Running hostapd and wpa_supplicant using test driver

Mati Vait mativait
Thu Mar 19 16:42:56 PDT 2009


Hello,
I'm trying to run hostapd and wpa_supplicant in EAP-PSK mode using test
driver. Everything goes fine until wpa_supplicants debug output (-ddK)
says following:
....
EAP-PSK: 16-octet pre-shared key not configured
EAP: Failed to initialize EAP method: vendor 0 method 47 (PSK)
EAP: Building EAP-Nak (requested type 47 vendor=0 method=0 not allowed)
EAP: allowed methods - hexdump(len=0):
EAP: EAP entering state SEND_RESPONSE
.....

Am I missing some configuration parameter somewhere or is it because
driver_test is not capable of running in EAP-PSK mode?

I'm using code from git (0.6.x).

Thank you for your time,
Mati 




Configuration files are:

1.test_wpa_supplicant.conf:

ctrl_interface=/var/run/wpa_supplicant
driver_param=test_socket=/tmp/hostap/ap1
eapol_version=2
ap_scan=1
fast_reauth=1
# EAP-PSK
network={
	ssid="test_hostapd_eap"
	anonymous_identity="eap_psk_user"
	key_mgmt=WPA-EAP
	eap=PSK
	identity="eap_psk_user at example.com"
	psk="0123456789abcdef0123456789abcdef"
}

2.test_hostapd.conf 

eapol_version=2
ctrl_interface=/var/run/hostapd
ctrl_interface_group=0
interface=ap1
driver=test
test_socket=/tmp/hostap/ap1
# Dump file for state information (on SIGUSR1)
dump_file=/tmp/hostap/hostapd.dump
ssid=test_hostapd_eap
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
macaddr_acl=0  # accept unless in deny list
auth_algs=1  # 802.11 Open System Authentication (no WEP)
ieee8021x=1

eap_server=1

eap_user_file=hostapd.test_eap_user
ca_cert=../eap_example/ca.pem
server_cert=../eap_example/server.pem
private_key=../eap_example/server.key
private_key_passwd="whatever"
eap_message=eap.message
eap_reauth_period=3600
own_ip_addr=127.0.0.1
wpa=1  # bit0=WPA, bit1=RSN
wpa_key_mgmt=WPA-EAP
wpa_pairwise=TKIP CCMP
wpa_group_rekey=6000
wpa_gmk_rekey=86400

3. hostapd.eap_user
"eap_psk_user"	PSK	"unknown"
"eap_psk_user at example.com" PSK	0123456789abcdef0123456789abcdef
"eap_psk_user"	PSK	0123456789abcdef0123456789abcdef
----------------------------------
debug log for hostapd:

