ipw2100 + wpa_supplicant setup

J. Ballé joba123
Sun May 8 23:22:30 PDT 2005


Hello,

I am trying to set up WPA on my wireless link (WEP works great with the same 
hard/software). It seems the connection is set up right, but then it is 
disconnected for some reason I can't figure out. I have the following 
components:

plain kernel 2.6.11.7 with software suspend 2 patches 2.1.8
wpa_supplicant 0.38
ipw2100 1.1.0 and firmware 1.3
LinkSys BEFW11S4 V4 with firmware 1.50.14
Intel 2100 3B

My wpa_supplicant.conf:

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=wheel
eapol_version=1
ap_scan=1
fast_reauth=1

network={
	ssid="LousbergWG"
	key_mgmt=WPA-PSK
	proto=WPA
	psk="... password ..."
	priority=1
}

[some other networks following here]

wpa_supplicant says this:

Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_ipw_init is called
Own MAC address: 00:0c:f1:2c:71:26
wpa_driver_ipw_set_wpa: enabled=1
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_countermeasures: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
Received 895 bytes of scan results (4 BSSes)
Scan results: 4
Selecting BSS from priority group 1
0: 00:0c:41:7e:e8:0c ssid='LousbergWG' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:0c:41:7e:e8:0c (SSID='LousbergWG' freq=0 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 
00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=23
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:7e:e8:0c
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0c:41:7e:e8:0c
No keys have been configured - skip key clearing
Associated with 00:0c:41:7e:e8:0c
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
RX EAPOL from 00:0c:41:7e:e8:0c
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 34 7c 00 52 87 5d 6b 26 
60 0d 9d 35 41 ef e4 45 2d a3 88 85 4d 99 f3 65 ef de 22 37 9f 94 3f 24 46 8a 
80 5b 4c b4ca d5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 34 7c 00 52 87 
5d 6b 26 60 0d 9d 35 41 ef e4 45 2d a3 88 85 4d 99 f3 65 ef de 22 37 9f 94 3f 
24 46 8a 805b 4c b4 ca d5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0c:41:7e:e8:0c (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 71 96 28 bc 18 83 83 52 b7 2c 23 5e 17 
70 96 7e 4f 81 7f 16 09 82 a8 91 b9 91 5b 00 1b 03 83 ef
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 4a 87 2f c3 a9 d4 4a 05 a0 bb 56 e4 a6 
4d 99 df
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0c 41 7e e8 0c 00 0c f1 2c 71 26 
88 8e 01 03 00 77 fe 01 09 00 20 34 7c 00 52 87 5d 6b 26 71 96 28 bc 18 83 83 
52 b7 2c 23 5e 17 70 96 7e 4f 81 7f 16 09 82 a8 91 b9 91 5b 00 1b 03 83 ef 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 4a 87 2f c3 a9 d4 4a 05 a0 bb 56 e4 a6 4d 99 df 00 18 dd 16 00 
50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
RX EAPOL from 00:0c:41:7e:e8:0c
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 a4 93 00 52 87 5d 6b 
27 60 0d 9d 35 41 ef e4 45 2d a3 88 85 4d 99 f3 65 ef de 22 37 9f 94 3f 24 46 
8a 80 5b 4c b4 ca d5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 a6 da 41 81 ef 6f 8d b1 25 aa 05 f8 4f 
74 d7 d9 00 18 dd 16 00 50f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 
50 f2 02
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 a4 93 00 52 
87 5d 6b 27 60 0d 9d 35 41 ef e4 45 2d a3 88 85 4d 99 f3 65 ef de 22 37 9f 94 
3f 24 46 8a 80 5b 4c b4 ca d5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 da 41 81 ef 6f 8d b1 25 aa 
05 f8 4f 74 d7 d9 00 18 dd16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 
01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:0c:41:7e:e8:0c (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 
00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0c 41 7e e8 0c 00 0c f1 2c 71 26 
88 8e 01 03 00 5f fe 01 09 00 20 a4 93 00 52 87 5d 6b 27 71 96 28 bc 18 83 83 
52 b7 2c 23 5e 17 70 96 7e 4f 81 7f 16 09 82 a8 91 b9 91 5b 00 1b 03 83 ef 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 53 f9 26 03 a3 20 60 a9 6d a4 8d 0d cc 01 ce ec 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
RX EAPOL from 00:0c:41:7e:e8:0c
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 a4 93 00 52 87 5d 6b 
28 25 d3 bb 6f 67 84 06 64 11 4f 1e 21 22 ab 0f dd 3d 16 f2 dc bb 71 03 03 e3 
26 95 32 ee 40 a0 ae 9e 76 fd fc 80 57 f2 29 29 8d 88 17 ae 3a 14 94 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 1c 9d f8 f6 55 94 ba 3a 53 e4 5c f1 f8 
4b 43 8c 00 20 a5 17 cd 214a 73 cb 16 52 38 1e 64 96 9a bb 90 d1 eb 08 c4 d1 
