hostapd-0.3.7 with 5213 chipset (5212) and WPA-PSK fails

Beat Meier bmeier at infovia.com.ar
Mon May 23 17:06:04 EDT 2005


Hi

I have the following minic pci cards
  5354 MP PLUS ARIES2 4G: 802.11a/b/g miniPCI Card
I have a client which works fine with this card and an WRT54G from Linksys.
No auth ok, WPA-PSK ok

But with hostapd version 0.3.7 and this card the client cannot connect 
to my hostapd.
Without authorization there is no problem.
I use madwifi driver date 20050311  which I compiled myself

The card has an Atheros chip AR5213A.
Ff I do an lspci there is the following output
00:0d.0 Ethernet controller: Unknown device 168c:0013 (rev 01)

dmesg gives me:
ath_hal: 0.9.14.9 (AR5210, AR5211, AR5212, RF5111, RF5112, RF2413)
wlan: 0.8.4.5 (EXPERIMENTAL)
ath_rate_onoe: 1.0
ath_pci: 0.9.4.12 (EXPERIMENTAL)
ath0: 11a rates: 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
ath0: 11b rates: 1Mbps 2Mbps 5.5Mbps 11Mbps
ath0: 11g rates: 1Mbps 2Mbps 5.5Mbps 11Mbps 6Mbps 9Mbps 12Mbps 18Mbps 
24Mbps 36Mbps 48Mbps 54Mbps
ath0: turbo rates: 6Mbps 9Mbps 12Mbps 18Mbps 24Mbps 36Mbps 48Mbps 54Mbps
ath0: mac 5.9 phy 4.3 radio 3.6
ath0: 802.11 address: 00:02:6f:21:e3:9f
ath0: Use hw queue 0 for WME_AC_BE traffic
ath0: Use hw queue 1 for WME_AC_BK traffic
ath0: Use hw queue 2 for WME_AC_VI traffic
ath0: Use hw queue 3 for WME_AC_VO traffic
ath0: Atheros 5212: mem=0x80000000, irq=12

If I look in hal/ah_devid.h this ids are only the leading 4 digits ? 
i.e. 168c in my case?
How does the driver know which version of chipset to use?

Does anybody use such a card in hostapd which works?
What could be the problem

Below a snipped ot the logs ...
Client logs before this are equals ...

Thanks for any hint

Beat


Output of client to wrt54g:
***********************************
...
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0c:41:6e:18:d2
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 
00 00 f1 ee 27 69 95 c5 ea 5f 8e 3e 9b eb 59 e7
 2c 4f 05 25 4a df a9 2d 31 cf a6 ba ff 18 90 a6 32 62 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 
00 00 00 00 00 f1 ee 27 69 95 c5 ea 5f 8e 3e 9b
 eb 59 e7 2c 4f 05 25 4a df a9 2d 31 cf a6 ba ff 18 90 a6 32 62 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00
WPA: RX message 1 of 4-Way Handshake from 00:0c:41:6e:18:d2 (ver=1)
...
***********************************

Output of client to hostapd:
***********************************
...
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:02:6f:21:e3:a3 into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:02:6f:21:e3:a3
Association event - clear replay counter
Associated to a new BSS: BSSID=00:02:6f:21:e3:a3
No keys have been configured - skip key clearing
Associated with 00:02:6f:21:e3:a3
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
Wireless event: cmd=0x8b19 len=12
Received 564 bytes of scan results (2 BSSes)
Scan results: 2
...
***********************************

