[haiku-bugs] Re: [Haiku] #9646: wpa_supplicant: cannot connect to network

  • From: "dsjonny" <trac@xxxxxxxxxxxx>
  • Date: Sat, 13 Apr 2013 22:44:14 -0000

#9646: wpa_supplicant: cannot connect to network
-------------------------------------------+----------------------------
   Reporter:  dsjonny                      |      Owner:  axeld
       Type:  bug                          |     Status:  new
   Priority:  high                         |  Milestone:  R1
  Component:  Network & Internet/Wireless  |    Version:  R1/Development
 Resolution:                               |   Keywords:
 Blocked By:                               |   Blocking:
Has a Patch:  0                            |   Platform:  All
-------------------------------------------+----------------------------

Comment (by dsjonny):

 Well, I have downloaded the R1A4 and the wifi works fine. The
 authentication timeout was 10s too. The connecting time looks like fast.
 Here is the output from the Terminal:

 {{{

 Welcome to the Haiku shell.

 ~/Desktop> /system/servers/net_server
 New service ssh
 Launch service: /boot/common/bin/sshd
 Initializing interface '/dev/net/iprowifi4965/0' conf 'N/A' driver
 'default' ctrl_interface 'N/A' bridge 'N/A'
 wpa_driver_bsd_capa: drivercaps=0x2581e001,cryptocaps=0x00000000
 Own MAC address: 00:15:00:77:2c:02
 bsd_set_key: alg=0 addr=0x2290e4 key_idx=0 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=0
 bsd_set_key: alg=0 addr=0x2290e4 key_idx=1 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=1
 bsd_set_key: alg=0 addr=0x2290e4 key_idx=2 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=2
 bsd_set_key: alg=0 addr=0x2290e4 key_idx=3 set_tx=0 seq_len=0 key_len=0
 bsd_del_key: key_idx=3
 wpa_driver_bsd_set_countermeasures: enabled=0
 RSN: flushing PMKID list in the driver
 State: DISCONNECTED -> INACTIVE
 Added interface /dev/net/iprowifi4965/0
 ssid - hexdump_ascii(len=7):
      44 52 2d 57 69 46 69                              DR-WiFi
 scan_ssid=1 (0x1)
 proto: 0x3
 key_mgmt: 0x2
 pairwise: 0x19
 group: 0x1e
 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
 PSK (from passphrase) - hexdump(len=32): [REMOVED]
 Setting scan request: 0 sec 0 usec
 State: INACTIVE -> SCANNING
 Scan SSID - hexdump_ascii(len=7):
      44 52 2d 57 69 46 69                              DR-WiFi
 Starting AP scan for wildcard SSID
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
 Failed to initiate AP scan.
 State: SCANNING -> INACTIVE
 Setting scan request: 1 sec 0 usec
 State: INACTIVE -> SCANNING
 Scan SSID - hexdump_ascii(len=7):
      44 52 2d 57 69 46 69                              DR-WiFi
 Starting AP scan for wildcard SSID
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 ioctl[SIOCS80211, op=103, val=0, arg_len=128]: General system error
 Failed to initiate AP scan.
 State: SCANNING -> INACTIVE
 Setting scan request: 1 sec 0 usec
 Received 1116 bytes of scan results (5 BSSes)
 BSS: Start scan result update 1
 BSS: Add new id 0 BSSID cc:5d:4e:47:99:bd SSID 'DR-WiFi'
 BSS: Add new id 1 BSSID d8:5d:4c:86:24:b4 SSID 'TPLINKHOME'
 BSS: Add new id 2 BSSID c8:60:00:67:32:d4 SSID 'SZKSZAK_T10Z'
 BSS: Add new id 3 BSSID 94:0c:6d:fe:c0:92 SSID 'CSSK_WLAN'
 BSS: Add new id 4 BSSID 00:1d:0f:c5:44:3c SSID 'WIFIZZ'
 New scan results available
 Selecting BSS from priority group 0
 Try to find WPA-enabled AP
 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
    selected based on RSN IE
    selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi'
 Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz)
 Cancelling scan request
 WPA: clearing own WPA/RSN IE
 Automatic auth_alg selection: 0x1
 RSN: using IEEE 802.11i/D9.0
 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
 WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f
 ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
 WPA: using GTK TKIP
 WPA: using PTK CCMP
 WPA: using KEY_MGMT WPA-PSK
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01
 00 00 0f ac 04 01 00 00 0f ac 02 00 00
