* Fwd: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC
@ 2016-07-07 0:36 Nestor Machno
2016-07-08 9:15 ` Amitkumar Karwar
0 siblings, 1 reply; 17+ messages in thread
From: Nestor Machno @ 2016-07-07 0:36 UTC (permalink / raw)
To: linux-wireless
Hi All,
Amitkumar, can you confirm if this this is a bug or today is fixed?
Vincent, I had also faced similar issue on Surface Pro 2 with
backports from 4.1... So here few question:
* I saw in 1st post that you where working to make work the
wpa_supplicant with mixed configuration for adhoc (wpa-none +
wpa-ibss), but also in recent post that you focus mostly on debugging
wpa-ibss. I suggest to focus your test on one wpa mode and I think
wpa-none better because it's easier..
* Why you are not testing the latest backport from upstream kernel? as
you can know Marvell is focus most to fix open issue on current stable
release, I saw from commit that recently they fix something about WPA
on mixflex, see
https://backports.wiki.kernel.org/index.php/Documentation/compat-drivers/hacking
* Would be good information to know if you tested also on backport
3.x, did you? I know mwifiex's WPA stack changed a lot from 3.x
kernel.
* To support you more, could you enable debug info and provide full
log of your setup? .config? patch? anything else?
* Can you share us your hacked backport?
* Lat question Vincent, are you working for AIRBUS, ACTIA or THALES ? :)
Best Regards
Nestor
On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON <vincent.cesson@smile.fr> wrote:
> Hi Amitkumar,
>
> Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) from the
> two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy with
> command "ifconfig mlan0 192.168.1.xy" and then I try to ping each other,
> without success.
>
> Vincent
^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-07 0:36 Fwd: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC Nestor Machno @ 2016-07-08 9:15 ` Amitkumar Karwar 2016-07-20 13:23 ` Luana Borgia 0 siblings, 1 reply; 17+ messages in thread From: Amitkumar Karwar @ 2016-07-08 9:15 UTC (permalink / raw) To: Nestor Machno, linux-wireless PiBGcm9tOiBsaW51eC13aXJlbGVzcy1vd25lckB2Z2VyLmtlcm5lbC5vcmcgW21haWx0bzpsaW51 eC13aXJlbGVzcy0NCj4gb3duZXJAdmdlci5rZXJuZWwub3JnXSBPbiBCZWhhbGYgT2YgTmVzdG9y IE1hY2hubw0KPiBTZW50OiBUaHVyc2RheSwgSnVseSAwNywgMjAxNiA2OjA3IEFNDQo+IFRvOiBs aW51eC13aXJlbGVzc0B2Z2VyLmtlcm5lbC5vcmcNCj4gU3ViamVjdDogRndkOiBtd2lmaWV4K3dw YV9zdXBwbGljYW50IGNhbm5vdCBzZXQgdXAgV1BBL1dQQTIgQURIT0MNCj4gDQo+IEhpIEFsbCwN Cj4gQW1pdGt1bWFyLCBjYW4geW91IGNvbmZpcm0gaWYgdGhpcyB0aGlzIGlzIGEgYnVnIG9yIHRv ZGF5IGlzIGZpeGVkPw0KDQpZZXMuIFRoaXMgaXMgYSBidWcgaW4gb3VyIGZpcm13YXJlLiBBREhP QyBpbiBXUEEvV1BBMiBzZWN1cml0eSBpcyBicm9rZW4uIFdlIGhhdmUgYXNrZWQgZmlybXdhcmUg ZXhwZXJ0cyB0byBsb29rIGludG8gdGhpcy4gQXMgd2UgaGF2ZSBhIG1pZC15ZWFyIHNodXRkb3du IHRoaXMgd2VlaywgdGhleSB3aWxsIGJlIGFibGUgdG8gY2hlY2sgdGhlIHByb2JsZW0gbmV4dCB3 ZWVrIG9ubHkuIEhvd2V2ZXIgQURIT0MgaW4gb3BlbiBtb2RlIHNob3VsZCB3b3JrIGFzIGV4cGVj dGVkDQoNCj4gDQo+IFZpbmNlbnQsIEkgaGFkIGFsc28gZmFjZWQgc2ltaWxhciBpc3N1ZSBvbiBT dXJmYWNlIFBybyAyIHdpdGggYmFja3BvcnRzDQo+IGZyb20gNC4xLi4uIFNvIGhlcmUgZmV3IHF1 ZXN0aW9uOg0KPiANCj4gKiBJIHNhdyBpbiAxc3QgcG9zdCB0aGF0IHlvdSB3aGVyZSB3b3JraW5n IHRvIG1ha2Ugd29yayB0aGUNCj4gd3BhX3N1cHBsaWNhbnQgd2l0aCBtaXhlZCBjb25maWd1cmF0 aW9uIGZvciBhZGhvYyAod3BhLW5vbmUgKyB3cGEtaWJzcyksDQo+IGJ1dCBhbHNvIGluIHJlY2Vu dCBwb3N0IHRoYXQgeW91IGZvY3VzIG1vc3RseSBvbiBkZWJ1Z2dpbmcgd3BhLWlic3MuIEkNCj4g c3VnZ2VzdCB0byBmb2N1cyB5b3VyIHRlc3Qgb24gb25lIHdwYSBtb2RlIGFuZCBJIHRoaW5rIHdw YS1ub25lIGJldHRlcg0KPiBiZWNhdXNlIGl0J3MgZWFzaWVyLi4NCj4gKiBXaHkgeW91IGFyZSBu b3QgdGVzdGluZyB0aGUgbGF0ZXN0IGJhY2twb3J0IGZyb20gdXBzdHJlYW0ga2VybmVsPyBhcw0K PiB5b3UgY2FuIGtub3cgTWFydmVsbCBpcyBmb2N1cyBtb3N0IHRvIGZpeCBvcGVuIGlzc3VlIG9u IGN1cnJlbnQgc3RhYmxlDQo+IHJlbGVhc2UsIEkgc2F3IGZyb20gY29tbWl0IHRoYXQgcmVjZW50 bHkgdGhleSBmaXggc29tZXRoaW5nIGFib3V0IFdQQSBvbg0KPiBtaXhmbGV4LCBzZWUNCj4gaHR0 cHM6Ly9iYWNrcG9ydHMud2lraS5rZXJuZWwub3JnL2luZGV4LnBocC9Eb2N1bWVudGF0aW9uL2Nv bXBhdC0NCj4gZHJpdmVycy9oYWNraW5nDQo+ICogV291bGQgYmUgZ29vZCBpbmZvcm1hdGlvbiB0 byBrbm93IGlmIHlvdSB0ZXN0ZWQgYWxzbyBvbiBiYWNrcG9ydCAzLngsDQo+IGRpZCB5b3U/ICBJ IGtub3cgbXdpZmlleCdzIFdQQSBzdGFjayBjaGFuZ2VkIGEgbG90IGZyb20gMy54IGtlcm5lbC4N Cj4gKiBUbyBzdXBwb3J0IHlvdSBtb3JlLCBjb3VsZCB5b3UgZW5hYmxlIGRlYnVnIGluZm8gYW5k IHByb3ZpZGUgZnVsbCBsb2cNCj4gb2YgeW91ciBzZXR1cD8gLmNvbmZpZz8gcGF0Y2g/IGFueXRo aW5nIGVsc2U/DQo+ICogQ2FuIHlvdSBzaGFyZSB1cyB5b3VyIGhhY2tlZCBiYWNrcG9ydD8NCj4g KiBMYXQgcXVlc3Rpb24gVmluY2VudCwgYXJlIHlvdSB3b3JraW5nIGZvciBBSVJCVVMsIEFDVElB IG9yIFRIQUxFUyA/DQo+IDopDQo+IA0KPiBCZXN0IFJlZ2FyZHMNCj4gTmVzdG9yDQo+IA0KPiBP biBNb24sIEp1biAxMywgMjAxNiBhdCA3OjQyIEFNLCBWaW5jZW50IENFU1NPTg0KPiA8dmluY2Vu dC5jZXNzb25Ac21pbGUuZnI+IHdyb3RlOg0KPiA+IEhpIEFtaXRrdW1hciwNCj4gPg0KPiA+IEhl cmUgYXJlIHRoZSB3cGFfc3VwcGxpY2FudCBsb2dzICh3aXRoIENPTkZJR19JQlNTX1JTTj15IGVu YWJsZWQpIGZyb20NCj4gPiB0aGUgdHdvIGRldmljZXMuIEJlc2lkZSB3cGFfc3VwcGxpY2FudCwg SSBtYW51YWxseSBzZXQgSVBzDQo+ID4gMTkyLjE2OC4xLnh5IHdpdGggY29tbWFuZCAiaWZjb25m aWcgbWxhbjAgMTkyLjE2OC4xLnh5IiBhbmQgdGhlbiBJIHRyeQ0KPiA+IHRvIHBpbmcgZWFjaCBv dGhlciwgd2l0aG91dCBzdWNjZXNzLg0KPiA+DQoNClJlZ2FyZHMsDQpBbWl0a3VtYXINCg== ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-08 9:15 ` Amitkumar Karwar @ 2016-07-20 13:23 ` Luana Borgia 2016-07-21 8:30 ` Nestor Machno 2016-07-21 9:05 ` Amitkumar Karwar 0 siblings, 2 replies; 17+ messages in thread From: Luana Borgia @ 2016-07-20 13:23 UTC (permalink / raw) To: Amitkumar Karwar; +Cc: Nestor Machno, linux-wireless Hi Amitkumar, any news about this issue? I've the same problem also.. Security a part, we can't leave the WIFI open or just with WEP because we get too many not trusted connection that consume a lot of our bandwidth Thanks, regards Luana 2016-07-08 11:15 GMT+02:00 Amitkumar Karwar <akarwar@marvell.com>: >> From: linux-wireless-owner@vger.kernel.org [mailto:linux-wireless- >> owner@vger.kernel.org] On Behalf Of Nestor Machno >> Sent: Thursday, July 07, 2016 6:07 AM >> To: linux-wireless@vger.kernel.org >> Subject: Fwd: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >> >> Hi All, >> Amitkumar, can you confirm if this this is a bug or today is fixed? > > Yes. This is a bug in our firmware. ADHOC in WPA/WPA2 security is broken. We have asked firmware experts to look into this. As we have a mid-year shutdown this week, they will be able to check the problem next week only. However ADHOC in open mode should work as expected > >> >> Vincent, I had also faced similar issue on Surface Pro 2 with backports >> from 4.1... So here few question: >> >> * I saw in 1st post that you where working to make work the >> wpa_supplicant with mixed configuration for adhoc (wpa-none + wpa-ibss), >> but also in recent post that you focus mostly on debugging wpa-ibss. I >> suggest to focus your test on one wpa mode and I think wpa-none better >> because it's easier.. >> * Why you are not testing the latest backport from upstream kernel? as >> you can know Marvell is focus most to fix open issue on current stable >> release, I saw from commit that recently they fix something about WPA on >> mixflex, see >> https://backports.wiki.kernel.org/index.php/Documentation/compat- >> drivers/hacking >> * Would be good information to know if you tested also on backport 3.x, >> did you? I know mwifiex's WPA stack changed a lot from 3.x kernel. >> * To support you more, could you enable debug info and provide full log >> of your setup? .config? patch? anything else? >> * Can you share us your hacked backport? >> * Lat question Vincent, are you working for AIRBUS, ACTIA or THALES ? >> :) >> >> Best Regards >> Nestor >> >> On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON >> <vincent.cesson@smile.fr> wrote: >> > Hi Amitkumar, >> > >> > Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) from >> > the two devices. Beside wpa_supplicant, I manually set IPs >> > 192.168.1.xy with command "ifconfig mlan0 192.168.1.xy" and then I try >> > to ping each other, without success. >> > > > Regards, > Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-20 13:23 ` Luana Borgia @ 2016-07-21 8:30 ` Nestor Machno 2016-07-21 9:05 ` Amitkumar Karwar 1 sibling, 0 replies; 17+ messages in thread From: Nestor Machno @ 2016-07-21 8:30 UTC (permalink / raw) To: Luana Borgia, Amitkumar Karwar; +Cc: linux-wireless Luana, as confirmed by Marvell this is a firmware issue and the firmware is not free/open so only Marvell is able to fix it. At the moment the latest firmware available is still the 15.68.7.p5, aka p5. http://git.marvell.com/?p=mwifiex-firmware.git;a=tree;f=mrvl;hb=HEAD Unfortunately in this case the community can't give you support.. Regards Nestor 2016-07-20 15:23 GMT+02:00 Luana Borgia <luanaborgia1969@gmail.com>: > Hi Amitkumar, > any news about this issue? I've the same problem also.. > > Security a part, we can't leave the WIFI open or just with WEP because > we get too many not trusted connection that consume a lot of our > bandwidth > > Thanks, regards > Luana > > 2016-07-08 11:15 GMT+02:00 Amitkumar Karwar <akarwar@marvell.com>: >> Yes. This is a bug in our firmware. ADHOC in WPA/WPA2 security is broken. We have asked firmware experts to look into this. As we have a mid-year shutdown this week, they will be able to check the problem next week only. However ADHOC in open mode should work as expected >> >> >> Regards, >> Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-20 13:23 ` Luana Borgia 2016-07-21 8:30 ` Nestor Machno @ 2016-07-21 9:05 ` Amitkumar Karwar 2016-07-21 12:34 ` Luana Borgia 1 sibling, 1 reply; 17+ messages in thread From: Amitkumar Karwar @ 2016-07-21 9:05 UTC (permalink / raw) To: Luana Borgia; +Cc: Nestor Machno, linux-wireless SGkgTHVhbmEsDQoNCj4gRnJvbTogTHVhbmEgQm9yZ2lhIFttYWlsdG86bHVhbmFib3JnaWExOTY5 QGdtYWlsLmNvbV0NCj4gU2VudDogV2VkbmVzZGF5LCBKdWx5IDIwLCAyMDE2IDY6NTMgUE0NCj4g VG86IEFtaXRrdW1hciBLYXJ3YXINCj4gQ2M6IE5lc3RvciBNYWNobm87IGxpbnV4LXdpcmVsZXNz QHZnZXIua2VybmVsLm9yZw0KPiBTdWJqZWN0OiBSZTogbXdpZmlleCt3cGFfc3VwcGxpY2FudCBj YW5ub3Qgc2V0IHVwIFdQQS9XUEEyIEFESE9DDQo+IA0KPiBIaSBBbWl0a3VtYXIsDQo+IGFueSBu ZXdzIGFib3V0IHRoaXMgaXNzdWU/IEkndmUgdGhlIHNhbWUgcHJvYmxlbSBhbHNvLi4NCj4gDQo+ IFNlY3VyaXR5IGEgcGFydCwgd2UgY2FuJ3QgbGVhdmUgdGhlIFdJRkkgb3BlbiBvciBqdXN0IHdp dGggV0VQIGJlY2F1c2UNCj4gd2UgZ2V0IHRvbyBtYW55IG5vdCB0cnVzdGVkIGNvbm5lY3Rpb24g dGhhdCBjb25zdW1lIGEgbG90IG9mIG91cg0KPiBiYW5kd2lkdGgNCj4gDQoNCldlIGFyZSBzdGls bCB3b3JraW5nIG9uIHRoaXMuIFdpdGggc29tZSBkcml2ZXIgY2hhbmdlcywgd2UgYXJlIGFibGUg dG8gUlNOIElFIGluIHRyYW5zbWl0dGVkIGZyYW1lcywgYnV0IDQgd2F5IGhhbmRzaGFrZSBkb2Vz bid0IG9jY3VyLg0KDQpSZWdhcmRzLA0KQW1pdGt1bWFyDQo= ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-21 9:05 ` Amitkumar Karwar @ 2016-07-21 12:34 ` Luana Borgia 2016-07-21 15:22 ` Amitkumar Karwar 0 siblings, 1 reply; 17+ messages in thread From: Luana Borgia @ 2016-07-21 12:34 UTC (permalink / raw) To: Amitkumar Karwar; +Cc: Nestor Machno, linux-wireless Hi Amitkumar, if I understood correctly you are working to solve the issue related to ibss-rsn (wpa2 in adhoc), I'm I right? What about the alternative WPA mechanism with wpa-none instead? Fix it shouldn't be simpler than RSN? Thanks for update and best regards. Luana 2016-07-21 11:05 GMT+02:00 Amitkumar Karwar <akarwar@marvell.com>: > Hi Luana, > >> From: Luana Borgia [mailto:luanaborgia1969@gmail.com] >> Sent: Wednesday, July 20, 2016 6:53 PM >> To: Amitkumar Karwar >> Cc: Nestor Machno; linux-wireless@vger.kernel.org >> Subject: Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >> >> Hi Amitkumar, >> any news about this issue? I've the same problem also.. >> >> Security a part, we can't leave the WIFI open or just with WEP because >> we get too many not trusted connection that consume a lot of our >> bandwidth >> > > We are still working on this. With some driver changes, we are able to RSN IE in transmitted frames, but 4 way handshake doesn't occur. > > Regards, > Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-07-21 12:34 ` Luana Borgia @ 2016-07-21 15:22 ` Amitkumar Karwar 0 siblings, 0 replies; 17+ messages in thread From: Amitkumar Karwar @ 2016-07-21 15:22 UTC (permalink / raw) To: Luana Borgia; +Cc: Nestor Machno, linux-wireless PiBGcm9tOiBMdWFuYSBCb3JnaWEgW21haWx0bzpsdWFuYWJvcmdpYTE5NjlAZ21haWwuY29tXQ0K PiBTZW50OiBUaHVyc2RheSwgSnVseSAyMSwgMjAxNiA2OjA1IFBNDQo+IFRvOiBBbWl0a3VtYXIg S2Fyd2FyDQo+IENjOiBOZXN0b3IgTWFjaG5vOyBsaW51eC13aXJlbGVzc0B2Z2VyLmtlcm5lbC5v cmcNCj4gU3ViamVjdDogUmU6IG13aWZpZXgrd3BhX3N1cHBsaWNhbnQgY2Fubm90IHNldCB1cCBX UEEvV1BBMiBBREhPQw0KPiANCj4gSGkgQW1pdGt1bWFyLA0KPiBpZiBJIHVuZGVyc3Rvb2QgY29y cmVjdGx5IHlvdSBhcmUgd29ya2luZyB0byBzb2x2ZSB0aGUgaXNzdWUgcmVsYXRlZCB0bw0KPiBp YnNzLXJzbiAod3BhMiBpbiBhZGhvYyksIEknbSBJIHJpZ2h0Pw0KPiBXaGF0IGFib3V0IHRoZSBh bHRlcm5hdGl2ZSBXUEEgbWVjaGFuaXNtIHdpdGggd3BhLW5vbmUgaW5zdGVhZD8gRml4IGl0DQo+ IHNob3VsZG4ndCBiZSBzaW1wbGVyIHRoYW4gUlNOPw0KDQpNYWtlcyBzZW5zZS4gSXQgd291bGQg YmUgdXNlZnVsIHRvIGhhdmUgc3VjY2Vzc2Z1bCBjYXNlIGxvZyBmb3IgY29tcGFyaXNvbiBhbmQg ZnVydGhlciBkZWJ1Z2dpbmcuDQpJcyBpdCBwb3NzaWJsZSBmb3IgeW91IChvciBzb21lb25lIGVs c2UpIGNhcHR1cmUgdGhlIHdwYV9zdXBwbGljYW50J3Mgc3VjY2Vzc2Z1bCBjYXNlIGxvZ3MgdXNp bmcgb3RoZXIgdmVuZG9yJ3MgY2hpcHNldD8NCldlIHRyaWVkIHdpdGggSW50ZWwgZGV2aWNlcy4g SXQgd29ya2VkIHVzaW5nIEdVSSBvbiB3aW5kb3dzIG1hY2hpbmUsIGJ1dCBkaWRuJ3Qgd29yayB1 c2luZyB3cGFfc3VwcGxpY2FudC4NCg0KUmVnYXJkcywNCkFtaXRrdW1hcg0K ^ permalink raw reply [flat|nested] 17+ messages in thread
* mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC @ 2016-06-10 15:37 Vincent CESSON [not found] ` <CAKVVYBk2Rf6RMPW1uySq4M7LeFCRHBGipYdiOqwQSHxFNmst=A@mail.gmail.com> 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-10 15:37 UTC (permalink / raw) To: linux-wireless Dear all, I need to set a secured Adhoc network using WPA or WPA2 on my embedded device (linux 3.10, mwifiex backported 4.1.1, wpa_supplicant 2.5 (with CONFIG_IBSS_RSN=y), hostap 2.5). I tried the following configs: WPA-NONE: I start a WPA-NONE Adhoc with wpa_supplicant on the embedded device (see wpa_supplicant-wpa-none.conf + wpa_supplicant-wpa-none.log). Then from my computer (Ubuntu 14.04), I managed to join the network and ping the device without setting any password! The connection is not secured. WPA-PSK: I also tried WPA-RSN (see wpa_supplicant-rsn.conf + wpa_supplicant-rsn.log). As you can see in log file, the 4Way-Handshake is completed. But after some seconds, the log shows a timeout and an authentication failure. The device and my computer are connected to the same network and they share the same BSS, but ping always fails. Note that if I set a bad password on computer side, the handshake never completes. dmesg does not show any error. WEP works fine. Any idea of what could be wrong? Thank you, Vincent ^ permalink raw reply [flat|nested] 17+ messages in thread
[parent not found: <CAKVVYBk2Rf6RMPW1uySq4M7LeFCRHBGipYdiOqwQSHxFNmst=A@mail.gmail.com>]
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC [not found] ` <CAKVVYBk2Rf6RMPW1uySq4M7LeFCRHBGipYdiOqwQSHxFNmst=A@mail.gmail.com> @ 2016-06-13 8:22 ` Vincent CESSON 2016-06-13 13:23 ` Amitkumar Karwar 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-13 8:22 UTC (permalink / raw) To: Raymond Hayes; +Cc: linux-wireless [-- Attachment #1: Type: text/plain, Size: 2638 bytes --] Here are the logs. I don't know if there is 4-way handshake in each direction, I don't have logs on computer side, I use GUI. I tried to use the same wpa_supplicant-rsn.conf on my computer and start it with wpa_supplicant, but nothing happen... Embedded device does not react at all. I found something new (and strange). I took a second embedded device, set the same wpa_supplicant-rsn.conf except the passwords (I set 2 different passwords), and I use the same command line: wpa_supplicant -dd -i mlan0 -c /etc/wpa_supplicant-rsn.conf -D nl80211,wext Result, the two devices join and ping! When I start the second device, no logs appear on the first device... How is it possible psk is not taken into account? Vincent Le 2016-06-10 18:18, Raymond Hayes a écrit : > I don't see the log files, but, for WPA2-PSK for IBSS (there is no > WPA-PSK for IBSS, only WPA-NONE), there should be 2 4-way handshakes, > one in each direction. Have you verified that your computer supports > this? If you pair 2 instances of your computer, do you see 2 > successful 4-way handshakes in the logs? > > Ray > > On Fri, Jun 10, 2016 at 8:37 AM, Vincent CESSON > <vincent.cesson@smile.fr> wrote: > >> Dear all, >> >> I need to set a secured Adhoc network using WPA or WPA2 on my >> embedded device (linux 3.10, mwifiex backported 4.1.1, wpa_supplicant >> 2.5 (with CONFIG_IBSS_RSN=y), hostap 2.5). I tried the following >> configs: >> >> WPA-NONE: >> I start a WPA-NONE Adhoc with wpa_supplicant on the embedded device >> (see wpa_supplicant-wpa-none.conf + wpa_supplicant-wpa-none.log). Then >> from my computer (Ubuntu 14.04), I managed to join the network and >> ping the device without setting any password! The connection is not >> secured. >> >> WPA-PSK: >> I also tried WPA-RSN (see wpa_supplicant-rsn.conf + >> wpa_supplicant-rsn.log). As you can see in log file, the >> 4Way-Handshake is completed. But after some seconds, the log shows a >> timeout and an authentication failure. The device and my computer are >> connected to the same network and they share the same BSS, but ping >> always fails. Note that if I set a bad password on computer side, the >> handshake never completes. >> >> dmesg does not show any error. >> WEP works fine. >> >> Any idea of what could be wrong? >> >> Thank you, >> Vincent >> -- >> To unsubscribe from this list: send the line "unsubscribe >> linux-wireless" in >> the body of a message to majordomo@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html >> [1] > > > > Links: > ------ > [1] http://vger.kernel.org/majordomo-info.html [-- Attachment #2: wpa_supplicant-rsn.conf --] [-- Type: text/plain, Size: 263 bytes --] ctrl_interface=DIR=/run/wpa_supplicant #GROUP=wheel # use 'ap_scan=2' on all devices connected to the network ap_scan=2 network={ ssid="suppl_wpa_adhoc_vce" mode=1 frequency=2432 proto=WPA RSN key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP psk="password" } [-- Attachment #3: wpa_supplicant-rsn.log --] [-- Type: text/plain, Size: 30808 bytes --] root@pcm-mx6quad:~# wpa_supplicant -ddd -i mlan0 -c /etc/wpa_supplicant-rsn.conf -D nl80211,wext wpa_supplicant v2.5 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'mlan0' conf '/etc/wpa_supplicant-adhoc.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant-adhoc.conf' -> '/etc/wpa_supplicant-adhoc.conf' Reading configuration file '/etc/wpa_supplicant-adhoc.conf' ctrl_interface='DIR=/run/wpa_supplicant' ap_scan=2 Line: 4 - start of a new network block ssid - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce mode=1 (0x1) frequency=2432 (0x980) proto: 0x3 key_mgmt: 0x2 pairwise: 0x18 group: 0x18 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='suppl_wpa_adhoc_vce' rfkill: initial event: idx=8 type=2 op=0 soft=0 hard=0 rfkill: initial event: idx=9 type=1 op=0 soft=0 hard=0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supports Probe Response offload in AP mode nl80211: Use separate P2P group interface (driver advertised support) nl80211: Disable use_monitor with device_ap_sme since no monitor mode support detected nl80211: interface mlan0 in phy phy0 nl80211: Set mode ifindex 17 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x28ae98 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=06 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0a07 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0a11 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=1101 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=1102 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0505 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now netlink: Operstate: ifindex=17 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) nl80211: driver param='(null)' Add interface mlan0 to a new radio phy0 nl80211: Regulatory information - country=FR (DFS-ETSI) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 20 mBm nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) nl80211: 57000-66000 @ 2160 MHz 40 mBm nl80211: Added 802.11b mode based on 802.11g information mlan0: Own MAC address: 98:f1:70:6f:93:f6 Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 mlan0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs mlan0: Setting scan request: 0.100000 sec mlan0: WPS: UUID based on MAC address: 12af4f70-c6df-5d0d-b74d-a8d7cef24161 GnuTLS: Library version 2.12.23 (runtime) - 2.12.23 (build) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED mlan0: Added interface mlan0 mlan0: State: DISCONNECTED -> DISCONNECTED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random mlan0: State: DISCONNECTED -> SCANNING mlan0: Add radio work 'connect'@0x291488 mlan0: First radio work item in the queue - schedule start immediately mlan0: Starting radio work 'connect'@0x291488 after 0.000046 second wait mlan0: Trying to associate with SSID 'suppl_wpa_adhoc_vce' mlan0: Cancelling scan request mlan0: WPA: clearing own WPA/RSN IE mlan0: Automatic auth_alg selection: 0x1 mlan0: WPA: No WPA/RSN IE available from association info mlan0: WPA: Set cipher suites based on configuration mlan0: WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 mlan0: State: SCANNING -> ASSOCIATING nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) nl80211: Join IBSS (ifindex=17) nl80211: Set mode ifindex 17 iftype 1 (ADHOC) nl80211: Unsubscribe mgmt frames handle 0x88a02611 (mode change) nl80211: Subscribe to mgmt frames with non-AP handle 0x28ae98 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x28ae98 match= nl80211: Register frame command failed (type=176): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=0): [NULL] nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=06 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0a07 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0a11 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=1101 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=1102 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x28ae98 match=0505 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now * SSID - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce * freq=2432 * vht_enabled=0 * ht_enabled=1 * sec_channel_offset=0 * channel_type=1 * control port * Extra IEs for Beacon/Probe Response frames - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: Join IBSS request sent successfully mlan0: Cancelling authentication timeout EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x19003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 43 (NL80211_CMD_JOIN_IBSS) received for mlan0 nl80211: IBSS 02:24:14:f1:90:46 joined nl80211: IBSS-joined on 2432 MHz nl80211: Operating frequency for the associated BSS from scan results: 2432 MHz nl80211: IBSS on frequency 2432 MHz mlan0: Event ASSOC (0) received mlan0: State: ASSOCIATING -> ASSOCIATED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) mlan0: Associated to a new BSS: BSSID=02:24:14:f1:90:46 Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] mlan0: Select network based on association information mlan0: Network configuration found for the current AP mlan0: WPA: Using WPA IE from AssocReq to set cipher suites mlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: IBSS-joined on 2432 MHz nl80211: Received scan results (3 BSSes) Sorted scan results 98:f1:70:6f:4c:ef freq=2437 qual=0 noise=-92 level=-87 snr=5 flags=0x9 age=1120 est=9000 IEs - hexdump(len=137): 00 06 50 43 4d 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 03 01 06 05 05 00 02 00 00 00 2a 01 00 2d 1a 2d 1a 0c ff ff ff 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 30 48 60 6c 3d 16 06 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 02:24:14:f1:90:46 freq=2432 qual=0 noise=-92 level=0 snr=92* flags=0x9 age=10 est=0 IEs - hexdump(len=21): 00 13 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f 76 63 65 80:1f:02:f5:81:7e freq=2437 qual=0 noise=-92 level=-72 snr=20 flags=0x9 age=1100 est=54000 IEs - hexdump(len=234): 00 20 54 50 2d 4c 49 4e 4b 5f 32 2e 34 47 48 7a 5f 43 33 30 30 5f 50 43 4d 5f 4c 61 62 5f 42 41 54 34 01 08 82 84 8b 96 0c 12 18 24 03 01 06 05 04 01 03 00 00 2a 01 04 32 04 30 48 60 6c 2d 1a ad 19 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 ad 19 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 06 00 e0 4c 02 01 60 dd 18 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 49 00 06 00 37 2a 00 01 20 mlan0: BSS: Start scan result update 1 mlan0: BSS: Add new id 0 BSSID 98:f1:70:6f:4c:ef SSID 'PCM_AP' freq 2437 mlan0: BSS: Add new id 1 BSSID 02:24:14:f1:90:46 SSID 'suppl_wpa_adhoc_vce' freq 2432 mlan0: BSS: Add new id 2 BSSID 80:1f:02:f5:81:7e SSID 'TP-LINK_2.4GHz_C300_PCM_Lab_BAT4' freq 2437 EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 mlan0: Associated with 02:24:14:f1:90:46 mlan0: WPA: Association event - clear replay counter mlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for 02:24:14:f1:90:46 nl80211: Failed to set STA flag: -524 (Unknown error 524) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAPOL: enable timer tick EAP: EAP entering state IDLE mlan0: Cancelling authentication timeout mlan0: State: ASSOCIATED -> COMPLETED mlan0: Radio work 'connect'@0x291488 done in 1.891519 seconds mlan0: CTRL-EVENT-CONNECTED - Connection to 02:24:14:f1:90:46 completed [id=0 id_str=] nl80211: Set mlan0 operstate 0->1 (UP) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) mlan0: Cancelling scan request AUTH: Initializing group state machine Get randomness: len=32 entropy=1 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) Get randomness: len=16 entropy=0 random from os_get_random - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=16): [REMOVED] GTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) AUTH: auth_set_key(alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1) AUTH: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=3 addr=0xbca7c key_idx=1 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 broadcast key RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x19043 ([UP][RUNNING][LOWER_UP]) l2_packet_receive: src=48:45:20:3b:31:75 len=99 mlan0: RX EAPOL from 48:45:20:3b:31:75 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 RSN: Starting IBSS Supplicant for peer 48:45:20:3b:31:75 WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 mlan0: WPA: Association event - clear replay counter mlan0: WPA: Clear old PTK RSN: IBSS Not using IBSS Auth for peer 48:45:20:3b:31:75 RSN: Starting IBSS Authenticator for now-authenticated peer 48:45:20:3b:31:75 AUTH: 48:45:20:3b:31:75 - event 1 notification AUTH: auth_set_key(alg=0 addr=48:45:20:3b:31:75 key_idx=0) AUTH: set_key - key - hexdump(len=0): [NULL] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=0x29cbc0 key_idx=0 set_tx=1 seq_len=6 key_len=0 nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=48:45:20:3b:31:75 AUTH: 48:45:20:3b:31:75 - start authentication WPA: 48:45:20:3b:31:75 WPA_PTK entering state INITIALIZE AUTH: eapol event not handled 0 AUTH: auth_set_key(alg=0 addr=48:45:20:3b:31:75 key_idx=0) AUTH: set_key - key - hexdump(len=0): [NULL] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=0x29cbc0 key_idx=0 set_tx=1 seq_len=6 key_len=0 nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=48:45:20:3b:31:75 AUTH: eapol event not handled 1 nl80211: Set STA flags - ifname=mlan0 addr=48:45:20:3b:31:75 total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0 AUTH: 48:45:20:3b:31:75 unauthorizing port Could not set station 48:45:20:3b:31:75 flags for kernel driver (errno=11) WPA: 48:45:20:3b:31:75 WPA_PTK_GROUP entering state IDLE WPA: 48:45:20:3b:31:75 WPA_PTK entering state AUTHENTICATION AUTH: eapol event not handled 3 AUTH: eapol event not handled 0 WPA: 48:45:20:3b:31:75 WPA_PTK entering state AUTHENTICATION2 WPA: Re-initialize GMK/Counter on first station Get randomness: len=32 entropy=0 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] Key Counter - hexdump(len=32): [REMOVED] Get randomness: len=16 entropy=0 random from os_get_random - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=16): [REMOVED] GTK - hexdump(len=16): [REMOVED] AUTH: auth_set_key(alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1) AUTH: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=3 addr=0xbca7c key_idx=1 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 broadcast key Get randomness: len=32 entropy=0 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Assign ANonce - hexdump(len=32): 0a 22 5b 08 e6 d7 fc 53 3a d6 70 e2 e3 ad a9 bc fe 8c 80 c9 1b e8 33 09 eb 55 1a 61 f2 14 9e e0 WPA: 48:45:20:3b:31:75 WPA_PTK entering state INITPSK AUTH: auth_get_psk (addr=48:45:20:3b:31:75 prev_psk=(nil)) AUTH: auth_get_psk (addr=48:45:20:3b:31:75 prev_psk=(nil)) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKSTART AUTH: 48:45:20:3b:31:75 - sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 AUTH: eapol event not handled 7 AUTH: auth_send_eapol(addr=48:45:20:3b:31:75 data_len=99 encrypt=0) WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) RSN: IBSS RX EAPOL for Supplicant from 48:45:20:3b:31:75 mlan0: IEEE 802.1X RX: version=2 type=3 length=95 WPA: RX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 mlan0: EAPOL-Key type=2 mlan0: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) mlan0: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 mlan0: WPA: RX message 1 of 4-Way Handshake from 48:45:20:3b:31:75 (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=0 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): fc 9b c5 c8 7f a0 76 4f 51 e1 86 4f cd fb 87 7a 64 c7 fc da c8 62 14 ed 57 ed 2f d5 e3 06 a6 66 WPA: PTK derivation - A1=98:f1:70:6f:93:f6 A2=48:45:20:3b:31:75 WPA: Nonce1 - hexdump(len=32): fc 9b c5 c8 7f a0 76 4f 51 e1 86 4f cd fb 87 7a 64 c7 fc da c8 62 14 ed 57 ed 2f d5 e3 06 a6 66 WPA: Nonce2 - hexdump(len=32): 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 SUPP: supp_alloc_eapol(type=3 data_len=117) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 mlan0: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): f5 f4 83 2a c3 1f 4e 87 94 5e 1f b5 f7 f0 b4 b2 WPA: TX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 fc 9b c5 c8 7f a0 76 4f 51 e1 86 4f cd fb 87 7a 64 c7 fc da c8 62 14 ed 57 ed 2f d5 e3 06 a6 66 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f5 f4 83 2a c3 1f 4e 87 94 5e 1f b5 f7 f0 b4 b2 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 SUPP: supp_ether_send(dest=48:45:20:3b:31:75 proto=0x888e len=121) l2_packet_receive: src=48:45:20:3b:31:75 len=121 mlan0: RX EAPOL from 48:45:20:3b:31:75 RX EAPOL - hexdump(len=121): 02 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 95 79 39 42 b2 48 ed 47 27 f7 69 cf a2 48 4e f9 c7 0d 69 48 30 bc 96 90 21 cf ad a1 65 60 b1 f5 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 35 43 aa ee 6d 28 27 6f be b1 54 e1 98 9b fa 59 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 RSN: IBSS RX EAPOL for Authenticator from 48:45:20:3b:31:75 WPA: Received EAPOL-Key from 48:45:20:3b:31:75 key_info=0x10a type=2 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 95 79 39 42 b2 48 ed 47 27 f7 69 cf a2 48 4e f9 c7 0d 69 48 30 bc 96 90 21 cf ad a1 65 60 b1 f5 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 Add randomness: count=2 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=32): [REMOVED] random pool - hexdump(len=128): [REMOVED] AUTH: 48:45:20:3b:31:75 - received EAPOL-Key frame (2/4 Pairwise) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKCALCNEGOTIATING AUTH: auth_get_psk (addr=48:45:20:3b:31:75 prev_psk=(nil)) WPA: PTK derivation - A1=98:f1:70:6f:93:f6 A2=48:45:20:3b:31:75 WPA: Nonce1 - hexdump(len=32): 0a 22 5b 08 e6 d7 fc 53 3a d6 70 e2 e3 ad a9 bc fe 8c 80 c9 1b e8 33 09 eb 55 1a 61 f2 14 9e e0 WPA: Nonce2 - hexdump(len=32): 95 79 39 42 b2 48 ed 47 27 f7 69 cf a2 48 4e f9 c7 0d 69 48 30 bc 96 90 21 cf ad a1 65 60 b1 f5 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKINITNEGOTIATING AUTH: 48:45:20:3b:31:75 - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=1 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] AUTH: eapol event not handled 7 AUTH: auth_send_eapol(addr=48:45:20:3b:31:75 data_len=155 encrypt=0) WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) l2_packet_receive: src=48:45:20:3b:31:75 len=155 mlan0: RX EAPOL from 48:45:20:3b:31:75 RX EAPOL - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 21 e4 63 b9 b2 b5 dd 1a 0e f6 c6 cb 4d 02 8e 00 38 cd dc 4a 86 3d 6b d3 15 2c 44 ea 2e 59 2f 16 31 c9 7d 0c 87 5d e8 10 6b 26 7d 7c 72 54 8f e0 ec 67 eb 42 36 38 dc 6c 3f 39 ea 62 b5 38 a4 a7 44 60 c0 cc a7 de f3 e5 93 RSN: IBSS RX EAPOL for Supplicant from 48:45:20:3b:31:75 mlan0: IEEE 802.1X RX: version=2 type=3 length=151 WPA: RX EAPOL-Key - hexdump(len=155): 02 03 00 97 02 13 ca 00 10 00 00 00 00 00 00 00 02 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 60 21 e4 63 b9 b2 b5 dd 1a 0e f6 c6 cb 4d 02 8e 00 38 cd dc 4a 86 3d 6b d3 15 2c 44 ea 2e 59 2f 16 31 c9 7d 0c 87 5d e8 10 6b 26 7d 7c 72 54 8f e0 ec 67 eb 42 36 38 dc 6c 3f 39 ea 62 b5 38 a4 a7 44 60 c0 cc a7 de f3 e5 93 mlan0: EAPOL-Key type=2 mlan0: key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure Encr) mlan0: key_length=16 key_data_length=56 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02 key_nonce - hexdump(len=32): 56 b9 c7 07 7c c9 7f 47 61 fe cf 39 de 6b f4 9d 19 1d 87 41 98 a1 7a 1c 05 a8 c5 b1 8e 34 ec d0 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 60 21 