terminated at sending EAPOL-key 2/4 on PEAP.

YenJung Chang yenjung at gmail.com
Thu Nov 4 00:54:53 EST 2004


I missed some settings in wpa_supplicant.conf.

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=0
eapol_version=1
ap_scan=1

Thanks,
yj.

On Thu, 4 Nov 2004 13:48:05 +0800, YenJung Chang <yenjung at gmail.com> wrote:
> Hi, list
> 
> I can't connect to my RADIUS server with EAP-PEAP, my setting,
> environment and debug message are showed below..
> However, the WPA-PSK is workable...
> 
> <environment>
> =============================
> RADIUS server: windows 2000 server
> AP: Cisco 1200 a+b
> 
> STATION:
> - Kernel: 2.4.25
> - Wireless card: Atheros ar5212
> - Driver: Madwifi
> - wpa_supplicant version: 0.2.5
> =============================
> 
> <setting>
> ==============================
> # EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel
> # (e.g., Radiator)
> network={
>         ssid="1200b"
>         key_mgmt=WPA-EAP
>         eap=PEAP
>         identity="spencer"
>         password="Ss=1234"
>         ca_cert="/etc/ssl/certs/netgearca.pem"
>         phase1="peaplabel=1"
>         phase2="auth=MSCHAPV2"
>         priority=2
> }
> 
> command:
> wpa_supplicant -d -c/etc/wpa_supplicant.conf -iath0
> 
> ==========================================
> 
> <debug message>
> ===========================================
> l2_packet_receive - recv: Network is down
> Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> ctrl_interface_group=0
> eapol_version=1
> ap_scan=1
> Priority group 2
>    id=0 ssid='1200b'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> wpa_driver_madwifi_set_wpa: enabled=1
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_set_countermeasures: enabled=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> Setting scan request: 0 sec 100000 usec
> Starting AP scan (broadcast SSID)
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
> Wireless event: cmd=0x8b1a len=12
> Wireless event: cmd=0x8b19 len=12
> Received 2716 bytes of scan results (13 BSSes)
> Scan results: 13
> Selecting BSS from priority group 2
> 0: 00:09:5b:f7:14:8c ssid='*spencer*' wpa_ie_len=24 rsn_ie_len=0
>    skip - SSID mismatch
> 1: 00:0f:b5:10:a5:38 ssid='davidv3' wpa_ie_len=26 rsn_ie_len=0
>    skip - SSID mismatch
> 2: 00:0c:85:71:6e:a8 ssid='1200b' wpa_ie_len=24 rsn_ie_len=0
>    selected
> Trying to associate with 00:0c:85:71:6e:a8 (SSID='1200b' freq=2437 MHz)
> Cancelling scan request
> WPA: using IEEE 802.11i/D3.0
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
> 01 00 00 50 f2 02 01 00 00 50 f2 01
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_set_drop_unencrypted: enabled=1
> wpa_driver_madwifi_associate
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - portControl=Auto
> Wireless event: cmd=0x8b1a len=18
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:0c:85:71:6e:a8
> Association event - clear replay counter
> Associated to a new BSS: BSSID=00:0c:85:71:6e:a8
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: txStart
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> RX EAPOL from 00:0c:85:71:6e:a8
> Setting authentication timeout: 70 sec 0 usec
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_PAE entering state RESTART
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=1 id=1
> EAP: EAP entering state IDENTITY
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
> EAP: using real identity - hexdump_ascii(len=7):
>      73 70 65 6e 63 65 72                              spencer
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=1 id=2
> EAP: EAP entering state IDENTITY
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
