wpa_supplicant compilation with -Os option causes WPA2-PSK-TKIP+CCMP break down

Dan Williams dcbw at redhat.com
Mon Jun 22 10:21:46 EDT 2009


On Fri, 2009-06-19 at 10:58 +0530, Raghavendra wrote:
> Hi All,
>  
>    I faced following issue:
>    WPA2-PSK-TKIP+CCMP is working with DLink (DWL-2100AP),
> Linksys(WAP4400N). But was not working with Cisco (Linksys) - WRT610N.
>    Reason is that I compiled wpa_supplicant with -Os option. Later
> when I compiled with -O2 or with out optimization flag it is working
> with Cisco router also. Please see below log.

Please provide the output of "gcc -v" so we can figure out what exact
compiler you're using.  Optimization bugs are often problems with the
compiler's code generation, but sometimes are legitimate problems with
the original code too.

By the way, you might consider helping get the upstream TI driver in
shape instead of using the TI vendor driver, which is unlikely to ever
go upstream because it has its own SDIO stack and 802.11 stack; that way
you benefit from all the work the community is doing on the stack and
driver too.

Dan

> # ./wpa_supplicant -i tiwlan0 -c ./wpa_supplicant.conf.tmp.linksys
> -Dwext -ddd
> Initializing interface 'tiwlan0' conf
> './wpa_supplicant.conf.tmp.linksys' driver 'wext' ctrl_interface 'N/A'
> bridge 'N/A'
> Configuration file './wpa_supplicant.conf.tmp.linksys' ->
> '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'
> Reading configuration file
> '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'
> ctrl_interface='/var/run/wpa_supplicant'
> ap_scan=2
> Line: 5 - start of a new network block
> ssid - hexdump_ascii(len=7):
>      6c 69 6e 6b 73 79 73
> linksys         
> proto: 0x3
> key_mgmt: 0x2
> pairwise: 0x18
> group: 0x18
> PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
>    id=0 ssid='linksys'
> Initializing interface (2) 'tiwlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
>   capabilities: key_mgmt 0xf enc 0xf
> WEXT: Operstate: linkmode=1, operstate=5
> Own MAC address: 00:00:f0:00:01:a1
> wpa_driver_wext_set_wpa
> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
> wpa_driver_wext_set_countermeasures
> wpa_driver_wext_set_drop_unencrypted
> Setting scan request: 0 sec 100000 usec
> Added interface tiwlan0
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> State: DISCONNECTED -> SCANNING
> Trying to associate with SSID 'linksys'
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> WPA: No WPA/RSN IE available from association info
> WPA: Set cipher suites based on configuration
> WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK CCMP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> No keys have been configured - skip key clearing
> wpa_driver_wext_set_drop_unencrypted
> State: SCANNING -> ASSOCIATING
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=0, operstate=291013
> wpa_driver_wext_associate
> ioctl[SIOCSIWGENIE]: Operation not supported
> Association request to the driver failed
> Setting authentication timeout: 5 sec 0 usec
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b06 len=8
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8b1a len=15
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8c02 len=164
> WEXT: Custom wireless event: ''
> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
> Wireless event: cmd=0x8c02 len=164
> WEXT: Custom wireless event: ''
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c07 len=95
> AssocReq IE wireless event - hexdump(len=87): 00 07 6c 69 6e 6b 73 79
> 73 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01
> 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11
> 18 ff 00 00 00 00 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00
> 00 dd 07 00 50 f2 02 00 01 21
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8c08 len=173
> AssocResp IE wireless event - hexdump(len=165): 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
> Wireless event: cmd=0x8b15 len=20
> Wireless event: new AP: 00:23:69:24:e9:48
> Association info event
> req_ies - hexdump(len=87): 00 07 6c 69 6e 6b 73 79 73 01 04 82 84 8b
> 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01 00 00 0f ac 02 01
> 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11 18 ff 00 00 00 00
> 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00 00 dd 07 00 50 f2
> 02 00 01 21
> resp_ies - hexdump(len=165): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01
> 00 00 0f ac 04 01 00 00 0f ac 02 3c 00
> State: ASSOCIATING -> ASSOCIATED
> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
> WEXT: Operstate: linkmode=0, operstate=291013
> Associated to a new BSS: BSSID=00:23:69:24:e9:48
> No keys have been configured - skip key clearing
> Network configuration found for the current AP
> WPA: Using WPA IE from AssocReq to set cipher suites
> WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: using GTK TKIP
> WPA: using PTK CCMP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02
> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - EAP fail=0
> EAPOL: External notification - portControl=Auto
> Associated with 00:23:69:24:e9:48
> WPA: Association event - clear replay counter
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> EAPOL: External notification - EAP success=0
> EAPOL: External notification - portEnabled=1
> EAPOL: SUPP_PAE entering state CONNECTING
> EAPOL: SUPP_BE entering state IDLE
> Setting authentication timeout: 10 sec 0 usec
> Cancelling scan request
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0' added
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> Wireless event: cmd=0x8c02 len=164
> WEXT: Custom wireless event: '  '
> RX EAPOL from 00:23:69:24:e9:48
> RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00
> 00 00 00 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16
> ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at
> least 99)
>  
> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
> Wireless event: cmd=0x8c02 len=164
> WEXT: Custom wireless event: '  '
> RX EAPOL from 00:23:69:24:e9:48
> RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00
> 00 00 01 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16
> ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at
> least 99)
>  
> This message continues forever.
>  
> Just thought this will be helpfull for others so sharing. Let me know
> if there are any other reasons for this failure.
>  
> -Raghu
> _______________________________________________
> HostAP mailing list
> HostAP at lists.shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap



More information about the HostAP mailing list