Configuration file: test_hostapd_.conf
ctrl_interface_group=0
TLS: Trusted root certificate(s) loaded
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
Allowed channel: mode=1 chan=1 freq=2412 MHz max_tx_power=0 dBm
Allowed channel: mode=0 chan=1 freq=2412 MHz max_tx_power=0 dBm
Allowed channel: mode=2 chan=60 freq=5300 MHz max_tx_power=0 dBm
RATE[0] rate=10 flags=0x152
Passive scanning not supported
Flushing old station entries
Deauthenticate all stations
test_driver_set_privacy(ifname=ap1 enabled=0)
test_driver_set_encryption(iface=ap1 alg=none idx=0 txkey=1)
test_driver_set_encryption(iface=ap1 alg=none idx=1 txkey=0)
test_driver_set_encryption(iface=ap1 alg=none idx=2 txkey=0)
test_driver_set_encryption(iface=ap1 alg=none idx=3 txkey=0)
Using interface ap1 with hwaddr 02:2d:55:b9:67:bd and ssid
'test_hostapd_eap'
test_driver_set_ssid(ifname=ap1)
test_driver_set_ssid: SSID - hexdump_ascii(len=16):
     74 65 73 74 5f 68 6f 73 74 61 70 64 5f 65 61 70   test_hostapd_eap
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): db 37 1c e0 6e 3c 14 32 d4 f4 f1 ad f3 7c 27 45
02 4f a6 e9 32 46 10 62 b1 f4 6d a6 d2 99 36 13
GTK - hexdump(len=32): 21 00 f7 88 4a 49 1d bf 40 dc a6 a1 a9 81 88 10
67 0b 53 14 34 6c db b2 5a 3f 5c 4e bc 49 5c 6a
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
test_driver_set_encryption(iface=ap1 alg=TKIP idx=1 txkey=1)
   key - hexdump(len=32): 21 00 f7 88 4a 49 1d bf 40 dc a6 a1 a9 81 88
10 67 0b 53 14 34 6c db b2 5a 3f 5c 4e bc 49 5c 6a
test_driver_set_privacy(ifname=ap1 enabled=1)
Using existing control interface directory.
ap1: Setup of interface done.
test_driver: received 4 bytes
test_driver: SCAN
test_driver: received 105 bytes
test_driver_assoc: SSID - hexdump_ascii(len=16):
     74 65 73 74 5f 68 6f 73 74 61 70 64 5f 65 61 70   test_hostapd_eap
test_socket: ASSOC sun_path - hexdump_ascii(len=33):
     2f 74 6d 70 2f 77 70 61 5f 73 75 70 70 6c 69 63   /tmp/wpa_supplic
     61 6e 74 5f 74 65 73 74 2d 32 31 37 32 39 2d 30   ant_test-21729-0
     00                                                _               
ap1: STA 02:b5:64:63:30:63 IEEE 802.11: associated
  New STA
ap1: STA 02:b5:64:63:30:63 WPA: event 1 notification
test_driver_set_encryption(iface=ap1 alg=none idx=0 txkey=1)
   addr=02:b5:64:63:30:63
   key - hexdump(len=0):
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: start authentication
EAP: Server state machine created
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state IDLE
IEEE 802.1X: 02:b5:64:63:30:63 CTRL_DIR entering state FORCE_BOTH
ap1: STA 02:b5:64:63:30:63 WPA: start authentication
WPA: 02:b5:64:63:30:63 WPA_PTK entering state INITIALIZE
test_driver_set_encryption(iface=ap1 alg=none idx=0 txkey=1)
   addr=02:b5:64:63:30:63
   key - hexdump(len=0):
WPA: 02:b5:64:63:30:63 WPA_PTK_GROUP entering state IDLE
WPA: 02:b5:64:63:30:63 WPA_PTK entering state AUTHENTICATION
WPA: 02:b5:64:63:30:63 WPA_PTK entering state AUTHENTICATION2
IEEE 802.1X: 02:b5:64:63:30:63 AUTH_PAE entering state DISCONNECTED
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: unauthorizing port
IEEE 802.1X: 02:b5:64:63:30:63 AUTH_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no identity known yet -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 1
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 103
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off;
retransCount=0)
IEEE 802.1X: 02:b5:64:63:30:63 AUTH_PAE entering state CONNECTING
IEEE 802.1X: 02:b5:64:63:30:63 AUTH_PAE entering state AUTHENTICATING
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state REQUEST
