WPA2(hostapd latest CVS) and madwifi driver

Chuanhua Lei ch_lei
Fri Dec 3 22:55:16 PST 2004


Hi, Jouni,

     When I try WPA2 (hostapd latest CVS) with madwifi driver (Master Mode).
After 4-way is finished, no 2-way group, Why?

Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 5f 02 00 8a 00 10 00 00 00 00 00 00 00 05 de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b2 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
 35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
 90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
 83 13 b4 bc 98 33 e3 b8 77 0f 76 92 2b 5e ff ef 7b
 4d cd d2 b4 38 8a f0 c3 2c 79 e5 03 a0 4c 4f 9f
 8f e0 99 60 44 c4 05 70 ce b0 a1 ec a8 fc e2 d9
 7b 63 a1 4c 8a c5 e5 5e 33 c0 67 f6 7a 87 b9
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
 00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
 b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
 3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 af 02 13 ca 00 10 00 00 00 00 00 00 00 06 de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b2 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 28 eb
 ef af d3 b4 57 45 b4 21 7f 44 a5 50 2b fd 00 50
 5f e6 20 c7 dc 00 9d 02 83 a2 b8 73 fe 87 31 97
 c8 f9 02 90 64 3f 29 9a 3c 5d dc a9 18 6b 69 d9
 41 4e 47 ee c4 65 b5 49 0b 87 7a d8 e1 ec 5d 8f
 5f 0f 2d 16 53 c0 f5 3f d6 99 61 5d e1 da 0d d2
 bf 06 07 73 5e 7e 08 22 72 b0 a7 3f 12 ca 9d 6b

IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)

=============>Then repeat

Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 5f 02 00 8a 00 10 00 00 00 00 00 00 00 07 de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b3 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
 35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
 90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
 64 99 e4 a0 e9 d7 d7 1f 82 ac 3c 3f e2 1b 66 2e 2a
 8d 1f ea 2c df a0 5c 94 31 a4 2c 5b 0d f0 a9 10
 68 fb ab eb a7 1d 7a f8 4e 61 68 80 bb e8 85 7b
 ce db e9 cd e2 e6 78 34 ff 01 75 35 24 64 30
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
 00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
 b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
 3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 af 02 13 ca 00 10 00 00 00 00 00 00 00 08 de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b3 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 1c 4b
 6b c1 1d 9c 53 d2 03 fc 86 da ea 76 60 c2 00 50
 ab 9b ab f2 33 db 1d 65 e1 2b 65 f3 89 51 bb e0
 07 7a c4 58 3d 5b 92 65 f0 32 9f 24 7a 65 5a e8
 c1 cc 56 5f 72 aa f9 c6 3f e6 c4 86 f1 80 df 5e
 b6 ae bd 60 90 fc a1 9c 9a cd 8e 55 d6 16 d0 2e
 6e 5e 4f f4 26 aa b7 35 ed dd 94 e3 5a e7 cc 0c

IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)
Wireless event: cmd=0x8c03 len=20
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.11: associated
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 1 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 WPA: event 4 notification
madwifi_del_key: addr=00:10:c6:1c:ce:b2 key_idx=0
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state AUTHENTICATION2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state INITPSK
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKSTART
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 1/4 msg of 4-Way Handshake
TX EAPOL - hexdump(len=113):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 5f 02 00 8a 00 10 00 00 00 00 00 00 00 09 de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b4 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

IEEE 802.1X: 121 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=117
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING
PMK - hexdump(len=32):
 35 2a b3 55 08 74 12 ea 2d d0 a0 a7 fe d7 90 b5 7a
 90 2b 4a cf df e8 32 5c be 64 bc 98 df be a6
PTK - hexdump(len=64):
 0f 68 05 dd c7 5f 08 a7 a2 47 63 ee 24 aa f5 75 76
 65 db 77 a3 1e 22 7c a4 08 fd 2b 8e 91 62 7d 43
 cf 01 b2 71 a6 a2 90 23 08 cc 37 6b dc 76 f1 a5
 a4 8f 96 87 76 cd 7c 01 a5 7e ae 6d 69 14 75
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITNEGOTIATING
madwifi_get_seqnum: addr=00:00:00:00:00:00 idx=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: sending 3/4 msg of 4-Way Handshake
Plaintext EAPOL-Key Key Data - hexdump(len=80):
 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac
 02 01 00 00 0f ac 02 00 00 dd 26 00 0f ac 01 01
 00 85 6d 12 bb cd b3 86 c2 dd 8b 4e 7b f8 4c c3
 b9 5c e9 d9 a8 0d 31 3d aa 74 0f 30 7d 35 0f 6d
 3b dd 00 00 00 00 00 00 00 00 00 00 00 00 00
TX EAPOL - hexdump(len=193):
 00 10 c6 1c ce b2 00 03 7f 05 21 44 88 8e 02 03 00
 af 02 13 ca 00 10 00 00 00 00 00 00 00 0a de 4a
 16 da 9a c0 2b 84 a9 61 72 f6 5e 48 36 3b 1e 42
 c2 ba 0a f3 89 9b 04 f4 68 30 43 08 0b b4 00 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00
 00 00 00 00 00 00 00 00 00 00 00 00 00 00 88 3b
 4a 7e 40 ab 48 91 86 7e a9 a9 d7 3b 62 62 00 50
 7c d1 03 c9 6c c7 6e a5 64 8a 1a 1c fb 87 8e 2a
 62 66 e6 ac 55 02 30 eb 77 47 20 76 c0 71 8a 68
 20 13 40 8f 80 ac 62 f8 3c 16 1f 42 14 93 f3 95
 5b 16 fb 86 3d 94 05 41 96 4e e1 6e d4 76 87 bb
 1f 62 33 8d db 27 34 cc 2e d9 3b f9 3c be 97 e9

IEEE 802.1X: 99 bytes from 00:10:c6:1c:ce:b2
   IEEE 802.1X: version=2 type=3 length=95
ath0: STA 00:10:c6:1c:ce:b2 WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:10:c6:1c:ce:b2 WPA_PTK entering state PTKINITDONE
madwifi_set_key: alg=CCMP addr=00:10:c6:1c:ce:b2 key_idx=0
ath0: STA 00:10:c6:1c:ce:b2 IEEE 802.1X: authorizing port
madwifi_set_sta_authorized: addr=00:10:c6:1c:ce:b2 authorized=1
ath0: STA 00:10:c6:1c:ce:b2 WPA: pairwise key handshake completed (RSN)

My hostap.conf as the following,

interface=ath0
bridge=br0
driver=madwifi
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2
ssid=linux
minimal_eap=0
wpa=2
wpa_passphrase=12345678
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP TKIP
wpa_group_rekey=600
wpa_gmk_rekey=86400

I use odyssey client 3.1 and your wpa_supplicant with madwifi driver(managed
mode), and has the same results as above.







More information about the Hostap mailing list