<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=gb2312">
<META content="MSHTML 6.00.2900.5803" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT size=2>
<DIV><FONT size=2>Hi guys,</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>I found wpa_supplicant 0.6.9 can't connect with some D-Link
wireless routers, but it works very well with some other brands.</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>My system configuration:</FONT></DIV>
<DIV><FONT size=2>1. i.MX31 3stack CPU</FONT></DIV>
<DIV><FONT size=2>2. Marvell sd8686, using firmware 9.70.</FONT></DIV>
<DIV><FONT size=2>3. Linux-2.6.26, but using libertas ported from 2.6.27 to
support 9.70 firmware.</FONT></DIV>
<DIV><FONT size=2>4. wpa_supplicant 0.6.9</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>From the log printed by wpa_supplicant, I found 1
line:</FONT></DIV>
<DIV><FONT size=2>IEEE 802.1X RX: version=1 type=3 length=95</FONT></DIV>
<DIV><FONT size=2>The version of eap is 1, so I am wondering if the protocol
running on wireless router is too old to be working with
wpa_supplicant.</FONT></DIV>
<DIV><FONT size=2>Below is the complete log:</FONT></DIV>
<DIV><FONT size=2></FONT> </DIV>
<DIV><FONT size=2>Initializing interface (2) 'eth0'<BR>Interface eth0 set UP -
waiting a second for the driver to complete initialization<BR>SIOCGIWRANGE:
WE(compiled)=22 WE(source)=15 enc_capa=0xf<BR> capabilities: key_mgmt 0xf
enc 0xf flags 0x0<BR>WEXT: Operstate: linkmode=1, operstate=5<BR>Own MAC
address:
00:1a:6b:a1:21:53<BR>wpa_driver_wext_set_wpa<BR>wpa_driver_wext_set_key: alg=0
key_idx=0 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=1 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=2 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=3 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_countermeasures<BR>wpa_driver_wext_set_drop_unencrypted<BR>RSN:
flushing PMKID list in the driver<BR>Setting scan request: 0 sec 100000
usec<BR>EAPOL: SUPP_PAE entering state DISCONNECTED<BR>EAPOL: KEY_RX entering
state NO_KEY_RECEIVE<BR>EAPOL: SUPP_BE entering state INITIALIZE<BR>EAP: EAP
entering state DISABLED<BR>Added interface eth0<BR>State: DISCONNECTED ->
SCANNING<BR>Starting AP scan (broadcast SSID)<BR>Trying to get current scan
results first without requesting a new scan to speed up initial
association<BR>Received 0 bytes of scan results (0 BSSes)<BR>Cached scan results
are empty - not posting<BR>Selecting BSS from priority group 0<BR>Try to find
WPA-enabled AP<BR>Try to find non-WPA AP<BR>No suitable AP found.<BR>Setting
scan request: 0 sec 0 usec<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1043
([UP][RUNNING])<BR>RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0'
added<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>RTM_NEWLINK,
IFLA_IFNAME: Interface 'eth0' added<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003
([UP])<BR>Wireless event: cmd=0x8b06 len=8<BR>Starting AP scan (broadcast
SSID)<BR>Scan requested (ret=0) - scan timeout 5 seconds<BR>EAPOL: disable timer
tick<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event:
cmd=0x8b19 len=8<BR>Received 546 bytes of scan results (3
BSSes)<BR>CTRL-EVENT-SCAN-RESULTS <BR>Selecting BSS from priority group 0<BR>Try
to find WPA-enabled AP<BR>0: 00:15:e9:0e:98:d2 ssid='tiger' wpa_ie_len=22
rsn_ie_len=0 caps=0x11<BR> selected based on WPA IE<BR>
selected WPA AP 00:15:e9:0e:98:d2 ssid='tiger'<BR>Trying to associate with
00:15:e9:0e:98:d2 (SSID='tiger' freq=2437 MHz)<BR>Cancelling scan
request<BR>WPA: clearing own WPA/RSN IE<BR>Automatic auth_alg selection:
0x1<BR>WPA: using IEEE 802.11i/D3.0<BR>WPA: Selected cipher suites: group 8
pairwise 8 key_mgmt 2 proto 1<BR>WPA: set AP WPA IE - hexdump(len=24): dd 16 00
50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02<BR>WPA: clearing
AP RSN IE<BR>WPA: using GTK TKIP<BR>WPA: using PTK TKIP<BR>WPA: using KEY_MGMT
WPA-PSK<BR>WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01
00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02<BR>No keys have been
configured - skip key clearing<BR>wpa_driver_wext_set_drop_unencrypted<BR>State:
SCANNING -> ASSOCIATING<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=-1,
operstate=5<BR>wpa_driver_wext_associate<BR>wpa_driver_wext_set_psk<BR>Association