 No keys have been configured - skip key clearing
 State: INACTIVE -> ASSOCIATING
 wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2
 key mgmt 1
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 bsd_set_opt_ie: set WPA+RSN ie (len 22)
 wpa_driver_bsd_associate: set PRIVACY 1
 Setting authentication timeout: 10 sec 0 usec
 Authentication with cc:5d:4e:47:99:bd timed out.
 Added BSSID cc:5d:4e:47:99:bd into blacklist
 No keys have been configured - skip key clearing
 State: ASSOCIATING -> DISCONNECTED
 Setting scan request: 0 sec 0 usec
 State: DISCONNECTED -> SCANNING
 Scan SSID - hexdump_ascii(len=7):
      44 52 2d 57 69 46 69                              DR-WiFi
 Starting AP scan for wildcard SSID
 wpa_driver_bsd_set_wpa: enabled=1
 wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
 Received 1016 bytes of scan results (4 BSSes)
 BSS: Start scan result update 2
 New scan results available
 Selecting BSS from priority group 0
 Try to find WPA-enabled AP
 0: cc:5d:4e:47:99:bd ssid='DR-WiFi' wpa_ie_len=0 rsn_ie_len=24 caps=0x11
    selected based on RSN IE
    selected WPA AP cc:5d:4e:47:99:bd ssid='DR-WiFi'
 Trying to associate with cc:5d:4e:47:99:bd (SSID='DR-WiFi' freq=2472 MHz)
 Cancelling scan request
 WPA: clearing own WPA/RSN IE
 Automatic auth_alg selection: 0x1
 RSN: using IEEE 802.11i/D9.0
 WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
 WPA: clearing AP WPA IE
 WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f
 ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
 WPA: using GTK TKIP
 WPA: using PTK CCMP
 WPA: using KEY_MGMT WPA-PSK
 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01
 00 00 0f ac 04 01 00 00 0f ac 02 00 00
 No keys have been configured - skip key clearing
 State: SCANNING -> ASSOCIATING
 wpa_driver_bsd_associate: ssid 'DR-WiFi' wpa ie len 22 pairwise 3 group 2
 key mgmt 1
 wpa_driver_bsd_set_drop_unencrypted: enabled=1
 bsd_set_opt_ie: set WPA+RSN ie (len 22)
 wpa_driver_bsd_associate: set PRIVACY 1
 Setting authentication timeout: 10 sec 0 usec
 State: ASSOCIATING -> ASSOCIATED
 Associated to a new BSS: BSSID=cc:5d:4e:47:99:bd
 No keys have been configured - skip key clearing
 Associated with cc:5d:4e:47:99:bd
 WPA: Association event - clear replay counter
 WPA: Clear old PTK
 Setting authentication timeout: 10 sec 0 usec
 Cancelling scan request
 RX EAPOL from cc:5d:4e:47:99:bd
 RX EAPOL - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00 00 00 00
 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a
 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11 65 aa 8e
 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00
 Setting authentication timeout: 10 sec 0 usec
 IEEE 802.1X RX: version=1 type=3 length=117
   EAPOL-Key type=2
   key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
   key_length=16 key_data_length=22
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
   key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce
 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 3f 10 7f ad 2e 11 65 aa 8e 6a b0 3a ad 80 60
 0a
 WPA: RX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 00 8a 00 10 00 00 00
 00 00 00 00 02 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13
 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3f 10 7f ad 2e 11
 65 aa 8e 6a b0 3a ad 80 60 0a 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00
 State: ASSOCIATED -> 4WAY_HANDSHAKE
 WPA: RX message 1 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2)
 RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00
 WPA: PMKID in EAPOL-Key - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00
 RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00
 RSN: no matching PMKID found
 WPA: Renewed SNonce - hexdump(len=32): 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e
 06 26 7c b4 b6 9d 6e 7e a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d
 WPA: PTK derivation - A1=00:15:00:77:2c:02 A2=cc:5d:4e:47:99:bd
 WPA: PMK - hexdump(len=32): [REMOVED]
 WPA: PTK - hexdump(len=48): [REMOVED]
 WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
