wpa_supplicant-0.5.11 SEG FAULT for for [WPA2-PSK-TKIP+CCMP-preauth]

Raghavendra s.raghu
Tue Jun 16 05:12:15 PDT 2009


This problem I observed in wpa_supplicant-0.6.9 also.
  ----- Original Message ----- 
  From: Raghavendra 
  To: hostap at lists.shmoo.com 
  Cc: Raghavendra 
  Sent: Tuesday, June 16, 2009 5:40 PM
  Subject: wpa_supplicant-0.5.11 SEG FAULT for for [WPA2-PSK-TKIP+CCMP-preauth]


  Hi All,

  I am using wpa_supplicant-0.5.11. I configured D-Link AP with WPA2-PSK and Cipher Type as "Auto". Getting seg fault. Please see logs below.
  In scan result it displayed following info.

    00:15:e9:ba:f3:66       2        188     [WPA2-PSK-TKIP+CCMP-preauth]    default

    I have following wpa_supplicant.conf file.

  # cat wpa_supplicant.conf.tmp 
  ctrl_interface=/var/run/wpa_supplicant
  ap_scan=2


  network={
                  ssid="default"
                  proto=WPA RSN
                  key_mgmt=WPA-PSK
                  pairwise=TKIP CCMP
                  group=TKIP CCMP
                  psk="testtest"
  }




  # wpa_supplicant -i tiwlan0 -c ./wpa_supplicant.conf.tmp -Dwext -ddd
  Initializing interface 'tiwlan0' conf './wpa_supplicant.conf.tmp' driver 'wext' ctrl_interface 'N/A' bridge 'N/A'
  Configuration file './wpa_supplicant.conf.tmp' -> '/mnt/nfs/./wpa_supplicant.conf.tmp'
  Reading configuration file '/mnt/nfs/./wpa_supplicant.conf.tmp'
  ctrl_interface='/var/run/wpa_supplicant'
  ap_scan=2
  Line: 5 - start of a new network block
  ssid - hexdump_ascii(len=7):
       64 65 66 61 75 6c 74                              default         
  proto: 0x3
  key_mgmt: 0x2
  pairwise: 0x18
  group: 0x18
  PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
  PSK (from passphrase) - hexdump(len=32): [REMOVED]
  Priority group 0
     id=0 ssid='default'
  Initializing interface (2) 'tiwlan0'
  EAPOL: SUPP_PAE entering state DISCONNECTED
  EAPOL: KEY_RX entering state NO_KEY_RECEIVE
  EAPOL: SUPP_BE entering state INITIALIZE
  EAP: EAP entering state DISABLED
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf
    capabilities: key_mgmt 0xf enc 0xf
  WEXT: Operstate: linkmode=1, operstate=5
  Own MAC address: 00:00:f0:00:02:89
  wpa_driver_wext_set_wpa
  wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
  wpa_driver_wext_set_countermeasures
  wpa_driver_wext_set_drop_unencrypted
  Setting scan request: 0 sec 100000 usec
  Using existing control interface directory.
  ctrl_iface bind(PF_UNIX) failed: Address already in use
  ctrl_iface exists, but does not allow connections - assuming it was leftover from forced program termination
  Successfully replaced leftover ctrl_iface socket '/var/run/wpa_supplicant/tiwlan0'
  Added interface tiwlan0
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  Wireless event: cmd=0x8b06 len=8
  State: DISCONNECTED -> SCANNING
  Trying to associate with SSID 'default'
  Cancelling scan request
  WPA: clearing own WPA/RSN IE
  Automatic auth_alg selection: 0x1
  WPA: No WPA/RSN IE available from association info
  WPA: Set cipher suites based on configuration
  WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
  WPA: clearing AP WPA IE
  WPA: clearing AP RSN IE
  WPA: using GTK CCMP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  No keys have been configured - skip key clearing
  wpa_driver_wext_set_drop_unencrypted
  State: SCANNING -> ASSOCIATING
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  WEXT: Operstate: linkmode=0, operstate=295929
  wpa_driver_wext_associate
  ioctl[SIOCSIWGENIE]: Operation not supported
  Association request to the driver failed
  Setting authentication timeout: 5 sec 0 usec
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  Wireless event: cmd=0x8b06 len=8
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  Wireless event: cmd=0x8b1a len=15
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  Wireless event: cmd=0x8c02 len=164
  WEXT: Custom wireless event: ''
  RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
  Wireless event: cmd=0x8c02 len=164
  WEXT: Custom wireless event: ''
  RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  Wireless event: cmd=0x8c07 len=55
  AssocReq IE wireless event - hexdump(len=47): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  Wireless event: cmd=0x8c08 len=24
  AssocResp IE wireless event - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
  Wireless event: cmd=0x8b15 len=20
  Wireless event: new AP: 00:15:e9:ba:f3:66
  Association info event
  req_ies - hexdump(len=47): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  resp_ies - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  State: ASSOCIATING -> ASSOCIATED
  wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
  WEXT: Operstate: linkmode=0, operstate=295929
  Associated to a new BSS: BSSID=00:15:e9:ba:f3:66
  No keys have been configured - skip key clearing
  Network configuration found for the current AP
  WPA: Using WPA IE from AssocReq to set cipher suites
  WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
  WPA: clearing AP WPA IE
  WPA: clearing AP RSN IE
  WPA: using GTK TKIP
  WPA: using PTK CCMP
  WPA: using KEY_MGMT WPA-PSK
  WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - EAP fail=0
  EAPOL: External notification - portControl=Auto
  Associated with 00:15:e9:ba:f3:66
  WPA: Association event - clear replay counter
  EAPOL: External notification - portEnabled=0
  EAPOL: External notification - portValid=0
  EAPOL: External notification - EAP success=0
  EAPOL: External notification - portEnabled=1
  EAPOL: SUPP_PAE entering state CONNECTING
  EAPOL: SUPP_BE entering state IDLE
  Setting authentication timeout: 10 sec 0 usec
  Cancelling scan request
  RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0' added
  RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
  Wireless event: cmd=0x8c02 len=164
  WEXT: Custom wireless event: '  '
  RX EAPOL from 00:15:e9:ba:f3:66
  RX EAPOL - hexdump(len=99): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 f5 ca 37 67 43 26 75 b9 ab 87 f3 b4 8e 11 82 99 94 11 71 5e 4b b3 27 22 d9 44 0c 21 3f 4d 64 b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  Setting authentication timeout: 10 sec 0 usec
  Segmentation fault



  -Raghu
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20090616/5a4c1633/attachment-0001.htm 



More information about the Hostap mailing list