Public bug reported:

Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi with 
WPA/WPA2 AP's (although it should work). WEP/Unencrypted AP's yet untested!
I'll give some information:

Distribution: Ubuntu 6.10 (Edgy)
modinfo ath_pci version: 0.9.2.1
Kernel version: 2.6.17-11-386
Wireless protocol: WPA2/Personal (so no RADIUS server)

Hardware:
* 3Com card 3CRXJK10075 (PCMCIA card)
* Linksys WAP54G
* Broadcom BCM4318 internal chipset (used with ndiswrapper and works - used for 
testing the AP's connectivity)

Part of the wpa_supplicant log with my 3Com 3CRXJK10075:
BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Ignore event for foreign ifindex 5
Ignore event for foreign ifindex 5
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 10:23:41:91:0F:11 into blacklist
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Ignore event for foreign ifindex 5
Ignore event for foreign ifindex 5
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   skip - blacklisted
1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
   skip - no WPA/RSN IE
No APs found - clear blacklist and try again
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
Added BSSID 10:23:41:91:0F:11 into blacklist
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 561 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=12
Authentication with 00:00:00:00:00:00 timed out.
BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
State: ASSOCIATING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface ath0
State: SCANNING -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
Cancelling scan request

Part of the wpa_supplicant log with my Broadcom chipset (working with 
ndiswrapper):
[EMAIL PROTECTED]:~$ sudo wpa_supplicant -dd -D wext -i eth1 -c 
/etc/wpa_supplicant/wlanconfig
Initializing interface 'eth1' conf '/etc/wpa_supplicant/wlanconfig' driver 
'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wlanconfig' -> 
'/etc/wpa_supplicant/wlanconfig'
Reading configuration file '/etc/wpa_supplicant/wlanconfig'
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=3):
     53 46 43                                          STFU             
proto: 0x2
key_mgmt: 0x2
pairwise: 0x10
group: 0x10
PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='STFU'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:14:a5:29:62:2e
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface eth1
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to speed 
up initial association
Received 663 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 0
0: 0F:9D:42:91:A0:0B ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
   selected based on RSN IE
Trying to associate with 0F:9D:42:91:A0:0B (SSID='STFU' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=11
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8c07 len=67
AssocReq IE wireless event - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 
24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 
32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
Wireless event: cmd=0x8c08 len=32
AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 
04 0c 12 18 60 dd 06 00 10 18 02 00 04
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 0F:9D:42:91:A0:0B
Association info event
req_ies - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 
dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 
06 00 10 18 02 00 04
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
State: ASSOCIATING -> ASSOCIATED
WEXT: Operstate: linkmode=-1, operstate=5
Associated to a new BSS: BSSID=0F:9D:42:91:A0:0B
No keys have been configured - skip key clearing
Associated with 0F:9D:42:91:A0:0B
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 0F:9D:42:91:A0:0B
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 00 
62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 
40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 
6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 
cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb 
f5 46 e7
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e 
b9 96 18 69 a0 cb f5 46 e7
RSN: PMKID from Authenticator - hexdump(len=16): d0 1d 47 b4 63 d7 1e b9 96 18 
69 a0 cb f5 46 e7
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 
fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f 
ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 
00 00 00 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 bc 
e6 0a 44 83 42 37 e1 72 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 96 ac ce 08 9e 6f 33 b3 50 58 
6e ab 6c 15 bb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 
02 00 00
RX EAPOL from 0F:9D:42:91:A0:0B
RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 01 
62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 5e 
40 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 
36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 
1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef 
dc c8 9c 05 1d be 00 1b
IEEE 802.1X RX: version=2 type=3 length=151
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
  key_length=16 key_data_length=56
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 
6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
  key_iv - hexdump(len=16): 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32
  key_rsc - hexdump(len=8): 0d 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57
WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 
00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 
cb 1a 5e 4
0 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 
57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 
1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc 
c8 9c 05 1d be 00 1b
RSN: encrypted key data - hexdump(len=56): 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 
ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 
9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b
WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 
00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8e 31 73 e9 ec 8b 91 68 e8 36 06 
d8 a7 5a 84 d4 dd 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 00 
00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 e2 19 59 6e 87 82 01 ce 1d a2 
0f 24 59 07 ff 00 00
WPA: Installing PTK to the driver.
wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
WPA: Group Key - hexdump(len=16): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 0d 00 00 00 00 00
wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
WPA: Key negotiation completed with 0F:9D:42:91:A0:0B [PTK=CCMP GTK=CCMP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 0F:9D:42:91:A0:0B completed (auth) [id=0 
id_str=]
WEXT: Operstate: linkmode=-1, operstate=6
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAP: EAP entering state DISABLED
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
EAPOL: startWhen --> 0
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: COMPLETED -> DISCONNECTED
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_deauthenticate
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
wpa_driver_wext_set_wpa
wpa_driver_wext_set_drop_unencrypted
wpa_driver_wext_set_countermeasures
No keys have been configured - skip key clearing
WEXT: Operstate: linkmode=0, operstate=6
Cancelling scan request

