Re: WPA: Failed to set PTK to the driver

From: Sam Leffler <sam_at_errno.com>
Date: Mon, 29 Aug 2005 10:14:47 -0700
Edmond Baroud wrote:
> Hi all,
> 
> I'm a long time desktop FreeBSD user (almost 7 years)
> and now the time has come to install it on a laptop I
> got from the job.
> Didn't have the choice to pick an Intel card so my
> laptop came with the 'Dell TrueMobile 1450 Dual Band
> WLAN Mini-PCI Card'.
> HW: Dell Latitude D610
> OS: 7-current custom kernel.
> I used ndisgen with the bcmwl5a.inf and bcmwl5.sys
> from various release of the driver but still can't get
> WPA to work and after some digging I looked at the
> net80211 layer source code and the error message I'm
> getting is coming fron there. I don't know if it's a
> bug in that module or an incompatibility between the
> layer and the ndis API.
> When I run the wpa_supplicant without initiating an
> 'ifconfig ndis0 ssid 'myssid' authmode wpa channel 1
> up' the supplicant doesn't seem to communicate with
> the AP, so I get to reproduce my test in the following
> sequence:
> I have all the wlan* modules compiled in the kernel.
> 
> -8<--cut--8<---cut--8<-
> normal boot
> cypher#kldload ndis
> cypher#kldload bcmwl5_sys
> ndis0: <Dell TrueMobile 1400 Dual Band WLAN Mini-PCI
> Card> mem 0xdfcfe000-0xdfcfffff irq 17 at device 3.0
> on pci3
> ndis0: NDIS API version: 5.0
> ndis0: Ethernet address: 00:0b:7d:27:30:81
> cypher# ifconfig ndis0 ssid 'myssid' authmode wpa
> channel 1 up
> cypher# wpa_supplicant -i ndis0 -c
> /etc/wpa_supplicant.conf -ddd
> Initializing interface 'ndis0' conf
> '/etc/wpa_supplicant.conf' driver 'default'
> Configuration file '/etc/wpa_supplicant.conf' ->
> '/etc/wpa_supplicant.conf'
> Reading configuration file '/etc/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> ctrl_interface_group=0
> Line: 7 - start of a new network block
> ssid - hexdump_ascii(len=6):
>         6d 73 73 69 64                    myssid
> proto: 0x1
> PSK (ASCII passphrase) - hexdump_ascii(len=15):
> [REMOVED]
> PSK (from passphrase) - hexdump(len=32): [REMOVED]
> Priority group 0
>    id=0 ssid='myssid'
> Initializing interface (2) 'ndis0'
> Own MAC address: 00:0b:7d:27:30:81
> wpa_driver_bsd_set_wpa: enabled=1
> wpa_driver_bsd_set_wpa_internal: wpa=3 privacy=1
> wpa_driver_bsd_del_key: keyidx=0
> wpa_driver_bsd_del_key: keyidx=1
> wpa_driver_bsd_del_key: keyidx=2
> wpa_driver_bsd_del_key: keyidx=3
> wpa_driver_bsd_set_countermeasures: enabled=0
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> Setting scan request: 0 sec 100000 usec
> Starting AP scan (broadcast SSID)
> Received 0 bytes of scan results (1 BSSes)
> Scan results: 1
> Selecting BSS from priority group 0
> 0: 00:09:5b:f9:b6:04 ssid='myssid' wpa_ie_len=24
> rsn_ie_len=0
>    selected
> Trying to associate with 00:09:5b:f9:b6:04
> (SSID='myssid' freq=2412 MHz)
> Cancelling scan request
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8
> key_mgmt 2
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01
> 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate: ssid 'myssid' wpa ie len 24
> pairwise 2 group 2 key mgmt 1
> wpa_driver_bsd_associate: set PRIVACY 1
> Setting authentication timeout: 5 sec 0 usec
> RX EAPOL from 00:09:5b:f9:b6:04
> RX EAPOL - hexdump(len=99): 01 03 00 5f fe 00 89 00 20
