wpa_supplicant porting troubles - port status unauthorized

Axel Dörfler axeld at pinc-software.de
Mon Dec 6 17:34:13 EST 2010


Hi there,

I am currently trying to port wpa_supplicant 0.7.2 to Haiku, and came 
across a problem that I hope someone with a better understanding of 
EAPOL can help me. FWIW Haiku is using a port of net80211 as found in 
FreeBSD, and also FreeBSD WLAN drivers, in fact, only the l2_packet 
implementation, and the delivering of the network notifications is done 
differently.

It looks like my router does not send me the initial EAPOL message of 
the 4way handshake, so the authentication times out.
This is the relevant output:
------------------8<------------------
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 
0f ac 04 01 00 00 0f ac 02 00 00
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
State: DISCONNECTED -> ASSOCIATING
wpa_driver_bsd_associate: ssid 'kiwi' wpa ie len 22 pairwise 3 group 3 
key mgmt 1
wpa_driver_bsd_set_drop_unencrypted: enabled=1
bsd_set_opt_ie: set WPA+RSN ie (len 22)
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - EAP fail=0
EAPOL: Supplicant port status: Unauthorized
EAPOL: External notification - portControl=Auto
EAPOL: Supplicant port status: Unauthorized
EAPOL: disable timer tick
EAPOL: Supplicant port status: Unauthorized
Authentication with 00:14:d1:c7:92:24 timed out.
Added BSSID 00:14:d1:c7:92:24 into blacklist
------------------8<------------------

AFAICT the only problematic thing is the "EAPOL: Supplicant port status: 
Unauthorized" line. The rest looks pretty much the same as on Linux 
(just that wext is used there).

Unfortunately, the only possible way for me to scan the packets is via 
tcpdump on the machine I am testing this code with, so I can't be 
entirely sure the router didn't send anything. Needless to say, the 
handshake is visible in tcpdump when using wpa_supplicant under Linux 
(with the same config file, btw).

Any help or advise would be appreciated.

Bye,
   Axel.



More information about the HostAP mailing list