WPA Supplicant doesn't send authentication request
Dan Williams
dcbw
Fri Dec 14 11:40:06 PST 2007
On Fri, 2007-12-14 at 11:28 -0800, Dmitry Shmidt wrote:
> Hello,
>
> I am porting WPA Supplicant ver 0.5.8 to work with unsupported WiFi
> driver.
> Driver doesn't have WEXT support.
> It allows me to connect to "open" network but not to WEP.
> According to WiFi sniffer Authentication request is not sent by the
> driver to AP.
> What can be the most probable reason for this ?
> Log is attached.
Well, wpa_supplicant itself doesn't send the authentication request.
The driver does. Your custom wpa_supplicant driver should tell the
card's driver to trigger association at the end of the 'associate'
wpa_supplicant driver handler. In WEXT, that usually happens when the
SSID or BSSID is set via SIOCSIWESSID or SIOCSIWBSSID. Without seeing
your driver or your wpa_supplicant driver sources, it's impossible to
say exactly in your case. But however the unsupported WiFi driver wants
to be told to associate is what you should be doing at the end of the
associate handler like wpa_driver_wext_associate() does.
Dan
> ?hanks,
> Dmitry
> ------------------------------------------------------------------------------------------------------------------
> Configuration file '/wpa_supplicant.conf' -> '/wpa_supplicant.conf'
> Reading configuration file '/wpa_supplicant.conf'
> ctrl_interface='/var/run/wpa_supplicant'
> eapol_version=1
> ap_scan=1
> fast_reauth=1
> Line: 437 - start of a new network block
> ssid - hexdump_ascii(len=16):
> 4c 69 6e 6b 73 79 73 5f 53 45 53 5f 34 34 38 33
> Linksys_SES_4483
> key_mgmt: 0x4
> auth_alg: 0x2
> wep_key0 - hexdump(len=5): [REMOVED]
> wep_tx_keyidx=0 (0x0)
> Priority group 0
> id=0 ssid='Linksys_SES_4483'
> Initializing interface (2) 'wlan0'
> EAPOL: SUPP_PAE entering state DISCONNECTED
> EAPOL: KEY_RX entering state NO_KEY_RECEIVE
> EAPOL: SUPP_BE entering state INITIALIZE
> EAP: EAP entering state DISABLED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Initializing CE-STA-DK 1.0 interface...
> driver events socket is 0x7...
> driver events socket is 0x8...
> wpa_driver_get_mac_addr called
> Own MAC address: 00:18:41:01:66:6b
> wpa_driver_set_wpa called
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 0
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 1
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 2
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 3
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_countermeasures called
> wpa_driver_set_drop_unencrypted called: 1 - not implemented
> Setting scan request: 0 sec 100000 usec
> Added interface wlan0
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> Trying to get current scan results first without requesting a new scan
> to speed up initial association
> wpa_driver_get_scan_results called
> Received 1170 bytes of scan results (10 BSSes)
> Scan results: 10
> Selecting BSS from priority group 0
> 4: 00:18:39:39:66:c2 ssid='Linksys_SES_4483' wpa_ie_len=0 rsn_ie_len=0
> caps=0x411
> selected non-WPA AP 00:18:39:39:66:c2 ssid='Linksys_SES_4483'
> Trying to associate with 00:18:39:39:66:c2 (SSID='Linksys_SES_4483'
> freq=2437 MHz)
> Cancelling scan request
> WPA: clearing own WPA/RSN IE
> Automatic auth_alg selection: 0x1
> Overriding auth_alg selection: 0x2
> wpa_driver_set_auth_alg called
> proto: 0
> auth_alg: 2
> auth_alg (AUTH_ALG_SHARED_KEY)
> Selected Auth:os802_11AuthModeShared
> WPA: clearing AP WPA IE
> WPA: clearing AP RSN IE
> WPA: clearing own WPA/RSN IE
> No keys have been configured - skip key clearing
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 0
> add_key (alg): 1
> add_key (set_tx): 1
> add_key (seq): - hexdump(len=0):
> add_key (key): - hexdump(len=5): 37 dd 5a 07 41
> setting this key to be the index: 0x80000000
> Adding WEP key index: 0x0
> wpa_driver_set_drop_unencrypted called: 1 - not implemented
> State: SCANNING -> ASSOCIATING
> wpa_driver_associate called
> setting os802_11Infrastructure mode...
> BSSID=00:18:39:39:66:c2
> Setting authentication timeout: 10 sec 0 usec
> EAPOL: External notification - portControl=ForceAuthorized
> Authentication with 00:00:00:00:00:00 timed out.
> Added BSSID 00:18:39:39:66:c2 into blacklist
> wpa_driver_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 0
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 1
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 2
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> wpa_driver_set_key called
> add_key (addr): ff:ff:ff:ff:ff:ff
> add_key (key_idx): 3
> add_key (alg): 0
> add_key (set_tx): 0
> add_key (seq): - hexdump(len=0): [NULL]
> add_key (key): - hexdump(len=0): [NULL]
> State: ASSOCIATING -> DISCONNECTED
> EAPOL: External notification - portEnabled=0
> EAPOL: External notification - portValid=0
> Setting scan request: 0 sec 0 usec
> State: DISCONNECTED -> SCANNING
> Starting AP scan (broadcast SSID)
> wpa_driver_scan called
>
> _______________________________________________
> HostAP mailing list
> HostAP at shmoo.com
> http://lists.shmoo.com/mailman/listinfo/hostap
More information about the Hostap
mailing list