cant ping from qnx AP (running hostapd) to wireless client and vice versa, after client status shows 'connected'
joyce tanks
joyce_tanks
Wed May 27 04:44:54 PDT 2009
Hello
I'm trying to run hostapd (0.6.4) on QNX (RTOS) board using the configuration below. The driver for QNX is BSD net80211 layer.
interface=run0
ssid=DemoAP
macaddr_acl=0
auth_algs=1
wpa=1
wpa_passphrase=password
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
I'm
using my windows xp integrated wireless card as the client, and it gets
to the connected status but both host ap and client cannot ping each
other.
I'm running hostapd with the -d option now, I get the messages below.
I'm
new to this so I'm not sure whats going on. I made sure I entered the
correct password "password"too. I see the error 'Could not set station
00:21:5c:88:ea:99 flags for kernel driver (errno=22)'. Does anyone know
whats happening?
Any info will be appreciated.
thanks
joyce
# hostapd -d /etc/hostapd.conf
Configuration file: /etc/hostapd.conf
bsd_set_iface_flags: dev_up=0
BSS count 1, BSSID mask ff:ff:ff:ff:ff:ff (0 bits)
run0: IEEE 802.11 Fetching hardware channel/rate support not supported.
Flushing old station entries
bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=3
Deauthenticate all stations
bsd_sta_deauth: addr=ff:ff:ff:ff:ff:ff reason_code=2
bsd_set_privacy: enabled=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=0
bsd_del_key: addr=00:00:00:00:00:00 key_idx=1
bsd_del_key: addr=00:00:00:00:00:00 key_idx=2
bsd_del_key: addr=00:00:00:00:00:00 key_idx=3
bsd_get_ssid: ssid=""
Using interface run0 with hwaddr 00:0e:8e:20:9f:40 and ssid 'DemoAP'
SSID - hexdump_ascii(len=6):
44 65 6d 6f 41 50 DemoAP
PSK (ASCII passphrase) - hexdump_ascii(len=8):
70 61 73 73 77 6f 72 64 password
PSK
(from passphrase) - hexdump(len=32): c2 19 dd 6f ba e9 e0 78 d4 d2 d9
97 f9 3d 14 37 b4 a0 8c 00 af 8a 0e 20 e0 b7 e0 36 e1 5c ef 6e
bsd_set_ssid: ssid="DemoAP"
bsd_set_ieee8021x: enabled=1
bsd_configure_wpa: group key cipher=AES-CCM (3)
bsd_configure_wpa: pairwise key ciphers=0x8
bsd_configure_wpa: key management algorithms=0x2
bsd_configure_wpa: rsn capabilities=0x0
bsd_configure_wpa: enable WPA= 0x1
bsd_set_iface_flags: dev_up=1
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
bsd_set_key: alg=CCMP addr=00:00:00:00:00:00 key_idx=1
bsd_set_privacy: enabled=1
run0: Setup of interface done.
run0: STA 00:21:5c:88:ea:99 IEEE 802.11: associated
New STA
run0: STA 00:21:5c:88:ea:99 WPA: event 1 notification
bsd_del_key: addr=00:21:5c:88:ea:99 key_idx=0
run0: STA 00:21:5c:88:ea:99 WPA: start authentication
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state INITIALIZE
bsd_del_key: addr=00:21:5c:88:ea:99 key_idx=0
bsd_set_sta_authorized: addr=00:21:5c:88:ea:99 authorized=0
run0: STA 00:21:5c:88:ea:99 IEEE 802.1X: unauthorizing port
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state IDLE
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state AUTHENTICATION
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state AUTHENTICATION2
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state INITPSK
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state PTKSTART
run0: STA 00:21:5c:88:ea:99 WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 keyidx=0 encr=0)
TX
EAPOL - hexdump(len=113): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 5f fe 00 8a 00 10 00 00 00 00 00 00 00 01 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a ba
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00
IEEE 802.1X: 125 bytes from 00:21:5c:88:ea:99
IEEE 802.1X: version=1 type=3 length=121
run0: STA 00:21:5c:88:ea:99 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=00:0e:8e:20:9f:40 A2=00:21:5c:88:ea:99
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state PTKINITNEGOTIATING
bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
run0: STA 00:21:5c:88:ea:99 WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=8 kde_len=24 keyidx=0 encr=0)
TX
EAPOL - hexdump(len=137): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 77 fe 01 ca 00 10 00 00 00 00 00 00 00 02 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a ba
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 d9 a1 d9 e2 67 eb 1b 70 09 0a ff 18 97 9e a6 c8
