Could use some help with sw-crypt and ath10k.
Ben Greear
greearb
Wed Dec 11 11:34:19 PST 2013
Hello!
I'm trying to get sw-crypt (ie, just refuse to set the key and return -ENOSPC) to work with ath10k client. The server is ath9k and has been working
fine. It appears that the station connects, but then the AP kicks it out. Almost certainly
the problem is that the ath10k client is doing something wrong, but I could use some help in
figuring out where the problem lies.
The AP's log looks like this below. I can get packet captures on a monitor port,
more verbose logs or other debugging if someone would like to see it.
Thanks,
Ben
2013-12-11 11:19:46.493 1386789586.322929: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:46.493 1386789586.322951: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:46.494 1386789586.322967: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:46.494 1386789587.322842: 1386789587.322849: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:46.494 1386789587.322954: 1386789587.322957: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:46.494 1386789587.322967: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:46.494 1386789587.323083: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 2)
2013-12-11 11:19:46.494 1386789587.323344: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:46.494 1386789587.323364: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:46.494 1386789587.323378: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:47.904 1386789589.323252: 1386789589.323260: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:47.904 1386789589.323385: 1386789589.323390: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:47.904 1386789589.323408: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:47.904 1386789589.323484: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 3)
2013-12-11 11:19:47.904 1386789589.323674: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:47.904 1386789589.323692: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:47.904 1386789589.323703: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:49.905 1386789591.323653: 1386789591.323661: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:49.905 1386789591.323794: 1386789591.323799: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:49.905 1386789591.323822: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:49.905 1386789591.323908: WPA: Use EAPOL-Key timeout of 2000 ms (retry counter 4)
2013-12-11 11:19:49.905 1386789591.324153: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:49.905 1386789591.324166: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:49.905 1386789591.324172: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:51.908 1386789593.324076: 1386789593.324083: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:51.908 1386789593.324132: 1386789593.324135: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state DISCONNECT
2013-12-11 11:19:51.908 1386789593.324152: wpa_sta_disconnect STA 00:03:7f:48:cc:b0
2013-12-11 11:19:51.908 1386789593.324167: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 00:03:7f:48:cc:b0 reason 2
2013-12-11 11:19:51.908 1386789593.324185: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xc0 nlmode=3
2013-12-11 11:19:51.908 1386789593.324199: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:51.908 1386789593.324207: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:51.908 1386789593.324271: 1386789593.324294: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0
key_len=0
2013-12-11 11:19:51.908 1386789593.324308: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908 1386789593.324323: WPA: wpa_sm_step() called recursively
2013-12-11 11:19:51.908 1386789593.324328: ap_sta_disconnect: reschedule ap_handle_timer timeout for 00:03:7f:48:cc:b0 (5 seconds - AP_MAX_INACTIVITY_AFTER_DEAUTH)
2013-12-11 11:19:51.908 1386789593.324335: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state DISCONNECTED
2013-12-11 11:19:51.908 1386789593.324340: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state INITIALIZE
2013-12-11 11:19:51.908 1386789593.324351: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:51.908 1386789593.324358: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908 1386789593.324458: 1386789593.324470: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:51.908 1386789593.324485: nl80211: Frame TX status event
2013-12-11 11:19:51.908 1386789593.324494: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:51.908 1386789593.324501: mgmt::deauth cb
2013-12-11 11:19:51.908 1386789593.324507: STA 00:03:7f:48:cc:b0 acknowledged deauth
2013-12-11 11:19:51.908 1386789593.324514: Removing STA 00:03:7f:48:cc:b0 from kernel driver
2013-12-11 11:19:51.908 1386789593.324637: nl80211: sta_remove -> DEL_STATION vap0 00:03:7f:48:cc:b0 --> 0 (Success)
