wpa_supplicant can't reauthenticate without resetting the driver (driver bug?)

David Ehrmann ehrmann at gmail.com
Wed Oct 1 17:28:57 EDT 2008


I forgot to mention, this is with wpa_supplicant 0.6.3.

On Wed, Oct 1, 2008 at 11:11 AM, David Ehrmann <ehrmann at gmail.com> wrote:
> I think this is a driver bug (ndiswrapper), but I'm checking here, first.
>
> I see this block in the log, repeated basically every second.  I don't
> see any actual errors, it just looks like the authentication never
> completes, but the driver tells wpa_supplicant that it should
> authenticate before any timeout occurs.
>
> Thanks in advance.
>
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c07 len=92
> AssocReq IE wireless event - hexdump(len=84): 00 10 47 6f 6f 67 6c 65
> 57 69 46 69 53 65 63 75 72 65 01 04 02 04 0b 16 30 26 01 00 00 0f ac
> 02 01 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 5b 77 fd dc 8e a9
> 6d 22 fb 78 49 36 3e a2 1f 8c dd 09 00 03 7f 01 01 00 00 00 00 dd 07
> 00 50 f2 02 00 01 00
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c08 len=48
> AssocResp IE wireless event - hexdump(len=40): 01 04 82 84 0b 16 07 06
> 55 53 20 01 0b 1b dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00
> 00 42 43 5e 00 62 32 2f 00
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:0d:xx:xx:xx:xx
> Association info event
> req_ies - hexdump(len=84): 00 10 47 6f 6f 67 6c 65 57 69 46 69 53 65
> 63 75 72 65 01 04 02 04 0b 16 30 26 01 00 00 0f ac 02 01 00 00 0f ac
> 04 01 00 00 0f ac 01 00 00 01 00 5b 77 fd dc 8e a9 6d 22 fb 78 49 36
> 3e a2 1f 8c dd 09 00 03 7f 01 01 00 00 00 00 dd 07 00 50 f2 02 00 01
> 00
> resp_ies - hexdump(len=40): 01 04 82 84 0b 16 07 06 55 53 20 01 0b 1b
> dd 18 00 50 f2 02 01 01 81 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62
> 32 2f 00
> WPA: set own WPA/RSN IE - hexdump(len=40): 30 26 01 00 00 0f ac 02 01
> 00 00 0f ac 04 01 00 00 0f ac 01 00 00 01 00 5b 77 fd dc 8e a9 6d 22
> fb 78 49 36 3e a2 1f 8c
> RSN: PMKID - hexdump(len=16): 5b 77 fd dc 8e a9 6d 22 fb 78 49 36 3e a2 1f 8c
> RSN: Trying to use cached PMKSA
> RSN: PMKID from assoc IE found from PMKSA cache
> State: ASSOCIATED -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=-1, operstate=5
> Associated with 00:0d:xx:xx:xx:xx
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portValid=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RX EAPOL from 00:0d:xx:xx:xx:xx
> Setting authentication timeout: 70 sec 0 usec
> RSN: Authenticator did not accept PMKID, doing full EAP authentication
> RSN: Cancelling PMKSA caching attempt
> EAPOL: Received EAP-Packet frame
> EAPOL: SUPP_PAE entering state RESTART
> EAP: EAP entering state INITIALIZE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_PAE entering state AUTHENTICATING
> EAPOL: SUPP_BE entering state REQUEST
> EAPOL: getSuppRsp
> EAP: EAP entering state RECEIVED
> EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
> EAP: EAP entering state IDENTITY
> CTRL-EVENT-EAP-STARTED EAP authentication started
> EAP: EAP-Request Identity data - hexdump_ascii(len=0):
> EAP: using real identity - hexdump_ascii(len=17):
> EAP: EAP entering state SEND_RESPONSE
> EAP: EAP entering state IDLE
> EAPOL: SUPP_BE entering state RESPONSE
> EAPOL: txSuppRsp
> TX EAPOL: dst=00:0d:xx:xx:xx:xx
> EAPOL: SUPP_BE entering state RECEIVE
>


More information about the HostAP mailing list