Could use some help with sw-crypt and ath10k.

Ben Greear greearb at candelatech.com
Wed Dec 11 14:34:19 EST 2013


Hello!

I'm trying to get sw-crypt (ie, just refuse to set the key and return -ENOSPC) to work with ath10k client.  The server is ath9k and has been working
fine.  It appears that the station connects, but then the AP kicks it out.  Almost certainly
the problem is that the ath10k client is doing something wrong, but I could use some help in
figuring out where the problem lies.

The AP's log looks like this below.  I can get packet captures on a monitor port,
more verbose logs or other debugging if someone would like to see it.

Thanks,
Ben


2013-12-11 11:19:46.493  1386789586.322929: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:46.493  1386789586.322951: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:46.494  1386789586.322967: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:46.494  1386789587.322842: 1386789587.322849: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:46.494  1386789587.322954: 1386789587.322957: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:46.494  1386789587.322967: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:46.494  1386789587.323083: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 2)
2013-12-11 11:19:46.494  1386789587.323344: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:46.494  1386789587.323364: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:46.494  1386789587.323378: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:47.904  1386789589.323252: 1386789589.323260: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:47.904  1386789589.323385: 1386789589.323390: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:47.904  1386789589.323408: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:47.904  1386789589.323484: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 3)
2013-12-11 11:19:47.904  1386789589.323674: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:47.904  1386789589.323692: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:47.904  1386789589.323703: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:49.905  1386789591.323653: 1386789591.323661: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:49.905  1386789591.323794: 1386789591.323799: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:49.905  1386789591.323822: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:49.905  1386789591.323908: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 4)
2013-12-11 11:19:49.905  1386789591.324153: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:49.905  1386789591.324166: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:49.905  1386789591.324172: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:51.908  1386789593.324076: 1386789593.324083: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:51.908  1386789593.324132: 1386789593.324135: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state DISCONNECT
2013-12-11 11:19:51.908  1386789593.324152: wpa_sta_disconnect STA 00:03:7f:48:cc:b0
2013-12-11 11:19:51.908  1386789593.324167: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:03:7f:48:cc:b0 reason 2
2013-12-11 11:19:51.908  1386789593.324185: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xc0 nlmode=3
2013-12-11 11:19:51.908  1386789593.324199: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:51.908  1386789593.324207: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:51.908  1386789593.324271: 1386789593.324294: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0
key_len=0
2013-12-11 11:19:51.908  1386789593.324308:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908  1386789593.324323: WPA: wpa_sm_step() called recursively
2013-12-11 11:19:51.908  1386789593.324328: ap_sta_disconnect: reschedule ap_handle_timer timeout for 00:03:7f:48:cc:b0 (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
2013-12-11 11:19:51.908  1386789593.324335: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state DISCONNECTED
2013-12-11 11:19:51.908  1386789593.324340: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state INITIALIZE
2013-12-11 11:19:51.908  1386789593.324351: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:51.908  1386789593.324358:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908  1386789593.324458: 1386789593.324470: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:51.908  1386789593.324485: nl80211: Frame TX status event
2013-12-11 11:19:51.908  1386789593.324494: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:51.908  1386789593.324501: mgmt::deauth cb
2013-12-11 11:19:51.908  1386789593.324507: STA 00:03:7f:48:cc:b0 acknowledged deauth