> EAP: using real identity - hexdump_ascii(len=7):
>      73 70 65 6e 63 65 72                              spencer
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=3
> EAP: EAP entering state GET_METHOD
> EAP-PEAP: Force new label for key derivation
> EAP-PEAP: Phase2 type: MSCHAPV2
> SSL: Trusted root certificate(s) loaded
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=6) - Flags 0x20
> EAP-PEAP: Start (server ver=0, own ver=1)
> EAP-PEAP: Using PEAP version 0
> SSL: (where=0x10 ret=0x1)
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:before/connect initialization
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write client hello A
> SSL: (where=0x1002 ret=0xffffffff)
> SSL: SSL_connect:error in SSLv3 read server hello A
> SSL: SSL_connect - want more data
> SSL: 100 bytes left to be sent out (of total 100 bytes)
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=4
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=1396) - Flags 0xc0
> EAP-PEAP: TLS Message Length: 4723
> SSL: Need 3337 bytes more input data
> SSL: Building ACK
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> IEEE 802.1X RX: version=1 type=0 length=1396
> WPA: EAPOL frame (type 0) discarded, not a Key frame
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=5
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=1396) - Flags 0x40
> SSL: Need 1947 bytes more input data
> SSL: Building ACK
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> IEEE 802.1X RX: version=1 type=0 length=1396
> WPA: EAPOL frame (type 0) discarded, not a Key frame
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=6
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=1396) - Flags 0x40
> SSL: Need 557 bytes more input data
> SSL: Building ACK
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> IEEE 802.1X RX: version=1 type=0 length=1396
> WPA: EAPOL frame (type 0) discarded, not a Key frame
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=7
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=563) - Flags 0x00
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 read server hello A
> SSL: eap_tls_verify_cb - preverify_ok=1 err=0 (ok) depth=1
> buf='/DC=com/DC=GUI/CN=Netgear CA'
> SSL: eap_tls_verify_cb - preverify_ok=1 err=0 (ok) depth=0
> buf='/CN=dni-9j5p6pp7hnj.GUI.com'
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 read server certificate A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 read server certificate request A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 read server done A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write client certificate A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write client key exchange A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write change cipher spec A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 write finished A
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 flush data
> SSL: (where=0x1002 ret=0xffffffff)
> SSL: SSL_connect:error in SSLv3 read finished A
> SSL: SSL_connect - want more data
> SSL: 194 bytes left to be sent out (of total 194 bytes)
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> IEEE 802.1X RX: version=1 type=0 length=563
> WPA: EAPOL frame (type 0) discarded, not a Key frame
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=8
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=53) - Flags 0x80
> EAP-PEAP: TLS Message Length: 43
> SSL: (where=0x1001 ret=0x1)
> SSL: SSL_connect:SSLv3 read finished A
> SSL: (where=0x20 ret=0x1)
> SSL: (where=0x1002 ret=0x1)
> SSL: No data to be sent out
> EAP-PEAP: TLS done, proceed to Phase 2