Output of hostapd:
***********************************
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:02:6f:21:e3:9f IEEE 802.11: associated
  New STA
ath0: STA 00:02:6f:21:e3:9f WPA: event 1 notification
ath0: STA 00:02:6f:21:e3:9f WPA: start authentication
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:02:6f:21:e3:9f key_idx=0
ath0: STA 00:02:6f:21:e3:9f IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:02:6f:21:e3:9f authorized=0
WPA: 00:02:6f:21:e3:9f WPA_PTK_GROUP entering state IDLE
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state AUTHENTICATION
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state AUTHENTICATION2
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITPSK
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state PTKSTART
ath0: STA 00:02:6f:21:e3:9f WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 02 6f 21 e3 9f 00 02 6f 21 e3 a3 88 8e 
02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ae a8 24 ad 1f 9c ac 
23 02 4a 7e 0c 94 7c 39 66 19 da fc d0 02 29 6b 5f 30 a4 d5 c7 f2 0f 33 
a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
ath0: STA 00:02:6f:21:e3:9f WPA: EAPOL-Key timeout
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state PTKSTART
ath0: STA 00:02:6f:21:e3:9f WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 02 6f 21 e3 9f 00 02 6f 21 e3 a3 88 8e 
02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 02 ae a8 24 ad 1f 9c ac 
23 02 4a 7e 0c 94 7c 39 66 19 da fc d0 02 29 6b 5f 30 a4 d5 c7 f2 0f 33 
a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
ath0: STA 00:02:6f:21:e3:9f WPA: EAPOL-Key timeout
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state PTKSTART
ath0: STA 00:02:6f:21:e3:9f WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 02 6f 21 e3 9f 00 02 6f 21 e3 a3 88 8e 
02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 03 ae a8 24 ad 1f 9c ac 
23 02 4a 7e 0c 94 7c 39 66 19 da fc d0 02 29 6b 5f 30 a4 d5 c7 f2 0f 33 
a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
ath0: STA 00:02:6f:21:e3:9f WPA: EAPOL-Key timeout
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state PTKSTART
ath0: STA 00:02:6f:21:e3:9f WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 02 6f 21 e3 9f 00 02 6f 21 e3 a3 88 8e 
02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 04 ae a8 24 ad 1f 9c ac 
23 02 4a 7e 0c 94 7c 39 66 19 da fc d0 02 29 6b 5f 30 a4 d5 c7 f2 0f 33 
a8 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state DISCONNECT
madwifi_sta_deauth: addr=00:02:6f:21:e3:9f reason_code=2
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state DISCONNECTED
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:02:6f:21:e3:9f key_idx=0
ath0: STA 00:02:6f:21:e3:9f IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:02:6f:21:e3:9f authorized=0
ath0: STA 00:02:6f:21:e3:9f IEEE 802.11: deauthenticated due to local 
deauth request
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:02:6f:21:e3:9f IEEE 802.11: deassociated
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:02:6f:21:e3:9f IEEE 802.11: associated
  New STA
ath0: STA 00:02:6f:21:e3:9f WPA: event 1 notification
ath0: STA 00:02:6f:21:e3:9f WPA: start authentication
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:02:6f:21:e3:9f key_idx=0
ath0: STA 00:02:6f:21:e3:9f IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:02:6f:21:e3:9f authorized=0
WPA: 00:02:6f:21:e3:9f WPA_PTK_GROUP entering state IDLE
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state AUTHENTICATION
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state AUTHENTICATION2
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITPSK
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state PTKSTART
ath0: STA 00:02:6f:21:e3:9f WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113): 00 02 6f 21 e3 9f 00 02 6f 21 e3 a3 88 8e 
02 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 ae a8 24 ad 1f 9c ac 
23 02 4a 7e 0c 94 7c 39 66 19 da fc d0 02 29 6b 5f 30 a4 d5 c7 f2 0f 33 
a9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
Wireless event: cmd=0x8c04 len=20
ath0: STA 00:02:6f:21:e3:9f IEEE 802.11: deassociated
ath0: STA 00:02:6f:21:e3:9f WPA: event 2 notification
madwifi_del_key: addr=00:02:6f:21:e3:9f key_idx=0
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state DISCONNECTED
WPA: 00:02:6f:21:e3:9f WPA_PTK entering state INITIALIZE
madwifi_del_key: addr=00:02:6f:21:e3:9f key_idx=0
ath0: STA 00:02:6f:21:e3:9f IEEE 802.1X: unauthorizing port
madwifi_set_sta_authorized: addr=00:02:6f:21:e3:9f authorized=0
***********************************





More information about the HostAP mailing list