00 18 dd 16 00 50 f2 01 01 00 00 50 f2 04 01 00 00 50 f2 04 01 00 00 50
f2 02
IEEE 802.1X: 99 bytes from 00:21:5c:88:ea:99
IEEE 802.1X: version=1 type=3 length=95
run0: STA 00:21:5c:88:ea:99 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state PTKINITDONE
bsd_set_key: alg=CCMP addr=00:21:5c:88:ea:99 key_idx=0
bsd_set_sta_authorized: addr=00:21:5c:88:ea:99 authorized=1
run0: STA 00:21:5c:88:ea:99 IEEE 802.1X: authorizing port
run0: STA 00:21:5c:88:ea:99 WPA: pairwise key handshake completed (WPA)
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state REKEYNEGOTIATING
bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
run0: STA 00:21:5c:88:ea:99 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX
EAPOL - hexdump(len=137): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 03 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a b9
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 cc 52 ea 11 2e 68 05 8a 9f b4 d0 6f 4b ee 1e 4e
00 18 25 bb 79 13 f6 fe fa cc b5 34 94 0f fb 6f b5 38 52 50 8a ac da 07
c9 c0
run0: STA 00:21:5c:88:ea:99 WPA: EAPOL-Key timeout
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state REKEYNEGOTIATING
bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
run0: STA 00:21:5c:88:ea:99 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX
EAPOL - hexdump(len=137): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 04 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a b9
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 b4 52 a0 d0 ad 08 d8 07 1d 34 10 76 76 db 0c 70
00 18 25 bb 79 13 f6 fe fa cc b5 34 94 0f fb 6f b5 38 52 50 8a ac da 07
c9 c0
run0: STA 00:21:5c:88:ea:99 WPA: EAPOL-Key timeout
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state REKEYNEGOTIATING
bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
run0: STA 00:21:5c:88:ea:99 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX
EAPOL - hexdump(len=137): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 05 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a b9
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 07 e5 d1 e2 43 10 de 0b 54 a8 ae 6a 6d ba c3 e3
00 18 25 bb 79 13 f6 fe fa cc b5 34 94 0f fb 6f b5 38 52 50 8a ac da 07
c9 c0
run0: STA 00:21:5c:88:ea:99 WPA: EAPOL-Key timeout
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state REKEYNEGOTIATING
bsd_get_seqnum: addr=00:00:00:00:00:00 idx=1
run0: STA 00:21:5c:88:ea:99 WPA: sending 1/2 msg of Group Key Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=0 pairwise=0 kde_len=16 keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=24): [REMOVED]
TX
EAPOL - hexdump(len=137): 00 21 5c 88 ea 99 00 0e 8e 20 9f 40 88 8e 02
03 00 77 fe 03 92 00 10 00 00 00 00 00 00 00 06 a2 16 35 10 8a 2e 78 dc
3c 35 60 74 e1 06 73 51 68 94 9a c0 cf fd 27 e4 7a 92 20 90 c8 c5 1a b9
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 33 94 57 25 3f 37 dd d6 37 e6 18 cc c6 24 a3 e9
00 18 25 bb 79 13 f6 fe fa cc b5 34 94 0f fb 6f b5 38 52 50 8a ac da 07
c9 c0
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state KEYERROR
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state DISCONNECT
hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:21:5c:88:ea:99 reason 2
bsd_sta_deauth: addr=00:21:5c:88:ea:99 reason_code=2
WPA: 00:21:5c:88:ea:99 WPA_PTK_GROUP entering state IDLE
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state DISCONNECTED
WPA: 00:21:5c:88:ea:99 WPA_PTK entering state INITIALIZE
bsd_del_key: addr=00:21:5c:88:ea:99 key_idx=0
ioctl[SIOCS80211]: No such file or directory
bsd_set_sta_authorized: addr=00:21:5c:88:ea:99 authorized=0
ioctl[SIOCS80211]: Invalid argument
run0: STA 00:21:5c:88:ea:99 IEEE 802.1X: unauthorizing port
Could not set station 00:21:5c:88:ea:99 flags for kernel driver (errno=22).
run0: STA 00:21:5c:88:ea:99 IEEE 802.11: deauthenticated due to local deauth request
run0: STA 00:21:5c:88:ea:99 IEEE 802.11: deassociated
Get your new Email address!
Grab the Email name you've always wanted before someone else does!
http://mail.promotions.yahoo.com/newdomains/aa/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20090527/44aeb632/attachment.htm
More information about the Hostap
mailing list