> EAP-PEAP: using label 'client PEAP encryption' in key derivation
> EAP-PEAP: Derived key - hexdump(len=64): f8 50 44 cc e4 a5 95 7e 34 15
> 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af ae
> 9f fc e0 35 29 c5 e5 ee b2 46 45 38 f1 e8 94 45 90 5b aa 6f 8f fb 1d
> b3 5f 6a a8 1d 3e 63 4a
> SSL: Building ACK
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 57, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=9
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=28) - Flags 0x00
> EAP-PEAP: received 22 bytes encrypted data for Phase 2
> EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=1): 01
> EAP-PEAP: received Phase 2: code=1 identifier=9 length=5
> EAP-PEAP: Phase 2 Request: type=1
> EAP: using real identity - hexdump_ascii(len=7):
>      73 70 65 6e 63 65 72                              spencer
> EAP-PEAP: Encrypting Phase 2 data - hexdump(len=12): 02 09 00 0c 01 73
> 70 65 6e 63 65 72
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=10
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=64) - Flags 0x00
> EAP-PEAP: received 58 bytes encrypted data for Phase 2
> EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=37): 1a 01 0a 00 24 10
> 32 1d da 61 e2 2b a7 4e 2c f4 8a 98 03 d8 d2 9e 44 4e 49 2d 39 4a 35
> 50 36 50 50 37 48 4e 4a
> EAP-PEAP: received Phase 2: code=1 identifier=10 length=41
> EAP-PEAP: Phase 2 Request: type=26
> EAP-PEAP: Phase 2 EAP packet
> EAP-MSCHAPV2: Received challenge
> EAP-MSCHAPV2: Authentication Servername - hexdump_ascii(len=15):
>      44 4e 49 2d 39 4a 35 50 36 50 50 37 48 4e 4a      DNI-9J5P6PP7HNJ
> EAP-MSCHAPV2: Generating Challenge Response
> EAP-MSCHAPV2: auth_challenge - hexdump(len=16): 32 1d da 61 e2 2b a7
> 4e 2c f4 8a 98 03 d8 d2 9e
> EAP-MSCHAPV2: peer_challenge - hexdump(len=16): f1 c8 54 a8 1a f7 9b
> 7a c1 8c 31 7a e0 c4 62 5d
> EAP-MSCHAPV2: username - hexdump_ascii(len=7):
>      73 70 65 6e 63 65 72                              spencer
> EAP-MSCHAPV2: password - hexdump_ascii(len=7):
>      53 73 3d 31 32 33 34                              Ss=1234
> EAP-MSCHAPV2: response - hexdump(len=24): a0 7d d4 88 1e 96 a6 b1 4c
> 70 35 bf 66 94 c9 1e 5c 58 f6 45 e8 38 af d1
> EAP-PEAP: Encrypting Phase 2 data - hexdump(len=66): 02 0a 00 42 1a 02
> 0a 00 3d 31 f1 c8 54 a8 1a f7 9b 7a c1 8c 31 7a e0 c4 62 5d 00 00 00
> 00 00 00 00 00 a0 7d d4 88 1e 96 a6 b1 4c 70 35 bf 66 94 c9 1e 5c 58
> f6 45 e8 38 af d1 00 73 70 65 6e 63 65 72
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 68, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=11
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=74) - Flags 0x00
> EAP-PEAP: received 68 bytes encrypted data for Phase 2
> EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=47): 1a 03 0a 00 2e 53
> 3d 43 37 45 38 35 42 38 46 38 30 36 34 31 46 36 36 45 32 46 36 34 37
> 37 45 41 36 32 33 41 46 38 30 37 30 46 46 44 38 41 39
> EAP-PEAP: received Phase 2: code=1 identifier=11 length=51
> EAP-PEAP: Phase 2 Request: type=26
> EAP-PEAP: Phase 2 EAP packet
> EAP-MSCHAPV2: Received success
> EAP-MSCHAPV2: Success message - hexdump(len=0):
> EAP-MSCHAPV2: Authentication succeeded
> EAP-PEAP: Encrypting Phase 2 data - hexdump(len=6): 02 0b 00 06 1a 03
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 78, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request method=25 id=12
> EAP: EAP entering state METHOD
> EAP-PEAP: Received packet(len=38) - Flags 0x00
> EAP-PEAP: received 32 bytes encrypted data for Phase 2
> EAP-PEAP: Decrypted Phase 2 EAP - hexdump(len=11): 01 0c 00 0b 21 80
> 03 00 02 00 01
> EAP-PEAP: received Phase 2: code=1 identifier=12 length=11
> EAP-PEAP: Phase 2 Request: type=33