e4 63 b9 b2 b5 dd 1a 0e f6 c6 cb 4d 02 8e RSN: encrypted key data - hexdump(len=56): cd dc 4a 86 3d 6b d3 15 2c 44 ea 2e 59 2f 16 31 c9 7d 0c 87 5d e8 10 6b 26 7d 7c 72 54 8f e0 ec 67 eb 42 36 38 dc 6c 3f 39 ea 62 b5 38 a4 a7 44 60 c0 cc a7 de f3 e5 93 WPA: decrypted EAPOL-Key key data - hexdump(len=48): [REMOVED] mlan0: WPA: RX message 3 of 4-Way Handshake from 48:45:20:3b:31:75 (ver=2) WPA: IE KeyData - hexdump(len=48): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 dd 16 00 0f ac 01 01 00 57 ef e6 3e f7 53 4c 45 89 c1 4c 83 2e fd 13 ab dd 00 WPA: RSN IE in EAPOL-Key - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: GTK in EAPOL-Key - hexdump(len=24): [REMOVED] mlan0: WPA: No WPA/RSN IE for this AP known. Trying to get from scan results SUPP: supp_get_beacon_ie WPA: set AP RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 mlan0: WPA: Found the current AP from updated scan results SUPP: supp_alloc_eapol(type=3 data_len=95) mlan0: WPA: Sending EAPOL-Key 4/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): b5 a6 fc 6c 7f a4 d2 7e 08 f4 a7 ef 17 c4 5c 57 WPA: TX EAPOL-Key - hexdump(len=99): 02 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b5 a6 fc 6c 7f a4 d2 7e 08 f4 a7 ef 17 c4 5c 57 00 00 SUPP: supp_ether_send(dest=48:45:20:3b:31:75 proto=0x888e len=99) mlan0: WPA: Installing PTK to the driver SUPP: supp_set_key(alg=3 addr=48:45:20:3b:31:75 key_idx=0 set_tx=1) SUPP: set_key - seq - hexdump(len=6): 00 00 00 00 00 00 SUPP: set_key - key - hexdump(len=16): [REMOVED] mlan0: IBSS-RSN-COMPLETED 48:45:20:3b:31:75 SUPP: Do not use this PTK SUPP: supp_mlme_setprotection(addr=48:45:20:3b:31:75 protection_type=1 key_type=1) RSN: received GTK in pairwise handshake - hexdump(len=18): [REMOVED] WPA: Group Key - hexdump(len=16): [REMOVED] mlan0: WPA: Installing GTK to the driver (keyidx=1 tx=0 len=16) WPA: RSC - hexdump(len=6): 00 00 00 00 00 00 SUPP: supp_set_key(alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1 set_tx=0) SUPP: set_key - seq - hexdump(len=6): 00 00 00 00 00 00 SUPP: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=3 addr=0x2a1508 key_idx=1 set_tx=0 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=48:45:20:3b:31:75 RSN IBSS RX GTK nl80211: set_key failed; err=-22 Invalid argument) mlan0: WPA: Failed to set GTK to the driver (alg=3 keylen=16 keyidx=1) mlan0: RSN: Failed to install GTK mlan0: RSN: Failed to configure GTK SUPP: supp_deauthenticate (TODO) l2_packet_receive: src=48:45:20:3b:31:75 len=99 mlan0: RX EAPOL from 48:45:20:3b:31:75 RX EAPOL - hexdump(len=99): 02 03 00 5f 02 03 0a 00 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6e ba a7 20 bf d6 40 40 aa b6 10 b2 8d 24 9b da 00 00 RSN: IBSS RX EAPOL for Authenticator from 48:45:20:3b:31:75 WPA: Received EAPOL-Key from 48:45:20:3b:31:75 key_info=0x30a type=2 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 AUTH: 48:45:20:3b:31:75 - received EAPOL-Key frame (4/4 Pairwise) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKINITDONE AUTH: auth_set_key(alg=3 addr=48:45:20:3b:31:75 key_idx=0) AUTH: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=3 addr=0x29cbc0 key_idx=0 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 addr=48:45:20:3b:31:75 nl80211: Set STA flags - ifname=mlan0 addr=48:45:20:3b:31:75 total_flags=0x1 flags_or=0x1 flags_and=0xffffffff authorized=1 AUTH: 48:45:20:3b:31:75 authorizing port Could not set station 48:45:20:3b:31:75 flags for kernel driver (errno=11) AUTH: eapol event not handled 1 AUTH: eapol event not handled 5 AUTH: eapol event not handled 6 AUTH: 48:45:20:3b:31:75 - pairwise key handshake completed (RSN) EAPOL: idleWhile --> 0 EAPOL: disable timer tick EAP: EAP entering state FAILURE mlan0: CTRL-EVENT-EAP-FAILURE EAP authentication failed [-- Attachment #4: wpa_supplicant-wpa-none.conf --] [-- Type: text/plain, Size: 234 bytes --] ctrl_interface=DIR=/run/wpa_supplicant #GROUP=wheel # use 'ap_scan=2' on all devices connected to the network ap_scan=2 network={ ssid="suppl_wpa_adhoc_vce" mode=1 frequency=2432 proto=WPA key_mgmt=WPA-NONE pairwise=NONE group=TKIP } [-- Attachment #5: wpa_supplicant-wpa-none.log --] [-- Type: text/plain, Size: 14873 bytes --] root@pcm-mx6quad:~# wpa_supplicant -ddd -i mlan0 -c /etc/wpa_supplicant-wpa-none.conf -D nl80211,wext wpa_supplicant v2.5 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'mlan0' conf '/etc/wpa_supplicant.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='DIR=/run/wpa_supplicant' ap_scan=2 Line: 4 - start of a new network block ssid - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce mode=1 (0x1) frequency=2432 (0x980) proto: 0x1 key_mgmt: 0x10 pairwise: 0x1 group: 0x8 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='suppl_wpa_adhoc_vce' rfkill: initial event: idx=8 type=2 op=0 soft=0 hard=0 rfkill: initial event: idx=9 type=1 op=0 soft=0 hard=0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supports Probe Response offload in AP mode nl80211: Use separate P2P group interface (driver advertised support) nl80211: Disable use_monitor with device_ap_sme since no monitor mode support detected nl80211: interface mlan0 in phy phy0 nl80211: Set mode ifindex 17 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x6eee90 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=06 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0a07 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0a11 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=1101 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=1102 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0505 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now netlink: Operstate: ifindex=17 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) nl80211: driver param='(null)' Add interface mlan0 to a new radio phy0 nl80211: Regulatory information - country=FR (DFS-ETSI) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 20 mBm nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) nl80211: 57000-66000 @ 2160 MHz 40 mBm nl80211: Added 802.11b mode based on 802.11g information mlan0: Own MAC address: 98:f1:70:6f:93:f6 Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 mlan0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs mlan0: Setting scan request: 0.100000 sec mlan0: WPS: UUID based on MAC address: 12af4f70-c6df-5d0d-b74d-a8d7cef24161 GnuTLS: Library version 2.12.23 (runtime) - 2.12.23 (build) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED mlan0: Added interface mlan0 mlan0: State: DISCONNECTED -> DISCONNECTED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random mlan0: State: DISCONNECTED -> SCANNING mlan0: Add radio work 'connect'@0x6f5478 mlan0: First radio work item in the queue - schedule start immediately mlan0: Starting radio work 'connect'@0x6f5478 after 0.000044 second wait mlan0: Trying to associate with SSID 'suppl_wpa_adhoc_vce' mlan0: Cancelling scan request mlan0: WPA: clearing own WPA/RSN IE mlan0: Automatic auth_alg selection: 0x1 mlan0: WPA: No WPA/RSN IE available from association info mlan0: WPA: Set cipher suites based on configuration mlan0: WPA: Selected cipher suites: group 8 pairwise 1 key_mgmt 16 proto 1 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK TKIP mlan0: WPA: using PTK NONE mlan0: WPA: using KEY_MGMT WPA-NONE WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00 wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=2 addr=(nil) key_idx=0 set_tx=1 seq_len=6 key_len=32 nl80211: KEY_DATA - hexdump(len=32): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 nl80211: set_key failed; err=-67 Link has been severed) mlan0: State: SCANNING -> ASSOCIATING nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) nl80211: Join IBSS (ifindex=17) nl80211: Set mode ifindex 17 iftype 1 (ADHOC) nl80211: Unsubscribe mgmt frames handle 0x88e66619 (mode change) nl80211: Subscribe to mgmt frames with non-AP handle 0x6eee90 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x6eee90 match= nl80211: Register frame command failed (type=176): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=0): [NULL] nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=06 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0a07 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0a11 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=1101 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=1102 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x6eee90 match=0505 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now * SSID - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce * freq=2432 * vht_enabled=0 * ht_enabled=1 * sec_channel_offset=0 * channel_type=1 * Extra IEs for Beacon/Probe Response frames - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00 nl80211: Join IBSS request sent successfully wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=2 addr=(nil) key_idx=0 set_tx=1 seq_len=6 key_len=32 nl80211: KEY_DATA - hexdump(len=32): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 mlan0: Cancelling authentication timeout mlan0: State: ASSOCIATING -> COMPLETED mlan0: Radio work 'connect'@0x6f5478 done in 1.954082 seconds mlan0: CTRL-EVENT-CONNECTED - Connection to 00:00:00:00:00:00 completed [id=-1 id_str=] nl80211: Set mlan0 operstate 0->1 (UP) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=ForceAuthorized EAPOL: disable timer tick RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x19003 ([UP][LOWER_UP]) nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x19043 ([UP][RUNNING][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 43 (NL80211_CMD_JOIN_IBSS) received for mlan0 nl80211: IBSS 02:21:81:d5:af:d2 joined nl80211: IBSS-joined on 2432 MHz nl80211: Operating frequency for the associated BSS from scan results: 2432 MHz nl80211: IBSS on frequency 2432 MHz mlan0: Event ASSOC (0) received mlan0: State: COMPLETED -> ASSOCIATED nl80211: Set mlan0 operstate 1->0 (DORMANT) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) mlan0: Associated to a new BSS: BSSID=02:21:81:d5:af:d2 Add randomness: count=1 entropy=0 random pool - hexdump(len=128): [REMOVED] random_mix_pool - hexdump(len=8): [REMOVED] random_mix_pool - hexdump(len=6): [REMOVED] random pool - hexdump(len=128): [REMOVED] mlan0: Select network based on association information mlan0: Network configuration found for the current AP mlan0: WPA: Using WPA IE from AssocReq to set cipher suites mlan0: WPA: Selected cipher suites: group 8 pairwise 1 key_mgmt 16 proto 1 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK TKIP mlan0: WPA: using PTK NONE mlan0: WPA: using KEY_MGMT WPA-NONE WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 00 01 00 00 50 f2 00 nl80211: IBSS-joined on 2432 MHz nl80211: Received scan results (4 BSSes) Sorted scan results 98:f1:70:6f:96:10 freq=2437 qual=0 noise=-92 level=-72 snr=20 flags=0x9 age=1190 est=54000 IEs - hexdump(len=137): 00 06 50 43 4d 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 03 01 06 05 05 01 02 00 00 00 2a 01 00 2d 1a 2d 1a 0c ff ff ff 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 30 48 60 6c 3d 16 06 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 98:f1:70:6f:4c:ef freq=2437 qual=0 noise=-92 level=-91 snr=1 