wpa_supplicant not working on wext interface
hardik patel
hk5patel
Tue Apr 12 07:27:32 PDT 2011
Hi All,
I am using wpa_supplicant v0.8.x which have p2p support on android os.
i am using below conf file to run wpa_supplicant
============
update_config=1
ctrl_interface=DIR=/data/misc/wifi/wpa_supplicant GROUP=wifi
ap_scan=1
fast_reauth=1
#network={
# ssid="ciscos11"
# key_mgmt=NONE
#}
=============
While running wpa_supplicant on nl80211 interface using above conf
file .... it is working fine .... but when i use wext interface with
above conf file.
As soon as i execute below command my android phone is getting hang
and abd connect is lost.
wpa_supplicant -Dwext -iwlan0 -c/data/wpa_supplicant_none.conf -dddd
log ;
====================
D/wpa_supplicant( 501): wpa_supplicant v0.8.x
D/wpa_supplicant( 501): Initializing interface 'wlan0' conf
'/data/wpa_supplicant_none.conf' driver 'wext' ctrl_interface 'N/A'
ridge 'N/A'
D/wpa_supplicant( 501): Configuration file
'/data/wpa_supplicant_none.conf' -> '/data/wpa_supplicant_none.conf'
D/wpa_supplicant( 501): Reading configuration file
'/data/wpa_supplicant_none.conf'
D/wpa_supplicant( 501): update_config=1
D/wpa_supplicant( 501):
ctrl_interface='DIR=/data/misc/wifi/wpa_supplicant GROUP=wifi'
D/wpa_supplicant( 501): ap_scan=1
D/wpa_supplicant( 501): fast_reauth=1
D/wpa_supplicant( 501): WEXT: cfg80211-based driver detected
D/wpa_supplicant( 501): Could not open file
/sys/class/net/wlan0/phy80211/name: No such file or directory
I/wpa_supplicant( 501): rfkill: Cannot open RFKILL control device
D/wpa_supplicant( 501): WEXT: RFKILL status not available
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): SIOCGIWRANGE: WE(compiled)=22 WE(source)=22
enc_capa=0xf
D/wpa_supplicant( 501): capabilities: key_mgmt 0xf enc 0xf flags 0x0
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): netlink: Operstate: linkmode=1, operstate=5
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=0
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=1
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=2
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=3
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_countermeasures
D/wpa_supplicant( 501): EAPOL: SUPP_PAE entering state DISCONNECTED
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): EAPOL: KEY_RX entering state NO_KEY_RECEIVE
D/wpa_supplicant( 501): EAPOL: SUPP_BE entering state INITIALIZE
D/wpa_supplicant( 501): EAP: EAP entering state DISABLED
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): Using existing control interface directory.
D/wpa_supplicant( 501): ctrl_interface_group=1010 (from group name 'wifi')
D/wpa_supplicant( 501): ctrl_iface bind(PF_UNIX) failed: Address already in use
D/wpa_supplicant( 501): ctrl_iface exists, but does not allow
connections - assuming it was leftover from forced program terminion
D/wpa_supplicant( 501): Successfully replaced leftover ctrl_iface
socket '/data/misc/wifi/wpa_supplicant/wlan0'
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b06 len=8
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b1a len=8
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8c02 len=264
D/wpa_supplicant( 501): WEXT: Custom wireless event: 'BEACONIEs=?'
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8c02 len=101
D/wpa_supplicant( 501): WEXT: Custom wireless event: 'BEACONIEs='
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b15 len=20
D/wpa_supplicant( 501): Wireless event: new AP: 00:26:0b:dc:17:8b
D/wpa_supplicant( 501): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
D/wpa_supplicant( 501): netlink: Operstate: linkmode=-1, operstate=5
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): Add randomness: count=1 entropy=0
I/wpa_supplicant( 501): wlan0: No network configuration found for the
current AP
D/wpa_supplicant( 501): wpa_driver_wext_disassociate
D/wpa_supplicant( 501): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
D/wpa_supplicant( 501): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 501): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): EAPOL: External notification - portValid=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b15 len=20
D/wpa_supplicant( 501): Wireless event: new AP: 00:00:00:00:00:00
D/wpa_supplicant( 501): Added BSSID 00:00:00:00:00:00 into blacklist
I/wpa_supplicant( 501): wlan0: CTRL-EVENT-DISCONNECTED
bssid=00:00:00:00:00:00 reason=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=0
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=1
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=2
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=3
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_key: alg=0 key_idx=0
set_tx=0 seq_len=0 key_len=0
D/wpa_supplicant( 501): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
D/wpa_supplicant( 501): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 501): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): EAPOL: External notification - portValid=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b1a len=8
D/wpa_supplicant( 501): WPS: Building WPS IE for Probe Request
D/wpa_supplicant( 501): WPS: * Version (hardcoded 0x10)
D/wpa_supplicant( 501): WPS: * Request Type
D/wpa_supplicant( 501): WPS: * Config Methods (188)
D/wpa_supplicant( 501): WPS: * UUID-E
D/wpa_supplicant( 501): WPS: * Primary Device Type
D/wpa_supplicant( 501): WPS: * RF Bands (3)
D/wpa_supplicant( 501): WPS: * Association State
D/wpa_supplicant( 501): WPS: * Configuration Error (0)
D/wpa_supplicant( 501): WPS: * Device Password ID (0)
D/wpa_supplicant( 501): WPS: * Device Name
D/wpa_supplicant( 501): Scan requested (ret=0) - scan timeout 5 seconds
D/wpa_supplicant( 501): EAPOL: disable timer tick
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8c02 len=264
D/wpa_supplicant( 501): WEXT: Custom wireless event: 'BEACONIEs=?'