request to the driver failed<BR>Setting authentication timeout: 5 sec 0
usec<BR>EAPOL: External notification - EAP success=0<BR>EAPOL: External
notification - EAP fail=0<BR>EAPOL: External notification -
portControl=Auto<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless
event: cmd=0x8b06 len=8<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003
([UP])<BR>Wireless event: cmd=0x8b04 len=12<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8b1a len=13<BR>RTM_NEWLINK:
operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless event: cmd=0x8b15
len=20<BR>Wireless event: new AP: 00:15:e9:0e:98:d2<BR>State: ASSOCIATING ->
ASSOCIATED<BR>wpa_driver_wext_set_operstate: operstate 0->0
(DORMANT)<BR>WEXT: Operstate: linkmode=-1, operstate=5<BR>Associated to a new
BSS: BSSID=00:15:e9:0e:98:d2<BR>No keys have been configured - skip key
clearing<BR>Associated with 00:15:e9:0e:98:d2<BR>WPA: Association event - clear
replay counter<BR>WPA: Clear old PTK<BR>EAPOL: External notification -
portEnabled=0<BR>EAPOL: External notification - portValid=0<BR>EAPOL: External
notification - EAP success=0<BR>EAPOL: External notification -
portEnabled=1<BR>EAPOL: SUPP_PAE entering state CONNECTING<BR>EAPOL: enable
timer tick<BR>EAPOL: SUPP_BE entering state IDLE<BR>Setting authentication
timeout: 10 sec 0 usec<BR>Cancelling scan request<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x11003 ([UP][LOWER_UP])<BR>RTM_NEWLINK, IFLA_IFNAME: Interface 'eth0'
added<BR>RX EAPOL from 00:15:e9:0e:98:d2<BR>RX EAPOL - hexdump(len=107): 01 03
00 5f fe 00 89 00 20 00 00 00 00 00 00 04 c1 41 54 43 3b 77 97 f2 56 00 b8 1d 08
3f e7 4a 58 6a e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00<BR>Setting authentication timeout: 10 sec 0 usec<BR>IEEE 802.1X RX: version=1
type=3 length=95<BR> EAPOL-Key type=254<BR> key_info 0x89 (ver=1
keyidx=0 rsvd=0 Pairwise Ack)<BR> key_length=32
key_data_length=0<BR> replay_counter - hexdump(len=8): 00 00 00 00 00 00
04 c1<BR> key_nonce - hexdump(len=32): 41 54 43 3b 77 97 f2 56 00 b8 1d 08
3f e7 4a 58 6a e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0 d6<BR> key_iv -
hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<BR>
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00<BR> key_id (reserved) -
hexdump(len=8): 00 00 00 00 00 00 00 00<BR> key_mic - hexdump(len=16): 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00<BR>WPA: RX EAPOL-Key -
hexdump(len=107): 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 04 c1 41 54 43 3b
77 97 f2 56 00 b8 1d 08 3f e7 4a 58 6a e8 61 3f 8c ce a4 7e 14 a4 26 cd f4 b8 f0
d6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00<BR>WPA: ignoring 8 bytes after the IEEE 802.1X data<BR>State:
ASSOCIATED -> 4WAY_HANDSHAKE<BR>WPA: RX message 1 of 4-Way Handshake from
00:15:e9:0e:98:d2 (ver=1)<BR>WPA: Renewed SNonce - hexdump(len=32): 33 b6 17 64
96 be c5 d0 80 53 8e 3c c5 42 1f 70 80 58 bb 35 36 3d c7 28 d5 ca da 35 a2 84 29
87<BR>WPA: PTK derivation - A1=00:1a:6b:a1:21:53 A2=00:15:e9:0e:98:d2<BR>WPA:
PMK - hexdump(len=32): [REMOVED]<BR>WPA: PTK - hexdump(len=64):
[REMOVED]<BR>WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02<BR>WPA: Sending EAPOL-Key
2/4<BR>WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00
00 00 00 04 c1 33 b6 17 64 96 be c5 d0 80 53 8e 3c c5 42 1f 70 80 58 bb 35 36 3d
c7 28 d5 ca da 35 a2 84 29 87 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 a9 93 a1 4a 43 bf 6e 29 27 b3 97 f9
df 15 21 48 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00
50 f2 02<BR>EAPOL: startWhen --> 0<BR>EAPOL: disable timer tick<BR>EAPOL:
SUPP_PAE entering state CONNECTING<BR>EAPOL: enable timer tick<BR>EAPOL:
txStart<BR>WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1
len=0)<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])<BR>Wireless event: cmd=0x8b15 len=20<BR>Wireless event: new AP:
00:00:00:00:00:00<BR>WPA: 4-Way Handshake failed - pre-shared key may be
incorrect<BR>Setting scan request: 0 sec 100000 usec<BR>Added BSSID
00:15:e9:0e:98:d2 into blacklist<BR>CTRL-EVENT-DISCONNECTED - Disconnect event -
remove keys<BR>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0
key_len=0<BR>State: 4WAY_HANDSHAKE ->
DISCONNECTED</FONT></DIV></FONT></DIV></BODY></HTML>