flags=0x9 age=1160 est=6500 IEs - hexdump(len=137): 00 06 50 43 4d 5f 41 50 01 08 82 84 8b 96 0c 12 18 24 03 01 06 05 05 00 02 00 00 00 2a 01 00 2d 1a 2d 1a 0c ff ff ff 00 00 00 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 0c 00 32 04 30 48 60 6c 3d 16 06 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 02:21:81:d5:af:d2 freq=2432 qual=0 noise=-92 level=0 snr=92* flags=0x9 age=20 est=0 IEs - hexdump(len=21): 00 13 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f 76 63 65 80:1f:02:f5:81:7e freq=2437 qual=0 noise=-92 level=-82 snr=10 flags=0x9 age=1140 est=24000 IEs - hexdump(len=234): 00 20 54 50 2d 4c 49 4e 4b 5f 32 2e 34 47 48 7a 5f 43 33 30 30 5f 50 43 4d 5f 4c 61 62 5f 42 41 54 34 01 08 82 84 8b 96 0c 12 18 24 03 01 06 05 04 00 03 00 00 2a 01 04 32 04 30 48 60 6c 2d 1a ad 19 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 3d 16 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 18 00 50 f2 02 01 01 00 00 03 a4 00 00 27 a4 00 00 42 43 5e 00 62 32 2f 00 dd 1e 00 90 4c 33 ad 19 1b ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 1a 00 90 4c 34 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 dd 06 00 e0 4c 02 01 60 dd 18 00 50 f2 04 10 4a 00 01 10 10 44 00 01 02 10 49 00 06 00 37 2a 00 01 20 mlan0: BSS: Start scan result update 1 mlan0: BSS: Add new id 0 BSSID 98:f1:70:6f:96:10 SSID 'PCM_AP' freq 2437 mlan0: BSS: Add new id 1 BSSID 98:f1:70:6f:4c:ef SSID 'PCM_AP' freq 2437 mlan0: BSS: Add new id 2 BSSID 02:21:81:d5:af:d2 SSID 'suppl_wpa_adhoc_vce' freq 2432 mlan0: BSS: Add new id 3 BSSID 80:1f:02:f5:81:7e SSID 'TP-LINK_2.4GHz_C300_PCM_Lab_BAT4' freq 2437 EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=ForceAuthorized mlan0: Associated with 02:21:81:d5:af:d2 mlan0: WPA: Association event - clear replay counter mlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for 02:21:81:d5:af:d2 nl80211: Failed to set STA flag: -524 (Unknown error 524) EAPOL: SUPP_BE entering state IDLE wpa_driver_nl80211_set_key: ifindex=17 (mlan0) alg=2 addr=(nil) key_idx=0 set_tx=1 seq_len=6 key_len=32 nl80211: KEY_DATA - hexdump(len=32): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 mlan0: Cancelling authentication timeout mlan0: State: ASSOCIATED -> COMPLETED mlan0: CTRL-EVENT-CONNECTED - Connection to 02:21:81:d5:af:d2 completed [id=0 id_str=] nl80211: Set mlan0 operstate 0->1 (UP) netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) mlan0: Cancelling scan request RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x19003 ([UP][LOWER_UP]) nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate netlink: Operstate: ifindex=17 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) RTM_NEWLINK: ifi_index=17 ifname=mlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x19043 ([UP][RUNNING][LOWER_UP]) ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-13 8:22 ` Vincent CESSON @ 2016-06-13 13:23 ` Amitkumar Karwar 2016-06-13 13:38 ` Vincent CESSON 0 siblings, 1 reply; 17+ messages in thread From: Amitkumar Karwar @ 2016-06-13 13:23 UTC (permalink / raw) To: Vincent CESSON, Raymond Hayes; +Cc: linux-wireless SGkgVmluY2VudCwNCg0KPiBGcm9tOiBsaW51eC13aXJlbGVzcy1vd25lckB2Z2VyLmtlcm5lbC5v cmcgW21haWx0bzpsaW51eC13aXJlbGVzcy0NCj4gb3duZXJAdmdlci5rZXJuZWwub3JnXSBPbiBC ZWhhbGYgT2YgVmluY2VudCBDRVNTT04NCj4gU2VudDogTW9uZGF5LCBKdW5lIDEzLCAyMDE2IDE6 NTIgUE0NCj4gVG86IFJheW1vbmQgSGF5ZXMNCj4gQ2M6IGxpbnV4LXdpcmVsZXNzQHZnZXIua2Vy bmVsLm9yZw0KPiBTdWJqZWN0OiBSZTogbXdpZmlleCt3cGFfc3VwcGxpY2FudCBjYW5ub3Qgc2V0 IHVwIFdQQS9XUEEyIEFESE9DDQo+IA0KPiBIZXJlIGFyZSB0aGUgbG9ncy4NCj4gDQo+IEkgZG9u J3Qga25vdyBpZiB0aGVyZSBpcyA0LXdheSBoYW5kc2hha2UgaW4gZWFjaCBkaXJlY3Rpb24sIEkg ZG9uJ3QgaGF2ZQ0KPiBsb2dzIG9uIGNvbXB1dGVyIHNpZGUsIEkgdXNlIEdVSS4gSSB0cmllZCB0 byB1c2UgdGhlIHNhbWUNCj4gd3BhX3N1cHBsaWNhbnQtcnNuLmNvbmYgb24gbXkgY29tcHV0ZXIg YW5kIHN0YXJ0IGl0IHdpdGggd3BhX3N1cHBsaWNhbnQsDQo+IGJ1dCBub3RoaW5nIGhhcHBlbi4u LiBFbWJlZGRlZCBkZXZpY2UgZG9lcyBub3QgcmVhY3QgYXQgYWxsLg0KPiANCj4gSSBmb3VuZCBz b21ldGhpbmcgbmV3IChhbmQgc3RyYW5nZSkuIEkgdG9vayBhIHNlY29uZCBlbWJlZGRlZCBkZXZp Y2UsDQo+IHNldCB0aGUgc2FtZSB3cGFfc3VwcGxpY2FudC1yc24uY29uZiBleGNlcHQgdGhlIHBh c3N3b3JkcyAoSSBzZXQgMg0KPiBkaWZmZXJlbnQgcGFzc3dvcmRzKSwgYW5kIEkgdXNlIHRoZSBz YW1lIGNvbW1hbmQgbGluZToNCj4gd3BhX3N1cHBsaWNhbnQgLWRkIC1pIG1sYW4wIC1jIC9ldGMv d3BhX3N1cHBsaWNhbnQtcnNuLmNvbmYgLUQNCj4gbmw4MDIxMSx3ZXh0IFJlc3VsdCwgdGhlIHR3 byBkZXZpY2VzIGpvaW4gYW5kIHBpbmchIFdoZW4gSSBzdGFydCB0aGUNCj4gc2Vjb25kIGRldmlj ZSwgbm8gbG9ncyBhcHBlYXIgb24gdGhlIGZpcnN0IGRldmljZS4uLg0KPiBIb3cgaXMgaXQgcG9z c2libGUgcHNrIGlzIG5vdCB0YWtlbiBpbnRvIGFjY291bnQ/DQo+IA0KDQpUaGFua3MgZm9yIHJl cG9ydGluZyB0aGUgcHJvYmxlbS4gV2Ugd2lsbCB0cnkgdGhpcyBhdCBvdXIgZW5kIGFuZCBjaGVj ayB0aGUgaXNzdWUuDQoNClJlZ2FyZHMsDQpBbWl0a3VtYXINCg== ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-13 13:23 ` Amitkumar Karwar @ 2016-06-13 13:38 ` Vincent CESSON 2016-06-13 13:40 ` Amitkumar Karwar 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-13 13:38 UTC (permalink / raw) To: Amitkumar Karwar; +Cc: Raymond Hayes, linux-wireless About the strange behaviour with the two devices connecting despite the bad passwords, I made a little mistake: on the device 2, wpa_supplicant was not built with option CONFIG_IBSS_RSN=y. But still, device 1 should not accept device 2... Note that with option CONFIG_IBSS_RSN=y enabled on both devices, WPA-PSK connection does not work, even with the right password... Vincent Le 2016-06-13 15:23, Amitkumar Karwar a écrit : > Hi Vincent, > >> From: linux-wireless-owner@vger.kernel.org [mailto:linux-wireless- >> owner@vger.kernel.org] On Behalf Of Vincent CESSON >> Sent: Monday, June 13, 2016 1:52 PM >> To: Raymond Hayes >> Cc: linux-wireless@vger.kernel.org >> Subject: Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >> >> Here are the logs. >> >> I don't know if there is 4-way handshake in each direction, I don't >> have >> logs on computer side, I use GUI. I tried to use the same >> wpa_supplicant-rsn.conf on my computer and start it with >> wpa_supplicant, >> but nothing happen... Embedded device does not react at all. >> >> I found something new (and strange). I took a second embedded device, >> set the same wpa_supplicant-rsn.conf except the passwords (I set 2 >> different passwords), and I use the same command line: >> wpa_supplicant -dd -i mlan0 -c /etc/wpa_supplicant-rsn.conf -D >> nl80211,wext Result, the two devices join and ping! When I start the >> second device, no logs appear on the first device... >> How is it possible psk is not taken into account? >> > > Thanks for reporting the problem. We will try this at our end and > check the issue. > > Regards, > Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-13 13:38 ` Vincent CESSON @ 2016-06-13 13:40 ` Amitkumar Karwar 2016-06-13 14:42 ` Vincent CESSON 0 siblings, 1 reply; 17+ messages in thread From: Amitkumar Karwar @ 2016-06-13 13:40 UTC (permalink / raw) To: Vincent CESSON; +Cc: Raymond Hayes, linux-wireless, Shengzhen Li SGkgVmluY2VudCwNCg0KPiBGcm9tOiBWaW5jZW50IENFU1NPTiBbbWFpbHRvOnZpbmNlbnQuY2Vz c29uQHNtaWxlLmZyXQ0KPiBTZW50OiBNb25kYXksIEp1bmUgMTMsIDIwMTYgNzowOSBQTQ0KPiBU bzogQW1pdGt1bWFyIEthcndhcg0KPiBDYzogUmF5bW9uZCBIYXllczsgbGludXgtd2lyZWxlc3NA dmdlci5rZXJuZWwub3JnDQo+IFN1YmplY3Q6IFJFOiBtd2lmaWV4K3dwYV9zdXBwbGljYW50IGNh bm5vdCBzZXQgdXAgV1BBL1dQQTIgQURIT0MNCj4gDQo+IEFib3V0IHRoZSBzdHJhbmdlIGJlaGF2 aW91ciB3aXRoIHRoZSB0d28gZGV2aWNlcyBjb25uZWN0aW5nIGRlc3BpdGUgdGhlDQo+IGJhZCBw YXNzd29yZHMsIEkgbWFkZSBhIGxpdHRsZSBtaXN0YWtlOiBvbiB0aGUgZGV2aWNlIDIsIHdwYV9z dXBwbGljYW50DQo+IHdhcyBub3QgYnVpbHQgd2l0aCBvcHRpb24gQ09ORklHX0lCU1NfUlNOPXku IEJ1dCBzdGlsbCwgZGV2aWNlIDEgc2hvdWxkDQo+IG5vdCBhY2NlcHQgZGV2aWNlIDIuLi4NCj4g DQo+IE5vdGUgdGhhdCB3aXRoIG9wdGlvbiBDT05GSUdfSUJTU19SU049eSBlbmFibGVkIG9uIGJv dGggZGV2aWNlcywgV1BBLVBTSw0KPiBjb25uZWN0aW9uIGRvZXMgbm90IHdvcmssIGV2ZW4gd2l0 aCB0aGUgcmlnaHQgcGFzc3dvcmQuLi4NCj4gDQoNCkkgc2VlLiBQbGVhc2Ugc2hhcmUgdGhlIHdw YV9zdXBwbGljYW50IGxvZ3Mgd2l0aCBDT05GSUdfSUJTU19SU049eSBlbmFibGVkIGZvciBhbmFs eXNpcy4NCg0KUmVnYXJkcywNCkFtaXRrdW1hcg0K ^ permalink raw reply [flat|nested] 17+ messages in thread
* RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-13 13:40 ` Amitkumar Karwar @ 2016-06-13 14:42 ` Vincent CESSON 2016-06-14 0:30 ` Raymond Hayes 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-13 14:42 UTC (permalink / raw) To: Amitkumar Karwar; +Cc: Raymond Hayes, linux-wireless, Shengzhen Li [-- Attachment #1: Type: text/plain, Size: 1112 bytes --] Hi Amitkumar, Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) from the two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy with command "ifconfig mlan0 192.168.1.xy" and then I try to ping each other, without success. Vincent Le 2016-06-13 15:40, Amitkumar Karwar a écrit : > Hi Vincent, > >> From: Vincent CESSON [mailto:vincent.cesson@smile.fr] >> Sent: Monday, June 13, 2016 7:09 PM >> To: Amitkumar Karwar >> Cc: Raymond Hayes; linux-wireless@vger.kernel.org >> Subject: RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >> >> About the strange behaviour with the two devices connecting despite >> the >> bad passwords, I made a little mistake: on the device 2, >> wpa_supplicant >> was not built with option CONFIG_IBSS_RSN=y. But still, device 1 >> should >> not accept device 2... >> >> Note that with option CONFIG_IBSS_RSN=y enabled on both devices, >> WPA-PSK >> connection does not work, even with the right password... >> > > I see. Please share the wpa_supplicant logs with CONFIG_IBSS_RSN=y > enabled for analysis. > > Regards, > Amitkumar [-- Attachment #2: wpa_supplicant-rsn-device_1.log --] [-- Type: text/plain, Size: 12691 bytes --] root@pcm-mx6quad:~# cat /etc/wpa_supplicant-rsn.conf ctrl_interface=DIR=/run/wpa_supplicant #GROUP=wheel # use 'ap_scan=2' on all devices connected to the network ap_scan=2 network={ ssid="suppl_wpa_adhoc_vce" mode=1 frequency=2432 proto=WPA RSN key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP psk="password" } root@pcm-mx6quad:~# wpa_supplicant -dd -i mlan0 -c /etc/wpa_supplicant-rsn.conf -D nl80211,wext wpa_supplicant v2.5 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'mlan0' conf '/etc/wpa_supplicant-rsn.