2013-12-11 11:19:51.908  1386789593.324514: Removing STA 00:03:7f:48:cc:b0 from kernel driver
2013-12-11 11:19:51.908  1386789593.324637: nl80211: sta_remove -> DEL_STATION vap0 00:03:7f:48:cc:b0 --> 0 (Success)
2013-12-11 11:19:51.908  1386789593.324657: 1386789593.324662: 1386789593.324672: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:51.908  1386789593.324685:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908  1386789593.324714: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for vap0
2013-12-11 11:19:51.908  1386789593.324726: nl80211: Delete station 00:03:7f:48:cc:b0
2013-12-11 11:19:52.069  1386789593.471245: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:52.069  1386789593.471262: nl80211: RX frame freq=5180 ssi_signal=-34 stype=4 len=220
2013-12-11 11:19:52.069  1386789593.471275: nl80211: send_mlme - noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 nlmode=3
2013-12-11 11:19:52.069  1386789593.471280: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:52.069  1386789593.471284: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.320  1386789595.733677: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:54.320  1386789595.733731: nl80211: RX frame freq=5180 ssi_signal=-34 stype=11 len=30
2013-12-11 11:19:54.320  1386789595.733742: vap0: Event RX_MGMT (20) received
2013-12-11 11:19:54.320  1386789595.733747: mgmt::auth
2013-12-11 11:19:54.320  1386789595.733752: authentication: STA=00:03:7f:48:cc:b0 auth_alg=0 auth_transaction=1 status_code=0 wep=0
2013-12-11 11:19:54.320  1386789595.733763: 1386789595.733769: 1386789595.733788: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.320  1386789595.733800:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.320  1386789595.733829: 1386789595.733832: 1386789595.733839: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.320  1386789595.733849:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.320  1386789595.733864: authentication reply: STA=00:03:7f:48:cc:b0 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
2013-12-11 11:19:54.321  1386789595.733874: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xb0 nlmode=3
2013-12-11 11:19:54.321  1386789595.733879: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:54.321  1386789595.733883: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.321  1386789595.734117: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:54.321  1386789595.734135: nl80211: Frame TX status event
2013-12-11 11:19:54.321  1386789595.734163: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:54.321  1386789595.734170: mgmt::auth cb
2013-12-11 11:19:54.335  1386789595.734180: 1386789595.749746: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:54.335  1386789595.749782: nl80211: RX frame freq=5180 ssi_signal=-34 stype=0 len=122
2013-12-11 11:19:54.335  1386789595.749795: vap0: Event RX_MGMT (20) received
2013-12-11 11:19:54.335  1386789595.749802: mgmt::assoc_req
2013-12-11 11:19:54.335  1386789595.749807: association request: STA=00:03:7f:48:cc:b0 capab_info=0x11 listen_interval=5
2013-12-11 11:19:54.335  1386789595.749814: Validating WMM IE: OUI 00:50:f2  OUI type 2  OUI sub-type 0  version 1  QoS info 0x0
2013-12-11 11:19:54.335  1386789595.749824:   old AID 1
2013-12-11 11:19:54.335  1386789595.749828: HT: STA 00:03:7f:48:cc:b0 HT Capabilities Info: 0x19ef
2013-12-11 11:19:54.335  1386789595.749833: update_sta_ht STA 00:03:7f:48:cc:b0 - no greenfield, num of non-gf stations 1
2013-12-11 11:19:54.335  1386789595.749838: hostapd_ht_operation_update current operation mode=0x4
2013-12-11 11:19:54.335  1386789595.749842: hostapd_ht_operation_update new operation mode=0x4 changes=0
2013-12-11 11:19:54.335  1386789595.749848: 1386789595.749852: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x10 nlmode=3
2013-12-11 11:19:54.335  1386789595.749858: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:54.335  1386789595.749862: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.335  1386789595.750289: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:54.335  1386789595.750312: nl80211: Frame TX status event
2013-12-11 11:19:54.335  1386789595.750327: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:54.335  1386789595.750338: mgmt::assoc_resp cb
2013-12-11 11:19:54.335  1386789595.750354: 1386789595.750373: 1386789595.750376: 1386789595.750389: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0
addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.335  1386789595.750404:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.335  1386789595.750460: nl80211: sta_remove -> DEL_STATION vap0 00:03:7f:48:cc:b0 --> -2 (No such file or directory)
2013-12-11 11:19:54.335  1386789595.750473: nl80211: Add STA 00:03:7f:48:cc:b0
