[prev in list] [next in list] [prev in thread] [next in thread] 

List:       hostap
Subject:    wpa_supplicant-0.5.11 SEG FAULT for for [WPA2-PSK-TKIP+CCMP-preauth]
From:       Raghavendra <s.raghu () samsung ! com>
Date:       2009-06-16 12:22:07
Message-ID: 1B0A6BB7A5504596811BC203F619DF13 () sisodomain ! com
[Download RAW message or body]

[Attachment #2 (multipart/alternative)]


Hi All,

I am using wpa_supplicant-0.5.11. I configured D-Link AP with WPA2-PSK and Cipher \
Type as "Auto". Getting seg fault. Please see logs below. In scan result it displayed \
following info.

  00:15:e9:ba:f3:66       2        188     [WPA2-PSK-TKIP+CCMP-preauth]    default

  I have following wpa_supplicant.conf file.

# cat wpa_supplicant.conf.tmp
ctrl_interface=/var/run/wpa_supplicant
ap_scan=2


network={
                ssid="default"
                proto=WPA RSN
                key_mgmt=WPA-PSK
                pairwise=TKIP CCMP
                group=TKIP CCMP
                psk="testtest"
}




# wpa_supplicant -i tiwlan0 -c ./wpa_supplicant.conf.tmp -Dwext -ddd
Initializing interface 'tiwlan0' conf './wpa_supplicant.conf.tmp' driver 'wext' \
ctrl_interface 'N/A' bridge 'N/A' Configuration file './wpa_supplicant.conf.tmp' -> \
'/mnt/nfs/./wpa_supplicant.conf.tmp' Reading configuration file \
'/mnt/nfs/./wpa_supplicant.conf.tmp' ctrl_interface='/var/run/wpa_supplicant'
ap_scan=2
Line: 5 - start of a new network block
ssid - hexdump_ascii(len=7):
     64 65 66 61 75 6c 74                              default
proto: 0x3
key_mgmt: 0x2
pairwise: 0x18
group: 0x18
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
PSK (from passphrase) - hexdump(len2): [REMOVED]
Priority group 0
   id=0 ssid='default'
Initializing interface (2) 'tiwlan0'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
SIOCGIWRANGE: WE(compiled)" WE(source) enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:00:f0:00:02:89
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
Setting scan request: 0 sec 100000 usec
Using existing control interface directory.
ctrl_iface bind(PF_UNIX) failed: Address already in use
ctrl_iface exists, but does not allow connections - assuming it was leftover from \
forced program termination Successfully replaced leftover ctrl_iface socket \
'/var/run/wpa_supplicant/tiwlan0' Added interface tiwlan0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'default'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK CCMP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len"): 30 14 01 00 00 0f ac 04 01 00 00 0f ac \
04 01 00 00 0f ac 02 00 00 No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=0, operstate)5929
wpa_driver_wext_associate
ioctl[SIOCSIWGENIE]: Operation not supported
Association request to the driver failed
Setting authentication timeout: 5 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8b1a len
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len4
WEXT: Custom wireless event: ''
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
Wireless event: cmd=0x8c02 len4
WEXT: Custom wireless event: ''
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c07 lenU
AssocReq IE wireless event - hexdump(lenG): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b \
96 32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 \
                0f ac 02 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8c08 len$
AssocResp IE wireless event - hexdump(len): 00 00 00 00 00 00 00 00 00 00 00 00 00 \
                00 00 00
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
Wireless event: cmd=0x8b15 len 
Wireless event: new AP: 00:15:e9:ba:f3:66
Association info event
req_ies - hexdump(lenG): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c 12 18 \
24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 \
                resp_ies - hexdump(len): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 \
                00 00
WPA: set own WPA/RSN IE - hexdump(len"): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 \
                00 00 0f ac 02 00 00
State: ASSOCIATING -> ASSOCIATED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=0, operstate)5929
Associated to a new BSS: BSSID:15:e9:ba:f3:66
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 16 key_mgmt 2 proto 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len"): 30 14 01 00 00 0f ac 02 01 00 00 0f ac \
                04 01 00 00 0f ac 02 00 00
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:15:e9:ba:f3:66
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
Cancelling scan request
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
Wireless event: cmd=0x8c02 len4
WEXT: Custom wireless event: '  '
RX EAPOL from 00:15:e9:ba:f3:66
RX EAPOL - hexdump(len™): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 f5 ca 37 \
67 43 26 75 b9 ab 87 f3 b4 8e 11 82 99 94 11 71 5e 4b b3 27 22 d9 44 0c 21 3f 4d 64 \
b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 \
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Setting \
authentication timeout: 10 sec 0 usec Segmentation fault



