wpa supplicant with hostap

Paul Sleggs sleggs at hotmail.co.uk
Tue Mar 20 10:28:21 EDT 2007


I have spent some time experimenting with WPA supplicant and have finally 
figured

out how to configure it to access the network at my university. 
Unfortunatley my

excitement of seeing the google search page was short lived as i realised 
that

the connection to the network was incredably slow.  The connection started 
at

around 4K then steadily dropped to 30B/s which is quite unusable .  I have 
had no problems using wireless tools to access WEP.  After many

hours of google searching I have not been able to find anyone with a similar

problem.  What follows is a list of my settings, hardware and the output 
from WPA

supplicant.  I would greatly appreciate any suggestions or ideas as to why 
the

connection is performing so poorly.

Paul

Hardware

802.11b netgear MA401 (prism2) PCMCIA card
HP jornada 680(32MB) running jlime (Jlime.com)

WPA Supplicant

Config file

#napair

ctrl_interface=/var/run/wpa_supplicant

ap_scan=1
network={

#id_str="napair"
mode=0
auth_alg=OPEN
ssid="NapAir"
scan_ssid=0
key_mgmt=WPA-EAP
proto=WPA
group=TKIP
pairwise=TKIP
eap=LEAP
phase2="auth=MSCHAPV2"
identity="05004279"
password="mypassword"
}


WPA supplicant output

The client connects and i am assigned an IP when i use dhcpcd and i can ping

external sites albeit very slowly.

Wpa supplicant is invoked with:

Wpa_supplicant -i wlan0 -D hostap -c /etc/wpa_supplicant.conf -dd



Initializing interface 'wlan0' conf '/etc/wpa_supplicant.conf' driver 
'hostap'

ctrl_interface 'N/A'
Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=1
Line: 5 - start of a new network block
mode=0 (0x0)
auth_alg: 0x1
ssid - hexdump_ascii(len=6):
     4e 61 70 41 69 72                                 NapAir
scan_ssid=0 (0x0)
key_mgmt: 0x1
proto: 0x1
group: 0x8
pairwise: 0x8
eap methods - hexdump(len=2): 11 00
phase2 - hexdump_ascii(len=13):
     61 75 74 68 3d 4d 53 43 48 41 50 56 32            auth=MSCHAPV2
identity - hexdump_ascii(len=8):
     30 35 30 30 34 32 37 39                           05004279
password - hexdump_ascii(len=7): [REMOVED]
Priority group 0
   id=0 ssid='NapAir'
Initializing interface (2) 'wlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
Added alternative ifindex 19 (wifi0) for wireless events
Added alternative ifindex 19 (wifi0) for wireless events
Own MAC address: 00:30:ab:17:07:6a
wpa_driver_hostap_set_wpa: enabled=1
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_countermeasures: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Added interface wlan0
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Wireless event: cmd=0x8b19 len=8
Received 907 bytes of scan results (5 BSSes)
Scan results: 5
Selecting BSS from priority group 0
0: 00:13:5f:55:ae:b0 ssid='NapAir' wpa_ie_len=26 rsn_ie_len=0 caps=0x11
   selected based on WPA IE
Trying to associate with 00:13:5f:55:ae:b0 (SSID='NapAir' freq=2462 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 1
WPA: set AP WPA IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 
00

00 50 f2 02 01 00 00 50 f2 01 28 00
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
f2

02 01 00 00 50 f2 02 01 00 00 50 f2 01
No keys have been configured - skip key clearing
wpa_driver_hostap_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_hostap_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - portControl=Auto
Wireless event: cmd=0x8b06 len=8
Wireless event: cmd=0x8b04 len=12
Wireless event: cmd=0x8b1a len=15
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:13:5f:55:ae:b0
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:13:5f:55:ae:b0
No keys have been configured - skip key clearing
Associated with 00:13:5f:55:ae:b0
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=56): 01 00 00 34 01 01 00 34 01 00 6e 65 74 77 6f 72 
6b 69

64 3d 4e 61 70 41 69 72 2c 6e 61 73 69 64 3d 6d 65 72 2d 61 70 31 31 33 30 
2d 63