2013-12-11 11:19:54.335  1386789595.750486:   * supported rates - hexdump(len=8): 0c 12 18 24 30 48 60 6c
2013-12-11 11:19:54.335  1386789595.750492:   * aid=1
2013-12-11 11:19:54.335  1386789595.750496:   * listen_interval=5
2013-12-11 11:19:54.335  1386789595.750500:   * ht_capabilities - hexdump(len=26): 6e 00 1b ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
2013-12-11 11:19:54.335  1386789595.750507:   * capability=0x11
2013-12-11 11:19:54.335  1386789595.750511:   * flags set=0x8 mask=0x8
2013-12-11 11:19:54.335  1386789595.750515:   * qosinfo=0x0
2013-12-11 11:19:54.335  1386789595.750640: 1386789595.750650: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0
key_len=0
2013-12-11 11:19:54.335  1386789595.750667:    addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.335  1386789595.750690: IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
2013-12-11 11:19:54.335  1386789595.750702: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state AUTHENTICATION2
2013-12-11 11:19:54.335  1386789595.751315: WPA: Assign ANonce - hexdump(len=32): 45 f9 7c 60 08 6c b5 06 4b 1a 1f 6e d0 d7 24 c1 15 82 a8 f6 52 fc e4 7b 2c 22
b4 2e da 3a 2f 77
2013-12-11 11:19:54.335  1386789595.751332: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state INITPSK
2013-12-11 11:19:54.335  1386789595.751341: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.335  1386789595.751351: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.335  1386789595.751362: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKSTART
2013-12-11 11:19:54.335  1386789595.751373: 1386789595.751376: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
2013-12-11 11:19:54.335  1386789595.751410: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
2013-12-11 11:19:54.335  1386789595.751423: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 00:03:7f:48:cc:b0 (300 seconds - ap_max_inactivity)
2013-12-11 11:19:54.335  1386789595.751445: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for vap0
2013-12-11 11:19:54.335  1386789595.751457: nl80211: New station 00:03:7f:48:cc:b0
2013-12-11 11:19:54.335  1386789595.751580: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:54.335  1386789595.751595: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=95 - ack=1
2013-12-11 11:19:54.335  1386789595.751605: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:54.335  1386789595.751614: WPA: Increase initial EAPOL-Key 1/4 timeout by 2000 ms because of acknowledged frame
2013-12-11 11:19:54.372  1386789595.772632: vap0: Event EAPOL_RX (27) received
2013-12-11 11:19:54.372  1386789595.772666: IEEE 802.1X: 121 bytes from 00:03:7f:48:cc:b0
2013-12-11 11:19:54.372  1386789595.772690:    IEEE 802.1X: version=1 type=3 length=117
2013-12-11 11:19:54.372  1386789595.772711: WPA: Received EAPOL-Key from 00:03:7f:48:cc:b0 key_info=0x10a type=2 key_data_length=22
2013-12-11 11:19:54.372  1386789595.772764: WPA: Received Key Nonce - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8
b3 2d d1 9a e9 26 1b cf
2013-12-11 11:19:54.372  1386789595.772790: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
2013-12-11 11:19:54.372  1386789595.772807: 1386789595.772811: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING
2013-12-11 11:19:54.372  1386789595.772819: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.372  1386789595.772853: WPA: PTK derivation - A1=00:03:83:3d:30:aa A2=00:03:7f:48:cc:b0
2013-12-11 11:19:54.372  1386789595.772864: WPA: Nonce1 - hexdump(len=32): 45 f9 7c 60 08 6c b5 06 4b 1a 1f 6e d0 d7 24 c1 15 82 a8 f6 52 fc e4 7b 2c 22 b4 2e
da 3a 2f 77
2013-12-11 11:19:54.382  1386789595.772879: WPA: Nonce2 - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8 b3 2d d1 9a
e9 26 1b cf
2013-12-11 11:19:54.382  1386789595.772893: WPA: PMK - hexdump(len=32): [REMOVED]
2013-12-11 11:19:54.382  1386789595.772899: WPA: PTK - hexdump(len=48): [REMOVED]
2013-12-11 11:19:54.382  1386789595.772913: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING2
2013-12-11 11:19:54.382  1386789595.772924: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:54.382  1386789595.772978: 1386789595.772981: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:54.382  1386789595.772995: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:54.382  1386789595.773063: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
2013-12-11 11:19:54.382  1386789595.773222: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:54.382  1386789595.773232: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:54.382  1386789595.773240: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
-- 
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc  http://www.candelatech.com



More information about the HostAP mailing list