#9646: wpa_supplicant: cannot connect to network -------------------------------------------+---------------------------- Reporter: dsjonny | Owner: axeld Type: bug | Status: new Priority: high | Milestone: R1 Component: Network & Internet/Wireless | Version: R1/Development Resolution: | Keywords: Blocked By: | Blocking: Has a Patch: 0 | Platform: All -------------------------------------------+---------------------------- Comment (by dsjonny): Well, I have downloaded the R1A4 and the wifi works fine. The authentication timeout was 10s too. The connecting time looks like fast. Here is the output from the Terminal: {{{ Welcome to the Haiku shell. ~/Desktop> /system/servers/net_server New service ssh Launch service: /boot/common/bin/sshd Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver 'default' ctrl_interface 'N/A' bridge 'N/A' wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000 Own MAC address: 00:15:00:77:2c:02 bsd_set_key: alg=0 addr=0x2290e4 key_idx=0 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=0 bsd_set_key: alg=0 addr=0x2290e4 key_idx=1 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=1 bsd_set_key: alg=0 addr=0x2290e4 key_idx=2 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=2 bsd_set_key: alg=0 addr=0x2290e4 key_idx=3 set_tx=0 seq_len=0 key_len=0 bsd_del_key: key_idx=3 wpa_driver_bsd_set_countermeasures: enabled=0 RSN: flushing PMKID list in the driver State: DISCONNECTED -> INACTIVE Added interface /dev/net/iprowifi4965/0 ssid - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi scan_ssid=1 (0x1) proto: 0x3 key_mgmt: 0x2 pairwise: 0x19 group: 0x1e PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Setting scan request: 0 sec 0 usec State: INACTIVE -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error Failed to initiate AP scan. State: SCANNING -> INACTIVE Setting scan request: 1 sec 0 usec State: INACTIVE -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error Failed to initiate AP scan. State: SCANNING -> INACTIVE Setting scan request: 1 sec 0 usec Received 1116 bytes of scan results (5 BSSes) BSS: Start scan result update 1 BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi' BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME' BSS: Add new id 2 BSSID c8:60:00:67:32:d4 SSID 'SZKSZAK_T10Z' BSS: Add new id 3 BSSID 94:0c:6d:fe:c0:92 SSID 'CSSK_WLAN' BSS: Add new id 4 BSSID 00:1d:0f:c5:44:3c SSID 'WIFIZZ' New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi' Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: INACTIVE -> ASSOCIATING wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 Setting authentication timeout: 10 sec 0 usec Authentication with cc:5d:4e:47:99:bd timed out. Added BSSID cc:5d:4e:47:99:bd into blacklist No keys have been configured - skip key clearing State: ASSOCIATING -> DISCONNECTED Setting scan request: 0 sec 0 usec State: DISCONNECTED -> SCANNING Scan SSID - hexdump_ascii(len=7): 44 52 2d 57 69 46 69 DR-WiFi Starting AP scan for wildcard SSID wpa_driver_bsd_set_wpa: enabled=1 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1 Received 1016 bytes of scan results (4 BSSes) BSS: Start scan result update 2 New scan results available Selecting BSS from priority group 0 Try to find WPA-enabled AP 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11 selected based on RSN IE selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi' Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 RSN: using IEEE 802.11i/D9.0 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2 WPA: clearing AP WPA IE WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: using GTK TKIP WPA: using PTK CCMP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2 key mgmt 1 wpa_driver_bsd_set_drop_unencrypted: enabled=1 bsd_set_opt_ie: set WPA+RSN ie (len 22) wpa_driver_bsd_associate: set PRIVACY 1 Setting authentication timeout: 10 sec 0 usec State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=cc:5d:4e:47:99:bd No keys have been configured - skip key clearing Associated with cc:5d:4e:47:99:bd WPA: Association event - clear replay counter WPA: Clear old PTK Setting authentication timeout: 10 sec 0 usec Cancelling scan request RX EAPOL from cc:5d:4e:47:99:bd RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=117 EAPOL-Key type=2 key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) key_length=16 key_data_length=22 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2) RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSN: no matching PMKID found WPA: Renewed SNonce - hexdump(len=32): 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d WPA: PTK derivation - A1=00:15:00:77:2c:02 A2=cc:5d:4e:47:99:bd WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Sending EAPOL-Key 2/4 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 02 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 d5 65 3f eb aa a2 53 4a cf 10 cb 88 0a 24 e8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RX EAPOL from cc:5d:4e:47:99:bd RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 IEEE 802.1X RX: version=1 type=3 length=175 EAPOL-Key type=2 key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) key_length=16 key_data_length=80 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03 key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 key_iv - hexdump(len=16): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 RSN: encrypted key data - hexdump(len=80): 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98 WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED] State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2) WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 0e 36 d9 02 17 04 d5 c2 c9 4b 9e 07 ba f4 1f bb 46 b4 92 47 06 9f f6 05 42 9c b9 55 4a 30 7d fb dd 00 00 00 00 00 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED] WPA: Sending EAPOL-Key 4/4 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 bf 87 01 ba 93 f4 e2 7e cf 4e fc 38 fe e8 5e 00 00 WPA: Installing PTK to the driver. bsd_set_key: alg=3 addr=0x180a3368 key_idx=0 set_tx=1 seq_len=6 key_len=16 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED] WPA: Group Key - hexdump(len=32): [REMOVED] WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32). WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 bsd_set_key: alg=2 addr=0x22579c key_idx=1 set_tx=0 seq_len=6 key_len=32 WPA: Key negotiation completed with cc:5d:4e:47:99:bd [PTK=CCMP GTK=TKIP] Cancelling authentication timeout Removed BSSID cc:5d:4e:47:99:bd from blacklist State: GROUP_HANDSHAKE -> COMPLETED CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:47:99:bd completed (auth) [id=0 id_str=] }}} -- Ticket URL: <http://dev.haiku-os.org/ticket/9646#comment:4> Haiku <http://dev.haiku-os.org> Haiku - the operating system.