38 30 2c 70 6f 72 74 69 64 3d 30
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=1 id=1
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=47):
     00 6e 65 74 77 6f 72 6b 69 64 3d 4e 61 70 41 69   _networkid=NapAi
     72 2c 6e 61 73 69 64 3d 6d 65 72 2d 61 70 31 31   r,nasid=mer-ap11
     33 30 2d 63 38 30 2c 70 6f 72 74 69 64 3d 30      30-c80,portid=0
EAP: using real identity - hexdump_ascii(len=8):
     30 35 30 30 34 32 37 39                           05004279
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=17): 01 00 00 0d 02 01 00 0d 01 30 35 30 30 34 32 37 
39
EAPOL: SUPP_BE entering state RECEIVE
RTM_NEWLINK, IFLA_IFNAME: Interface 'wifi0' added
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=46): 01 00 00 18 01 18 00 18 11 01 00 08 57 a0 0f 8a 
d1 62

ce 77 30 35 30 30 34 32 37 39 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request method=17 id=24
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method (17, LEAP)
CTRL-EVENT-EAP-METHOD EAP method 17 (LEAP) selected
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Request
EAP-LEAP: Challenge from AP - hexdump(len=8): 57 a0 0f 8a d1 62 ce 77
EAP-LEAP: Generating Challenge Response
EAP-LEAP: Response - hexdump(len=24): b8 a1 52 06 e4 74 ce fc bc fd 3a b9 9d 
75

76 8d 65 bb b4 80 9b 45 24 a6
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=44): 01 00 00 28 02 18 00 28 11 01 00 18 b8 a1 52 06 
e4 74

ce fc bc fd 3a b9 9d 75 76 8d 65 bb b4 80 9b 45 24 a6 30 35 30 30 34 32 37 
39
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=46): 01 00 00 04 03 18 00 04 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Success
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Success
EAP-LEAP: Challenge to AP/AS - hexdump(len=8): 4f bf 1c e2 c4 6b d6 63
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL - hexdump(len=28): 01 00 00 18 01 18 00 18 11 01 00 08 4f bf 1c e2 
c4 6b

d6 63 30 35 30 30 34 32 37 39
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=46): 01 00 00 28 02 18 00 28 11 01 00 18 4c 21 d7 d8 
b8 e9

7f c8 f1 2b 7c eb f1 5b 56 c2 a6 ab d7 c3 11 4e af 5f 30 35 30 30 34 32 37 
39 00

00
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Response for LEAP method=17 id=24
EAP: EAP entering state METHOD
EAP-LEAP: Processing EAP-Response
EAP-LEAP: Response from AP - hexdump(len=24): 4c 21 d7 d8 b8 e9 7f c8 f1 2b 
7c eb

f1 5b 56 c2 a6 ab d7 c3 11 4e af 5f
EAP: method process -> ignore=FALSE methodState=DONE decision=UNCOND_SUCC
EAP-LEAP: pw_hash_hash - hexdump(len=16): [REMOVED]
EAP-LEAP: peer_challenge - hexdump(len=8): 57 a0 0f 8a d1 62 ce 77
EAP-LEAP: peer_response - hexdump(len=24): b8 a1 52 06 e4 74 ce fc bc fd 3a 
b9 9d

75 76 8d 65 bb b4 80 9b 45 24 a6
EAP-LEAP: ap_challenge - hexdump(len=8): 4f bf 1c e2 c4 6b d6 63
EAP-LEAP: ap_response - hexdump(len=24): 4c 21 d7 d8 b8 e9 7f c8 f1 2b 7c eb 
f1

5b 56 c2 a6 ab d7 c3 11 4e af 5f
EAP-LEAP: master key - hexdump(len=16): [REMOVED]
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAP: EAP entering state SUCCESS
CTRL-EVENT-EAP-SUCCESS EAP authentication completed successfully
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state SUCCESS
EAPOL: SUPP_BE entering state IDLE
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 
01 82

55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 0a ff e4 26 
43 79

83 45 2d f9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
  key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=32 key_data_length=0
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e 
a5 0d

2c 17 3c 37 b6 0a ff e4 26 43 79 83 45 2d f9
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00 89 00 20 00 00 00 00 
00 00

00 01 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 0a 
ff e4

26 43 79 83 45 2d f9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:13:5f:55:ae:b0 (ver=1)
WPA: PMK from EAPOL state machines - hexdump(len=16): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 
02 01

00 00 50 f2 02 01 00 00 50 f2 01
WPA: Renewed SNonce - hexdump(len=32): 0a 3e c4 70 87 40 96 dd 76 68 3c ff 
28 d3

92 8b e0 7f 2f 61 8c 28 da ec 93 e0 85 a4 1b d8 91 03
WPA: PMK - hexdump(len=16): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 
00

00 00 01 0a 3e c4 70 87 40 96 dd 76 68 3c ff 28 d3 92 8b e0 7f 2f 61 8c 28 
da ec

93 e0 85 a4 1b d8 91 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 10 04 a7 93 f6 49 50 dd 60 90 43 39 
e3 bd

bf 82 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 
50 f2

01
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 00 00 00 
02

82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 0a ff e4 
26 43

79 83 45 2d f9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 5c 58 2a 60 c1 71 3c ed 89 80 c9 8f ad 23 2e 
c9 00

1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 01 
28 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=121
  EAPOL-Key type=254
  key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
  key_length=32 key_data_length=26
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e 
a5 0d