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8c02 len=101
D/wpa_supplicant( 501): WEXT: Custom wireless event: 'BEACONIEs='
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b15 len=20
D/wpa_supplicant( 501): Wireless event: new AP: 00:26:0b:dc:17:8b
D/wpa_supplicant( 501): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
D/wpa_supplicant( 501): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 501): Add randomness: count=2 entropy=1
I/wpa_supplicant( 501): wlan0: No network configuration found for the
current AP
D/wpa_supplicant( 501): wpa_driver_wext_disassociate
I/dun_service( 86): process rmnet event
D/wpa_supplicant( 501): wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
D/wpa_supplicant( 501): netlink: Operstate: linkmode=-1, operstate=5
D/wpa_supplicant( 501): EAPOL: External notification - portEnabled=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
D/wpa_supplicant( 501): EAPOL: External notification - portValid=0
D/wpa_supplicant( 501): EAPOL: Supplicant port status: Unauthorized
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
I/dun_service( 86): process rmnet event
I/dun_service( 86): rstate == DUN_RMNETSTATE_ERROR in dun_monitor_kevents
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b1a len=8
D/wpa_supplicant( 501): RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
D/wpa_supplicant( 501): RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan0' added
D/wpa_supplicant( 501): Wireless event: cmd=0x8b19 len=8
I/dun_service( 86): process rmnet event
D/wpa_supplicant( 501): Received 4096 bytes of scan results (1 BSSes)
D/wpa_supplicant( 501): Add randomness: count=3 entropy=2
D/wpa_supplicant( 501): WPS: attr type=0x104a len=1
D/wpa_supplicant( 501): WPS: attr type=0x1044 len=1
D/wpa_supplicant( 501): WPS: attr type=0x103b len=1
D/wpa_supplicant( 501): WPS: attr type=0x1047 len=16
D/wpa_supplicant( 501): WPS: attr type=0x1021 len=20
D/wpa_supplicant( 501): WPS: attr type=0x1023 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1024 len=7
D/wpa_supplicant( 501): WPS: attr type=0x1042 len=12
D/wpa_supplicant( 501): WPS: attr type=0x1054 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1011 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1008 len=2
D/wpa_supplicant( 501): WPS: attr type=0x104a len=1
D/wpa_supplicant( 501): WPS: attr type=0x1044 len=1
D/wpa_supplicant( 501): WPS: attr type=0x103b len=1
D/wpa_supplicant( 501): WPS: attr type=0x1047 len=16
D/wpa_supplicant( 501): WPS: attr type=0x1021 len=20
D/wpa_supplicant( 501): WPS: attr type=0x1023 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1024 len=7
D/wpa_supplicant( 501): WPS: attr type=0x1042 len=12
D/wpa_supplicant( 501): WPS: attr type=0x1054 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1011 len=8
D/wpa_supplicant( 501): WPS: attr type=0x1008 len=2
D/wpa_supplicant( 501): WPS: attr type=0x104a len=1
D/wpa_supplicant( 501): WPS: attr type=0x1044 len=1
D/wpa_supplicant( 501): WPS: attr type=0x103b len=1
D/wpa_supplicant( 501): WPS: attr type=0x1047 len=16
D/wpa_supplicant( 501): WPS: attr type=0x1021 len=20
D/wpa_supplicant( 501): WPS: attr type=0x1023 len=8
If i use wpa_supplicant v0.6.x version and same conf file then it is
working fine ....
can any one tell me why wpa_supplicant is not working on wext
interface.... if i use below conf file then i am to connect with AP
successfully. it means that if we want to use this latest supplicant
with wext interface then at list one AP entry required in conf file
... is it right ?
============
update_config=1
ctrl_interface=DIR=/data/misc/wifi/wpa_supplicant GROUP=wifi
ap_scan=1
fast_reauth=1
network={
ssid="ciscos11"
key_mgmt=NONE
}
=============
--
Regards,
Hardik
"If you are doing what you have always been doing then expect what you
have always been getting."
More information about the Hostap
mailing list