hostap/hostapd/wpa_supplicant - new development release v0.3.3

Miles Lane miles.lane at gmail.com
Fri Jan 7 16:04:09 EST 2005


Hi Jouni,

The CVS tarball build gives the following build error:

cc -MMD -O2 -Wall -g -I../driver/modules -I../utils -I../hostapd
-DCONFIG_DRIVER_HOSTAP -DCONFIG_DRIVER_WEXT
-DCONFIG_DRIVER_NDISWRAPPER -DEAP_TLS -DEAP_PEAP -DEAP_TTLS -DEAP_MD5
-DEAP_MSCHAPv2 -DEAP_GTC -DEAP_OTP -DEAP_LEAP -DEAP_TLV
-DIEEE8021X_EAPOL -DEAP_TLS_FUNCS -DPKCS12_FUNCS
-DCONFIG_WIRELESS_EXTENSION -DCONFIG_CTRL_IFACE   -c -o config.o
config.c
config.c:19:20: common.h: No such file or directory
In file included from config.c:20:
wpa.h:7: error: parse error before "u8"

Also, using wpa_supplicant 0.3.3, I am having some trouble.
I can only get it to create a usable connection about once 
every five tries.

I have a card based on the Broadcom 4306 chipset.  I am using
ndisloader 1.0rc1 to load bcmwl5.sys.  Here is the content from
my wpa_supplicant.conf:

----------
# allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' group
ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=root
#
# home network; allow all valid ciphers

ctrl_interface=/var/run/wpa_supplicant
ctrl_interface_group=root
network={
        ssid="Trinkle Lane Home"
        scan_ssid=1
        pairwise=CCMP TKIP
        group=CCMP TKIP
        key_mgmt=WPA-PSK
        psk="nuttypass"
}
-------------

Here's what happens in the failure case:

root at Monkey100:~# wpa_supplicant -iwlan0 -c/etc/wpa_supplicant.conf
-Dndiswrapper -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver
'ndiswrapper'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0 (from group name 'root')
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0 (from group name 'root')
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=17):
     54 72 69 6e 6b 6c 65 20 4c 61 6e 65 20 48 6f 6d   Trinkle Lane Hom
     65                                                e
scan_ssid=1 (0x1)
pairwise: 0x18
group: 0x18
key_mgmt: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='Trinkle Lane Home'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0c:e5:53:2c:3e
Setting scan request: 0 sec 100000 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=17):
     54 72 69 6e 6b 6c 65 20 4c 61 6e 65 20 48 6f 6d   Trinkle Lane Hom
     65                                                e
ioctl[SIOCSIWSCAN{,EXT}]: No such device
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
ioctl[SIOCGIWSCAN]: Operation not supported
Scan results: -1
Failed to get scan results - try scanning again
Setting scan request: 1 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Starting AP scan (broadcast SSID)
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
Received 493 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:03:93:ea:37:bb ssid='Trinkle Lane Home' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:03:93:ea:37:bb (SSID='Trinkle Lane Home'
freq=2412 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c02 len=205
Custom wireless event:
'ASSOCINFO(ReqIEs=00115472696e6b6c65204c616e6520486f6d65010882848b962430486c32040c121860dd06001018010001dd160050f20101000050f20201000050f20201000050f202
RespIEs=010482848b9632080c1218243048606c)'
Association info event
req_ies - hexdump(len=67): 00 11 54 72 69 6e 6b 6c 65 20 4c 61 6e 65
20 48 6f 6d 65 01 0882 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00
10 18 01 00 01 dd 16 00 50 f2 01 01 0000 50 f2 02 01 00 00 50 f2 02 01
00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:03:93:ea:37:bb
Association event - clear replay counter
Associated to a new BSS: BSSID=00:03:93:ea:37:bb
No keys have been configured - skip key clearing
Associated with 00:03:93:ea:37:bb
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 00 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 43 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 00 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 43 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 51 6a 6c cd ac 70 03 92 85 9e
4a 22 ab 25 91 49 dadb dc f3 96 fa 78 f2 7c 4d 4a a4 27 f9 d0 fd
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 9a 04 e0 52 a0 fb 68 0f 20 a3 2b
53 64 2f 38 6c
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 51 6a
6c cd ac 70 03 92 85 9e 4a 22 ab 25 9149 da db dc f3 96 fa 78 f2 7c 4d
4a a4 27 f9 d0 fd 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 9a 04 e0 52 a0 fb 68 0f 20
a3 2b53 64 2f 38 6c 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f202
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 00 01 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 43 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a6 8f
83 88 82 b5 dd 1b dc cd 5d 15 ca d0 c3 f7 00 18 dd 16 00 50 f2 01 01
00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
00 00 00 00 00 01 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 43 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 a6 8f 83 88 82 b5 dd 1b dc cd 5d 15 ca d0 c3 f7 00 18 dd 16 00 50
f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 51 6a
6c cd ac 70 03 92 85 9e 4a 22 ab 25 9149 da db dc f3 96 fa 78 f2 7c 4d
4a a4 27 f9 d0 fd 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 6e 43 6c 1a 80 43 ef ce 47
d7 d1fc 67 d2 1b 82 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00 00 00 00
00 00 02 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 44 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 87 e5
e9 0a 16 16 c5 8e 5a dd d0 bf ff 3b 06 4f 00 20 94 c9 9e 2b cc 6c a9
29 98 45 6c 8f d7 5e 02 71 b4 cb 6b c9 a2 e0 b0 b7 f5 f0 91 80 53 4f
e9 77
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 91 00 20 00 00
00 00 00 00 00 02 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 44 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 87 e5 e9 0a 16 16 c5 8e 5a dd d0 bf ff 3b 06 4f 00 20 94 c9 9e 2b
cc 6c a9 29 98 45 6c 8f d7 5e 02 71 b4 cb 6b c9 a2 e0 b0 b7 f5 f0 91
80 53 4f e9 77
WPA: RX message 1 of Group Key Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 01 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 5f fe 03 11 00 20 00 00 00 00 00 00 00 02 00 00
00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 17 ac 14 60 8a 8d 96 91 b7
46 d818 17 21 0c 8b 00 00
WPA: Key negotiation completed with 00:03:93:ea:37:bb [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b2a len=12
Wireless event: cmd=0x8b1a len=31
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55

And here is a success log:

root at Monkey100:~# wpa_supplicant -iwlan0 -c/etc/wpa_supplicant.conf
-Dndiswrapper -dd
Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver
'ndiswrapper'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0 (from group name 'root')
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0 (from group name 'root')
Line: 9 - start of a new network block
ssid - hexdump_ascii(len=17):
     54 72 69 6e 6b 6c 65 20 4c 61 6e 65 20 48 6f 6d   Trinkle Lane Hom
     65                                                e
scan_ssid=1 (0x1)
pairwise: 0x18
group: 0x18
key_mgmt: 0x2
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='Trinkle Lane Home'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Own MAC address: 00:0c:e5:53:2c:3e
Setting scan request: 0 sec 100000 usec
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=17):
     54 72 69 6e 6b 6c 65 20 4c 61 6e 65 20 48 6f 6d   Trinkle Lane Hom
     65                                                e
ioctl[SIOCSIWSCAN{,EXT}]: No such device
Failed to initiate AP scan.
Setting scan request: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
Scan timeout - try to get results
Received 493 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:03:93:ea:37:bb ssid='Trinkle Lane Home' wpa_ie_len=24 rsn_ie_len=0
   selected
Trying to associate with 00:03:93:ea:37:bb (SSID='Trinkle Lane Home'
freq=2412 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8c02 len=205
Custom wireless event:
'ASSOCINFO(ReqIEs=00115472696e6b6c65204c616e6520486f6d65010882848b962430486c32040c121860dd06001018010001dd160050f20101000050f20201000050f20201000050f202
RespIEs=010482848b9632080c1218243048606c)'
Association info event
req_ies - hexdump(len=67): 00 11 54 72 69 6e 6b 6c 65 20 4c 61 6e 65
20 48 6f 6d 65 01 0882 84 8b 96 24 30 48 6c 32 04 0c 12 18 60 dd 06 00
10 18 01 00 01 dd 16 00 50 f2 01 01 0000 50 f2 02 01 00 00 50 f2 02 01
00 00 50 f2 02
resp_ies - hexdump(len=16): 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c
assoc_wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01
00 00 50 f2 02 01 00 00 50 f2 02
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:03:93:ea:37:bb
Association event - clear replay counter
Associated to a new BSS: BSSID=00:03:93:ea:37:bb
No keys have been configured - skip key clearing
Associated with 00:03:93:ea:37:bb
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00
00 00 00 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 45 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00
00 00 00 00 00 00 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 45 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: Renewed SNonce - hexdump(len=32): d0 fd 76 3d 9c da 89 0d 98 be
0e 74 78 be ab ca f54d 50 ff ad ed 96 14 d6 2b 6d 23 63 db e8 89
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): bc 01 c5 06 e3 31 03 46 bc 8f 45
85 aa 53 06 78
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 77 fe 01 09 00 20 00 00 00 00 00 00 00 00 d0 fd
76 3d 9c da 89 0d 98 be 0e 74 78 be abca f5 4d 50 ff ad ed 96 14 d6 2b
6d 23 63 db e8 89 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 bc 01 c5 06 e3 31 03 46 bc
8f 4585 aa 53 06 78 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00
50 f2 02 01 00 00 50 f202
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00
00 00 01 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 45 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 95
cf c8 01 fb 8b d3 3d 91 9a 22 5d 32 17 42 00 18 dd 16 00 50 f2 01 01
00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00
00 00 00 00 00 01 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 45 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 f1 95 cf c8 01 fb 8b d3 3d 91 9a 22 5d 32 17 42 00 18 dd 16 00 50
f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 5f fe 01 09 00 20 00 00 00 00 00 00 00 01 d0 fd
76 3d 9c da 89 0d 98 be 0e 74 78 be abca f5 4d 50 ff ad ed 96 14 d6 2b
6d 23 63 db e8 89 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 9e 28 df 3d 58 7c 1c 11 f5
ba 0a42 b5 04 ac 5d 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
RX EAPOL from 00:03:93:ea:37:bb
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00
00 00 03 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc 29 3c d9
00 ec 6e a0 ae c8 11 e2 96 e8 55 46 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 29 c8
85 bb 4c fe f4 a6 a8 72 c9 c3 bb af 26 4e 00 20 53 22 37 da 6b 87 89
da b5 be 8d 10 41 77 30 c8 8a a9 37 7b b9 e5 54 93 b9 8e 8e 9a 06 95
45 cc
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00
00 00 00 00 00 03 46 a3 ba 14 91 c8 78 79 62 a4 92 85 a6 04 e3 d1 bc
29 3c d9 00 ec 6e a0 ae c8 11 e2 96 e8 55 46 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 29 c8 85 bb 4c fe f4 a6 a8 72 c9 c3 bb af 26 4e 00 20 53 22 37 da
6b 87 89 da b5 be 8d 10 41 77 30 c8 8a a9 37 7b b9 e5 54 93 b9 8e 8e
9a 06 95 45 cc
WPA: RX message 1 of Group Key Handshake from 00:03:93:ea:37:bb (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 03 93 ea 37 bb 00 0c e5
53 2c 3e 88 8e 01 0300 5f fe 03 21 00 20 00 00 00 00 00 00 00 03 00 00
00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 0d 9e 98 06 a0 87 11
9e 6d8d ea b5 22 a2 00 00
WPA: Key negotiation completed with 00:03:93:ea:37:bb [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57



More information about the HostAP mailing list