My wpa_supplicant connection file (which works fine with my 
ndiswrapper/Broadcom solution):
network={
ssid="STFU"
proto=RSN
key_mgmt=WPA-PSK
pairwise=CCMP
group=CCMP
psk="password"
}

** Affects: Ubuntu
     Importance: Undecided
         Status: Unconfirmed

** Description changed:

- Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi
- (although it should work). I'll give some information:
+ Unfortunately my new 3Com 3CRXJK10075 card does not work with madwifi with 
WPA/WPA2 AP's (although it should work). WEP/Unencrypted AP's yet untested!
+ I'll give some information:
  
  Distribution: Ubuntu 6.10 (Edgy)
  modinfo ath_pci version: 0.9.2.1
  Kernel version: 2.6.17-11-386
  Wireless protocol: WPA2/Personal (so no RADIUS server)
  
  Hardware:
  * 3Com card 3CRXJK10075 (PCMCIA card)
  * Linksys WAP54G
  * Broadcom BCM4318 internal chipset (used with ndiswrapper and works - used 
for testing the AP's connectivity)
  
  Part of the wpa_supplicant log with my 3Com 3CRXJK10075:
  BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
  State: ASSOCIATING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  Setting scan request: 0 sec 0 usec
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  Wireless event: cmd=0x8b19 len=8
  Received 561 bytes of scan results (3 BSSes)
  Scan results: 3
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     skip - blacklisted
  1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
     skip - SSID mismatch
  2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
     skip - no WPA/RSN IE
  No APs found - clear blacklist and try again
  Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     selected based on RSN IE
  Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  RSN: using IEEE 802.11i/D9.0
  WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
  WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 
04 01 00 00 0f ac 02 00 00
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_associate
  Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RSN: Ignored PMKID candidate without preauth flag
  Wireless event: cmd=0x8b06 len=8
  Wireless event: cmd=0x8b04 len=12
  Wireless event: cmd=0x8b1a len=12
  Ignore event for foreign ifindex 5
  Ignore event for foreign ifindex 5
  Authentication with 00:00:00:00:00:00 timed out.
  Added BSSID 10:23:41:91:0F:11 into blacklist
  State: ASSOCIATING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  Setting scan request: 0 sec 0 usec
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  Ignore event for foreign ifindex 5
  Ignore event for foreign ifindex 5
  Wireless event: cmd=0x8b19 len=8
  Received 561 bytes of scan results (3 BSSes)
  Scan results: 3
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     selected based on RSN IE
  Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  RSN: using IEEE 802.11i/D9.0
  WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
  WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 
04 01 00 00 0f ac 02 00 00
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_associate
  Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RSN: Ignored PMKID candidate without preauth flag
  Wireless event: cmd=0x8b06 len=8
  Wireless event: cmd=0x8b04 len=12
  Wireless event: cmd=0x8b1a len=12
  Authentication with 00:00:00:00:00:00 timed out.
  BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
  State: ASSOCIATING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  Setting scan request: 0 sec 0 usec
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  Wireless event: cmd=0x8b19 len=8
  Received 561 bytes of scan results (3 BSSes)
  Scan results: 3
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     skip - blacklisted
  1: 01:02:d1:0d:37:72 ssid='Josh' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
     skip - SSID mismatch
  2: 23:23:23:53:32:31 ssid='default' wpa_ie_len=0 rsn_ie_len=0 caps=0x1
     skip - no WPA/RSN IE
  No APs found - clear blacklist and try again
  Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     selected based on RSN IE
  Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  RSN: using IEEE 802.11i/D9.0
  WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
  WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 
04 01 00 00 0f ac 02 00 00
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_associate
  Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RSN: Ignored PMKID candidate without preauth flag
  Wireless event: cmd=0x8b06 len=8
  Wireless event: cmd=0x8b04 len=12
  Wireless event: cmd=0x8b1a len=12
  Authentication with 00:00:00:00:00:00 timed out.
  Added BSSID 10:23:41:91:0F:11 into blacklist
  State: ASSOCIATING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  Setting scan request: 0 sec 0 usec
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  Wireless event: cmd=0x8b19 len=8
  Received 561 bytes of scan results (3 BSSes)
  Scan results: 3
  Selecting BSS from priority group 0
  0: 10:23:41:91:0F:11 ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     selected based on RSN IE
  Trying to associate with 10:23:41:91:0F:11 (SSID='STFU' freq=2462 MHz)
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  RSN: using IEEE 802.11i/D9.0
  WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
  WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 
04 01 00 00 0f ac 02 00 00
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_associate
  Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RSN: Ignored PMKID candidate without preauth flag
  Wireless event: cmd=0x8b06 len=8
  Wireless event: cmd=0x8b04 len=12
  Wireless event: cmd=0x8b1a len=12
  Authentication with 00:00:00:00:00:00 timed out.
  BSSID 10:23:41:91:0F:11 blacklist count incremented to 2
  State: ASSOCIATING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  Setting scan request: 0 sec 0 usec
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  CTRL-EVENT-TERMINATING - signal 2 received
  Removing interface ath0
  State: SCANNING -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  No keys have been configured - skip key clearing
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  wpa_driver_wext_set_wpa
  wpa_driver_wext_set_drop_unencrypted
  wpa_driver_wext_set_countermeasures
  No keys have been configured - skip key clearing
  WEXT: Operstate: linkmode=0, operstate=6
  Removed BSSID 10:23:41:91:0F:11 from blacklist (clear)
  Cancelling scan request
  