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: Sending EAP Packet (identifier
103)
test_driver: received 41 bytes
test_driver: dst=02:2d:55:b9:67:bd src=02:b5:64:63:30:63 proto=888e
IEEE 802.1X: 21 bytes from 02:b5:64:63:30:63
   IEEE 802.1X: version=2 type=0 length=17
EAP: code=2 identifier=103 length=17
 (response)
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: received EAP packet (code=2
id=103 len=17) from STA: EAP Response-Identity (1)
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=103 respMethod=1 respVendor=0
respVendorMethod=0
EAP: EAP entering state INTEGRITY_CHECK
EAP: EAP entering state METHOD_RESPONSE
EAP-Identity: Peer identity - hexdump_ascii(len=12):
     65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user    
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: another method available -> CONTINUE
EAP: EAP entering state PROPOSE_METHOD
EAP: getNextMethod: vendor 0 type 47
EAP: EAP entering state METHOD_REQUEST
EAP: building EAP-Request: Identifier 104
EAP-PSK: PSK-1 (sending)
EAP-PSK: RAND_S (server rand) - hexdump(len=16): c7 88 74 3d 9c 26 96 d1
69 8a fc 43 60 ee d7 c3
EAP: EAP entering state SEND_REQUEST
EAP: EAP entering state IDLE
EAP: retransmit timeout 3 seconds (from dynamic back off;
retransCount=0)
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state REQUEST
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: Sending EAP Packet (identifier
104)
test_driver: received 30 bytes
test_driver: dst=02:2d:55:b9:67:bd src=02:b5:64:63:30:63 proto=888e
IEEE 802.1X: 10 bytes from 02:b5:64:63:30:63
   IEEE 802.1X: version=2 type=0 length=6
EAP: code=2 identifier=104 length=6
 (response)
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: received EAP packet (code=2
id=104 len=6) from STA: EAP Response-Nak (3)
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state RESPONSE
EAP: EAP entering state RECEIVED
EAP: parseEapResp: rxResp=1 respId=104 respMethod=3 respVendor=0
respVendorMethod=0
EAP: EAP entering state NAK
EAP: processing NAK (current EAP method index 1)
EAP: configured methods - hexdump(len=64): 00 00 00 00 2f 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00
EAP: list of methods supported by the peer - hexdump(len=1): 00
EAP: new list of configured methods - hexdump(len=64): 00 00 00 00 2f 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00
EAP: EAP entering state SELECT_ACTION
EAP: getDecision: no more methods available -> FAILURE
EAP: EAP entering state FAILURE
EAP: Building EAP-Failure (id=104)
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state FAIL
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: Sending EAP Packet (identifier
104)
IEEE 802.1X: 02:b5:64:63:30:63 AUTH_PAE entering state HELD
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: unauthorizing port
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: authentication failed - EAP
type: 0 (Unknown)
ap1: STA 02:b5:64:63:30:63 IEEE 802.1X: Supplicant used different EAP
type: 3 (Nak)
IEEE 802.1X: 02:b5:64:63:30:63 BE_AUTH entering state IDLE
test_driver: received 8 bytes
ap1: STA 02:b5:64:63:30:63 IEEE 802.11: disassociated
ap1: STA 02:b5:64:63:30:63 WPA: event 2 notification
test_driver_set_encryption(iface=ap1 alg=none idx=0 txkey=1)
   addr=02:b5:64:63:30:63
   key - hexdump(len=0):
WPA: 02:b5:64:63:30:63 WPA_PTK entering state DISCONNECTED
WPA: 02:b5:64:63:30:63 WPA_PTK entering state INITIALIZE
test_driver_set_encryption(iface=ap1 alg=none idx=0 txkey=1)
   addr=02:b5:64:63:30:63
   key - hexdump(len=0):
EAP: Server state machine removed
...

------------------------------------------
debug log for wpa_supplicant:

Initializing interface 'sta1' conf 'test_wpa_supplicant.conf' driver
'test' ctrl_interface 'N/A' bridge 'N/A'
Configuration file 'test_wpa_supplicant.conf' ->
'test_wpa_supplicant.conf'
Reading configuration file 'test_wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
driver_param='test_socket=/tmp/hostap/ap1'
eapol_version=2
ap_scan=1
fast_reauth=1
Priority group 0
   id=0 ssid='test_hostapd_eap'
wpa_driver_test_set_param: param='test_socket=/tmp/hostap/ap1'
wpa_driver_test_get_mac_addr
Own MAC address: 02:b5:64:63:30:63
wpa_driver_test_set_wpa: enabled=1
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=0 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=1 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=2 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=3 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Using existing control interface directory.
Added interface sta1
Trying to get current scan results first without requesting a new scan
to speed up initial association
Cached scan results are empty - not posting
Selecting BSS from priority group 0
Try to find WPA-enabled AP
Try to find non-WPA AP
No suitable AP found.
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
wpa_driver_test_scan: priv=0x8ddc868
Scan SSID - hexdump(len=0): [NULL]
Scan extra IE(s) - hexdump(len=0): [NULL]
test_driver: received 124 bytes
test_driver: SCANRESP 02:2d:55:b9:67:bd 746573745f686f73746170645f656170
dd1a0050f20101000050f20202000050f2040050f20201000050f201 PRIVACY
EAPOL: disable timer tick
Scan timeout - try to get results
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 02:2d:55:b9:67:bd ssid='test_hostapd_eap' wpa_ie_len=26 rsn_ie_len=0
caps=0x10
   selected based on WPA IE
   selected WPA AP 02:2d:55:b9:67:bd ssid='test_hostapd_eap'
Trying to associate with 02:2d:55:b9:67:bd (SSID='test_hostapd_eap'
freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 1
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_test_associate: priv=0x8ddc868 freq=0 pairwise_suite=3
group_suite=2 key_mgmt_suite=0 auth_alg=1 mode=0
   bssid=02:2d:55:b9:67:bd
   ssid - hexdump_ascii(len=16):
     74 65 73 74 5f 68 6f 73 74 61 70 64 5f 65 61 70   test_hostapd_eap
   wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 04 01 00 00 50 f2 01
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
test_driver: received 29 bytes
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=02:2d:55:b9:67:bd
No keys have been configured - skip key clearing
Associated with 02:2d:55:b9:67:bd
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
test_driver: received 40 bytes
RX EAPOL from 02:2d:55:b9:67:bd
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=103 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=11):
     65 61 70 2e 6d 65 73 73 61 67 65                  eap.message     
EAP: using anonymous identity - hexdump_ascii(len=12):
     65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user    
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=02:2d:55:b9:67:bd
EAPOL: SUPP_BE entering state RECEIVE
test_driver: received 53 bytes
RX EAPOL from 02:2d:55:b9:67:bd
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=104 method=47 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)
EAP-PSK: 16-octet pre-shared key not configured  <<<<<<<<<<<<<<<<<<<<<<<
EAP: Failed to initialize EAP method: vendor 0 method 47 (PSK)
EAP: Building EAP-Nak (requested type 47 vendor=0 method=0 not allowed)
EAP: allowed methods - hexdump(len=0):
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=02:2d:55:b9:67:bd
EAPOL: SUPP_BE entering state RECEIVE
test_driver: received 28 bytes
RX EAPOL from 02:2d:55:b9:67:bd
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
Setting authentication timeout: 2 sec 0 usec
Authentication with 02:2d:55:b9:67:bd timed out.
Added BSSID 02:2d:55:b9:67:bd into blacklist
wpa_driver_test_disassociate addr=02:2d:55:b9:67:bd reason_code=3
Setting scan request: 0 sec 100000 usec
BSSID 02:2d:55:b9:67:bd blacklist count incremented to 2
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=0 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=1 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=2 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=3 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=0 set_tx=0
   addr=02:2d:55:b9:67:bd
wpa_driver_test_mlme_setprotection: protect_type=0 key_type=1
wpa_driver_test_mlme_setprotection: addr=02:2d:55:b9:67:bd
State: ASSOCIATED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
No keys have been configured - skip key clearing
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
Starting AP scan for wildcard SSID
wpa_driver_test_scan: priv=0x8ddc868
Scan SSID - hexdump(len=0): [NULL]
Scan extra IE(s) - hexdump(len=0): [NULL]
