Timeout after move to GROUP_HANDSHAKE state

Aric D. Blumer aric at sdgsystems.com
Fri Aug 7 08:22:45 EDT 2009


Can anyone tell me what wpa_supplicant is waiting for when a WPA 
association times out after a move to the GROUP_HANDSHAKE state?  The 
output of wpa_supplicant 0.6.9 is shown below.  I am trying to get a 
wifi driver working, and I suspect it's not doing something it should 
be.  Knowing what would help me solve it.  Thanks.

. . .
RX EAPOL from 00:15:e9:64:8e:36
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 00 00 00 
00 00 03 96 a1 82 7f c9 fc 09 2e fe 17 5d 36 5f 70 8f b2 0d b8 fa 94 23 
e1 72 8e e8 2d 1b 6b 19
9f 07 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 5f d1 db 52 bc bf be a6 08 6d 24 5d c6 
b3 bc 70 00 18 dd 16 00
  50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
   EAPOL-Key type=254
   key_info 0x1c9 (ver=1 keyidx=0 rsvd=0 Pairwise Install Ack MIC)
   key_length=32 key_data_length=24
   replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
   key_nonce - hexdump(len=32): 96 a1 82 7f c9 fc 09 2e fe 17 5d 36 5f 
70 8f b2 0d b8 fa 94 23 e1 72 8e e8 2d 1b 6b 19 9f 07 4f
   key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
   key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
   key_mic - hexdump(len=16): 5f d1 db 52 bc bf be a6 08 6d 24 5d c6 b3 
bc 70
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 c9 00 20 00 00 
00 00 00 00 00 03 96 a1 82 7f c9 fc 09 2e fe 17 5d 36 5f 70 8f b2 0d b8 
fa 94 23 e1 72 8e e8 2d
1b 6b 19 9f 07 4f 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 5f d1 db 52 bc bf be a6 08 6d 
24 5d c6 b3 bc 70 00 18
  dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:15:e9:64:8e:36 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 01 09 00 20 00 00 00 
00 00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 0a 68 e3 64 93 4b c6 9f c6 
b2 b5 39 1b 6e 7b 00 00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
WpaDriverBgwSetKey: alg=2 key_idx=0 set_tx=1 seq_len=6 key_len=32
WpaDriverBgwSetKey: ioctl call
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
(about 8 seconds elapse here)
Authentication with 00:15:e9:64:8e:36 timed out.
. . .


More information about the HostAP mailing list