2013-12-11 11:19:51.908 1386789593.324657: 1386789593.324662: 1386789593.324672: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:51.908 1386789593.324685: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:51.908 1386789593.324714: nl80211: Drv Event 20 (NL80211_CMD_DEL_STATION) received for vap0
2013-12-11 11:19:51.908 1386789593.324726: nl80211: Delete station 00:03:7f:48:cc:b0
2013-12-11 11:19:52.069 1386789593.471245: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:52.069 1386789593.471262: nl80211: RX frame freq=5180 ssi_signal=-34 stype=4 len=220
2013-12-11 11:19:52.069 1386789593.471275: nl80211: send_mlme - noack=1 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x50 nlmode=3
2013-12-11 11:19:52.069 1386789593.471280: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:52.069 1386789593.471284: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.320 1386789595.733677: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:54.320 1386789595.733731: nl80211: RX frame freq=5180 ssi_signal=-34 stype=11 len=30
2013-12-11 11:19:54.320 1386789595.733742: vap0: Event RX_MGMT (20) received
2013-12-11 11:19:54.320 1386789595.733747: mgmt::auth
2013-12-11 11:19:54.320 1386789595.733752: authentication: STA=00:03:7f:48:cc:b0 auth_alg=0 auth_transaction=1 status_code=0 wep=0
2013-12-11 11:19:54.320 1386789595.733763: 1386789595.733769: 1386789595.733788: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.320 1386789595.733800: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.320 1386789595.733829: 1386789595.733832: 1386789595.733839: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0
set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.320 1386789595.733849: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.320 1386789595.733864: authentication reply: STA=00:03:7f:48:cc:b0 auth_alg=0 auth_transaction=2 resp=0 (IE len=0)
2013-12-11 11:19:54.321 1386789595.733874: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0xb0 nlmode=3
2013-12-11 11:19:54.321 1386789595.733879: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:54.321 1386789595.733883: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.321 1386789595.734117: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:54.321 1386789595.734135: nl80211: Frame TX status event
2013-12-11 11:19:54.321 1386789595.734163: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:54.321 1386789595.734170: mgmt::auth cb
2013-12-11 11:19:54.335 1386789595.734180: 1386789595.749746: nl80211: BSS Event 59 (NL80211_CMD_FRAME) received for vap0
2013-12-11 11:19:54.335 1386789595.749782: nl80211: RX frame freq=5180 ssi_signal=-34 stype=0 len=122
2013-12-11 11:19:54.335 1386789595.749795: vap0: Event RX_MGMT (20) received
2013-12-11 11:19:54.335 1386789595.749802: mgmt::assoc_req
2013-12-11 11:19:54.335 1386789595.749807: association request: STA=00:03:7f:48:cc:b0 capab_info=0x11 listen_interval=5
2013-12-11 11:19:54.335 1386789595.749814: Validating WMM IE: OUI 00:50:f2 OUI type 2 OUI sub-type 0 version 1 QoS info 0x0
2013-12-11 11:19:54.335 1386789595.749824: old AID 1
2013-12-11 11:19:54.335 1386789595.749828: HT: STA 00:03:7f:48:cc:b0 HT Capabilities Info: 0x19ef
2013-12-11 11:19:54.335 1386789595.749833: update_sta_ht STA 00:03:7f:48:cc:b0 - no greenfield, num of non-gf stations 1
2013-12-11 11:19:54.335 1386789595.749838: hostapd_ht_operation_update current operation mode=0x4
2013-12-11 11:19:54.335 1386789595.749842: hostapd_ht_operation_update new operation mode=0x4 changes=0
2013-12-11 11:19:54.335 1386789595.749848: 1386789595.749852: nl80211: send_mlme - noack=0 freq=0 no_cck=0 offchanok=0 wait_time=0 fc=0x10 nlmode=3
2013-12-11 11:19:54.335 1386789595.749858: nl80211: send_mgmt -> send_frame
2013-12-11 11:19:54.335 1386789595.749862: nl80211: send_frame - Use bss->freq=5180
2013-12-11 11:19:54.335 1386789595.750289: nl80211: Drv Event 60 (NL80211_CMD_FRAME_TX_STATUS) received for vap0
2013-12-11 11:19:54.335 1386789595.750312: nl80211: Frame TX status event
2013-12-11 11:19:54.335 1386789595.750327: vap0: Event TX_STATUS (18) received
2013-12-11 11:19:54.335 1386789595.750338: mgmt::assoc_resp cb
2013-12-11 11:19:54.335 1386789595.750354: 1386789595.750373: 1386789595.750376: 1386789595.750389: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0
addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0 key_len=0
2013-12-11 11:19:54.335 1386789595.750404: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.335 1386789595.750460: nl80211: sta_remove -> DEL_STATION vap0 00:03:7f:48:cc:b0 --> -2 (No such file or directory)
2013-12-11 11:19:54.335 1386789595.750473: nl80211: Add STA 00:03:7f:48:cc:b0
2013-12-11 11:19:54.335 1386789595.750486: * supported rates - hexdump(len=8): 0c 12 18 24 30 48 60 6c
2013-12-11 11:19:54.335 1386789595.750492: * aid=1
2013-12-11 11:19:54.335 1386789595.750496: * listen_interval=5
2013-12-11 11:19:54.335 1386789595.750500: * ht_capabilities - hexdump(len=26): 6e 00 1b ff ff ff 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00
2013-12-11 11:19:54.335 1386789595.750507: * capability=0x11
2013-12-11 11:19:54.335 1386789595.750511: * flags set=0x8 mask=0x8
2013-12-11 11:19:54.335 1386789595.750515: * qosinfo=0x0
2013-12-11 11:19:54.335 1386789595.750640: 1386789595.750650: wpa_driver_nl80211_set_key: ifindex=6 (vap0) alg=0 addr=0xba6e00 key_idx=0 set_tx=1 seq_len=0
key_len=0
2013-12-11 11:19:54.335 1386789595.750667: addr=00:03:7f:48:cc:b0
2013-12-11 11:19:54.335 1386789595.750690: IEEE 802.1X: Ignore STA - 802.1X not enabled or forced for WPS
2013-12-11 11:19:54.335 1386789595.750702: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state AUTHENTICATION2
2013-12-11 11:19:54.335 1386789595.751315: WPA: Assign ANonce - hexdump(len=32): 45 f9 7c 60 08 6c b5 06 4b 1a 1f 6e d0 d7 24 c1 15 82 a8 f6 52 fc e4 7b 2c 22
b4 2e da 3a 2f 77
2013-12-11 11:19:54.335 1386789595.751332: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state INITPSK
2013-12-11 11:19:54.335 1386789595.751341: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.335 1386789595.751351: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.335 1386789595.751362: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKSTART
2013-12-11 11:19:54.335 1386789595.751373: 1386789595.751376: WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=1 kde_len=0 keyidx=0 encr=0)
2013-12-11 11:19:54.335 1386789595.751410: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
2013-12-11 11:19:54.335 1386789595.751423: hostapd_new_assoc_sta: reschedule ap_handle_timer timeout for 00:03:7f:48:cc:b0 (300 seconds - ap_max_inactivity)
2013-12-11 11:19:54.335 1386789595.751445: nl80211: Drv Event 19 (NL80211_CMD_NEW_STATION) received for vap0
2013-12-11 11:19:54.335 1386789595.751457: nl80211: New station 00:03:7f:48:cc:b0
2013-12-11 11:19:54.335 1386789595.751580: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:54.335 1386789595.751595: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=95 - ack=1
2013-12-11 11:19:54.335 1386789595.751605: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
2013-12-11 11:19:54.335 1386789595.751614: WPA: Increase initial EAPOL-Key 1/4 timeout by 2000 ms because of acknowledged frame
2013-12-11 11:19:54.372 1386789595.772632: vap0: Event EAPOL_RX (27) received
2013-12-11 11:19:54.372 1386789595.772666: IEEE 802.1X: 121 bytes from 00:03:7f:48:cc:b0
2013-12-11 11:19:54.372 1386789595.772690: IEEE 802.1X: version=1 type=3 length=117
2013-12-11 11:19:54.372 1386789595.772711: WPA: Received EAPOL-Key from 00:03:7f:48:cc:b0 key_info=0x10a type=2 key_data_length=22
2013-12-11 11:19:54.372 1386789595.772764: WPA: Received Key Nonce - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8
b3 2d d1 9a e9 26 1b cf
2013-12-11 11:19:54.372 1386789595.772790: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
2013-12-11 11:19:54.372 1386789595.772807: 1386789595.772811: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING
2013-12-11 11:19:54.372 1386789595.772819: Searching a PSK for 00:03:7f:48:cc:b0 p2p_dev_addr=00:00:00:00:00:00 prev_psk=(nil)
2013-12-11 11:19:54.372 1386789595.772853: WPA: PTK derivation - A1=00:03:83:3d:30:aa A2=00:03:7f:48:cc:b0
2013-12-11 11:19:54.372 1386789595.772864: WPA: Nonce1 - hexdump(len=32): 45 f9 7c 60 08 6c b5 06 4b 1a 1f 6e d0 d7 24 c1 15 82 a8 f6 52 fc e4 7b 2c 22 b4 2e
da 3a 2f 77
2013-12-11 11:19:54.382 1386789595.772879: WPA: Nonce2 - hexdump(len=32): ee 53 7b 79 b4 a0 5b 65 f7 e7 a0 7c 49 f3 08 02 3c a8 00 54 7a d7 5d f8 b3 2d d1 9a
e9 26 1b cf
2013-12-11 11:19:54.382 1386789595.772893: WPA: PMK - hexdump(len=32): [REMOVED]
2013-12-11 11:19:54.382 1386789595.772899: WPA: PTK - hexdump(len=48): [REMOVED]
2013-12-11 11:19:54.382 1386789595.772913: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKCALCNEGOTIATING2
2013-12-11 11:19:54.382 1386789595.772924: WPA: 00:03:7f:48:cc:b0 WPA_PTK entering state PTKINITNEGOTIATING
2013-12-11 11:19:54.382 1386789595.772978: 1386789595.772981: WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=1 kde_len=66 keyidx=1 encr=1)
2013-12-11 11:19:54.382 1386789595.772995: Plaintext EAPOL-Key Key Data - hexdump(len=80): [REMOVED]
2013-12-11 11:19:54.382 1386789595.773063: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
2013-12-11 11:19:54.382 1386789595.773222: vap0: Event EAPOL_TX_STATUS (48) received
2013-12-11 11:19:54.382 1386789595.773232: IEEE 802.1X: 00:03:7f:48:cc:b0 TX status - version=2 type=3 length=175 - ack=1
2013-12-11 11:19:54.382 1386789595.773240: WPA: EAPOL-Key TX status for STA 00:03:7f:48:cc:b0 ack=1
--
Ben Greear <greearb at candelatech.com>
Candela Technologies Inc http://www.candelatech.com
More information about the Hostap
mailing list