Handoff with wpa_supplicant and madwifi driver

Stephan Schlumbohm stephan.schlumbohm at tu-harburg.de
Sat Nov 19 16:14:45 EST 2005


Hi all,

I'm having serious trouble with the handoff from one access point to another using wpa_supplicant (stable 0.3.8 and development 0.4.6) with the madwifi driver (madwifi-ng latest svn snapshot from madwifi.org).

Both access points have the same ESSID and operate on the same channel and have the same security settings. In fact, those access points are mesh access points - both are connected to a FreeRADIUS server.

Authentication (Open, WPA-PSK, WPA-802.1X-TLS/PEAP/TTLS) works fine in this setup to each access point.

But, when I try to roam from one access point to another, wpa_supplicant does not initiate a reassociation request to the new access point. Instead, it disassociates the old access point, then it performs the scanning and then finally goes through a full new authentication with the new access point.

This causes the handoff to take about 1.5 to 3 seconds. This is not acceptable and is not intended by the developers. A single channel handoff should take about 10 to 300 ms (depending on authentication).

Is this a problem in wpa_supplicant or in the madwifi-driver?

Has anyone the handoff with wpa_supplicant and madwifi working successfully?

Here's the debug output from wpa_supplicant 0.3.8 performing a couple of WPA-PSK handoffs:


EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
**************** HANDOFF 1 **********************************************
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0d:97:04:04:12 into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:97:04:04:12
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:97:04:04:12
No keys have been configured - skip key clearing
Associated with 00:0d:97:04:04:12
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0d:97:04:04:12
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 02 8a 00 10 00 00 00 00 00 00 00 06 a1 5d 6c ec 7d ce c2 2f 16 1a 17 32 b8 17 10
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 02 8a 00 10 00 00 00 00 00 00 00 06 a1 5d 6c ec 7d ce c2 2f 16 1a 17 30
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:12 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 74 da c9 ad 96 3a f5 e3 dc be 7a 57 78 50 f8 ca 29 1b 2d 74 26 f1 bf ff 0d 41 4c bd9
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 35 14 56 c2 f3 c5 8b f9 72 ad fc 03 73 29 36 60
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 12 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 870 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 1
0: 00:0d:97:04:04:10 ssid='Test' wpa_ie_len=28 rsn_ie_len=0
   selected
Trying to associate with 00:0d:97:04:04:10 (SSID='Test' freq=2462 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=33
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:97:04:04:10
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:97:04:04:10
No keys have been configured - skip key clearing
Associated with 00:0d:97:04:04:10
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50 d3 cd 80
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): be 6a 04 68 c0 12 f1 c8 3b 43 59 40 62 d3 cc 3d 3b 56 39 73 b6 fc aa c2 a5 f0 44 a9b
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): f6 48 a4 69 d9 3f 94 e0 2f 75 64 d9 f1 bf 26 3d
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50 d3 cd 80
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 02 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): be 86 c1 1e 06 d4 1f d7 b2 8c 28 f8 c5 40 53 24
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=25 idleWhile=55
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=24 idleWhile=54
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=23 idleWhile=53
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=22 idleWhile=52
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=21 idleWhile=51
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50 d3 cd 80
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 03 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): f0 d2 39 81 38 db 08 bb 9b 57 92 82 1f a5 ed 14
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 04 13 e6 b2 92 7e 3f 4c ff 16 57 e9 50 d3 cd 2
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=123
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 04 13 e6 b2 92 7e 3f 4c ff 16 57 e9 2
WPA: RX message 3 of 4-Way Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 5f fe 01 0a 00 10 00 00 00 000
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=139): 01 03 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 05 53 2c 64 c6 0b 4b e7 cb e6 ff 0a 60 13 f9 1
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=139): 01 03 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 05 53 2c 64 c6 0b 4b e7 cb e6 ff 0a 1
WPA: RX message 1 of Group Key Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 5f fe 03 12 00 20 00 00 00 000
WPA: Key negotiation completed with 00:0d:97:04:04:10 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=20 idleWhile=50
...
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=0 idleWhile=0
************************* HANDOFF 2 *************************************
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
Added BSSID 00:0d:97:04:04:10 into blacklist
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:97:04:04:10
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:97:04:04:10
No keys have been configured - skip key clearing
Associated with 00:0d:97:04:04:10
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:0d:97:04:04:10
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 02 8a 00 10 00 00 00 00 00 00 00 06 6d 2f 3d 95 85 7c 69 fa be fd e9 56 d6 53 40
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 02 8a 00 10 00 00 00 00 00 00 00 06 6d 2f 3d 95 85 7c 69 fa be fd e9 50
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:10 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): fc af c6 ff 8f bf 6d 4b 6c 24 d7 d7 83 64 12 d9 d6 ff c6 18 3f 6b d7 83 94 e8 ef 908
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): b4 83 d1 10 2d 6d 0e 0c b7 74 42 9e 20 33 49 3c
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 10 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Setting scan request: 0 sec 100000 usec
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
Disconnect event - remove keys
wpa_driver_madwifi_del_key: keyidx=0
wpa_driver_madwifi_del_key: keyidx=1
wpa_driver_madwifi_del_key: keyidx=2
wpa_driver_madwifi_del_key: keyidx=3
wpa_driver_madwifi_del_key: keyidx=0
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b1a len=12
Wireless event: cmd=0x8b19 len=12
Received 870 bytes of scan results (3 BSSes)
Scan results: 3
Selecting BSS from priority group 1
0: 00:0d:97:04:04:07 ssid='Test' wpa_ie_len=28 rsn_ie_len=0
   selected
Trying to associate with 00:0d:97:04:04:07 (SSID='Test' freq=2462 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_madwifi_set_drop_unencrypted: enabled=1
wpa_driver_madwifi_associate
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b1a len=33
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:0d:97:04:04:07
Association event - clear replay counter
Associated to a new BSS: BSSID=00:0d:97:04:04:07
No keys have been configured - skip key clearing
Associated with 00:0d:97:04:04:07
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=29 idleWhile=59
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added
RX EAPOL from 00:0d:97:04:04:07
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 6e 86 05 a5 f5 ad 0c 8d 1e c9 84 21 c9 10
Setting authentication timeout: 10 sec 0 usec
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 49 6e 86 05 a5 f5 ad 0c 8d 1e c9 80
WPA: RX message 1 of 4-Way Handshake from 00:0d:97:04:04:07 (ver=2)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 02
WPA: Renewed SNonce - hexdump(len=32): 34 d1 fd 73 bc 97 36 30 5a 1d 2b 03 6c 87 74 f0 63 9d 35 c2 dc 5e e8 60 6e 5c 2d 30a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): fa 42 5d de 71 68 dc 60 83 38 ff e3 94 03 b8 c0
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 0d 97 04 04 07 00 02 6f 21 1d 6b 88 8e 01 03 00 77 fe 01 0a 00 10 00 00 00 002
RX EAPOL from 00:0d:97:04:04:07
RX EAPOL - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02 49 6e 86 05 a5 f5 ad 0c 8d 1e c9 84 21 c9 2
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=123
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=127): 01 03 00 7b fe 01 ca 00 10 00 00 00 00 00 00 00 02 49 6e 86 05 a5 f5 ad 0c 8d 1e c9 2
WPA: RX message 3 of 4-Way Handshake from 00:0d:97:04:04:07 (ver=2)
WPA: IE KeyData - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 0d 97 04 04 07 00 02 6f 21 1d 6b 88 8e 01 03 00 5f fe 01 0a 00 10 00 00 00 000
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6 key_len=16
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=28 idleWhile=58
RX EAPOL from 00:0d:97:04:04:07
RX EAPOL - hexdump(len=139): 01 03 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03 61 a6 a7 d1 b8 e1 35 c6 fb 6e f4 63 e3 f1 3
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=135
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=139): 01 03 00 87 fe 03 92 00 20 00 00 00 00 00 00 00 03 61 a6 a7 d1 b8 e1 35 c6 fb 6e f4 3
WPA: RX message 1 of Group Key Handshake from 00:0d:97:04:04:07 (ver=2)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_madwifi_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key 2/2 - hexdump(len=113): 00 0d 97 04 04 07 00 02 6f 21 1d 6b 88 8e 01 03 00 5f fe 03 12 00 20 00 00 00 000
WPA: Key negotiation completed with 00:0d:97:04:04:07 [PTK=CCMP GTK=TKIP]
Cancelling authentication timeout
EAPOL: External notification - portValid=1
EAPOL: External notification - EAP success=1
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: SUPP_BE entering state IDLE
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=27 idleWhile=57
EAPOL: Port Timers tick - authWhile=0 heldWhile=0 startWhen=26 idleWhile=56
...



Cheers,

Stephan




More information about the HostAP mailing list