  Part of the wpa_supplicant log with my Broadcom chipset (working with 
ndiswrapper):
  [EMAIL PROTECTED]:~$ sudo wpa_supplicant -dd -D wext -i eth1 -c 
/etc/wpa_supplicant/wlanconfig
  Initializing interface 'eth1' conf '/etc/wpa_supplicant/wlanconfig' driver 
'wext' ctrl_interface 'N/A' bridge 'N/A'
  Configuration file '/etc/wpa_supplicant/wlanconfig' -> 
'/etc/wpa_supplicant/wlanconfig'
  Reading configuration file '/etc/wpa_supplicant/wlanconfig'
  Line: 9 - start of a new network block
  ssid - hexdump_ascii(len=3):
       53 46 43                                          STFU             
  proto: 0x2
  key_mgmt: 0x2
  pairwise: 0x10
  group: 0x10
  PSK (ASCII passphrase) - hexdump_ascii(len=13): [REMOVED]
  PSK (from passphrase) - hexdump(len=32): [REMOVED]
  Priority group 0
     id=0 ssid='STFU'
  Initializing interface (2) 'eth1'
  EAPOL: SUPP_PAE entering state DISCONNECTED
  EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  EAPOL: SUPP_BE entering state INITIALIZE
  EAP: EAP entering state DISABLED
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
    capabilities: key_mgmt 0xf enc 0xf
  WEXT: Operstate: linkmode=1, operstate=5
  Own MAC address: 00:14:a5:29:62:2e
  wpa_driver_wext_set_wpa
  wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_countermeasures
  wpa_driver_wext_set_drop_unencrypted
  Setting scan request: 0 sec 100000 usec
  Added interface eth1
  Wireless event: cmd=0x8b06 len=8
  RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  State: DISCONNECTED -> SCANNING
  Starting AP scan (broadcast SSID)
  Trying to get current scan results first without requesting a new scan to 
speed up initial association
  Received 663 bytes of scan results (3 BSSes)
  Scan results: 3
  Selecting BSS from priority group 0
  0: 0F:9D:42:91:A0:0B ssid='STFU' wpa_ie_len=0 rsn_ie_len=22 caps=0x11
     selected based on RSN IE
  Trying to associate with 0F:9D:42:91:A0:0B (SSID='STFU' freq=2462 MHz)
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  RSN: using IEEE 802.11i/D9.0
  WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2
  WPA: clearing AP WPA IE
  WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 
04 01 00 00 0f ac 02 00 00
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 
00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_associate
  Setting authentication timeout: 10 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RSN: Ignored PMKID candidate without preauth flag
  Wireless event: cmd=0x8b06 len=8
  Wireless event: cmd=0x8b04 len=12
  Wireless event: cmd=0x8b1a len=11
  RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  Wireless event: cmd=0x8c07 len=67
  AssocReq IE wireless event - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 
96 24 30 48 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 
00 32 04 0c 12 18 60 dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
  Wireless event: cmd=0x8c08 len=32
  AssocResp IE wireless event - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 
32 04 0c 12 18 60 dd 06 00 10 18 02 00 04
  Wireless event: cmd=0x8b15 len=20
  Wireless event: new AP: 0F:9D:42:91:A0:0B
  Association info event
  req_ies - hexdump(len=59): 00 03 53 46 43 01 08 82 84 8b 96 24 30 48 6c 30 14 
01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 32 04 0c 12 18 60 
dd 06 00 40 96 01 01 00 dd 06 00 10 18 02 00 01
  resp_ies - hexdump(len=24): 01 08 82 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 
dd 06 00 10 18 02 00 04
  WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
  State: ASSOCIATING -> ASSOCIATED
  WEXT: Operstate: linkmode=-1, operstate=5
  Associated to a new BSS: BSSID=0F:9D:42:91:A0:0B
  No keys have been configured - skip key clearing
  Associated with 0F:9D:42:91:A0:0B
  WPA: Association event - clear replay counter
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - portEnabled=1
  EAPOL: SUPP_PAE entering state CONNECTING
  EAPOL: SUPP_BE entering state IDLE
  Setting authentication timeout: 10 sec 0 usec
  RX EAPOL from 0F:9D:42:91:A0:0B
  RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 00 00 
00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 
5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 cb f5 46 e7
  Setting authentication timeout: 10 sec 0 usec
  IEEE 802.1X RX: version=2 type=3 length=117
    EAPOL-Key type=2
    key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
    key_length=16 key_data_length=22
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 
73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
    key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 
00 00 00 00 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 
63 cb 1a 5e 40 e8 3c 6a c0 31 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 1e b9 96 18 69 a0 
cb f5 46 e7
  State: ASSOCIATED -> 4WAY_HANDSHAKE
  WPA: RX message 1 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
  RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 d0 1d 47 b4 63 d7 
1e b9 96 18 69 a0 cb f5 46 e7
  RSN: PMKID from Authenticator - hexdump(len=16): d0 1d 47 b4 63 d7 1e b9 96 
18 69 a0 cb f5 46 e7
  RSN: no matching PMKID found
  WPA: Renewed SNonce - hexdump(len=32): 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 
fd 7c ff 13 81 4c 94 7a 78 bc e6 0a 44 83 42 37 e1 72 45
  WPA: PMK - hexdump(len=32): [REMOVED]
  WPA: PTK - hexdump(len=64): [REMOVED]
  WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
  WPA: Sending EAPOL-Key 2/4
  WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 
00 00 00 00 33 93 22 f2 a9 a5 d6 36 b9 db 4f 1c 07 fd 7c ff 13 81 4c 94 7a 78 
bc e6 0a 44 83 42 37 e1 72 45 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 52 96 ac ce 08 9e 6f 33 b3 50 
58 6e ab 6c 15 bb 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f 
ac 02 00 00
  RX EAPOL from 0F:9D:42:91:A0:0B
  RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 
01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 63 cb 1a 
5e 40 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 
7c 36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce 
b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 
ef dc c8 9c 05 1d be 00 1b
  IEEE 802.1X RX: version=2 type=3 length=151
    EAPOL-Key type=2
    key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr)
    key_length=16 key_data_length=56
    replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
    key_nonce - hexdump(len=32): 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 
73 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 31
    key_iv - hexdump(len=16): 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32
    key_rsc - hexdump(len=8): 0d 00 00 00 00 00 00 00
    key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
    key_mic - hexdump(len=16): b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 36 57
  WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 