> EAP-PEAP: Received TLVs - hexdump(len=6): 80 03 00 02 00 01
> EAP-PEAP: Result TLV - hexdump(len=2): 00 01
> EAP-PEAP: TLV Result - Success - EAP-PEAP/Phase2 Completed
> EAP-PEAP: Encrypting Phase 2 data - hexdump(len=11): 02 0c 00 0b 21 80
> 03 00 02 00 01
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> EAPOL: SUPP_BE entering state RECEIVE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Success
> EAP: Workaround for unexpected identifier field in EAP Success:
> reqId=13 lastId=12 (these are supposed to be same)
> EAP: EAP entering state SUCCESS
> EAPOL: SUPP_BE entering state RECEIVE
> EAPOL: SUPP_BE entering state SUCCESS
> EAPOL: SUPP_BE entering state IDLE
> WPA: EAPOL frame too short, len 46, expecting at least 99
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
> WPA: Renewed SNonce - hexdump(len=32): b7 a5 c6 89 79 94 04 e0 88 f7
> 48 48 ae a6 84 f7 48 e7 6b e2 0c e8 19 87 01 5f 20 dc 0b e7 d8 10
> WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
> a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
> ce 48 4a af
> WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
> ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
> WPA: PTK - hexdump(len=64): ca cd 66 64 b3 fc 22 c2 d1 1e 38 5d 11 0b
> 90 47 a9 a7 75 b2 98 b4 c8 7b e4 b3 09 fd f8 b3 10 b8 c0 ec 68 34 6b
> c0 a2 d9 4e 3e f2 f5 39 ef ee 82 62 27 51 be 9a 09 6a 68 b1 63 a1 c3
> 5d 96 ea f6
> WPA: EAPOL-Key MIC - hexdump(len=16): 05 d0 a1 6c 24 5a 40 a2 15 b2 b4
> 24 97 ea 41 31
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
> WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
> a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
> ce 48 4a af
> WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
> ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
> WPA: PTK - hexdump(len=64): 04 b6 7f 59 b9 33 17 78 b9 10 86 35 18 8c
> ab 32 37 e7 48 17 20 80 22 f8 32 a0 7a cc 7a 87 2f ca b8 0b 2a 24 a1
> e6 6e 73 9b 49 45 1b d0 68 31 93 9f 63 d6 73 db fb 04 12 eb c8 ff 77
> 03 40 7d 62
> WPA: EAPOL-Key MIC - hexdump(len=16): 91 1c 3f e5 fb 00 ed ce fe b4 8e
> f5 f6 ec e3 fb
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:0c:85:71:6e:a8
> EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0c:85:71:6e:a8 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00
> 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01
> WPA: PMK from EAPOL state machines - hexdump(len=32): f8 50 44 cc e4
> a5 95 7e 34 15 09 03 06 97 ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1
> ce 48 4a af
> WPA: PMK - hexdump(len=32): f8 50 44 cc e4 a5 95 7e 34 15 09 03 06 97
> ea 99 23 8c e0 b9 bb 34 01 37 93 94 bb d1 ce 48 4a af
> WPA: PTK - hexdump(len=64): de 9b 98 fd 5b 32 ff 12 4d 8d 4a 94 89 7f
> d8 a0 6f b4 f6 45 55 0a 94 95 83 39 52 44 62 16 b4 b6 ce 4d c7 40 ad
> c2 a3 40 5f a5 11 45 4e a0 8c 99 d5 ed e1 b3 b5 45 e2 27 61 73 14 12
> 7d 89 3e 83
> WPA: EAPOL-Key MIC - hexdump(len=16): b6 3a 56 f5 cb 31 9b 66 c6 43 d4
> ae 25 64 1b 12
> WPA: Sending EAPOL-Key 2/4
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:00:00:00:00:00
> Setting scan request: 0 sec 100000 usec
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> Disconnect event - remove keys
> wpa_driver_madwifi_del_key: keyidx=0
> wpa_driver_madwifi_del_key: keyidx=1
> wpa_driver_madwifi_del_key: keyidx=2
> wpa_driver_madwifi_del_key: keyidx=3
> wpa_driver_madwifi_del_key: keyidx=0
> ==================================================
> 
> Please tell me what mistake I made.
> 
> If there is more information I should provide, please tell me.
> Any advice is appreciated.
> 
> Thanks,
> yj.
>



More information about the HostAP mailing list