2c 17 3c 37 b6 0a ff e4 26 43 79 83 45 2d f9
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 5c 58 2a 60 c1 71 3c ed 89 80 c9 8f ad 23 2e c9
WPA: RX EAPOL-Key - hexdump(len=125): 01 03 00 79 fe 01 c9 00 20 00 00 00 00 
00

00 00 02 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 
0a ff

e4 26 43 79 83 45 2d f9 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 5c 58 2a 60 c1 71 3c ed 89 80 c9 8f 
ad 23

2e c9 00 1a dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 
50 f2

01 28 00
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:13:5f:55:ae:b0 (ver=1)
WPA: IE KeyData - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 
00

50 f2 02 01 00 00 50 f2 01 28 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 00 
00 00

00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 28 33 64 0d cb b4 4c 93 ed 58 86 d7 b8 
5d 56

2e 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=0 set_tx=1 seq_len=6 key_len=32
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RX EAPOL from 00:13:5f:55:ae:b0
RX EAPOL - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 00 00 00 
03

82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 0a ff e4 
26 43

79 83 44 fb 61 5e c2 d7 62 40 52 73 2a 82 53 f9 ea 96 72 7d 92 36 07 4b 00 
00 00

00 00 00 00 00 00 00 00 00 00 48 d6 0d 1c 6a 22 a2 88 3c 97 03 c4 29 66 b1 
7c 00

20 74 64 cd 0c 22 d8 3f 92 91 b8 a7 84 8d 04 51 74 dc 6e b5 7d 71 65 bd ab 
7b bf

23 9f b7 6c c0 30
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=1 type=3 length=127
  EAPOL-Key type=254
  key_info 0x3a1 (ver=1 keyidx=2 rsvd=0 Group Ack MIC Secure)
  key_length=32 key_data_length=32
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e 
a5 0d

2c 17 3c 37 b6 0a ff e4 26 43 79 83 44 fb 61
  key_iv - hexdump(len=16): 5e c2 d7 62 40 52 73 2a 82 53 f9 ea 96 72 7d 92
  key_rsc - hexdump(len=8): 36 07 4b 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 48 d6 0d 1c 6a 22 a2 88 3c 97 03 c4 29 66 b1 7c
WPA: RX EAPOL-Key - hexdump(len=131): 01 03 00 7f fe 03 a1 00 20 00 00 00 00 
00

00 00 03 82 55 1e 54 a3 6b 62 a1 a0 0d 71 a2 37 2d 8e a5 0d 2c 17 3c 37 b6 
0a ff

e4 26 43 79 83 44 fb 61 5e c2 d7 62 40 52 73 2a 82 53 f9 ea 96 72 7d 92 36 
07 4b

00 00 00 00 00 00 00 00 00 00 00 00 00 48 d6 0d 1c 6a 22 a2 88 3c 97 03 c4 
29 66

b1 7c 00 20 74 64 cd 0c 22 d8 3f 92 91 b8 a7 84 8d 04 51 74 dc 6e b5 7d 71 
65 bd

ab 7b bf 23 9f b7 6c c0 30
State: GROUP_HANDSHAKE -> GROUP_HANDSHAKE
WPA: RX message 1 of Group Key Handshake from 00:13:5f:55:ae:b0 (ver=1)
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=2 tx=0).
WPA: RSC - hexdump(len=6): 36 07 4b 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=2 set_tx=0 seq_len=6 key_len=32
WPA: Sending EAPOL-Key 2/2
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 03 21 00 20 00 00 00 00 
00 00

00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00

00 00 00 00 00 00 00 00 00 00 00 00 18 bd 9e 28 44 8b f3 a6 13 7d 83 ce 75 
58 82

a9 00 00
WPA: Key negotiation completed with 00:13:5f:55:ae:b0 [PTK=TKIP GTK=TKIP]
Cancelling authentication timeout
State: GROUP_HANDSHAKE -> COMPLETED
CTRL-EVENT-CONNECTED - Connection to 00:13:5f:55:ae:b0 completed (auth)
EAPOL: External notification - portValid=1
EAPOL: SUPP_PAE entering state AUTHENTICATED
EAPOL: startWhen --> 0
EAPOL: authWhile --> 0
EAPOL: idleWhile --> 0
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface wlan0
State: COMPLETED -> DISCONNECTED
wpa_driver_hostap_deauthenticate
wpa_driver_hostap_reset: type=2
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0 key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_hostap_set_wpa: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=0
wpa_driver_hostap_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
EAP: deinitialize previously used EAP method (17, LEAP) at EAP deinit
Cancelling scan request

_________________________________________________________________
MSN Hotmail is evolving - check out the new Windows Live Mail.  
http://ideas.live.co.uk/




More information about the HostAP mailing list