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant-rsn.conf' -> '/etc/wpa_supplicant-rsn.conf' Reading configuration file '/etc/wpa_supplicant-rsn.conf' ctrl_interface='DIR=/run/wpa_supplicant' ap_scan=2 Line: 4 - start of a new network block ssid - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce mode=1 (0x1) frequency=2432 (0x980) proto: 0x3 key_mgmt: 0x2 pairwise: 0x18 group: 0x18 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='suppl_wpa_adhoc_vce' rfkill: initial event: idx=2 type=2 op=0 soft=0 hard=0 rfkill: initial event: idx=3 type=1 op=0 soft=0 hard=0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supports Probe Response offload in AP mode nl80211: Use separate P2P group interface (driver advertised support) nl80211: Disable use_monitor with device_ap_sme since no monitor mode support detected nl80211: interface mlan0 in phy phy1 nl80211: Set mode ifindex 11 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x1fbae98 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=06 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0a07 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0a11 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=1101 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=1102 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0505 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now netlink: Operstate: ifindex=11 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) nl80211: driver param='(null)' Add interface mlan0 to a new radio phy1 nl80211: Regulatory information - country=FR (DFS-ETSI) nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 80 MHz 20 mBm nl80211: 5250-5330 @ 80 MHz 20 mBm (DFS) nl80211: 5490-5710 @ 160 MHz 27 mBm (DFS) nl80211: 57000-66000 @ 2160 MHz 40 mBm nl80211: Added 802.11b mode based on 802.11g information mlan0: Own MAC address: 98:f1:70:6f:93:f6 Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures wpa_driver_nl80211_set_key: ifindex=11 (mlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=11 (mlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=11 (mlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=11 (mlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 mlan0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs mlan0: Setting scan request: 0.100000 sec mlan0: WPS: UUID based on MAC address: 12af4f70-c6df-5d0d-b74d-a8d7cef24161 GnuTLS: Library version 2.12.23 (runtime) - 2.12.23 (build) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED mlan0: Added interface mlan0 mlan0: State: DISCONNECTED -> DISCONNECTED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random mlan0: State: DISCONNECTED -> SCANNING mlan0: Add radio work 'connect'@0x1fc1480 mlan0: First radio work item in the queue - schedule start immediately mlan0: Starting radio work 'connect'@0x1fc1480 after 0.000044 second wait mlan0: Trying to associate with SSID 'suppl_wpa_adhoc_vce' mlan0: Cancelling scan request mlan0: WPA: clearing own WPA/RSN IE mlan0: Automatic auth_alg selection: 0x1 mlan0: WPA: No WPA/RSN IE available from association info mlan0: WPA: Set cipher suites based on configuration mlan0: WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 mlan0: State: SCANNING -> ASSOCIATING nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) nl80211: Join IBSS (ifindex=11) nl80211: Set mode ifindex 11 iftype 1 (ADHOC) nl80211: Unsubscribe mgmt frames handle 0x89732611 (mode change) nl80211: Subscribe to mgmt frames with non-AP handle 0x1fbae98 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x1fbae98 match= nl80211: Register frame command failed (type=176): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=0): [NULL] nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=06 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0a07 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0a11 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=1101 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=1102 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x1fbae98 match=0505 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now * SSID - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce * freq=2432 * vht_enabled=0 * ht_enabled=1 * sec_channel_offset=0 * channel_type=1 * control port * Extra IEs for Beacon/Probe Response frames - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: Join IBSS request sent successfully mlan0: Cancelling authentication timeout EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 EAPOL: disable timer tick nl80211: Event message available nl80211: Drv Event 43 (NL80211_CMD_JOIN_IBSS) received for mlan0 nl80211: IBSS 02:2d:9d:c9:29:c6 joined nl80211: IBSS-joined on 2432 MHz nl80211: Operating frequency for the associated BSS from scan results: 2432 MHz nl80211: IBSS on frequency 2432 MHz mlan0: Event ASSOC (0) received mlan0: State: ASSOCIATING -> ASSOCIATED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) mlan0: Associated to a new BSS: BSSID=02:2d:9d:c9:29:c6 mlan0: Select network based on association information mlan0: Network configuration found for the current AP mlan0: WPA: Using WPA IE from AssocReq to set cipher suites mlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: IBSS-joined on 2432 MHz nl80211: Received scan results (4 BSSes) mlan0: BSS: Start scan result update 1 mlan0: BSS: Add new id 0 BSSID 98:f1:70:6f:4c:ef SSID 'PCM_AP' freq 2437 mlan0: BSS: Add new id 1 BSSID 02:2d:9d:c9:29:c6 SSID 'suppl_wpa_adhoc_vce' freq 2432 mlan0: BSS: Add new id 2 BSSID 80:1f:02:f5:81:7e SSID 'TP-LINK_2.4GHz_C300_PCM_Lab_BAT4' freq 2437 mlan0: BSS: Add new id 3 BSSID 74:da:38:2e:86:00 SSID 'HALT_TEST' freq 2437 EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 mlan0: Associated with 02:2d:9d:c9:29:c6 mlan0: WPA: Association event - clear replay counter mlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for 02:2d:9d:c9:29:c6 nl80211: Failed to set STA flag: -524 (Unknown error 524) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAPOL: enable timer tick EAP: EAP entering state IDLE mlan0: Cancelling authentication timeout mlan0: State: ASSOCIATED -> COMPLETED mlan0: Radio work 'connect'@0x1fc1480 done in 1.912078 seconds mlan0: CTRL-EVENT-CONNECTED - Connection to 02:2d:9d:c9:29:c6 completed [id=0 id_str=] nl80211: Set mlan0 operstate 0->1 (UP) netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) mlan0: Cancelling scan request AUTH: Initializing group state machine Get randomness: len=32 entropy=1 GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) Get randomness: len=16 entropy=0 GTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) AUTH: auth_set_key(alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1) AUTH: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=11 (mlan0) alg=3 addr=0xbca7c key_idx=1 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 broadcast key RTM_NEWLINK: ifi_index=11 ifname=mlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x19003 ([UP][LOWER_UP]) nl80211: Set IF_OPER_UP again based on ifi_flags and expected operstate netlink: Operstate: ifindex=11 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) RTM_NEWLINK: ifi_index=11 ifname=mlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x19043 ([UP][RUNNING][LOWER_UP]) [-- Attachment #3: wpa_supplicant-rsn-device_2.log --] [-- Type: text/plain, Size: 12445 bytes --] root@pcm-mx6solo:~# cat /etc/wpa_supplicant-rsn.conf ctrl_interface=DIR=/run/wpa_supplicant #GROUP=wheel # use 'ap_scan=2' on all devices connected to the network ap_scan=2 network={ ssid="suppl_wpa_adhoc_vce" mode=1 frequency=2432 proto=WPA RSN key_mgmt=WPA-PSK pairwise=CCMP TKIP group=CCMP TKIP psk="password" } root@pcm-mx6solo:~# wpa_supplicant -dd -i mlan0 -c /etc/wpa_supplicant-rsn.conf -D nl80211,wext wpa_supplicant v2.5 random: Trying to read entropy from /dev/random Successfully initialized wpa_supplicant Initializing interface 'mlan0' conf '/etc/wpa_supplicant-rsn.conf' driver 'nl80211,wext' ctrl_interface 'N/A' bridge 'N/A' Configuration file '/etc/wpa_supplicant-rsn.conf' -> '/etc/wpa_supplicant-rsn.conf' Reading configuration file '/etc/wpa_supplicant-rsn.conf' ctrl_interface='DIR=/run/wpa_supplicant' ap_scan=2 Line: 4 - start of a new network block ssid - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce mode=1 (0x1) frequency=2432 (0x980) proto: 0x3 key_mgmt: 0x2 pairwise: 0x18 group: 0x18 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='suppl_wpa_adhoc_vce' rfkill: initial event: idx=6 type=2 op=0 soft=0 hard=0 rfkill: initial event: idx=7 type=1 op=0 soft=0 hard=0 nl80211: TDLS supported nl80211: TDLS external setup nl80211: Supported cipher 00-0f-ac:1 nl80211: Supported cipher 00-0f-ac:5 nl80211: Supported cipher 00-0f-ac:2 nl80211: Supported cipher 00-0f-ac:4 nl80211: Supported cipher 00-0f-ac:6 nl80211: Supports Probe Response offload in AP mode nl80211: Use separate P2P group interface (driver advertised support) nl80211: Disable use_monitor with device_ap_sme since no monitor mode support detected nl80211: interface mlan0 in phy phy0 nl80211: Set mode ifindex 39 iftype 2 (STATION) nl80211: Subscribe to mgmt frames with non-AP handle 0x72ce98 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=06 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0a07 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0a11 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=1101 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=1102 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0505 nl80211: Register frame command failed (type=208): ret=-114 (Operation already in progress) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now netlink: Operstate: ifindex=39 linkmode=1 (userspace-control), operstate=5 (IF_OPER_DORMANT) nl80211: driver param='(null)' Add interface mlan0 to a new radio phy0 nl80211: Regulatory information - country=FR nl80211: 2402-2482 @ 40 MHz 20 mBm nl80211: 5170-5250 @ 40 MHz 20 mBm nl80211: 5250-5330 @ 40 MHz 20 mBm (DFS) nl80211: 5490-5710 @ 40 MHz 27 mBm (DFS) nl80211: 57240-65880 @ 2160 MHz 40 mBm (no outdoor) nl80211: Added 802.11b mode based on 802.11g information mlan0: Own MAC address: 98:f1:70:6f:95:9e Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures wpa_driver_nl80211_set_key: ifindex=39 (mlan0) alg=0 addr=(nil) key_idx=0 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=39 (mlan0) alg=0 addr=(nil) key_idx=1 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=39 (mlan0) alg=0 addr=(nil) key_idx=2 set_tx=0 seq_len=0 key_len=0 wpa_driver_nl80211_set_key: ifindex=39 (mlan0) alg=0 addr=(nil) key_idx=3 set_tx=0 seq_len=0 key_len=0 mlan0: RSN: flushing PMKID list in the driver nl80211: Flush PMKIDs mlan0: Setting scan request: 0.100000 sec mlan0: WPS: UUID based on MAC address: c045f30d-3f63-5ac4-b80c-c19614c1c491 GnuTLS: Library version 2.12.23 (runtime) - 2.12.23 (build) EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: Supplicant port status: Unauthorized nl80211: Skip set_supp_port(unauthorized) while not associated EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED mlan0: Added interface mlan0 mlan0: State: DISCONNECTED -> DISCONNECTED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=39 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) random: Got 20/20 bytes from /dev/random mlan0: State: DISCONNECTED -> SCANNING mlan0: Add radio work 'connect'@0x733480 mlan0: First radio work item in the queue - schedule start immediately mlan0: Starting radio work 'connect'@0x733480 after 0.000045 second wait mlan0: Trying to associate with SSID 'suppl_wpa_adhoc_vce' mlan0: Cancelling scan request mlan0: WPA: clearing own WPA/RSN IE mlan0: Automatic auth_alg selection: 0x1 mlan0: WPA: No WPA/RSN IE available from association info mlan0: WPA: Set cipher suites based on configuration mlan0: WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 mlan0: State: SCANNING -> ASSOCIATING nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=39 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) nl80211: Join IBSS (ifindex=39) nl80211: Set mode ifindex 39 iftype 1 (ADHOC) nl80211: Unsubscribe mgmt frames handle 0x88fa4611 (mode change) nl80211: Subscribe to mgmt frames with non-AP handle 0x72ce98 nl80211: Register frame type=0xb0 (WLAN_FC_STYPE_AUTH) nl_handle=0x72ce98 match= nl80211: Register frame command failed (type=176): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=0): [NULL] nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=06 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=1): 06 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0a07 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 07 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0a11 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 0a 11 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=1101 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 01 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=1102 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 11 02 nl80211: Register frame type=0xd0 (WLAN_FC_STYPE_ACTION) nl_handle=0x72ce98 match=0505 nl80211: Register frame command failed (type=208): ret=-22 (Invalid argument) nl80211: Register frame match - hexdump(len=2): 05 05 nl80211: Failed to register Action frame processing - ignore for now * SSID - hexdump_ascii(len=19): 73 75 70 70 6c 5f 77 70 61 5f 61 64 68 6f 63 5f suppl_wpa_adhoc_ 76 63 65 vce * freq=2432 * vht_enabled=0 * ht_enabled=1 * sec_channel_offset=0 * channel_type=1 * control port * Extra IEs for Beacon/Probe Response frames - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: Join IBSS request sent successfully mlan0: Cancelling authentication timeout EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 EAPOL: disable timer tick RTM_NEWLINK: ifi_index=39 ifname=mlan0 operstate=5 linkmode=1 ifi_family=0 ifi_flags=0x19003 ([UP][LOWER_UP]) nl80211: Event message available nl80211: Drv Event 43 (NL80211_CMD_JOIN_IBSS) received for mlan0 nl80211: IBSS 02:2d:9d:c9:29:c6 joined nl80211: IBSS-joined on 2432 MHz nl80211: Operating frequency for the associated BSS from scan results: 2432 MHz nl80211: IBSS on frequency 2432 MHz mlan0: Event ASSOC (0) received mlan0: State: ASSOCIATING -> ASSOCIATED nl80211: Set mlan0 operstate 0->0 (DORMANT) netlink: Operstate: ifindex=39 linkmode=-1 (no change), operstate=5 (IF_OPER_DORMANT) mlan0: Associated to a new BSS: BSSID=02:2d:9d:c9:29:c6 mlan0: Select network based on association information mlan0: Network configuration found for the current AP mlan0: WPA: Using WPA IE from AssocReq to set cipher suites mlan0: WPA: Selected cipher suites: group 16 pairwise 16 key_mgmt 2 proto 2 mlan0: WPA: clearing AP WPA IE mlan0: WPA: clearing AP RSN IE mlan0: WPA: using GTK CCMP mlan0: WPA: using PTK CCMP mlan0: WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 nl80211: IBSS-joined on 2432 MHz nl80211: Received scan results (3 BSSes) mlan0: BSS: Start scan result update 1 mlan0: BSS: Add new id 0 BSSID 98:f1:70:6f:4c:ef SSID 'PCM_AP' freq 2437 mlan0: BSS: Add new id 1 BSSID 02:2d:9d:c9:29:c6 SSID 'suppl_wpa_adhoc_vce' freq 2432 mlan0: BSS: Add new id 2 BSSID 80:1f:02:f5:81:7e SSID 'TP-LINK_2.4GHz_C300_PCM_Lab_BAT4' freq 2437 EAPOL: External notification - portControl=ForceAuthorized EAPOL: External notification - EAP success=1 EAP: EAP entering state DISABLED EAPOL: External notification - EAP fail=0 mlan0: Associated with 02:2d:9d:c9:29:c6 mlan0: WPA: Association event - clear replay counter mlan0: WPA: Clear old PTK EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state S_FORCE_AUTH EAPOL: Supplicant port status: Authorized nl80211: Set supplicant port authorized for 02:2d:9d:c9:29:c6 nl80211: Failed to set STA flag: -524 (Unknown error 524) EAPOL: SUPP_BE entering state IDLE EAP: EAP entering state INITIALIZE EAPOL: enable timer tick EAP: EAP entering state IDLE mlan0: Cancelling authentication timeout mlan0: State: ASSOCIATED -> COMPLETED mlan0: Radio work 'connect'@0x733480 done in 1.169077 seconds mlan0: CTRL-EVENT-CONNECTED - Connection to 02:2d:9d:c9:29:c6 completed [id=0 id_str=] nl80211: Set mlan0 operstate 0->1 (UP) netlink: Operstate: ifindex=39 linkmode=-1 (no change), operstate=6 (IF_OPER_UP) mlan0: Cancelling scan request AUTH: Initializing group state machine Get randomness: len=32 entropy=1 GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 Key Counter - hexdump(len=32): [REMOVED] WPA: Delay group state machine start until Beacon frames have been configured WPA: Start group state machine to set initial keys WPA: group state machine entering state GTK_INIT (VLAN-ID 0) Get randomness: len=16 entropy=0 GTK - hexdump(len=16): [REMOVED] WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0) AUTH: auth_set_key(alg=3 addr=ff:ff:ff:ff:ff:ff key_idx=1) AUTH: set_key - key - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=39 (mlan0) alg=3 addr=0xbca7c key_idx=1 set_tx=1 seq_len=6 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] nl80211: KEY_SEQ - hexdump(len=6): 00 00 00 00 00 00 broadcast key RTM_NEWLINK: ifi_index=39 ifname=mlan0 operstate=6 linkmode=1 ifi_family=0 ifi_flags=0x19043 ([UP][RUNNING][LOWER_UP]) ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-13 14:42 ` Vincent CESSON @ 2016-06-14 0:30 ` Raymond Hayes 2016-06-15 7:11 ` Vincent CESSON 0 siblings, 1 reply; 17+ messages in thread From: Raymond Hayes @ 2016-06-14 0:30 UTC (permalink / raw) To: Vincent CESSON; +Cc: Amitkumar Karwar, linux-wireless, Shengzhen Li >From the RSN log, the dual 4-way handshakes succeeded, but the GTK was not installed: nl80211: set_key failed; err=-22 Invalid argument) and it looks like there was a problem marking the peer authorized: AUTH: 48:45:20:3b:31:75 authorizing port Could not set station 48:45:20:3b:31:75 flags for kernel driver (errno=11) Ray On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON <vincent.cesson@smile.fr> wrote: > Hi Amitkumar, > > Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) from the > two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy with > command "ifconfig mlan0 192.168.1.xy" and then I try to ping each other, > without success. > > Vincent > > > > Le 2016-06-13 15:40, Amitkumar Karwar a écrit : >> >> Hi Vincent, >> >>> From: Vincent CESSON [mailto:vincent.cesson@smile.fr] >>> Sent: Monday, June 13, 2016 7:09 PM >>> To: Amitkumar Karwar >>> Cc: Raymond Hayes; linux-wireless@vger.kernel.org >>> Subject: RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >>> >>> About the strange behaviour with the two devices connecting despite the >>> bad passwords, I made a little mistake: on the device 2, wpa_supplicant >>> was not built with option CONFIG_IBSS_RSN=y. But still, device 1 should >>> not accept device 2... >>> >>> Note that with option CONFIG_IBSS_RSN=y enabled on both devices, WPA-PSK >>> connection does not work, even with the right password... >>> >> >> I see. Please share the wpa_supplicant logs with CONFIG_IBSS_RSN=y >> enabled for analysis. >> >> Regards, >> Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-14 0:30 ` Raymond Hayes @ 2016-06-15 7:11 ` Vincent CESSON [not found] ` <CAKVVYBnrC6h1EvEW3jpMOsCqgAQ9L-mu_985QyFOOYFY+vZn1Q@mail.gmail.com> 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-15 7:11 UTC (permalink / raw) To: Raymond Hayes; +Cc: Amitkumar Karwar, linux-wireless, Shengzhen Li Hi Raymond, Who is trying to mark the peer authorized? Should I look into mwifiex driver? cfg80211.ko? libnl? wpa_supplicant? I am a bit lost among all these elements. Vincent Le 2016-06-14 02:30, Raymond Hayes a écrit : > From the RSN log, the dual 4-way handshakes succeeded, but the GTK was > not installed: > > nl80211: set_key failed; err=-22 Invalid argument) > > and it looks like there was a problem marking the peer authorized: > > AUTH: 48:45:20:3b:31:75 authorizing port > Could not set station 48:45:20:3b:31:75 flags for kernel driver > (errno=11) > > Ray > > On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON > <vincent.cesson@smile.fr> wrote: >> Hi Amitkumar, >> >> Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) >> from the >> two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy >> with >> command "ifconfig mlan0 192.168.1.xy" and then I try to ping each >> other, >> without success. >> >> Vincent >> >> >> >> Le 2016-06-13 15:40, Amitkumar Karwar a écrit : >>> >>> Hi Vincent, >>> >>>> From: Vincent CESSON [mailto:vincent.cesson@smile.fr] >>>> Sent: Monday, June 13, 2016 7:09 PM >>>> To: Amitkumar Karwar >>>> Cc: Raymond Hayes; linux-wireless@vger.kernel.org >>>> Subject: RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >>>> >>>> About the strange behaviour with the two devices connecting despite >>>> the >>>> bad passwords, I made a little mistake: on the device 2, >>>> wpa_supplicant >>>> was not built with option CONFIG_IBSS_RSN=y. But still, device 1 >>>> should >>>> not accept device 2... >>>> >>>> Note that with option CONFIG_IBSS_RSN=y enabled on both devices, >>>> WPA-PSK >>>> connection does not work, even with the right password... >>>> >>> >>> I see. Please share the wpa_supplicant logs with CONFIG_IBSS_RSN=y >>> enabled for analysis. >>> >>> Regards, >>> Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
[parent not found: <CAKVVYBnrC6h1EvEW3jpMOsCqgAQ9L-mu_985QyFOOYFY+vZn1Q@mail.gmail.com>]
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC [not found] ` <CAKVVYBnrC6h1EvEW3jpMOsCqgAQ9L-mu_985QyFOOYFY+vZn1Q@mail.gmail.com> @ 2016-06-15 14:17 ` Vincent CESSON 2016-06-15 16:17 ` Raymond Hayes 0 siblings, 1 reply; 17+ messages in thread From: Vincent CESSON @ 2016-06-15 14:17 UTC (permalink / raw) To: Raymond Hayes; +Cc: Amitkumar Karwar, linux-wireless, Shengzhen Li [-- Attachment #1: Type: text/plain, Size: 2541 bytes --] I set a successful AP network with WPA-PSK (see conf and log attached). As you can see on log, the message "Could not set station 48:45:20:3b:31:75 flags for kernel driver" appears too, but the connection is OK. Le 2016-06-15 13:35, Raymond Hayes a écrit : > The logs were from wpa_supplicant so I suggest starting there; but > the problem could be on either side, so you'll probably have to look > into mwiflex too. > > Ray > > On Wednesday, June 15, 2016, Vincent CESSON <vincent.cesson@smile.fr> > wrote: > >> Hi Raymond, >> >> Who is trying to mark the peer authorized? Should I look into mwifiex >> driver? cfg80211.ko? libnl? wpa_supplicant? I am a bit lost among all >> these elements. >> >> Vincent >> >> Le 2016-06-14 02:30, Raymond Hayes a écrit : >> >>> From the RSN log, the dual 4-way handshakes succeeded, but the GTK >>> was >>> not installed: >>> >>> nl80211: set_key failed; err=-22 Invalid argument) >>> >>> and it looks like there was a problem marking the peer authorized: >>> >>> AUTH: 48:45:20:3b:31:75 authorizing port >>> Could not set station 48:45:20:3b:31:75 flags for kernel driver >>> (errno=11) >>> >>> Ray >>> >>> On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON >>> <vincent.cesson@smile.fr> wrote: >>> >>>> Hi Amitkumar, >>>> >>>> Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) >>>> from the >>>> two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy >>>> with >>>> command "ifconfig mlan0 192.168.1.xy" and then I try to ping each >>>> other, >>>> without success. >>>> >>>> Vincent >>>> >>>> Le 2016-06-13 15:40, Amitkumar Karwar a écrit : >>>> >>>>> Hi Vincent, >>>>> >>>>>> From: Vincent CESSON [mailto:vincent.cesson@smile.fr] >>>>>> Sent: Monday, June 13, 2016 7:09 PM >>>>>> To: Amitkumar Karwar >>>>>> Cc: Raymond Hayes; linux-wireless@vger.kernel.org >>>>>> Subject: RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >>>>>> >>>>>> About the strange behaviour with the two devices connecting >>>>>> despite the >>>>>> bad passwords, I made a little mistake: on the device 2, >>>>>> wpa_supplicant >>>>>> was not built with option CONFIG_IBSS_RSN=y. But still, device 1 >>>>>> should >>>>>> not accept device 2... >>>>>> >>>>>> Note that with option CONFIG_IBSS_RSN=y enabled on both devices, >>>>>> WPA-PSK >>>>>> connection does not work, even with the right password... >>>>> >>>>> I see. Please share the wpa_supplicant logs with CONFIG_IBSS_RSN=y >>>>> enabled for analysis. >>>>> >>>>> Regards, >>>>> Amitkumar [-- Attachment #2: hostapd-rsn.conf --] [-- Type: text/plain, Size: 188 bytes --] ssid=test_pcm_wpa2_vce interface=uap0 driver=nl80211 hw_mode=a channel=48 ieee80211n=1 wmm_enabled=1 wpa=2 wpa_passphrase=password wpa_key_mgmt=WPA-PSK wpa_pairwise=CCMP rsn_pairwise=CCMP [-- Attachment #3: hostapd-rsn.log --] [-- Type: text/plain, Size: 6075 bytes --] nl80211: Event message available nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for uap0 nl80211: New station 48:45:20:3b:31:75 nl80211: Assoc Req IEs - hexdump(len=98): 00 11 74 65 73 74 5f 70 63 6d 5f 77 70 61 32 5f 76 63 65 01 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 2d 1a ad 11 17 ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7f 08 04 00 00 00 01 00 00 40 dd 07 00 50 f2 02 00 01 00 uap0: Event ASSOC (0) received uap0: STA 48:45:20:3b:31:75 IEEE 802.11: associated STA included RSN IE in (Re)AssocReq New STA nl80211: Set STA flags - ifname=uap0 addr=48:45:20:3b:31:75 total_flags=0x0 flags_or=0x0 flags_and=0xfffffff1 authorized=0 uap0: STA 48:45:20:3b:31:75 WPA: event 1 notification wpa_driver_nl80211_set_key: ifindex=10 (uap0) alg=0 addr=0x12424a0 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=48:45:20:3b:31:75 IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS uap0: STA 48:45:20:3b:31:75 WPA: start authentication WPA: 48:45:20:3b:31:75 WPA_PTK entering state INITIALIZE wpa_driver_nl80211_set_key: ifindex=10 (uap0) alg=0 addr=0x12424a0 key_idx=0 set_tx=1 seq_len=0 key_len=0 addr=48:45:20:3b:31:75 nl80211: Set STA flags - ifname=uap0 addr=48:45:20:3b:31:75 total_flags=0x0 flags_or=0x0 flags_and=0xfffffffe authorized=0 uap0: STA 48:45:20:3b:31:75 IEEE 802.1X: unauthorizing port Could not set station 48:45:20:3b:31:75 flags for kernel driver (errno=11). WPA: 48:45:20:3b:31:75 WPA_PTK_GROUP entering state IDLE WPA: 48:45:20:3b:31:75 WPA_PTK entering state AUTHENTICATION WPA: 48:45:20:3b:31:75 WPA_PTK entering state AUTHENTICATION2 WPA: Re-initialize GMK/Counter on first station Get randomness: len=32 entropy=5 GMK - hexdump(len=32): [REMOVED] Get randomness: len=32 entropy=0 Key Counter - hexdump(len=32): [REMOVED] Get randomness: len=16 entropy=0 GTK - hexdump(len=16): [REMOVED] wpa_driver_nl80211_set_key: ifindex=10 (uap0) alg=3 addr=0x878b0 key_idx=1 set_tx=1 seq_len=0 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] broadcast key Get randomness: len=32 entropy=0 WPA: Assign ANonce - hexdump(len=32): 95 46 c5 a0 c7 08 81 2a ae 45 a3 d4 d6 63 05 e6 d4 b7 f2 ea dc 35 d5 77 5a 83 8b 6e be e8 6a 2a WPA: 48:45:20:3b:31:75 WPA_PTK entering state INITPSK Searching a PSK for 48:45:20:3b:31:75 prev_psk=(nil) Searching a PSK for 48:45:20:3b:31:75 prev_psk=(nil) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKSTART uap0: STA 48:45:20:3b:31:75 WPA: sending 1/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1) RTM_NEWLINK: ifi_index=10 ifname=uap0 operstate=6 linkmode=0 ifi_family=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP]) uap0: Event EAPOL_TX_STATUS (38) received IEEE 802.1X: 48:45:20:3b:31:75 TX status - version=2 type=3 length=95 - ack=1 WPA: EAPOL-Key TX status for STA 48:45:20:3b:31:75 ack=1 WPA: Increase initial EAPOL-Key 1/4 timeout by 1000 ms because of acknowledged frame uap0: Event EAPOL_RX (24) received IEEE 802.1X: 121 bytes from 48:45:20:3b:31:75 IEEE 802.1X: version=1 type=3 length=117 WPA: Received EAPOL-Key from 48:45:20:3b:31:75 key_info=0x10a type=2 key_data_length=22 WPA: Received Key Nonce - hexdump(len=32): 48 83 ef 94 32 5a 9a 4b ed 24 11 fa af c7 84 05 57 c2 3d df 52 7d 23 97 8f 39 10 22 f9 e8 64 93 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 uap0: STA 48:45:20:3b:31:75 WPA: received EAPOL-Key frame (2/4 Pairwise) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKCALCNEGOTIATING Searching a PSK for 48:45:20:3b:31:75 prev_psk=(nil) WPA: PTK derivation - A1=98:f1:70:6f:93:f6 A2=48:45:20:3b:31:75 WPA: Nonce1 - hexdump(len=32): 95 46 c5 a0 c7 08 81 2a ae 45 a3 d4 d6 63 05 e6 d4 b7 f2 ea dc 35 d5 77 5a 83 8b 6e be e8 6a 2a WPA: Nonce2 - hexdump(len=32): 48 83 ef 94 32 5a 9a 4b ed 24 11 fa af c7 84 05 57 c2 3d df 52 7d 23 97 8f 39 10 22 f9 e8 64 93 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: KCK - hexdump(len=16): [REMOVED] WPA: KEK - hexdump(len=16): [REMOVED] WPA: TK - hexdump(len=16): [REMOVED] WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKCALCNEGOTIATING2 WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKINITNEGOTIATING uap0: STA 48:45:20:3b:31:75 WPA: sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=46 keyidx=1 encr=1) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED] WPA: Use EAPOL-Key timeout of 100 ms (retry counter 1) uap0: Event EAPOL_TX_STATUS (38) received IEEE 802.1X: 48:45:20:3b:31:75 TX status - version=2 type=3 length=151 - ack=1 WPA: EAPOL-Key TX status for STA 48:45:20:3b:31:75 ack=1 uap0: Event EAPOL_RX (24) received IEEE 802.1X: 99 bytes from 48:45:20:3b:31:75 IEEE 802.1X: version=1 type=3 length=95 WPA: Received EAPOL-Key from 48:45:20:3b:31:75 key_info=0x30a type=2 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 uap0: STA 48:45:20:3b:31:75 WPA: received EAPOL-Key frame (4/4 Pairwise) WPA: 48:45:20:3b:31:75 WPA_PTK entering state PTKINITDONE wpa_driver_nl80211_set_key: ifindex=10 (uap0) alg=3 addr=0x12424a0 key_idx=0 set_tx=1 seq_len=0 key_len=16 nl80211: KEY_DATA - hexdump(len=16): [REMOVED] addr=48:45:20:3b:31:75 uap0: AP-STA-CONNECTED 48:45:20:3b:31:75 nl80211: Set STA flags - ifname=uap0 addr=48:45:20:3b:31:75 total_flags=0x1 flags_or=0x1 flags_and=0xffffffff authorized=1 uap0: STA 48:45:20:3b:31:75 IEEE 802.1X: authorizing port Could not set station 48:45:20:3b:31:75 flags for kernel driver (errno=11). uap0: STA 48:45:20:3b:31:75 RADIUS: starting accounting session 5529713D-00000000 uap0: STA 48:45:20:3b:31:75 WPA: pairwise key handshake completed (RSN) ^ permalink raw reply [flat|nested] 17+ messages in thread
* Re: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC 2016-06-15 14:17 ` Vincent CESSON @ 2016-06-15 16:17 ` Raymond Hayes 0 siblings, 0 replies; 17+ messages in thread From: Raymond Hayes @ 2016-06-15 16:17 UTC (permalink / raw) To: Vincent CESSON; +Cc: Amitkumar Karwar, linux-wireless, Shengzhen Li I'm not sure what to tell you. Did you look into the GTK installation failure? For WPA-PSK, there's 1 4-way handshake and the STA installs 1 PTK and 1 GTK. For WPA2-PSK for IBSS, there are 2 4-way handshakes and the STA installs 1 PTK and 2 GTKs. If the peer's GTK isn't installed, the STA won't be able to decrypt the peer's broadcast frames. Do you have a sniff of the failure? What's failing? Does it work if you use static IP addresses and static ARP entries? Ray On Wed, Jun 15, 2016 at 7:17 AM, Vincent CESSON <vincent.cesson@smile.fr> wrote: > I set a successful AP network with WPA-PSK (see conf and log attached). As > you can see on log, the message "Could not set station 48:45:20:3b:31:75 > flags for kernel driver" appears too, but the connection is OK. > > > > > Le 2016-06-15 13:35, Raymond Hayes a écrit : >> >> The logs were from wpa_supplicant so I suggest starting there; but >> the problem could be on either side, so you'll probably have to look >> into mwiflex too. >> >> Ray >> >> On Wednesday, June 15, 2016, Vincent CESSON <vincent.cesson@smile.fr> >> wrote: >> >>> Hi Raymond, >>> >>> Who is trying to mark the peer authorized? Should I look into mwifiex >>> driver? cfg80211.ko? libnl? wpa_supplicant? I am a bit lost among all these >>> elements. >>> >>> Vincent >>> >>> Le 2016-06-14 02:30, Raymond Hayes a écrit : >>> >>>> From the RSN log, the dual 4-way handshakes succeeded, but the GTK was >>>> not installed: >>>> >>>> nl80211: set_key failed; err=-22 Invalid argument) >>>> >>>> and it looks like there was a problem marking the peer authorized: >>>> >>>> AUTH: 48:45:20:3b:31:75 authorizing port >>>> Could not set station 48:45:20:3b:31:75 flags for kernel driver >>>> (errno=11) >>>> >>>> Ray >>>> >>>> On Mon, Jun 13, 2016 at 7:42 AM, Vincent CESSON >>>> <vincent.cesson@smile.fr> wrote: >>>> >>>>> Hi Amitkumar, >>>>> >>>>> Here are the wpa_supplicant logs (with CONFIG_IBSS_RSN=y enabled) from >>>>> the >>>>> two devices. Beside wpa_supplicant, I manually set IPs 192.168.1.xy >>>>> with >>>>> command "ifconfig mlan0 192.168.1.xy" and then I try to ping each >>>>> other, >>>>> without success. >>>>> >>>>> Vincent >>>>> >>>>> Le 2016-06-13 15:40, Amitkumar Karwar a écrit : >>>>> >>>>>> Hi Vincent, >>>>>> >>>>>>> From: Vincent CESSON [mailto:vincent.cesson@smile.fr] >>>>>>> Sent: Monday, June 13, 2016 7:09 PM >>>>>>> To: Amitkumar Karwar >>>>>>> Cc: Raymond Hayes; linux-wireless@vger.kernel.org >>>>>>> Subject: RE: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC >>>>>>> >>>>>>> About the strange behaviour with the two devices connecting despite >>>>>>> the >>>>>>> bad passwords, I made a little mistake: on the device 2, >>>>>>> wpa_supplicant >>>>>>> was not built with option CONFIG_IBSS_RSN=y. But still, device 1 >>>>>>> should >>>>>>> not accept device 2... >>>>>>> >>>>>>> Note that with option CONFIG_IBSS_RSN=y enabled on both devices, >>>>>>> WPA-PSK >>>>>>> connection does not work, even with the right password... >>>>>> >>>>>> >>>>>> I see. Please share the wpa_supplicant logs with CONFIG_IBSS_RSN=y >>>>>> enabled for analysis. >>>>>> >>>>>> Regards, >>>>>> Amitkumar ^ permalink raw reply [flat|nested] 17+ messages in thread
end of thread, other threads:[~2016-07-21 15:22 UTC | newest] Thread overview: 17+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2016-07-07 0:36 Fwd: mwifiex+wpa_supplicant cannot set up WPA/WPA2 ADHOC Nestor Machno 2016-07-08 9:15 ` Amitkumar Karwar 2016-07-20 13:23 ` Luana Borgia 2016-07-21 8:30 ` Nestor Machno 2016-07-21 9:05 ` Amitkumar Karwar 2016-07-21 12:34 ` Luana Borgia 2016-07-21 15:22 ` Amitkumar Karwar -- strict thread matches above, loose matches on Subject: below -- 2016-06-10 15:37 Vincent CESSON [not found] ` <CAKVVYBk2Rf6RMPW1uySq4M7LeFCRHBGipYdiOqwQSHxFNmst=A@mail.gmail.com> 2016-06-13 8:22 ` Vincent CESSON 2016-06-13 13:23 ` Amitkumar Karwar 2016-06-13 13:38 ` Vincent CESSON 2016-06-13 13:40 ` Amitkumar Karwar 2016-06-13 14:42 ` Vincent CESSON 2016-06-14 0:30 ` Raymond Hayes 2016-06-15 7:11 ` Vincent CESSON [not found] ` <CAKVVYBnrC6h1EvEW3jpMOsCqgAQ9L-mu_985QyFOOYFY+vZn1Q@mail.gmail.com> 2016-06-15 14:17 ` Vincent CESSON 2016-06-15 16:17 ` Raymond Hayes
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.