 00 0f ac 04 01 00 00 0f ac 02 00 00
 WPA: Sending EAPOL-Key 2/4
 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00
 00 00 00 00 02 81 d6 02 c2 21 a0 c4 32 34 05 cb 4e 06 26 7c b4 b6 9d 6e 7e
 a7 30 23 81 fc bb 13 c6 f4 4d 3e 0d 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c3 d5 65 3f eb aa
 a2 53 4a cf 10 cb 88 0a 24 e8 00 16 30 14 01 00 00 0f ac 02 01 00 00 0f ac
 04 01 00 00 0f ac 02 00 00
 RX EAPOL from cc:5d:4e:47:99:bd
 RX EAPOL - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00 00 00 00
 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13 ce de 0a
 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed f0 4e 72
 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9 b8 62 b7
 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27 63 ad 40
 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0 72 5b bd
 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
 IEEE 802.1X RX: version=1 type=3 length=175
   EAPOL-Key type=2
   key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure
 Encr)
   key_length=16 key_data_length=80
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
   key_nonce - hexdump(len=32): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce
 0c 67 2f 81 8e 13 ce de 0a 80 91 79 5a 31 cf f9 d8 b5
   key_iv - hexdump(len=16): bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c
 67
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 01 e6 6f f5 55 ed f0 4e 72 0f 3a 54 e8 ac 30
 39
 WPA: RX EAPOL-Key - hexdump(len=179): 01 03 00 af 02 13 ca 00 10 00 00 00
 00 00 00 00 03 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6 ce 0c 67 2f 81 8e 13
 ce de 0a 80 91 79 5a 31 cf f9 d8 b5 bc c7 c9 44 85 cc 73 bb 4c 9d 34 79 e6
 ce 0c 67 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 e6 6f f5 55 ed
 f0 4e 72 0f 3a 54 e8 ac 30 39 00 50 87 26 e3 3b 3f 9a 33 51 34 c2 c7 c1 e9
 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36 1e 0f 27
 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44 6b 7d d0
 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
 RSN: encrypted key data - hexdump(len=80): 87 26 e3 3b 3f 9a 33 51 34 c2
 c7 c1 e9 b8 62 b7 14 45 bc 30 6c eb 43 9b 2d a5 cd e1 15 df b3 91 f9 f2 36
 1e 0f 27 63 ad 40 c5 b1 3e 38 ed 71 3d ed 3c 63 c6 d2 ff c5 0a 72 86 1d 44
 6b 7d d0 72 5b bd 78 f5 fd 8b 83 4e d5 c3 81 01 01 40 03 98
 WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
 State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
 WPA: RX message 3 of 4-Way Handshake from cc:5d:4e:47:99:bd (ver=2)
 WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f ac
 02 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 0e 36 d9 02
 17 04 d5 c2 c9 4b 9e 07 ba f4 1f bb 46 b4 92 47 06 9f f6 05 42 9c b9 55 4a
 30 7d fb dd 00 00 00 00 00
 WPA: RSN IE in EAPOL-Key - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00
 00 0f ac 02 00 0f ac 04 01 00 00 0f ac 02 00 00
 WPA: GTK in EAPOL-Key - hexdump(len=40): [REMOVED]
 WPA: Sending EAPOL-Key 4/4
 WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00
 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02 bf 87 01 ba 93
 f4 e2 7e cf 4e fc 38 fe e8 5e 00 00
 WPA: Installing PTK to the driver.
 bsd_set_key: alg=3 addr=0x180a3368 key_idx=0 set_tx=1 seq_len=6 key_len=16
 State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
 RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
 WPA: Group Key - hexdump(len=32): [REMOVED]
 WPA: Installing GTK to the driver (keyidx=1 tx=0 len=32).
 WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
 bsd_set_key: alg=2 addr=0x22579c key_idx=1 set_tx=0 seq_len=6 key_len=32
 WPA: Key negotiation completed with cc:5d:4e:47:99:bd [PTK=CCMP GTK=TKIP]
 Cancelling authentication timeout
 Removed BSSID cc:5d:4e:47:99:bd from blacklist
 State: GROUP_HANDSHAKE -> COMPLETED
 CTRL-EVENT-CONNECTED - Connection to cc:5d:4e:47:99:bd completed (auth)
 [id=0 id_str=]
 }}}

--
Ticket URL: <http://dev.haiku-os.org/ticket/9646#comment:4>
Haiku <http://dev.haiku-os.org>
Haiku - the operating system.

Other related posts: