WPA: Failed to set PTK to the driver

From: Edmond Baroud <ebaroud_at_yahoo.com>
Date: Sun, 28 Aug 2005 23:53:42 -0400 (EDT)
Hi all,

I'm a long time desktop FreeBSD user (almost 7 years)
and now the time has come to install it on a laptop I
got from the job.
Didn't have the choice to pick an Intel card so my
laptop came with the 'Dell TrueMobile 1450 Dual Band
WLAN Mini-PCI Card'.
HW: Dell Latitude D610
OS: 7-current custom kernel.
I used ndisgen with the bcmwl5a.inf and bcmwl5.sys
from various release of the driver but still can't get
WPA to work and after some digging I looked at the
net80211 layer source code and the error message I'm
getting is coming fron there. I don't know if it's a
bug in that module or an incompatibility between the
layer and the ndis API.
When I run the wpa_supplicant without initiating an
'ifconfig ndis0 ssid 'myssid' authmode wpa channel 1
up' the supplicant doesn't seem to communicate with
the AP, so I get to reproduce my test in the following
sequence:
I have all the wlan* modules compiled in the kernel.

-8<--cut--8<---cut--8<-
normal boot
cypher#kldload ndis
cypher#kldload bcmwl5_sys
ndis0: <Dell TrueMobile 1400 Dual Band WLAN Mini-PCI
Card> mem 0xdfcfe000-0xdfcfffff irq 17 at device 3.0
on pci3
ndis0: NDIS API version: 5.0
ndis0: Ethernet address: 00:0b:7d:27:30:81
cypher# ifconfig ndis0 ssid 'myssid' authmode wpa
channel 1 up
cypher# wpa_supplicant -i ndis0 -c
/etc/wpa_supplicant.conf -ddd
Initializing interface 'ndis0' conf
'/etc/wpa_supplicant.conf' driver 'default'
Configuration file '/etc/wpa_supplicant.conf' ->
'/etc/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group=0
Line: 7 - start of a new network block
ssid - hexdump_ascii(len=6):
        6d 73 73 69 64                    myssid
proto: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=15):
[REMOVED]
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='myssid'
Initializing interface (2) 'ndis0'
Own MAC address: 00:0b:7d:27:30:81
wpa_driver_bsd_set_wpa: enabled=1
wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
wpa_driver_bsd_del_key: keyidx=0
wpa_driver_bsd_del_key: keyidx=1
wpa_driver_bsd_del_key: keyidx=2
wpa_driver_bsd_del_key: keyidx=3
wpa_driver_bsd_set_countermeasures: enabled=0
wpa_driver_bsd_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
Starting AP scan (broadcast SSID)
Received 0 bytes of scan results (1 BSSes)
Scan results: 1
Selecting BSS from priority group 0
0: 00:09:5b:f9:b6:04 ssid='myssid' wpa_ie_len=24
rsn_ie_len=0
   selected
Trying to associate with 00:09:5b:f9:b6:04
(SSID='myssid' freq=2412 MHz)
Cancelling scan request
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8
key_mgmt 2
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01
01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
wpa_driver_bsd_set_drop_unencrypted: enabled=1
wpa_driver_bsd_associate: ssid 'myssid' wpa ie len 24
pairwise 2 group 2 key mgmt 1
wpa_driver_bsd_associate: set PRIVACY 1
Setting authentication timeout: 5 sec 0 usec
RX EAPOL from 00:09:5b:f9:b6:04
RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20
00 00 00 00 00 00 00 01 35 27 ab 37 5f 76 d8 76 78 39
43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0 cf 54 66
5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00
89 00 20 00 00 00 00 00 00 00 01 35 27 ab 37 5f 76 d8
76 78 39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0
cf 54 66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00
WPA: RX message 1 of 4-Way Handshake from
00:09:5b:f9:b6:04 (ver=1)
WPA: Renewed SNonce - hexdump(len=32): 7c 11 51 60 d3
4e 87 6b 40 73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db
f5 b2 45 40 47 44 35 a5 0a
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: EAPOL-Key MIC - hexdump(len=16): 3b 08 8a 26 36
3c 57 7c a0 90 77 07 40 84 65 47
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b f9
b6 04 00 0b 7d 27 30 81 88 8e 01 03 00 77 fe 01 09 00
20 00 00 00 00 00 00 00 01 7c 11 51 60 d3 4e 87 6b 40
73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db f5 b2 45 40
47 44 35 a5 0a 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 3b 08 8a 26 36 3c 57 7c a0 90 77 07 40 84 65 47 00
18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
RX EAPOL from 00:09:5b:f9:b6:04
RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00
20 00 00 00 00 00 00 00 02 35 27 ab 37 5f 76 d8 76 78
39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0 cf 54
66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 33 4c df 12 27 d1 21 a2 43 e8 92 72 07 41 2a f4 00
18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
02 01 00 00 50 f2 02
IEEE 802.1X RX: version=1 type=3 length=119
  EAPOL-Key type=254
WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe
01 c9 00 20 00 00 00 00 00 00 00 02 35 27 ab 37 5f 76
d8 76 78 39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa
f0 cf 54 66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 33 4c df 12 27 d1 21 a2 43 e8 92 72 07 41
2a f4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
WPA: RX message 3 of 4-Way Handshake from
00:09:5b:f9:b6:04 (ver=1)
WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01
01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 09 5b f9
b6 04 00 0b 7d 27 30 81 88 8e 01 03 00 5f fe 01 09 00
20 00 00 00 00 00 00 00 02 7c 11 51 60 d3 4e 87 6b 40
73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db f5 b2 45 40
47 44 35 a5 0a 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 27 b8 2e 54 25 a9 e0 ba 21 72 28 ac 16 37 7d 24 00
00
WPA: Installing PTK to the driver.
WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
wpa_driver_bsd_set_key: alg=TKIP
addr=00:09:5b:f9:b6:04 key_idx=0 set_tx=1 seq_len=6
key_len=32
ioctl[SIOCS80211, op 19, len 60]: Operation not
supported by device
WPA: Failed to set PTK to the driver. 

-8<--cut--8<---cut--8<-

Any ideas? Please CC me I'm not subscribed to the
list.
I'll be glad to do some debugging to help fix that if
it's a bug.

Cheers,

-Ed

__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 
Received on Mon Aug 29 2005 - 01:53:44 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:42 UTC