wpa_supplicant compilation with -Os option causes WPA2-PSK-TKIP+CCMP break down

Raghavendra s.raghu at samsung.com
Fri Jun 19 01:28:58 EDT 2009


Hi All,

   I faced following issue:
   WPA2-PSK-TKIP+CCMP is working with DLink (DWL-2100AP), Linksys(WAP4400N). But was not working with Cisco (Linksys) - WRT610N.
   Reason is that I compiled wpa_supplicant with -Os option. Later when I compiled with -O2 or with out optimization flag it is working with Cisco router also. Please see below log.

# ./wpa_supplicant -i tiwlan0 -c ./wpa_supplicant.conf.tmp.linksys -Dwext -ddd
Initializing interface 'tiwlan0' conf './wpa_supplicant.conf.tmp.linksys' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
Configuration file './wpa_supplicant.conf.tmp.linksys' -> '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'
Reading configuration file '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'
ctrl_interface='/var/run/wpa_supplicant'
ap_scan=2
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=7):
     6c 69 6e 6b 73 79 73                              linksys         
proto: 0x3
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='linksys'
Initializing interface (2) 'tiwlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:00:f0:00:01:a1
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Added interface tiwlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'linksys'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=0, operstate=291013
wpa_driver_wext_associate
ioctl[SIOCSIWGENIE]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=15
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len=164
WEXT: Custom wireless event: ''
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len=164
WEXT: Custom wireless event: ''
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 len=95
AssocReq IE wireless event - hexdump(len=87): 00 07 6c 69 6e 6b 73 79 73 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11 18 ff 00 00 00 00 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00 00 dd 07 00 50 f2 02 00 01 21
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len=173
AssocResp IE wireless event - hexdump(len=165): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:23:69:24:e9:48
Association info event
req_ies - hexdump(len=87): 00 07 6c 69 6e 6b 73 79 73 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11 18 ff 00 00 00 00 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00 00 dd 07 00 50 f2 02 00 01 21
resp_ies - hexdump(len=165): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 3c 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=0, operstate=291013
Associated to a new BSS: BSSID=00:23:69:24:e9:48
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:23:69:24:e9:48
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c02 len=164
WEXT: Custom wireless event: '  '
RX EAPOL from 00:23:69:24:e9:48
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 00 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16 ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at least 99)

RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c02 len=164
WEXT: Custom wireless event: '  '
RX EAPOL from 00:23:69:24:e9:48
RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16 ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at least 99)

This message continues forever.

Just thought this will be helpfull for others so sharing. Let me know if there are any other reasons for this failure.

-Raghu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20090619/926d2d61/attachment.htm 


More information about the HostAP mailing list