<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16850" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi All,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>I am using wpa_supplicant-0.5.11. I configured
D-Link AP with WPA2-PSK and Cipher Type as "Auto". Getting seg fault. Please see
logs below.</FONT></DIV>
<DIV><FONT face=Arial size=2>In scan result it displayed following
info.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2>
00:15:e9:ba:f3:66
2 188
[WPA2-PSK-TKIP+CCMP-preauth] default</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2> I have following wpa_supplicant.conf
file.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2># cat wpa_supplicant.conf.tmp
<BR>ctrl_interface=/var/run/wpa_supplicant<BR>ap_scan=2</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT> </DIV><FONT face=Arial size=2>
<DIV><BR>network={<BR>
ssid="default"<BR>
proto=WPA
RSN<BR>
key_mgmt=WPA-PSK<BR>
pairwise=TKIP
CCMP<BR>
group=TKIP
CCMP<BR>
psk="testtest"<BR>}<BR></DIV>
<DIV> </DIV>
<DIV> </DIV></FONT>
<DIV><FONT face=Arial size=2></FONT> </DIV>
<DIV><FONT face=Arial size=2># wpa_supplicant -i tiwlan0 -c
./wpa_supplicant.conf.tmp -Dwext -ddd<BR>Initializing interface 'tiwlan0' conf
'./wpa_supplicant.conf.tmp' driver 'wext' ctrl_interface 'N/A' bridge
'N/A'<BR>Configuration file './wpa_supplicant.conf.tmp' ->
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>Reading configuration file
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>ctrl_interface='/var/run/wpa_supplicant'<BR>ap_scan=2<BR>Line:
5 - start of a new network block<BR>ssid -
hexdump_ascii(len=7):<BR> 64 65 66 61 75 6c
74
default <BR>proto:
0x3<BR>key_mgmt: 0x2<BR>pairwise: 0x18<BR>group: 0x18<BR>PSK (ASCII passphrase)
- hexdump_ascii(len=8): [REMOVED]<BR>PSK (from passphrase) - hexdump(len=32):
[REMOVED]<BR>Priority group 0<BR> id=0
ssid='default'<BR>Initializing interface (2) 'tiwlan0'<BR>EAPOL: SUPP_PAE
entering state DISCONNECTED<BR>EAPOL: KEY_RX entering state
NO_KEY_RECEIVE<BR>EAPOL: SUPP_BE entering state INITIALIZE<BR>EAP: EAP entering
state DISABLED<BR>EAPOL: External notification - portEnabled=0<BR>EAPOL:
External notification - portValid=0<BR>SIOCGIWRANGE: WE(compiled)=22
WE(source)=19 enc_capa=0xf<BR> capabilities: key_mgmt 0xf enc 0xf<BR>WEXT:
Operstate: linkmode=1, operstate=5<BR>Own MAC address:
00:00:f0:00:02:89<BR>wpa_driver_wext_set_wpa<BR>wpa_driver_wext_set_key: alg=0
key_idx=0 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=1 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=2 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=3 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_countermeasures<BR>wpa_driver_wext_set_drop_unencrypted<BR>Setting
scan request: 0 sec 100000 usec<BR>Using existing control interface
directory.<BR>ctrl_iface bind(PF_UNIX) failed: Address already in
use<BR>ctrl_iface exists, but does not allow connections - assuming it was
leftover from forced program termination<BR>Successfully replaced leftover
ctrl_iface socket '/var/run/wpa_supplicant/tiwlan0'<BR>Added interface
tiwlan0<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event:
cmd=0x8b06 len=8<BR>State: DISCONNECTED -> SCANNING<BR>Trying to associate
with SSID 'default'<BR>Cancelling scan request<BR>WPA: clearing own WPA/RSN
IE<BR>Automatic auth_alg selection: 0x1<BR>WPA: No WPA/RSN IE available from
association info<BR>WPA: Set cipher suites based on configuration<BR>WPA:
Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2<BR>WPA: clearing
AP WPA IE<BR>WPA: clearing AP RSN IE<BR>WPA: using GTK CCMP<BR>WPA: using PTK
CCMP<BR>WPA: using KEY_MGMT WPA-PSK<BR>WPA: Set own WPA IE default -
hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00
00<BR>No keys have been configured - skip key
clearing<BR>wpa_driver_wext_set_drop_unencrypted<BR>State: SCANNING ->
ASSOCIATING<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=0,
operstate=295929<BR>wpa_driver_wext_associate<BR>ioctl[SIOCSIWGENIE]: Operation
not supported<BR>Association request to the driver failed<BR>Setting
authentication timeout: 5 sec 0 usec<BR>EAPOL: External notification - EAP
success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003
([UP])<BR>Wireless event: cmd=0x8b06 len=8<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8b1a len=15<BR>RTM_NEWLINK:
operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02
len=164<BR>WEXT: Custom wireless event: ''<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02 len=164<BR>WEXT: Custom
wireless event: ''<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])<BR>Wireless event: cmd=0x8c07 len=55<BR>AssocReq IE wireless
event - hexdump(len=47): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c
12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02
00 00<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless
event: cmd=0x8c08 len=24<BR>AssocResp IE wireless event - hexdump(len=16): 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless event: cmd=0x8b15
len=20<BR>Wireless event: new AP: 00:15:e9:ba:f3:66<BR>Association info
event<BR>req_ies - hexdump(len=47): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96
32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00
0f ac 02 00 00<BR>resp_ies - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00<BR>WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f
ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>State: ASSOCIATING ->
ASSOCIATED<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=0, operstate=295929<BR>Associated to a
new BSS: BSSID=00:15:e9:ba:f3:66<BR>No keys have been configured - skip key
clearing<BR>Network configuration found for the current AP<BR>WPA: Using WPA IE
from AssocReq to set cipher suites<BR>WPA: Selected cipher suites: group 8
pairwise 16 key_mgmt 2 proto 2<BR>WPA: clearing AP WPA IE<BR>WPA: clearing AP
RSN IE<BR>WPA: using GTK TKIP<BR>WPA: using PTK CCMP<BR>WPA: using KEY_MGMT
WPA-PSK<BR>WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac
02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>EAPOL: External notification -
EAP success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>Associated with 00:15:e9:ba:f3:66<BR>WPA:
Association event - clear replay counter<BR>EAPOL: External notification -
portEnabled=0<BR>EAPOL: External notification - portValid=0<BR>EAPOL: External
notification - EAP success=0<BR>EAPOL: External notification -
portEnabled=1<BR>EAPOL: SUPP_PAE entering state CONNECTING<BR>EAPOL: SUPP_BE
entering state IDLE<BR>Setting authentication timeout: 10 sec 0
usec<BR>Cancelling scan request<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0'
added<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>Wireless event: cmd=0x8c02 len=164<BR>WEXT: Custom
wireless event: ' '<BR>RX EAPOL from 00:15:e9:ba:f3:66<BR>RX EAPOL -
hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 f5 ca 37 67
43 26 75 b9 ab 87 f3 b4 8e 11 82 99 94 11 71 5e 4b b3 27 22 d9 44 0c 21 3f 4d 64
b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00<BR>Setting authentication timeout: 10 sec 0 usec<BR><STRONG>Segmentation
fault</STRONG></FONT></DIV><FONT face=Arial size=2>
<DIV> </DIV>
<DIV> </DIV>
<DIV> </DIV>
<DIV>-Raghu</FONT></DIV></BODY></HTML>