wpa_supplicant devel version && service pack 2

Sergio sergioyebenes
Tue Aug 26 08:22:27 PDT 2008


Hi,

my brain is being hurt. Ive tried to use 0.5.10 (with eap-tls) under SP3 
against freeradius. Client never sends his certificate so i have 
migrated to SP2. Under SP2, wpa_supp 0.5.10 version works ok having 
client cert into a .p12 format file but, when i'm going to use pkcs#11 
engine, the user is rejected. Why? When server requires client cert, it 
catch an access-request packet from my access point WITHOUT User-Name 
attribute so, the user is rejected.
Development binaries version doesn't have CONFIG_SMARTCARD option, so i 
need to compile my own executable from 0.6.3. following is a part of 
wpa_supplicant log:



ENGINE: SSL_use_certificate --> OK
TLS: Using private key from engine
CTRL-EVENT-EAP-METHOD EAP vendor 0 method 13 (TLS) selected
EAP: EAP entering state METHOD
SSL: Received packet(len=6) - Flags 0x20
EAP-TLS: Start
SSL: (where=0x10 ret=0x1)
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:before/connect initialization
SSL: (where=0x1001 ret=0x1)
SSL: SSL_connect:SSLv3 write client hello A
SSL: (where=0x1002 ret=0xffffffff)
SSL: SSL_connect:error in SSLv3 read server hello A
SSL: SSL_connect - want more data
SSL: 88 bytes pending from ssl_out
SSL: 88 bytes left to be sent out (of total 88 bytes)
EAP: method process -> ignore=FALSE methodState=MAY_CONT decision=FAIL
EAP: EAP entering state SEND_RESPONSE
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RESPONSE
EAPOL: txSuppRsp
TX EAPOL: dst=00:14:c1:0e:30:fc
TX EAPOL - hexdump(len=98): 01 00 00 5e 02 01 00 5e 0d 00 16 03 01 00 53 
01 00 0
0 4f 03 01 48 b4 19 9f 65 d2 d1 46 2a 50 45 95 1e bb 0e cf 50 ae a7 73 
fe 4a cf
2b 66 c9 73 ef 70 20 ae 57 00 00 28 00 39 00 38 00 35 00 16 00 13 00 0a 
00 33 00
 32 00 2f 00 07 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 
03 01 0
0
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=9): 02 00 00 05 01 00 00 05 01
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 01
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 01 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 02
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 02 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 03
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7a
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 03 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=9): 02 00 00 05 01 00 00 05 01
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Request id=0 method=1 vendor=0 vendorMethod=0
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 01
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 01 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 02
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 02
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 02 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=8): 02 00 00 04 04 00 00 04
EAPOL: Received EAP-Packet frame
EAPOL: SUPP_BE entering state REQUEST
EAPOL: getSuppRsp
EAP: EAP entering state RECEIVED
EAP: Received EAP-Failure
EAP: EAP-Success Id mismatch - reqId=0 lastId=1
EAP: EAP entering state DISCARD
EAP: EAP entering state IDLE
EAPOL: SUPP_BE entering state RECEIVE
RX EAPOL from 00:14:c1:0e:30:fc
RX EAPOL - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 00 00 00 
00 00 03
24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 69 6a 6b 
f8 ef 10
 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
EAPOL: Ignoring WPA EAPOL-Key frame in EAPOL state machines
IEEE 802.1X RX: version=2 type=3 length=117
  EAPOL-Key type=2
  key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack)
  key_length=16 key_data_length=22
  replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 03
  key_nonce - hexdump(len=32): 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 
51 c2 f
d 0e 0a e3 c0 69 6a 6b f8 ef 10 b8 bb be 42 7b
  key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
  key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
WPA: RX EAPOL-Key - hexdump(len=121): 02 03 00 75 02 00 8a 00 10 00 00 
00 00 00
00 00 03 24 eb a9 73 a3 a2 de 02 fb f8 20 74 87 46 51 c2 fd 0e 0a e3 c0 
69 6a 6b
 f8 ef 10 b8 bb be 42 7b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00
00 00 00 00 16 dd 14 00 0f ac 04 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 00 00

State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:c1:0e:30:fc (ver=2)
RSN: msg 1/4 key data - hexdump(len=22): dd 14 00 0f ac 04 00 00 00 00 
00 00 00
00 00 00 00 00 00 00 00 00
RSN: PMKID from Authenticator - hexdump(len=16): 00 00 00 00 00 00 00 00 
00 00 0
0 00 00 00 00 00
RSN: no matching PMKID found
EAPOL: EAP key not available
EAPOL: EAP key not available
WPA: Failed to get master session key from EAPOL state machines
WPA: Key handshake aborted
CTRL-EVENT-TERMINATING - signal 0 received
Removing interface {0543B5E4-5B72-4FAE-8F3D-5FE292F10AB4}
State: 4WAY_HANDSHAKE -> DISCONNECTED
NDIS: Set OID 0d010102 - hexdump(len=36): [REMOVED]
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portValid=0
wpa_driver_ndis_set_wpa: enabled=0
No keys have been configured - skip key clearing
CTRL: close pipe 003E6510
EAP: deinitialize previously used EAP method (13, TLS) at EAP deinit
ENGINE: engine deinit
Cancelling scan request
Cancelling authentication timeout
NDIS: OID_802_11_PMKID (flush) - hexdump(len=8): 08 00 00 00 00 00 00 00
NDIS: Set OID 0d010123 - hexdump(len=8): [REMOVED]
NDIS: Set OID 0d010102 - hexdump(len=36): [REMOVED]
NDIS: Set OID 0d010115 - hexdump(len=4): [REMOVED]
NDIS: WZCEnumInterfaces: 1 interfaces
NDIS: intfs 0 GUID '{0543B5E4-5B72-4FAE-8F3D-5FE292F10AB4}'
NDIS: Current interface found from WZC
NDIS: WZC interface flags 0x8000 dwCtlFlags 0x0
NDIS: Enabling WZC for this interface
NDIS: Re-enabled WZC for this interface
CTRL: close pipe 003E3BA0


and, when i try to use .p12 file (using 0.6.3), openssl print this errors:

OpenSSL: tls_connection_ca_cert - Failed to load root certificates 
error:0000000
0:lib(0):func(0):reason(0)
OpenSSL: tls_connection_ca_cert - loaded DER format CA certificate
OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (DER) 
failed error
:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag
OpenSSL: pending error: error:0D06C03A:asn1 encoding 
routines:ASN1_D2I_EX_PRIMIT
IVE:nested asn1 error
OpenSSL: pending error: error:0D08303A:asn1 encoding 
routines:ASN1_TEMPLATE_NOEX
P_D2I:nested asn1 error
OpenSSL: pending error: error:0D09A00D:asn1 encoding 
routines:d2i_PrivateKey:ASN
1 lib
OpenSSL: pending error: error:140CB00D:SSL 
routines:SSL_use_PrivateKey_file:ASN1
 lib
OpenSSL: tls_connection_private_key - SSL_use_PrivateKey_File (PEM) 
failed error
:0906D06C:PEM routines:PEM_read_bio:no start line
OpenSSL: pending error: error:140CB009:SSL 
routines:SSL_use_PrivateKey_file:PEM
lib
OPENSSL_Uplink(007DF020,06): no OPENSSL_Applink

using the same configuration that used into 0.5.10.

Also, to achieve results in general, i need to kill WZC process before 
executing wpa_suplicant, is it normal? I thought that this is necessary 
only when using NDISUIO option into .config.

really at this moment i'm lost, can anybody help me? Sorry for posting 
too large logs.

Thanks



More information about the Hostap mailing list