Re: wpa_supplicant + NDIS (broadcom) + linksys WRT54G possible?

From: Sam Leffler <sam_at_errno.com>
Date: Mon, 06 Jun 2005 08:16:11 -0700
Doug Barton wrote:
> Doug Barton wrote:
> 
>> Sam Leffler wrote:
> 
> 
>>> You would probably better off setting up an ap where you can see 
>>> what's happening on the ap side.  Since you have an ath card you 
>>> could use that to test with (even in the same laptop).
>>
>>
>>
>> I can try that, be a couple days before I get to it though. 
> 
> 
> Ok, I finally got around to this. Using the wpa code that Sam just 
> committed to -current, I set up the ath card in hostap mode, and ran 
> wpa_supplicant on the ndis card.
> 
> Here is the ath (hostap) side:
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: associated
>   New STA
> ath0: STA 00:90:4b:63:5f:e0 WPA: event 1 notification
> ath0: STA 00:90:4b:63:5f:e0 WPA: start authentication
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITIALIZE
> bsd_del_key: addr=00:90:4b:63:5f:e0 key_idx=0
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.1X: unauthorizing port
> bsd_set_sta_authorized: addr=00:90:4b:63:5f:e0 authorized=0
> WPA: 00:90:4b:63:5f:e0 WPA_PTK_GROUP entering state IDLE
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITPSK
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state PTKSTART
> ath0: STA 00:90:4b:63:5f:e0 WPA: sending 1/4 msg of 4-Way Handshake
> TX EAPOL - hexdump(len=113): 00 90 4b 63 5f e0 00 0d 88 8a 77 c6 88 8e 
> 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 27 55 b1 da 18 ef 6e 
> 41 78 4b 6c b3 31 26 56 9a a9 28 9a 9f d7 73 fe 01 d0 38 dc ba 59 93 5e 
> 9b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00
> IEEE 802.1X: 123 bytes from 00:90:4b:63:5f:e0
>    IEEE 802.1X: version=1 type=3 length=119
> ath0: STA 00:90:4b:63:5f:e0 WPA: WPA IE from (Re)AssocReq did not match 
> with msg 2/4
> WPA IE in AssocReq - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 
> 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA IE in msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
> 01 00 00 50 f2 02 01 00 00 50 f2 02

I know what this is; I've got the fix in another tree.

	Sam

> bsd_sta_deauth: addr=00:90:4b:63:5f:e0 reason_code=2
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deauthenticated due to local 
> deauth request
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deassociated
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: associated
>   New STA
> ath0: STA 00:90:4b:63:5f:e0 WPA: event 1 notification
> ath0: STA 00:90:4b:63:5f:e0 WPA: start authentication
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITIALIZE
> bsd_del_key: addr=00:90:4b:63:5f:e0 key_idx=0
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.1X: unauthorizing port
> bsd_set_sta_authorized: addr=00:90:4b:63:5f:e0 authorized=0
> WPA: 00:90:4b:63:5f:e0 WPA_PTK_GROUP entering state IDLE
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state AUTHENTICATION2
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state INITPSK
> WPA: 00:90:4b:63:5f:e0 WPA_PTK entering state PTKSTART
> ath0: STA 00:90:4b:63:5f:e0 WPA: sending 1/4 msg of 4-Way Handshake
> TX EAPOL - hexdump(len=113): 00 90 4b 63 5f e0 00 0d 88 8a 77 c6 88 8e 
> 01 03 00 5f fe 00 89 00 20 00 00 00 00 00 00 00 01 27 55 b1 da 18 ef 6e 
> 41 78 4b 6c b3 31 26 56 9a a9 28 9a 9f d7 73 fe 01 d0 38 dc ba 59 93 5e 
> 9c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
> 00 00 00
> IEEE 802.1X: 123 bytes from 00:90:4b:63:5f:e0
>    IEEE 802.1X: version=1 type=3 length=119
> ath0: STA 00:90:4b:63:5f:e0 WPA: WPA IE from (Re)AssocReq did not match 
> with msg 2/4
> WPA IE in AssocReq - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 
> 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
> WPA IE in msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
> 01 00 00 50 f2 02 01 00 00 50 f2 02
> bsd_sta_deauth: addr=00:90:4b:63:5f:e0 reason_code=2
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deauthenticated due to local 
> deauth request
> ath0: STA 00:90:4b:63:5f:e0 IEEE 802.11: deassociated
> 
> 
> And here is the ndis side:
> Trying to associate with 00:0d:88:8a:77:c6 (SSID='wpa-test' freq=2412 MHz)
> Cancelling scan request
> Automatic auth_alg selection: 0x1
> WPA: using IEEE 802.11i/D3.0
> WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
> WPA: using GTK TKIP
> WPA: using PTK TKIP
> WPA: using KEY_MGMT WPA-PSK
> WPA: Own WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
> 01 00 00 50 f2 02 01 00 00 50 f2 02
> No keys have been configured - skip key clearing
> wpa_driver_bsd_set_drop_unencrypted: enabled=1
> wpa_driver_bsd_associate
> Setting authentication timeout: 5 sec 0 usec
> RX EAPOL from 00:0d:88:8a:77:c6
> Setting authentication timeout: 10 sec 0 usec
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0d:88:8a:77:c6 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
> f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: Renewed SNonce - hexdump(len=32): 71 cc f2 16 d3 bf fe 59 72 ee 19 
> 61 ea e6 11 fb 07 ef 9f a3 01 83 67 c4 78 54 6a c2 4d 2e 29 12
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: EAPOL-Key MIC - hexdump(len=16): 5a 6b 0e 62 1d 10 d5 b4 89 c2 0b 
> a6 72 70 e9 66
> WPA: Sending EAPOL-Key 2/4
> RX EAPOL from 00:0d:88:8a:77:c6
> IEEE 802.1X RX: version=1 type=3 length=95
>   EAPOL-Key type=254
> WPA: RX message 1 of 4-Way Handshake from 00:0d:88:8a:77:c6 (ver=1)
> WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 
> f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
> WPA: PMK - hexdump(len=32): [REMOVED]
> WPA: PTK - hexdump(len=64): [REMOVED]
> WPA: EAPOL-Key MIC - hexdump(len=16): 24 e2 bc 1e a1 5d ad 71 29 e9 fa 
> b2 5f e4 2d a9
> WPA: Sending EAPOL-Key 2/4
> 
> Hope this helps,
> 
> Doug
> 
> 
Received on Mon Jun 06 2005 - 13:12:14 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:38:35 UTC