e0 ce 2d df 21 1b 06 98 fb 99 f0
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 a4 93 00 52 
87 5d 6b 28 25 d3 bb 6f 67 84 06 64 11 4f 1e 21 22 ab 0f dd 3d 16 f2 dc bb 71 
03 03 e3 26 95 32 ee 40 a0 ae 9e 76 fd fc 80 57 f2 29 29 8d 88 17 ae 3a 14 94 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 9d f8 f6 55 94 ba 3a 53 e4 
5c f1 f8 4b 43 8c 00 20 a517 cd 21 4a 73 cb 16 52 38 1e 64 96 9a bb 90 d1 eb 
08 c4 d1 e0 ce 2d df 21 1b 06 98 fb 99 f0
WPA: RX message 1 of Group Key Handshake from 00:0c:41:7e:e8:0c (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0c 41 7e e8 0c 00 0c f1 2c 71 26 
88 8e 01 03 00 5f fe 03 11 00 20 a4 93 00 52 87 5d 6b 28 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 85 2a 71 cd 6c d9 c3 29 b2 c4 31 07 c3 31 b5 f4 00 00
WPA: Key negotiation completed with 00:0c:41:7e:e8:0c [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
RX EAPOL from 00:0c:41:7e:e8:0c
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 b0 c3 00 52 87 5d 6b 
29 a5 9c 30 e4 14 a6 04 54 65 8e d3 9b d4 e4 6e 29 e6 9d 14 da 27 67 c7 a9 a4 
fd 10 fb 36 3a e4 8e af 4c 82 61 c1 c4 53 f6 3d e8 b8 17 f5 c4 3c b3 01 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 6a 6f 1d 59 b9 dd e2 4c a1 10 d0 8f 35 
51 4c 6d 00 20 a1 95 77 7b60 36 67 cb 51 bc 35 3e fc 5a ae ba 4b 97 d6 ad 2b 
a5 5f 8f da 40 e8 34 9e 73 ab 54
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 b0 c3 00 52 
87 5d 6b 29 a5 9c 30 e4 14 a6 04 54 65 8e d3 9b d4 e4 6e 29 e6 9d 14 da 27 67 
c7 a9 a4 fd 10 fb 36 3a e4 8e af 4c 82 61 c1 c4 53 f6 3d e8 b8 17 f5 c4 3c b3 
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6a 6f 1d 59 b9 dd e2 4c a1 10 
d0 8f 35 51 4c 6d 00 20 a195 77 7b 60 36 67 cb 51 bc 35 3e fc 5a ae ba 4b 97 
d6 ad 2b a5 5f 8f da 40 e8 34 9e 73 ab 54
WPA: RX message 1 of Group Key Handshake from 00:0c:41:7e:e8:0c (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 01 00 00 00 00 00
wpa_driver_ipw_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0c 41 7e e8 0c 00 0c f1 2c 71 26 
88 8e 01 03 00 5f fe 03 11 00 20 b0 c3 00 52 87 5d 6b 29 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 cb 01 41 9b 0e 29 62 54 71 e1 40 32 e8 d8 ca f4 00 00
WPA: Group rekeying completed with 00:0c:41:7e:e8:0c [GTK=TKIP]
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23 idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22 idleWhile=52
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0c:41:7e:e8:0c into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_ipw_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21 idleWhile=51
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20 idleWhile=50
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=19 idleWhile=49
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=18 idleWhile=48
Scan timeout - try to get results
Received 679 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 1
0: 00:0c:41:7e:e8:0c ssid='LousbergWG' wpa_ie_len=24 rsn_ie_len=0
   skip - blacklisted
1: 00:12:17:b3:0b:d5 ssid='Uni-DSL.de Zugang 988' wpa_ie_len=0 rsn_ie_len=0
   skip - no WPA/RSN IE
2: 00:0f:66:a7:20:fc ssid='oecher' wpa_ie_len=0 rsn_ie_len=0
   skip - no WPA/RSN IE
Selecting BSS from priority group 0
0: 00:0c:41:7e:e8:0c ssid='LousbergWG' wpa_ie_len=24 rsn_ie_len=0
   skip - blacklisted
1: 00:12:17:b3:0b:d5 ssid='Uni-DSL.de Zugang 988' wpa_ie_len=0 rsn_ie_len=0
   skip - no WPA/RSN IE
2: 00:0f:66:a7:20:fc ssid='oecher' wpa_ie_len=0 rsn_ie_len=0
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 00:0c:41:7e:e8:0c from blacklist (clear)
Selecting BSS from priority group 1
0: 00:0c:41:7e:e8:0c ssid='LousbergWG' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:0c:41:7e:e8:0c (SSID='LousbergWG' freq=0 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
wpa_driver_ipw_set_auth_alg: auth_alg=0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 
00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_ipw_set_drop_unencrypted: enabled=1
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=23
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0c:41:7e:e8:0c
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0c:41:7e:e8:0c
No keys have been configured - skip key clearing
Associated with 00:0c:41:7e:e8:0c
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
Signal 2 received - terminating
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_ipw_set_wpa: enabled=0
wpa_driver_ipw_set_drop_unencrypted: enabled=0
wpa_driver_ipw_set_countermeasures: enabled=0

