LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking
User Name
Password
Linux - Wireless Networking This forum is for the discussion of wireless networking in Linux.

Notices


Reply
  Search this Thread
Old 05-29-2007, 03:46 PM   #1
Gero
Member
 
Registered: Oct 2004
Distribution: LFS 6.0
Posts: 33

Rep: Reputation: 15
Broadcom network card with ndiswrapper


I'm trying to get my Broadcom wireless network card to work. I've managed to install ndiswrapper and load the required drivers in the kernel and such, but now i still can't get it to connect with my wireless AP.

I'm using wpa_supplicant to connect to it, and this is what i get:

Code:
# sudo wpa_supplicant -ieth1 -Dwext -c/etc/wpa_supplicant.conf -d


Initializing interface 'eth1' conf '/etc/wpa_supplicant.conf' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
Priority group 0
   id=0 ssid='SX551DCD365'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=21 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:18:39:ee:a7:a9
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed up initial association
Received 592 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:01:e3:dc:d3:65 ssid='SX551DCD365' wpa_ie_len=28 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 00:01:e3:dc:d3:65 (SSID='SX551DCD365' freq=2472 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: added PMKSA cache candidate 00:01:e3:dc:d3:65 prio 1000
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=19
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=75
AssocReq IE wireless event - hexdump(len=67): 00 0b 53 58 35 35 31 44 43 44 33 36 35 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=24
AssocResp IE wireless event - hexdump(len=16): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:01:e3:dc:d3:65
Association info event
req_ies - hexdump(len=67): 00 0b 53 58 35 35 31 44 43 44 33 36 35 01 08 82 84 8b 96 24 30 48 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 00
resp_ies - hexdump(len=16): 01 08 82 84 8b 96 0c 18 30 48 32 04 12 24 60 6c
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=00:01:e3:dc:d3:65
No keys have been configured - skip key clearing
Associated with 00:01:e3:dc:d3:65
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RX EAPOL from 00:01:e3:dc:d3:65te
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 95
  key_nonce - hexdump(len=32): 6e 16 84 ce 92 f8 97 8a 50 25 95 d5 30 6c be e1 50 db cc 0d bb 98 42 ea c2 31 3b 6c 0c 15 7a 81
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:01:e3:dc:d3:65 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 05 1e cd 3b b5 5b d0 2c 6e 82 1a 1c 74 79 37 d7
RSN: PMKID from Authenticator - hexdump(len=16): 05 1e cd 3b b5 5b d0 2c 6e 82 1a 1c 74 79 37 d7
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): f3 7d c6 b8 d4 24 05 e8 0e 3d cd d3 67 37 4e c5 7f 01 19 59 83 15 37 e3 c0 54 b2 d2 e9 b5 9e a4
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
RX EAPOL from 00:01:e3:dc:d3:65
IEEE 802.1X RX: version=1 type=3 length=167
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=72
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 96
  key_nonce - hexdump(len=32): 6e 16 84 ce 92 f8 97 8a 50 25 95 d5 30 6c be e1 50 db cc 0d bb 98 42 ea c2 31 3b 6c 0c 15 7a 81
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 04 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 2f 32 4d bb ac 0f 31 45 f8 f3 4a ef f1 fd a1 03
RSN: encrypted key data - hexdump(len=72): 2e bd 91 dc d5 a9 e8 ba 73 e8 70 92 d3 75 32 20 ed 4c dc 1a 51 24 f7 ea 84 16 c9 47 b6 34 6a 4c 20 46 2b e4 eb cc 74 bf f1 80 f6 ee cf 1e 1d af 2b 37 44 5d f5 c1 bc 28 d6 98 24 0c c8 9c 2a 15 41 b9 5e 6d 4a 47 19 06
WPA: decrypted EAPOL-Key key data - hexdump(len=64): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:01:e3:dc:d3:65 (ver=2)
WPA: IE KeyData - hexdump(len=64): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 01 00 dd 26 00 0f ac 01 02 00 5b fc f0 bb 55 00 d8 0d fb 95 6f 82 e9 f1 1b 3a 06 ae 46 42 5e f0 8c d7 cc bd 92 eb 65 db 74 e4 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 04 00 00 00 00 00
wpa_driver_wext_set_key: alg=2 key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Key negotiation completed with 00:01:e3:dc:d3:65 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:01:e3:dc:d3:65 completed (auth) [id=0 id_str=]
wpa_driver_wext_set_operstate: operstate 0->1 (UP)
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK: operstate=1 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RSN: processing PMKSA candidate list
RSN: not in suitable state for new pre-authentication
EAPOL: startWhen --> 0
and then wpa_supplicant starts repeating almost the same text as above.

Can anyone give some input on what's going wrong?

Thanks in advance, Gero
 
Old 05-30-2007, 04:55 PM   #2
Hangdog42
LQ Veteran
 
Registered: Feb 2003
Location: Maryland
Distribution: Slackware
Posts: 7,803
Blog Entries: 1

Rep: Reputation: 422Reputation: 422Reputation: 422Reputation: 422Reputation: 422
That's pretty odd, I don't see any errors in that output. You might try adding -Bw to your startup code and see if that helps. The B flag puts it into daemon mode, and the w flag causes it to wait until eth1 is available. It could be that something isn't quite right on eth1 yet, so wpa_supplicant is thrashing.
 
Old 05-30-2007, 09:02 PM   #3
Gero
Member
 
Registered: Oct 2004
Distribution: LFS 6.0
Posts: 33

Original Poster
Rep: Reputation: 15
will try that tomorrow, a bit busy atm

anyways, thanks for the input
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Configuring Broadcom Wireless Card w/ NdisWrapper jeelliso Linux - Hardware 2 07-17-2006 12:43 PM
No blue LED for wireless card (broadcom/ndiswrapper) rmr1234 SUSE / openSUSE 2 01-02-2006 03:27 PM
ndiswrapper to set up broadcom wireless card... ram0135 Linux - Wireless Networking 3 12-13-2004 11:10 PM
Fedora Core 1, Ndiswrapper, and Broadcom wireless card... bmike30 Linux - Wireless Networking 1 09-30-2004 12:26 AM
broadcom 54g wireless card to work with ndiswrapper adamwenner Linux - Hardware 9 05-13-2004 08:54 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking > Linux - Wireless Networking

All times are GMT -5. The time now is 02:24 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration