wpa_supplicant and MA311 using hostap-driver

Marco Lierfeld hostap
Tue May 1 07:21:25 PDT 2007


Hello

I have a problem using wpa_supplicant (v0.5.7) with a Netgear MA311
(PCI, Prism2.5 chipset) using the hostap-driver.

If I want to connect to my AP via wpa_supplicant, I get the message
        ioctl[PRISM2_IOCTL_HOSTAPD]: Invalid argument
(details and context see debug-output below).

I have loaded the kernel modules for aes and arc4, ieee80211_crypt_tkip
and ieee80211_crypt_ccmp and of course the hostap_pci and hostap
modules. My kernelversion is 2.6.17 (but I tested it also with kernel
2.6.20). 

The card's firmware is:
wifi0: NIC: id=0x8013 v1.0.0
wifi0: PRI: id=0x15 v1.1.1
wifi0: STA: id=0x1f v1.7.4
wifi0: Intersil Prism2.5 PCI: mem=0xdfcff000, irq=11

Also here I have tested with the latest firmware 1.8.4. But as
mentionend here http://linux.junsun.net/intersil-prism/ version 1.7.4
should be best as 1.8.4 has some flaws.

Has somebody an idea what I am doing wrong or how to solve my problem?

Thanks in advance,
Marco

PS: Yes, the card should be WPA-capable as mentioned here for example:
http://www.friedhoff.org/ma311.html



Debug output following:

# wpa_supplicant -Dhostap -ieth1
-c /etc/wpa_supplicant/wpa_supplicant.conf -dd

Initializing interface 'eth1' conf
'/etc/wpa_supplicant/wpa_supplicant.conf' driver 'hostap' ctrl_interface
'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/wpa_supplicant.conf' ->
'/etc/wpa_supplicant/wpa_supplicant.conf'
Reading configuration file '/etc/wpa_supplicant/wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
ctrl_interface_group='0' (DEPRECATED)
eapol_version=1
ap_scan=1
fast_reauth=1
Line: 362 - start of a new network block
ssid - hexdump_ascii(len=9):
     64 6f 6e 74 73 65 65 6d 65                        dontseeme       
proto: 0x3
key_mgmt: 0x2
pairwise: 0x18
group: 0x8
auth_alg: 0x1
PSK (ASCII passphrase) - hexdump_ascii(len=30): [REMOVED]
mode=0 (0x0)
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
   id=0 ssid='dontseeme'
Initializing interface (2) 'eth1'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)=20 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:09:5b:2f:72:26
wpa_driver_hostap_set_wpa: enabled=1
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_countermeasures: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=1
Setting scan request: 0 sec 100000 usec
ctrl_interface_group=0
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
Wireless event: cmd=0x8b06 len=8
Ignore event for foreign ifindex 6
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan
to speed up initial association
Received 282 bytes of scan results (2 BSSes)
Scan results: 2
Selecting BSS from priority group 0
0: 00:03:c9:f9:ad:a5 ssid='dontseeme' wpa_ie_len=30 rsn_ie_len=26
caps=0x11
   selected based on RSN IE
Trying to associate with 00:03:c9:f9:ad:a5 (SSID='dontseeme' freq=2467
MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
Overriding auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 2 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00
0f ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
No keys have been configured - skip key clearing
wpa_driver_hostap_set_drop_unencrypted: enabled=1
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_hostap_associate
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b04 len=12
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len=18
Ignore event for foreign ifindex 6
Ignore event for foreign ifindex 6
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RX EAPOL from 00:03:c9:f9:ad:a5
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
00 00 2e ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a 29 66 8e
5d d2 0d d7 af 1e 34 08 98 34 4b 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 1e 59 da a5 1f
b3 e7 dc b6 1d 18 94 b9 0f 1b 19
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2e
  key_nonce - hexdump(len=32): ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45
c3 69 11 4a 29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
00 00 00 00 00 2e ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a
29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 1e 59
da a5 1f b3 e7 dc b6 1d 18 94 b9 0f 1b 19
State: ASSOCIATING -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:03:c9:f9:ad:a5 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 1e 59 da a5
1f b3 e7 dc b6 1d 18 94 b9 0f 1b 19
RSN: PMKID from Authenticator - hexdump(len=16): 1e 59 da a5 1f b3 e7 dc
b6 1d 18 94 b9 0f 1b 19
RSN: no matching PMKID found
WPA: Renewed SNonce - hexdump(len=32): 9a ed c1 c1 98 90 ed 11 5f 6e 30
65 96 6e 18 16 a0 90 7d 39 8b 20 c7 81 a6 16 fe fd 2c f9 bc 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: Use BSSID (00:03:c9:f9:ad:a5) as the destination for EAPOL-Key
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
00 00 00 00 00 2e 9a ed c1 c1 98 90 ed 11 5f 6e 30 65 96 6e 18 16 a0 90
7d 39 8b 20 c7 81 a6 16 fe fd 2c f9 bc 02 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 09 4d
23 90 a4 a8 46 ca 10 57 8c b7 2b 3e ad 05 00 16 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:03:c9:f9:ad:a5
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00
00 00 2f ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a 29 66 8e
5d d2 0d d7 af 1e 34 08 98 34 4b 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 1e 59 da a5 1f
b3 e7 dc b6 1d 18 94 b9 0f 1b 19
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 2f
  key_nonce - hexdump(len=32): ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45
c3 69 11 4a 29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00
00 00 00 00 00 2f ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a
29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 16 dd 14 00 0f ac 04 1e 59
da a5 1f b3 e7 dc b6 1d 18 94 b9 0f 1b 19
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:03:c9:f9:ad:a5 (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 1e 59 da a5
1f b3 e7 dc b6 1d 18 94 b9 0f 1b 19
RSN: PMKID from Authenticator - hexdump(len=16): 1e 59 da a5 1f b3 e7 dc
b6 1d 18 94 b9 0f 1b 19
RSN: no matching PMKID found
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00
00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00
00 00 00 00 00 2f 9a ed c1 c1 98 90 ed 11 5f 6e 30 65 96 6e 18 16 a0 90
7d 39 8b 20 c7 81 a6 16 fe fd 2c f9 bc 02 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e9 2c
2f b2 8d 37 fc 01 34 0c d8 b4 db 22 ed 5e 00 16 30 14 01 00 00 0f ac 02
01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
RX EAPOL from 00:03:c9:f9:ad:a5
RX EAPOL - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00 00 00 00
00 00 30 ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a 29 66 8e
5d d2 0d d7 af 1e 34 08 98 34 4b 11 4a 29 66 8e 5d d2 0d d7 af 1e 34 08
98 34 4c c1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf 57 3c 76 99
5f 09 81 91 ce d3 a3 cc 6b 6e 62 00 50 e0 84 21 8f 98 bc 7d 1d 6b 07 d5
f2 f5 33 eb 68 aa d0 09 e3 0a ed b9 13 d7 08 68 86 52 13 1d 43 ef 26 be
45 2d 06 14 92 ac 08 2f c6 35 0e 24 49 59 b0 42 a4 ba 9c e3 2c 55 aa d6
5a 2f 1f d8 51 a7 71 00 a3 a3 f5 bc e1 5f 9f a6 95 d1 56 3b 1b
IEEE 802.1X RX: version=2 type=3 length=175
  EAPOL-Key type=2
  key_info 0x13ca (ver=2 keyidx=0 rsvd=0 Pairwise Install Ack MIC Secure
Encr)
  key_length=16 key_data_length=80
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 30
  key_nonce - hexdump(len=32): ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45
c3 69 11 4a 29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b
  key_iv - hexdump(len=16): 11 4a 29 66 8e 5d d2 0d d7 af 1e 34 08 98 34
4c
  key_rsc - hexdump(len=8): c1 01 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): cf 57 3c 76 99 5f 09 81 91 ce d3 a3 cc 6b
6e 62
WPA: RX EAPOL-Key - hexdump(len=179): 02 03 00 af 02 13 ca 00 10 00 00
00 00 00 00 00 30 ca 35 7d 3e c0 07 15 ec 60 f0 59 b6 0e 45 c3 69 11 4a
29 66 8e 5d d2 0d d7 af 1e 34 08 98 34 4b 11 4a 29 66 8e 5d d2 0d d7 af
1e 34 08 98 34 4c c1 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 cf 57
3c 76 99 5f 09 81 91 ce d3 a3 cc 6b 6e 62 00 50 e0 84 21 8f 98 bc 7d 1d
6b 07 d5 f2 f5 33 eb 68 aa d0 09 e3 0a ed b9 13 d7 08 68 86 52 13 1d 43
ef 26 be 45 2d 06 14 92 ac 08 2f c6 35 0e 24 49 59 b0 42 a4 ba 9c e3 2c
55 aa d6 5a 2f 1f d8 51 a7 71 00 a3 a3 f5 bc e1 5f 9f a6 95 d1 56 3b 1b
RSN: encrypted key data - hexdump(len=80): e0 84 21 8f 98 bc 7d 1d 6b 07
d5 f2 f5 33 eb 68 aa d0 09 e3 0a ed b9 13 d7 08 68 86 52 13 1d 43 ef 26
be 45 2d 06 14 92 ac 08 2f c6 35 0e 24 49 59 b0 42 a4 ba 9c e3 2c 55 aa
d6 5a 2f 1f d8 51 a7 71 00 a3 a3 f5 bc e1 5f 9f a6 95 d1 56 3b 1b
WPA: decrypted EAPOL-Key key data - hexdump(len=72): [REMOVED]
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 3 of 4-Way Handshake from 00:03:c9:f9:ad:a5 (ver=2)
WPA: IE KeyData - hexdump(len=72): 30 18 01 00 00 0f ac 02 02 00 00 0f
ac 04 00 0f ac 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01 00 08 6f
12 4c 49 c0 38 75 11 8d 67 42 c6 7c 3d 14 30 af 15 36 e0 05 27 2c 4c 8e
9c 5f d9 55 23 36 dd 00 00 00 00 00
WPA: Sending EAPOL-Key 4/4
WPA: TX EAPOL-Key - hexdump(len=99): 01 03 00 5f 02 03 0a 00 00 00 00 00
00 00 00 00 30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ef b4 17
9a c1 cf 5c c8 73 4b 5d 13 30 1b ad 1e 00 00
WPA: Installing PTK to the driver.
wpa_driver_hostap_set_key: alg=CCMP key_idx=0 set_tx=1 seq_len=6
key_len=16
ioctl[PRISM2_IOCTL_HOSTAPD]: Invalid argument
Failed to set encryption.
Crypt algorithm initialization failed.
WPA: Failed to set PTK to the driver.
EAPOL: External notification - portValid=1
State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
RSN: received GTK in pairwise handshake - hexdump(len=34): [REMOVED]
WPA: Group Key - hexdump(len=32): [REMOVED]
WPA: Installing GTK to the driver (keyidx=1 tx=0).
WPA: RSC - hexdump(len=6): c1 01 00 00 00 00
wpa_driver_hostap_set_key: alg=TKIP key_idx=1 set_tx=0 seq_len=6
key_len=32
ioctl[PRISM2_IOCTL_HOSTAPD]: Invalid argument
Failed to set encryption.
Crypt algorithm initialization failed.
WPA: Failed to set GTK to the driver.
RSN: Failed to install GTK
RSN: Failed to configure GTK
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface eth1
State: GROUP_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_hostap_set_key: alg=none key_idx=0 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=1 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=2 set_tx=0 seq_len=0
key_len=0
wpa_driver_hostap_set_key: alg=none key_idx=3 set_tx=0 seq_len=0
key_len=0
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_hostap_set_wpa: enabled=0
wpa_driver_hostap_set_drop_unencrypted: enabled=0
wpa_driver_hostap_set_countermeasures: enabled=0
No keys have been configured - skip key clearing
Cancelling scan request
Cancelling authentication timeout
WEXT: Operstate: linkmode=0, operstate=6







More information about the Hostap mailing list