You are not logged in.

#1 2007-12-26 07:06:48

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

Hey guys, I have installed Arch Linux, with all 4 groups of packages off the CD (Base, devel, lib and support). I have a Netgear MA111v2, (the v2 means second version, which I think is important to note).  This is a wireless USB adaptor.  How do I set up Arch to connect to my wireless internet router, and use WPA-PSK TKIP encryption?

I heard you possibly could use NDSwrapper and use the windows driver under linux, or possibly wlan package, but I thought I read somewhere that wlan wouldn't work with MA111v2, only v1.

So does wlan now support MA111v2, or is there some other driver included on the CD or do I have to use NDSwrapper, or something else?

Thankyou very much,

nekosuki big_smile


edit:

I haven't tried using wlan-ng or NDISwrapper yet

double-edit:

MA111v2 definitely uses the SIS162 chipset

Last edited by nekosuki (2007-12-27 04:46:27)

Offline

#2 2007-12-26 11:40:25

tomk
Forum Fellow
From: Ireland
Registered: 2004-07-21
Posts: 9,604

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

Identify the chipset first - lsusb should tell you something about it. Once you have that, you can decide if wlan-ng26 provides the right driver (prism2_usb). If it doesn't, use ndiswrapper.

Offline

#3 2007-12-27 03:48:18

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

lsusb says

Bus 002 Device 002: ID 0846:4230 NetGear, Inc. MA111 WiFi
Bus 002 Device 001: ID 0000:0000
Bus 001 Device 002: ID 046d:c00c Logitech, Inc. Optical Wheel Mouse
Bus 001 Device 001: ID 0000:0000

it's actually MA111v2, which means its version 2, which is different from the first version

so what do I do now?

Thanks!

nekosuki

Last edited by nekosuki (2007-12-27 04:01:14)

Offline

#4 2007-12-27 03:54:39

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

Here is more verbose info


Bus 002 Device 002: ID 0846:4230 NetGear, Inc. MA111 WiFi
Device Descriptor:
  bLength                18
  bDescriptorType         1
  bcdUSB               1.10
  bDeviceClass            0 (Defined at Interface level)
  bDeviceSubClass         0
  bDeviceProtocol         0
  bMaxPacketSize0        64
  idVendor           0x0846 NetGear, Inc.
  idProduct          0x4230 MA111 WiFi
  bcdDevice            1.00
  iManufacturer           0
  iProduct                0
  iSerial                 0
  bNumConfigurations      1
  Configuration Descriptor:
    bLength                 9
    bDescriptorType         2
    wTotalLength           39
    bNumInterfaces          1
    bConfigurationValue     1
    iConfiguration          0
    bmAttributes         0x80
      (Bus Powered)
    MaxPower              256mA
    Interface Descriptor:
      bLength                 9
      bDescriptorType         4
      bInterfaceNumber        0
      bAlternateSetting       0
      bNumEndpoints           3
      bInterfaceClass       255 Vendor Specific Class
      bInterfaceSubClass      0
      bInterfaceProtocol      0
      iInterface              0
      Endpoint Descriptor:
        bLength                 7
        bDescriptorType         5
        bEndpointAddress     0x01  EP 1 OUT
        bmAttributes            2
          Transfer Type            Bulk
          Synch Type               None
          Usage Type               Data
        wMaxPacketSize     0x0040  1x 64 bytes
        bInterval               1
      Endpoint Descriptor:
        bLength                 7
        bDescriptorType         5
        bEndpointAddress     0x82  EP 2 IN
        bmAttributes            2
          Transfer Type            Bulk
          Synch Type               None
          Usage Type               Data
        wMaxPacketSize     0x0040  1x 64 bytes
        bInterval               1
      Endpoint Descriptor:
        bLength                 7
        bDescriptorType         5
        bEndpointAddress     0x83  EP 3 IN
        bmAttributes            3
          Transfer Type            Interrupt
          Synch Type               None
          Usage Type               Data
        wMaxPacketSize     0x0040  1x 64 bytes
        bInterval               8
Device Status:     0x0000
  (Bus Powered)



So what do I do now neutral

Last edited by nekosuki (2007-12-27 04:00:21)

Offline

#5 2007-12-27 04:05:35

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

Do I use do I use wlancfg, wlanconfig, or wlanctl-ng? for my key? (if I want to use wlan?)

and once I know which one to use, how do I use it?  Can't I use a prebuilt script or something?

Last edited by nekosuki (2007-12-27 04:08:50)

Offline

#6 2007-12-27 04:47:24

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

OK as written in the edit in the first post, MA111v2 definitely uses SIS162, not PRISM anymore.

Offline

#7 2007-12-27 07:47:07

nekosuki
Member
Registered: 2007-12-26
Posts: 6

Re: Setting up a Netgear MA111v2 wireless USB adaptor, with WPA-PSK (TKIP)

I've made some progress, but when I type

wpa_supplicant -Dwext -iwlan0 -c/etc/wpa_supplicant.conf -dd

I get:

Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Line: 2 - start of a new network block
ssid - hexdump_ascii(len=15):
     74 68 65 62 65 73 74 73 73 69 64 65 76 65 72      thebestssidever
PSK (ASCII passphrase) - hexdump_ascii(len=18): [REMOVED]
key_mgmt: 0x2
proto: 0x1
pairwise: 0x8
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Line 8: removed CCMP from group cipher list since it was not allowed for pairwise cipher
Priority group 0
   id=0 ssid='thebestssidever'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xd
  capabilities: key_mgmt 0x5 enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0f:b5:fa:c3:f6
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface wlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 812 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 00:18:4d:18:85:14 ssid='GALWAY' wpa_ie_len=30 rsn_ie_len=26 caps=0x11
   skip - SSID mismatch
1: 00:18:4d:98:17:9e ssid='thebestssidever' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
   selected WPA AP 00:18:4d:98:17:9e ssid='thebestssidever'
Try to find non-WPA AP
Trying to associate with 00:18:4d:98:17:9e (SSID='thebestssidever' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 proto 1
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=23
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=55
AssocReq IE wireless event - hexdump(len=47): 00 0f 74 68 65 62 65 73 74 73 73 69 64 65 76 65 72 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=28
AssocResp IE wireless event - hexdump(len=20): 01 04 82 84 8b 96 dd 0c 00 03 7f 02 01 01 0b 00 02 a4 40 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:18:4d:98:17:9e
Association info event
req_ies - hexdump(len=47): 00 0f 74 68 65 62 65 73 74 73 73 69 64 65 76 65 72 01 04 82 84 8b 96 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
resp_ies - hexdump(len=20): 01 04 82 84 8b 96 dd 0c 00 03 7f 02 01 01 0b 00 02 a4 40 00
WPA: set own WPA/RSN IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:18:4d:98:17:9e
No keys have been configured - skip key clearing
Associated with 00:18:4d:98:17:9e
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:18:4d:98:17:9e (ver=1)
WPA: Renewed SNonce - hexdump(len=32): e9 23 23 c3 d7 b4 f6 ed 2f 47 11 5a e0 d2 39 bd 31 e1 97 89 38 b1 b6 5b fa 28 7b 8d b1 71 5e 5b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 00 00 01 e9 23 23 c3 d7 b4 f6 ed 2f 47 11 5a e0 d2 39 bd 31 e1 97 89 38 b1 b6 5b fa 28 7b 8d b1 71 5e 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f6 13 4b 72 4b 26 3b ab 2d 59 b0 0d b8 b5 38 28 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=24
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 00 00 02 8a 7e 57 bc 4f 4e 99 9a 8c 9f 9a ee 19 45 fa 93 7b 95 b9 b1 2b 97 b6 1a 7e 99 71 36 81 eb b5 62 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 98 29 a9 8a 35 8a f1 ef 19 bc 79 1b 25 d0 84 00 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:18:4d:98:17:9e (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 51 2d d4 74 7d 7e f7 53 f7 a9 9a d1 e9 b8 21 19 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:18:4d:98:17:9e
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c 00 20 e9 79 71 36 08 d2 f6 47 b9 7c 49 9f 90 c0 e2 3c 7c 79 03 07 ec 18 fa 20 d9 49 32 c1 3c 45 f7 f2
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e
  key_iv - hexdump(len=16): ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 03 a7 72 1f 25 9f d9 22 f3 7f 12 a3 c5 84 73 03 28 ff 32 d6 c8 b5 74 85 d6 bf e9 8f 7d cd 5f 8d 3e ce c1 b0 5b 36 5f a1 8f 46 70 0d 21 64 c1 26 44 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 d5 f5 72 c0 5f ee cf 5c 07 cd 97 05 d4 e3 9c 00 20 e9 79 71 36 08 d2 f6 47 b9 7c 49 9f 90 c0 e2 3c 7c 79 03 07 ec 18 fa 20 d9 49 32 c1 3c 45 f7 f2
WPA: RX message 1 of Group Key Handshake from 00:18:4d:98:17:9e (ver=1)
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 8b 90 17 df 3a 3c 31 7c 89 d0 df da 5d b7 d5 3b 00 00
WPA: Key negotiation completed with 00:18:4d:98:17:9e [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:18:4d:98:17:9e completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
EAPOL: startWhen --> 0  //Just hangs here forever.....
CTRL-EVENT-TERMINATING - signal 2 received      // I hit control C here because it stopped there sad
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 1->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6






So basically it hangs where I said in the log (I made a comment with "//" )

Any Ideas?

Thanks,

Nekosuki

Last edited by nekosuki (2007-12-27 07:48:11)

Offline

Board footer

Powered by FluxBB