprowifi4965/0: No keys have been configured - skip key clearing /dev/net/iprowifi4965/0: State: SCANNING -> DISCONNECTED wpa_driver_bsd_set_countermeasures: enabled=0 /dev/net/iprowifi4965/0: No keys have been configured - skip key clearing Removed BSSID cc:5d:4e:47:99:bd from blacklist (clear) /dev/net/iprowifi4965/0: BSS: Remove id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi' due to wpa_bss_flush /dev/net/iprowifi4965/0: BSS: Remove id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME' due to wpa_bss_flush /dev/net/iprowifi4965/0: Cancelling scan request /dev/net/iprowifi4965/0: Cancelling authentication timeout wpa_driver_bsd_set_wpa: enabled=0 wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0 bsd_set_opt_ie: set WPA+RSN ie (len 0) ioctl[SIOCS80211, op=26, val=0, arg_len=0]: General system error wpa_driver_bsd_set_wpa_internal: wpa=0 privacy=0 bsd_set_opt_ie: set WPA+RSN ie (len 0) ioctl[SIOCS80211, op=26, val=0, arg_len=0]: General system error
by , 12 years ago
comment:3 by , 12 years ago
Well that looks like it almost made it. The things that stick out are:
wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error /dev/net/iprowifi4965/0: Failed to initiate AP scan
... and obviously:
/dev/net/iprowifi4965/0: Setting authentication timeout: 10 sec 0 usec /dev/net/iprowifi4965/0: Authentication with cc:5d:4e:47:99:bd timed out.
It looks like the AP scan still takes place, though possibly not because of the wpa_supplicant but just generally because the driver is still in its initial scan mode. Does the output change if you retry the connection?
The rest of the output looks fine and as expected, none of the ioctls seem to fail, so connecting should theoretically work. When it worked previously, did it take a lot of time to authenticate and get the connection going? I mean the current timeout is set to 15 seconds, the auth timeout is 10 seconds, so maybe previously it would take two attempts? In that case it would have taken around 20 seconds to establish a connection.
I know that the wpa_supplicant works with this driver because I use that driver on both of my current laptops. The one in this machine is identified as:
device 088e: Centrino Advanced-N 6235 (Centrino Advanced-N 6235 AGN)
So pretty similar to the 6230 in your system.
comment:4 by , 12 years ago
Well, I have downloaded the R1A4 and the wifi works fine. The authentication timeout was 10s too. The connecting time looks like fast. Here is the output from the Terminal:
Welcome to the Haiku shell. ~/Desktop> /system/servers/net_server New service ssh Launch service: /boot/common/bin/sshd Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver 'default' ctrl_interface 'N/A' bridge 'N/A' wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000 Own MAC address: 00:15:00:77:2c:02 bsd_set_key: alg=0 addr=0x2290e4 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x2290e4 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x2290e4 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x2290e4 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 wpa_driver_bsd_set_countermeasures: enabled=0 RSN: flushing PMKID list in the driver State: DISCONNECTED -> INACTIVE Added interface /dev/net/iprowifi4965/0 ssid - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi scan_ssid=1 (0x1) proto: 0x3 key_mgmt: 0x2 pairwise: 0x19 group: 0x1e PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error Failed to initiate AP scan. State: SCANNING -> INACTIVE Setting scan request: 1 sec 0 usec State: INACTIVE -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error Failed to initiate AP scan. State: SCANNING -> INACTIVE Setting scan request: 1 sec 0 usec Received 1116 bytes of scan results (5 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi' BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME' BSS: Add new id 2 BSSID c8:60:00:67:32:d4 SSID 'SZKSZAK_T10Z' BSS: Add new id 3 BSSID 94:0c:6d:fe:c0:92 SSID 'CSSK_WLAN' BSS: Add new id 4 BSSID 00:1d:0f:c5:44:3c SSID 'WIFIZZ' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi' Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: INACTIVE -> ASSOCIATING wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 Setting authentication timeout: 10 sec 0 usec Authentication with cc:5d:4e:47:99:bd timed out. Added BSSID cc:5d:4e:47:99:bd into blacklist No keys have been configured - skip key clearing State: ASSOCIATING -> DISCONNECTED Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 Received 1016 bytes of scan results (4 BSSes) BSS: Start scan result update 2 New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi' Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 Setting authentication timeout: 10 sec 0 usec State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=cc:5d:4e:47:99:bd No keys have been configured - skip key clearing Associated with cc:5d:4e:47:99:bd WPA: Association event - clear replay counter WPA: Clear old PTK Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from cc:5d:4e:47:99:bd RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d WPA: PTK derivation - A1=00:15:00:77:2c:02 A2=cc:5d:4e:47:99:bd WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 d5 65 3f eb aa a2 53 4a cf 10 cb 88 0a 24 e8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from cc:5d:4e:47:99:bd RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 IEEE 802.1X RX: version=1 type=3 length=175 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=80 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 key_iv - hexdump(len=16): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 RSN: encrypted key data - hexdump(len=80): 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2) WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 0e 36 d9 02 17 04 d5 c2 c9 4b 9e 07 ba f4 1f bb 46 b4 92 47 06 9f f6 05 42 9c b9 55 4a 30 7d fb dd 00 00 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 bf 87 01 ba 93 f4 e2 7e cf 4e fc 38 fe e8 5e 00 00 WPA: Installing PTK to the driver. bsd_set_key: alg=3 addr=0x180a3368 key_idx=0 set_tx=1 seq_len=6 key_len=16 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=2 addr=0x22579c key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with cc:5d:4e:47:99:bd [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID cc:5d:4e:47:99:bd from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:47:99:bd completed (auth) [id=0 id_str=]
comment:5 by , 11 years ago
Priority: | high → normal |
---|
comment:6 by , 8 years ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:9 by , 6 years ago
Resolution: | → not reproducible |
---|---|
Status: | assigned → closed |
Please attach a syslog, it might indicate the problem from the driver side. It is possible that the timeout is simply too short so that in your case no association/authentication manages to complete.
The "no networks" symptom is expected. Scanning and displaying scan results is fully passive right now and relies on someone initiating a scan. The driver does so when it starts up, as does the wpa_supplicant to look for the desired network. If the wpa_supplicant fails to connect, it does shut down the driver and clear the scan results. The net_server never attempts to scan, therefore no networks are then shown anymore.
You can always connect to networks using ifconfig however. Just use
ifconfig <interface> join <networkName>
and it should bring up the wpa_supplicant dialog. Note that due to the missing scan results the wpa_supplicant cannot know what type of encryption is used (unless the network has previously been stored) and so will default to "Open" and you have to change that accrodingly.To debug this further, please provide the output of the net_server and wpa_supplicant. To get it you need to start the net_server from a Terminal. First quit both the wpa_supplicant and net_server via
hey wpa_supplicant quit
andhey net_server quit
respectively. Then just run the net_server via/system/servers/net_server
. It should then print its output into that Terminal. Since the net_server also starts the wpa_supplicant, that one will also print its output to the same Terminal. Then try to connect to the network using ifconfig as mentioned above and save and attach the whole output here.