00 00 00 01 62 d9 2c 44 eb f5 0c 59 df 0b f6 7a 01 cf db 73 6b 65 4c 22 70 4d 
63 cb 1a 5e 4
  0 e8 3c 6a c0 31 6b 65 4c 22 70 4d 63 cb 1a 5e 40 e8 3c 6a c0 32 0d 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 b4 f8 a8 85 5a 1c a7 a6 3f 07 6e 68 38 7c 
36 57 00 38 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 64 ab f2 43 a3 59 0e 02 b8 ce b8 
1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 b3 9b 79 e1 cc ae 2a 79 f6 a8 ef 
dc c8 9c 05 1d be 00 1b
  RSN: encrypted key data - hexdump(len=56): 8b 7c e2 1a e2 53 3e 2a 7d 59 fc 
64 ab f2 43 a3 59 0e 02 b8 ce b8 1b 1c b6 0a bd 5e df 8c 13 c1 b0 10 0f d6 d9 
b3 9b 79 e1 cc ae 2a 79 f6 a8 ef dc c8 9c 05 1d be 00 1b
  WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED]
  State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
  WPA: RX message 3 of 4-Way Handshake from 0F:9D:42:91:A0:0B (ver=2)
  WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 
01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 8e 31 73 e9 ec 8b 91 68 e8 36 
06 d8 a7 5a 84 d4 dd 00
  WPA: Sending EAPOL-Key 4/4
  WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00 00 
00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 05 e2 19 59 6e 87 82 01 ce 1d 
a2 0f 24 59 07 ff 00 00
  WPA: Installing PTK to the driver.
  wpa_driver_wext_set_key: alg=3 key_idx=0 set_tx=1 seq_len=6 key_len=16
  EAPOL: External notification - portValid=1
  State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
  RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED]
  WPA: Group Key - hexdump(len=16): [REMOVED]
  WPA: Installing GTK to the driver (keyidx=1 tx=0).
  WPA: RSC - hexdump(len=6): 0d 00 00 00 00 00
  wpa_driver_wext_set_key: alg=3 key_idx=1 set_tx=0 seq_len=6 key_len=16
  WPA: Key negotiation completed with 0F:9D:42:91:A0:0B [PTK=CCMP GTK=CCMP]
  Cancelling authentication timeout
  State: GROUP_HANDSHAKE -> COMPLETED
  CTRL-EVENT-CONNECTED - Connection to 0F:9D:42:91:A0:0B completed (auth) [id=0 
id_str=]
  WEXT: Operstate: linkmode=-1, operstate=6
  EAPOL: External notification - portValid=1
  EAPOL: External notification - EAP success=1
  EAPOL: SUPP_PAE entering state AUTHENTICATING
  EAPOL: SUPP_BE entering state SUCCESS
  EAP: EAP entering state DISABLED
  EAPOL: SUPP_PAE entering state AUTHENTICATED
  EAPOL: SUPP_BE entering state IDLE
  RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
  EAPOL: startWhen --> 0
  CTRL-EVENT-TERMINATING - signal 2 received
  Removing interface eth1
  State: COMPLETED -> DISCONNECTED
  WEXT: Operstate: linkmode=-1, operstate=5
  wpa_driver_wext_deauthenticate
  wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  EAPOL: External notification - portEnabled=0
  EAPOL: SUPP_PAE entering state DISCONNECTED
  EAPOL: SUPP_BE entering state INITIALIZE
  EAPOL: External notification - portValid=0
  wpa_driver_wext_set_wpa
  wpa_driver_wext_set_drop_unencrypted
  wpa_driver_wext_set_countermeasures
  No keys have been configured - skip key clearing
  WEXT: Operstate: linkmode=0, operstate=6
  Cancelling scan request
  
  My wpa_supplicant connection file (which works fine with my 
ndiswrapper/Broadcom solution):
  network={
  ssid="STFU"
  proto=RSN
  key_mgmt=WPA-PSK
  pairwise=CCMP
  group=CCMP
  psk="password"
  }

-- 
[madwifi] 3Com 3CRXJK10075 PCMCIA (Atheros chipset) does not associate with 
WPA2 or WPA AP's
https://launchpad.net/bugs/91508

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to