test_driver: received 124 bytes
test_driver: SCANRESP 02:2d:55:b9:67:bd 746573745f686f73746170645f656170
dd1a0050f20101000050f20202000050f2040050f20201000050f201 PRIVACY
EAPOL: startWhen --> 0
Scan timeout - try to get results
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 02:2d:55:b9:67:bd ssid='test_hostapd_eap' wpa_ie_len=26 rsn_ie_len=0
caps=0x10
   skip - blacklisted
Try to find non-WPA AP
0: 02:2d:55:b9:67:bd ssid='test_hostapd_eap' wpa_ie_len=26 rsn_ie_len=0
caps=0x10
   skip - blacklisted
No APs found - clear blacklist and try again
Removed BSSID 02:2d:55:b9:67:bd from blacklist (clear)
Selecting BSS from priority group 0
Try to find WPA-enabled AP
0: 02:2d:55:b9:67:bd ssid='test_hostapd_eap' wpa_ie_len=26 rsn_ie_len=0
caps=0x10
   selected based on WPA IE
   selected WPA AP 02:2d:55:b9:67:bd ssid='test_hostapd_eap'
Trying to associate with 02:2d:55:b9:67:bd (SSID='test_hostapd_eap'
freq=0 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 1
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2
02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 01
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00
00 50 f2 02 01 00 00 50 f2 04 01 00 00 50 f2 01
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
wpa_driver_test_associate: priv=0x8ddc868 freq=0 pairwise_suite=3
group_suite=2 key_mgmt_suite=0 auth_alg=1 mode=0
   bssid=02:2d:55:b9:67:bd
   ssid - hexdump_ascii(len=16):
     74 65 73 74 5f 68 6f 73 74 61 70 64 5f 65 61 70   test_hostapd_eap
   wpa_ie - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 04 01 00 00 50 f2 01
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
test_driver: received 29 bytes
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=02:2d:55:b9:67:bd
No keys have been configured - skip key clearing
Associated with 02:2d:55:b9:67:bd
WPA: Association event - clear replay counter
WPA: Clear old PTK
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
test_driver: received 40 bytes
RX EAPOL from 02:2d:55:b9:67:bd
Setting authentication timeout: 70 sec 0 usec
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_PAE entering state RESTART
EAP: EAP entering state INITIALIZE
EAP: EAP entering state IDLE
EAPOL: SUPP_PAE entering state AUTHENTICATING
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=198 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state IDENTITY
CTRL-EVENT-EAP-STARTED EAP authentication started
EAP: EAP-Request Identity data - hexdump_ascii(len=11):
     65 61 70 2e 6d 65 73 73 61 67 65                  eap.message     
EAP: using anonymous identity - hexdump_ascii(len=12):
     65 61 70 5f 70 73 6b 5f 75 73 65 72               eap_psk_user    
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=02:2d:55:b9:67:bd
EAPOL: SUPP_BE entering state RECEIVE
test_driver: received 53 bytes
RX EAPOL from 02:2d:55:b9:67:bd
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=199 method=47 vendor=0 vendorMethod=0
EAP: EAP entering state GET_METHOD
EAP: Initialize selected EAP method: vendor 0 method 47 (PSK)
EAP-PSK: 16-octet pre-shared key not configured
EAP: Failed to initialize EAP method: vendor 0 method 47 (PSK)
EAP: Building EAP-Nak (requested type 47 vendor=0 method=0 not allowed)
EAP: allowed methods - hexdump(len=0):
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=02:2d:55:b9:67:bd
EAPOL: SUPP_BE entering state RECEIVE
test_driver: received 28 bytes
RX EAPOL from 02:2d:55:b9:67:bd
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP entering state FAILURE
CTRL-EVENT-EAP-FAILURE EAP authentication failed
EAPOL: SUPP_PAE entering state HELD
EAPOL: SUPP_BE entering state RECEIVE
EAPOL: SUPP_BE entering state FAIL
EAPOL: SUPP_BE entering state IDLE
EAPOL authentication completed unsuccessfully
Setting authentication timeout: 2 sec 0 usec
CTRL-EVENT-TERMINATING - signal 2 received
Removing interface sta1
State: ASSOCIATED -> DISCONNECTED
wpa_driver_test_deauthenticate addr=02:2d:55:b9:67:bd reason_code=3
Added BSSID 02:2d:55:b9:67:bd into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=0 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=1 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=2 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=3 set_tx=0
   addr=ff:ff:ff:ff:ff:ff
wpa_driver_test_set_key: priv=0x8ddc868 alg=0 key_idx=0 set_tx=0
   addr=02:2d:55:b9:67:bd
wpa_driver_test_mlme_setprotection: protect_type=0 key_type=1
wpa_driver_test_mlme_setprotection: addr=02:2d:55:b9:67:bd
State: DISCONNECTED -> DISCONNECTED
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
wpa_driver_test_set_wpa: enabled=0
No keys have been configured - skip key clearing
Control interface directory not empty - leaving it behind
Removed BSSID 02:2d:55:b9:67:bd from blacklist (clear)
Cancelling scan request
Cancelling authentication timeout






More information about the Hostap mailing list