with ipw2100.ko debug = 7, I also get the following kernel messages:

May  8 20:51:20 joe kernel: ieee80211_crypt: registered algorithm 'TKIP'
May  8 20:51:27 joe kernel: ipw2100: U ipw2100_disable_adapter TODO: implement 
scan state machine
May  8 20:51:27 joe last message repeated 6 times
May  8 20:51:27 joe kernel: ipw2100: U ipw2100_set_scan_options enter
May  8 20:51:30 joe kernel: ipw2100: U ipw2100_disable_adapter TODO: implement 
scan state machine
May  8 20:51:30 joe last message repeated 3 times
May  8 20:51:31 joe kernel: ipw2100: I isr_indicate_associated eth1: 
Associated with 'LousbergWG' at 11Mbps, channel 10 (BSSID=00:0c:41:7e:e8:0c)
May  8 20:51:31 joe kernel: ipw2100: U ipw2100_wx_event_work Waking net queue.
May  8 20:51:31 joe kernel: ipw2100: U ipw2100_disable_adapter TODO: implement 
scan state machine
May  8 20:51:31 joe kernel: ipw2100: U ipw2100_disable_adapter TODO: implement 
scan state machine
May  8 20:51:31 joe kernel: ipw2100: U ipw2100_close enter
May  8 20:51:31 joe kernel: ipw2100: U ipw2100_close exit

I would really appreciate if someone could look into this, because I'm at the 
end of my knowledge.

Thanks

Johannes




More information about the Hostap mailing list