wpa_supplicant compilation with -Os option causes WPA2-PSK-TKIP+CCMP break down

Raghavendra s.raghu
Thu Jun 25 05:29:49 PDT 2009


Hi Dan,

Please find log below.

Using built-in specs.
Reading specs from /scratchbox/compilers/cortex-linux-gnueabi/gcc.specs
rename spec cpp to old_cpp
Target: arm-none-linux-gnueabi
Configured with: 
/scratch/paul/lite/linux/src/gcc-4.2/configure --build=i686-pc-linux-gnu --host=i686-pc-linux-gnu 
 --target=arm-none-linux-gnueabi --enable-threads --disable-libmudflap --disable-libssp 
 --disable-libgomp --disable-libstdcxx-pch --with-gnu-as --with-gnu-ld --enable-languages=c,c++ 
 --enable-shared --enable-symvers=gnu --enable-__cxa_atexit --with-pkgversion=CodeSourcery 
Sourcery G++ Lite 
2007q3-51 --with-bugurl=https://support.codesourcery.com/GNUToolchain/ --disable-nls 
 --prefix=/opt/codesourcery --with-sysroot=/opt/codesourcery/arm-none-linux-gnueabi/libc 
 --with-build-sysroot=/scratch/paul/lite/linux/install/arm-none-linux-gnueabi/libc --enable-poison-system-directories --with-build-time-tools=/scratch/paul/lite/linux/install/arm-none-linux-gnueabi/bin --with-build-time-tools=/scratch/paul/lite/linux/install/arm-none-linux-gnueabi/binThread model: posixgcc version 4.2.1 (CodeSourcery Sourcery G++ Lite 2007q3-51)Please let me know if you find any issues in this config.-Raghu----- Original Message -----From: "Dan Williams" <dcbw at redhat.com>To: "Raghavendra" <s.raghu at samsung.com>Cc: <hostap at lists.shmoo.com>Sent: Monday, June 22, 2009 7:51 PMSubject: Re: wpa_supplicant compilation with -Os option causesWPA2-PSK-TKIP+CCMP break down> On Fri, 2009-06-19 at 10:58 +0530, Raghavendra wrote:>> Hi All,>>>>    I faced following issue:>>    WPA2-PSK-TKIP+CCMP is working with DLink (DWL-2100AP),>> Linksys(WAP4400N). But was not working with Cisco (Linksys) - WRT610N.>>    Reason is that I compiled wpa_supplicant with -Os option. Later>> when I comp
iled with -O2 or with out optimization flag it is working>> with Cisco router also. Please see below log.>> Please provide the output of "gcc -v" so we can figure out what exact> compiler you're using.  Optimization bugs are often problems with the> compiler's code generation, but sometimes are legitimate problems with> the original code too.>> By the way, you might consider helping get the upstream TI driver in> shape instead of using the TI vendor driver, which is unlikely to ever> go upstream because it has its own SDIO stack and 802.11 stack; that way> you benefit from all the work the community is doing on the stack and> driver too.>> Dan>>> # ./wpa_supplicant -i tiwlan0 -c ./wpa_supplicant.conf.tmp.linksys>> -Dwext -ddd>> Initializing interface 'tiwlan0' conf>> './wpa_supplicant.conf.tmp.linksys' driver 'wext' ctrl_interface 'N/A'>> bridge 'N/A'>> Configuration file './wpa_supplicant.conf.tmp.linksys' ->>> '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'>> Reading configuration file
>> '/mnt/nfs/./wpa_supplicant.conf.tmp.linksys'>> ctrl_interface='/var/run/wpa_supplicant'>> ap_scan=2>> Line: 5 - start of a new network block>> ssid - hexdump_ascii(len=7):>>      6c 69 6e 6b 73 79 73>> linksys>> proto: 0x3>> key_mgmt: 0x2>> pairwise: 0x18>> group: 0x18>> PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]>> PSK (from passphrase) - hexdump(len=32): [REMOVED]>> Priority group 0>>    id=0 ssid='linksys'>> Initializing interface (2) 'tiwlan0'>> EAPOL: SUPP_PAE entering state DISCONNECTED>> EAPOL: KEY_RX entering state NO_KEY_RECEIVE>> EAPOL: SUPP_BE entering state INITIALIZE>> EAP: EAP entering state DISABLED>> EAPOL: External notification - portEnabled=0>> EAPOL: External notification - portValid=0>> SIOCGIWRANGE: WE(compiled)=22 WE(source)=19 enc_capa=0xf>>   capabilities: key_mgmt 0xf enc 0xf>> WEXT: Operstate: linkmode=1, operstate=5>> Own MAC address: 00:00:f0:00:01:a1>> wpa_driver_wext_set_wpa>> wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key
_len=0>> wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0>> wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0>> wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0>> wpa_driver_wext_set_countermeasures>> wpa_driver_wext_set_drop_unencrypted>> Setting scan request: 0 sec 100000 usec>> Added interface tiwlan0>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])>> Wireless event: cmd=0x8b06 len=8>> State: DISCONNECTED -> SCANNING>> Trying to associate with SSID 'linksys'>> Cancelling scan request>> WPA: clearing own WPA/RSN IE>> Automatic auth_alg selection: 0x1>> WPA: No WPA/RSN IE available from association info>> WPA: Set cipher suites based on configuration>> WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2>> WPA: clearing AP WPA IE>> WPA: clearing AP RSN IE>> WPA: using GTK CCMP>> WPA: using PTK CCMP>> WPA: using KEY_MGMT WPA-PSK>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 04>> 01 
00 00 0f ac 04 01 00 00 0f ac 02 00 00>> No keys have been configured - skip key clearing>> wpa_driver_wext_set_drop_unencrypted>> State: SCANNING -> ASSOCIATING>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)>> WEXT: Operstate: linkmode=0, operstate=291013>> wpa_driver_wext_associate>> ioctl[SIOCSIWGENIE]: Operation not supported>> Association request to the driver failed>> Setting authentication timeout: 5 sec 0 usec>> EAPOL: External notification - EAP success=0>> EAPOL: External notification - EAP fail=0>> EAPOL: External notification - portControl=Auto>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])>> Wireless event: cmd=0x8b06 len=8>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])>> Wireless event: cmd=0x8b1a len=15>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])>> Wireless event: cmd=0x8c02 len=164>> WEXT: Custom wireless event: ''>> RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])>> Wireless event: cmd=0x8c02 len=164>> WEXT: Custom wireless event: ''>> RTM_
NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])>> Wireless event: cmd=0x8c07 len=95>> AssocReq IE wireless event - hexdump(len=87): 00 07 6c 69 6e 6b 73 79>> 73 01 04 82 84 8b 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01>> 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11>> 18 ff 00 00 00 00 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00>> 00 dd 07 00 50 f2 02 00 01 21>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])>> Wireless event: cmd=0x8c08 len=173>> AssocResp IE wireless event - hexdump(len=165): 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])>> Wireless event: cmd=0x8b15 len=20>> Wireless event: new AP: 00:23:69:24:e9:48>> Association info event>> req_ies - hexdump(len=87): 00 07 6c 69 6e 6b 73 79 73 01 04 82 84 8b>> 96 32 08 0c 12 18 24 30 48 60 6c 2e 01 21 30 14 01 00 00 0f ac 02 01>> 00 00 0f ac 04 01 00 00 0f ac 02 3c 00 2d 1a 30 11 18 ff 00 00 00 00>> 00 00 00 00 00 48 00 01 00 00 00 00 00 05 00 00 00 00 dd 07 00 50 f2>> 02 00 01 21>> resp_ies - hexdump(len=165): 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00>> WPA: set own WPA/RSN IE - hexdump(len=22): 30 14 01 00 00 0f ac 02 01>> 00 00 0f ac 04 01 00 00 0f ac 02 3c 00>> State: ASSOCIATING -> ASSOCIATED>> wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)>> WEXT: Operstate: linkmode=0, operstate=291013>> Associated to a new BSS: BSSID=00:23:69:24:e9:48>> No keys have been configured - skip key clearing>> Network configuration found for the current AP>> WPA: Using WPA IE from AssocReq to set cipher suites>> WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2>> WPA: clearing AP WPA IE>> WPA: clearing AP RSN IE>> WPA: using GTK TKIP>> WPA: using PTK CCMP>> WPA: using KEY_MGMT WPA-PSK>> WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02>> 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00>> EAPOL: External notification - EAP success=0>> EAPOL: External notification - EAP fail=0>> EAPOL: External notification - portControl=Auto>> Associate
d with 00:23:69:24:e9:48>> WPA: Association event - clear replay counter>> EAPOL: External notification - portEnabled=0>> EAPOL: External notification - portValid=0>> EAPOL: External notification - EAP success=0>> EAPOL: External notification - portEnabled=1>> EAPOL: SUPP_PAE entering state CONNECTING>> EAPOL: SUPP_BE entering state IDLE>> Setting authentication timeout: 10 sec 0 usec>> Cancelling scan request>> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])>> RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0' added>> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])>> Wireless event: cmd=0x8c02 len=164>> WEXT: Custom wireless event: '  '>> RX EAPOL from 00:23:69:24:e9:48>> RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00>> 00 00 00 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16>> ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> Setting authentication timeout: 10 sec 0 usec>> WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at>> least 99)>>>> RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])>> Wireless event: cmd=0x8c02 len=164>> WEXT: Custom wireless event: '  '>> RX EAPOL from 00:23:69:24:e9:48>> RX EAPOL - hexdump(len=99): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00>> 00 00 01 4b e9 dd 83 9b 8a 81 37 3f b7 0a 1d 8b dc 2f aa 99 83 3f 16>> ea c0 d3 e8 43 d9 4e 7f 08 f2 2a 92 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00>> WPA: EAPOL frame too short to be a WPA EAPOL-Key (len 72, expecting at>> least 99)>>>> This message continues forever.>>>> Just thought this will be helpfull for others so sharing. Let me know>> if there are any other reasons for this failure.>>>> -Raghu>> _______________________________________
________>> HostAP mailing list>> HostAP at lists.shmoo.com>> http://lists.shmoo.com/mailman/listinfo/hostap>




More information about the Hostap mailing list