<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16850" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>This problem I observed in wpa_supplicant-0.6.9
also.</FONT></DIV>
<BLOCKQUOTE dir=ltr
style="PADDING-RIGHT: 0px; PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #000000 2px solid; MARGIN-RIGHT: 0px">
<DIV style="FONT: 10pt arial">----- Original Message ----- </DIV>
<DIV
style="BACKGROUND: #e4e4e4; FONT: 10pt arial; font-color: black"><B>From:</B>
<A title=s.raghu@samsung.com href="mailto:s.raghu@samsung.com">Raghavendra</A>
</DIV>
<DIV style="FONT: 10pt arial"><B>To:</B> <A title=hostap@lists.shmoo.com
href="mailto:hostap@lists.shmoo.com">hostap@lists.shmoo.com</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Cc:</B> <A title=s.raghu@samsung.com
href="mailto:s.raghu@samsung.com">Raghavendra</A> </DIV>
<DIV style="FONT: 10pt arial"><B>Sent:</B> Tuesday, June 16, 2009 5:40
PM</DIV>
<DIV style="FONT: 10pt arial"><B>Subject:</B> wpa_supplicant-0.5.11 SEG FAULT
for for [WPA2-PSK-TKIP+CCMP-preauth]</DIV>
<DIV><BR></DIV>
<DIV><FONT face=Arial size=2>Hi All,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>I am using wpa_supplicant-0.5.11. I configured
D-Link AP with WPA2-PSK and Cipher Type as "Auto". Getting seg fault. Please
see logs below.</FONT></DIV>
<DIV><FONT face=Arial size=2>In scan result it displayed following
info.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>
00:15:e9:ba:f3:66
2 188
[WPA2-PSK-TKIP+CCMP-preauth] default</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2> I have following wpa_supplicant.conf
file.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2># cat wpa_supplicant.conf.tmp
<BR>ctrl_interface=/var/run/wpa_supplicant<BR>ap_scan=2</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV><FONT face=Arial size=2>
<DIV><BR>network={<BR>
ssid="default"<BR>
proto=WPA
RSN<BR>
key_mgmt=WPA-PSK<BR>
pairwise=TKIP
CCMP<BR>
group=TKIP
CCMP<BR>
psk="testtest"<BR>}<BR></DIV>
<DIV> </DIV>
<DIV> </DIV></FONT>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2># wpa_supplicant -i tiwlan0 -c
./wpa_supplicant.conf.tmp -Dwext -ddd<BR>Initializing interface 'tiwlan0' conf
'./wpa_supplicant.conf.tmp' driver 'wext' ctrl_interface 'N/A' bridge
'N/A'<BR>Configuration file './wpa_supplicant.conf.tmp' ->
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>Reading configuration file
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>ctrl_interface='/var/run/wpa_supplicant'<BR>ap_scan=2<BR>Line:
5 - start of a new network block<BR>ssid -
hexdump_ascii(len=7):<BR> 64 65 66 61 75 6c
74
default <BR>proto:
0x3<BR>key_mgmt: 0x2<BR>pairwise: 0x18<BR>group: 0x18<BR>PSK (ASCII
passphrase) - hexdump_ascii(len=8): [REMOVED]<BR>PSK (from passphrase) -
hexdump(len=32): [REMOVED]<BR>Priority group 0<BR> id=0
ssid='default'<BR>Initializing interface (2) 'tiwlan0'<BR>EAPOL: SUPP_PAE
entering state DISCONNECTED<BR>EAPOL: KEY_RX entering state
NO_KEY_RECEIVE<BR>EAPOL: SUPP_BE entering state INITIALIZE<BR>EAP: EAP
entering state DISABLED<BR>EAPOL: External notification -
portEnabled=0<BR>EAPOL: External notification - portValid=0<BR>SIOCGIWRANGE:
WE(compiled)=22 WE(source)=19 enc_capa=0xf<BR> capabilities: key_mgmt
0xf enc 0xf<BR>WEXT: Operstate: linkmode=1, operstate=5<BR>Own MAC address:
00:00:f0:00:02:89<BR>wpa_driver_wext_set_wpa<BR>wpa_driver_wext_set_key: alg=0
key_idx=0 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=1 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=2 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=3 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_countermeasures<BR>wpa_driver_wext_set_drop_unencrypted<BR>Setting
scan request: 0 sec 100000 usec<BR>Using existing control interface
directory.<BR>ctrl_iface bind(PF_UNIX) failed: Address already in
use<BR>ctrl_iface exists, but does not allow connections - assuming it was
leftover from forced program termination<BR>Successfully replaced leftover
ctrl_iface socket '/var/run/wpa_supplicant/tiwlan0'<BR>Added interface
tiwlan0<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event:
cmd=0x8b06 len=8<BR>State: DISCONNECTED -> SCANNING<BR>Trying to associate
with SSID 'default'<BR>Cancelling scan request<BR>WPA: clearing own WPA/RSN
IE<BR>Automatic auth_alg selection: 0x1<BR>WPA: No WPA/RSN IE available from
association info<BR>WPA: Set cipher suites based on configuration<BR>WPA:
Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2<BR>WPA:
clearing AP WPA IE<BR>WPA: clearing AP RSN IE<BR>WPA: using GTK CCMP<BR>WPA:
using PTK CCMP<BR>WPA: using KEY_MGMT WPA-PSK<BR>WPA: Set own WPA IE default -
hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02
00 00<BR>No keys have been configured - skip key
clearing<BR>wpa_driver_wext_set_drop_unencrypted<BR>State: SCANNING ->
ASSOCIATING<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=0,
operstate=295929<BR>wpa_driver_wext_associate<BR>ioctl[SIOCSIWGENIE]:
Operation not supported<BR>Association request to the driver failed<BR>Setting
authentication timeout: 5 sec 0 usec<BR>EAPOL: External notification - EAP
success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003
([UP])<BR>Wireless event: cmd=0x8b06 len=8<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8b1a len=15<BR>RTM_NEWLINK:
operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02
len=164<BR>WEXT: Custom wireless event: ''<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02 len=164<BR>WEXT: Custom
wireless event: ''<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])<BR>Wireless event: cmd=0x8c07 len=55<BR>AssocReq IE wireless
event - hexdump(len=47): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c
12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac
02 00 00<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])<BR>Wireless event: cmd=0x8c08 len=24<BR>AssocResp IE wireless
event - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless
event: cmd=0x8b15 len=20<BR>Wireless event: new AP:
00:15:e9:ba:f3:66<BR>Association info event<BR>req_ies - hexdump(len=47): 00
07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 30 14
01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>resp_ies -
hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<BR>WPA: set
own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01
00 00 0f ac 02 00 00<BR>State: ASSOCIATING ->
ASSOCIATED<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=0, operstate=295929<BR>Associated to a
new BSS: BSSID=00:15:e9:ba:f3:66<BR>No keys have been configured - skip key
clearing<BR>Network configuration found for the current AP<BR>WPA: Using WPA
IE from AssocReq to set cipher suites<BR>WPA: Selected cipher suites: group 8
pairwise 16 key_mgmt 2 proto 2<BR>WPA: clearing AP WPA IE<BR>WPA: clearing AP
RSN IE<BR>WPA: using GTK TKIP<BR>WPA: using PTK CCMP<BR>WPA: using KEY_MGMT
WPA-PSK<BR>WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac
02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>EAPOL: External notification -
EAP success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>Associated with 00:15:e9:ba:f3:66<BR>WPA:
Association event - clear replay counter<BR>EAPOL: External notification -
portEnabled=0<BR>EAPOL: External notification - portValid=0<BR>EAPOL: External
notification - EAP success=0<BR>EAPOL: External notification -
portEnabled=1<BR>EAPOL: SUPP_PAE entering state CONNECTING<BR>EAPOL: SUPP_BE
entering state IDLE<BR>Setting authentication timeout: 10 sec 0
usec<BR>Cancelling scan request<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0'
added<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>Wireless event: cmd=0x8c02 len=164<BR>WEXT:
Custom wireless event: ' '<BR>RX EAPOL from 00:15:e9:ba:f3:66<BR>RX
EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 f5
ca 37 67 43 26 75 b9 ab 87 f3 b4 8e 11 82 99 94 11 71 5e 4b b3 27 22 d9 44 0c
21 3f 4d 64 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00<BR>Setting authentication timeout: 10 sec 0
usec<BR><STRONG>Segmentation fault</STRONG></FONT></DIV><FONT face=Arial
size=2>
<DIV> </DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>-Raghu</FONT></DIV></BLOCKQUOTE></BODY></HTML>