without OpenSSL
Kuroishi Mitsuo
kuroishi at iij.ad.jp
Wed Oct 28 18:13:04 PDT 2015
Hi, I'm Mitsuo.
Dose anyone work the hostapd without OpenSSL?
I managed to build it however it dosen't work well now.
It seems to have some problem around crypto module maybe and
details below.
It works well when it's build with OpenSSL.
My hostapd version is 2.4 on NetBSD ARM architecture.
I'd appreciate if I were given some helpful advice.
Regards,
--
Kuroishi Mitsuo
- hostapd side log
debug wlan osif_assoc_indication:wlan0: sta assoc [80:be:05:cf:57:68] status = 0
info wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 IEEE 802.11: associated
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: event 1 notification
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: start authentication
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 IEEE 802.1X: unauthorizing port
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: sending 1/4 msg of 4-Way Handshake
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: received EAPOL-Key frame (2/4 Pairwise)
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: sending 3/4 msg of 4-Way Handshake
debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: EAPOL-Key timeout
- supplicant side log
wlan9: RX EAPOL from 00:e0:4d:ff:05:4d
RX EAPOL - hexdump(len=123): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 31 30 3a 36 66 3a 33 66 3a 35 39 3a 62 34 3a 63 36 20 57 50 41 3a 20
wlan9: Setting authentication timeout: 10 sec 0 usec
wlan9: IEEE 802.1X RX: version=2 type=3 length=95
wlan9: EAPOL-Key type=2
wlan9: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
wlan9: key_length=16 key_data_length=0
replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
key_nonce - hexdump(len=32): 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59
key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 31 30 3a 36 66 3a 33 66 3a 35 39 3a 62 34 3a 63 36 20 57 50 41 3a 20
wlan9: WPA: ignoring 24 bytes after the IEEE 802.1X data
wlan9: State: ASSOCIATED -> 4WAY_HANDSHAKE
wlan9: WPA: RX message 1 of 4-Way Handshake from 00:e0:4d:ff:05:4d (ver=2)
RSN: msg 1/4 key data - hexdump(len=0):
Get randomness: len=32 entropy=11
random from os_get_random - hexdump(len=32): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
random_mix_pool - hexdump(len=20): [REMOVED]
random from internal pool - hexdump(len=16): [REMOVED]
mixed random - hexdump(len=32): [REMOVED]
WPA: Renewed SNonce - hexdump(len=32): 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49
WPA: PTK derivation - A1=10:6f:3f:59:b4:c6 A2=00:e0:4d:ff:05:4d
WPA: Nonce1 - hexdump(len=32): 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49
WPA: Nonce2 - hexdump(len=32): 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=48): [REMOVED]
WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01
wlan9: WPA: Sending EAPOL-Key 2/4
WPA: KCK - hexdump(len=16): [REMOVED]
WPA: Derived Key MIC - hexdump(len=16): 64 88 5c 7e 76 29 97 66 47 ad 77 f2 a9 5d d5 48
WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 64 88 5c 7e 76 29 97 66 47 ad 77 f2 a9 5d d5 48 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00
EAPOL: startWhen --> 0
EAPOL: disable timer tick
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: enable timer tick
EAPOL: txStart
WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0)
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan9' added
WEXT: if_removed already cleared - ignore event
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan9' added
WEXT: if_removed already cleared - ignore event
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
wlan9: Event DISASSOC (1) received
wlan9: Disassociation notification
wlan9: CTRL-EVENT-DISCONNECTED bssid=00:e0:4d:ff:05:4d reason=0
wlan9: WPA: 4-Way Handshake failed - pre-shared key may be incorrect
More information about the Hostap
mailing list