> 00 00 00 00 00 00 00 01 35 27 ab 37 5f 76 d8 76 78 39
> 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0 cf 54 66
> 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=99): 01 03 00 5f fe 00
> 89 00 20 00 00 00 00 00 00 00 01 35 27 ab 37 5f 76 d8
> 76 78 39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0
> cf 54 66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00
> WPA: RX message 1 of 4-Way Handshake from
> 00:09:5b:f9:b6:04 (ver=1)
> WPA: Renewed SNonce - hexdump(len=32): 7c 11 51 60 d3
> 4e 87 6b 40 73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db
> f5 b2 45 40 47 44 35 a5 0a
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: EAPOL-Key MIC - hexdump(len=16): 3b 08 8a 26 36
> 3c 57 7c a0 90 77 07 40 84 65 47
> WPA: Sending EAPOL-Key 2/4
> WPA: TX EAPOL-Key 2/4 - hexdump(len=137): 00 09 5b f9
> b6 04 00 0b 7d 27 30 81 88 8e 01 03 00 77 fe 01 09 00
> 20 00 00 00 00 00 00 00 01 7c 11 51 60 d3 4e 87 6b 40
> 73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db f5 b2 45 40
> 47 44 35 a5 0a 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 3b 08 8a 26 36 3c 57 7c a0 90 77 07 40 84 65 47 00
> 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
> 02 01 00 00 50 f2 02
> RX EAPOL from 00:09:5b:f9:b6:04
> RX EAPOL - hexdump(len=123): 01 03 00 77 fe 01 c9 00
> 20 00 00 00 00 00 00 00 02 35 27 ab 37 5f 76 d8 76 78
> 39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa f0 cf 54
> 66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 33 4c df 12 27 d1 21 a2 43 e8 92 72 07 41 2a f4 00
> 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2
> 02 01 00 00 50 f2 02
> IEEE 802.1X RX: version=1 type=3 length=119
>   EAPOL-Key type=254
> WPA: RX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe
> 01 c9 00 20 00 00 00 00 00 00 00 02 35 27 ab 37 5f 76
> d8 76 78 39 43 22 40 01 7f 2c d1 ae 7d b4 b0 6f 88 aa
> f0 cf 54 66 5c 48 b5 c6 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 33 4c df 12 27 d1 21 a2 43 e8 92 72 07 41
> 2a f4 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
> 00 50 f2 02 01 00 00 50 f2 02
> WPA: RX message 3 of 4-Way Handshake from
> 00:09:5b:f9:b6:04 (ver=1)
> WPA: IE KeyData - hexdump(len=24): dd 16 00 50 f2 01
> 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Sending EAPOL-Key 4/4
> WPA: TX EAPOL-Key 4/4 - hexdump(len=113): 00 09 5b f9
> b6 04 00 0b 7d 27 30 81 88 8e 01 03 00 5f fe 01 09 00
> 20 00 00 00 00 00 00 00 02 7c 11 51 60 d3 4e 87 6b 40
> 73 ed 50 33 9d 10 05 95 0d 72 23 a4 21 db f5 b2 45 40
> 47 44 35 a5 0a 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 00 27 b8 2e 54 25 a9 e0 ba 21 72 28 ac 16 37 7d 24 00
> 00
> WPA: Installing PTK to the driver.
> WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
> wpa_driver_bsd_set_key: alg=TKIP
> addr=00:09:5b:f9:b6:04 key_idx=0 set_tx=1 seq_len=6
> key_len=32
> ioctl[SIOCS80211, op 19, len 60]: Operation not
> supported by device
> WPA: Failed to set PTK to the driver. 
> 
> -8<--cut--8<---cut--8<-
> 
> Any ideas? Please CC me I'm not subscribed to the
> list.
> I'll be glad to do some debugging to help fix that if
> it's a bug.
>

Please show the output of kldstat; it appears you may not have wlan_tkip 
loaded.

	Sam
Received on Mon Aug 29 2005 - 15:07:56 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:42 UTC