-Raghu


[Attachment #5 (text/html)]

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=Content-Type content="text/html; charset=iso-8859-1">
<META content="MSHTML 6.00.6000.16850" name=GENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=#ffffff>
<DIV><FONT face=Arial size=2>Hi All,</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>I am using wpa_supplicant-0.5.11. I configured
D-Link AP with WPA2-PSK and Cipher Type as "Auto". Getting seg fault. Please see
logs below.</FONT></DIV>
<DIV><FONT face=Arial size=2>In scan result it displayed following
info.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>&nbsp;
00:15:e9:ba:f3:66&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 188&nbsp;&nbsp;&nbsp;&nbsp;
[WPA2-PSK-TKIP+CCMP-preauth]&nbsp;&nbsp;&nbsp; default</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2>&nbsp; I have following wpa_supplicant.conf
file.</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2># cat wpa_supplicant.conf.tmp
<BR>ctrl_interface=/var/run/wpa_supplicant<BR>ap_scan=2</FONT></DIV>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV><FONT face=Arial size=2>
<DIV><BR>network={<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 ssid="default"<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 proto=WPA
RSN<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 key_mgmt=WPA-PSK<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 pairwise=TKIP
CCMP<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 group=TKIP
CCMP<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 psk="testtest"<BR>}<BR></DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV></FONT>
<DIV><FONT face=Arial size=2></FONT>&nbsp;</DIV>
<DIV><FONT face=Arial size=2># wpa_supplicant -i tiwlan0 -c
./wpa_supplicant.conf.tmp -Dwext -ddd<BR>Initializing interface 'tiwlan0' conf
'./wpa_supplicant.conf.tmp' driver 'wext' ctrl_interface 'N/A' bridge
'N/A'<BR>Configuration file './wpa_supplicant.conf.tmp' -&gt;
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>Reading configuration file
'/mnt/nfs/./wpa_supplicant.conf.tmp'<BR>ctrl_interface='/var/run/wpa_supplicant'<BR>ap_scan=2<BR>Line:
 5 - start of a new network block<BR>ssid -
hexdump_ascii(len=7):<BR>&nbsp;&nbsp;&nbsp;&nbsp; 64 65 66 61 75 6c
74&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <BR>proto:
0x3<BR>key_mgmt: 0x2<BR>pairwise: 0x18<BR>group: 0x18<BR>PSK (ASCII passphrase)
- hexdump_ascii(len=8): [REMOVED]<BR>PSK (from passphrase) - hexdump(len2):
[REMOVED]<BR>Priority group 0<BR>&nbsp;&nbsp; id=0
ssid='default'<BR>Initializing interface (2) 'tiwlan0'<BR>EAPOL: SUPP_PAE
entering state DISCONNECTED<BR>EAPOL: KEY_RX entering state
NO_KEY_RECEIVE<BR>EAPOL: SUPP_BE entering state INITIALIZE<BR>EAP: EAP entering
state DISABLED<BR>EAPOL: External notification - portEnabled=0<BR>EAPOL:
External notification - portValid=0<BR>SIOCGIWRANGE: WE(compiled)"
WE(source) enc_capa=0xf<BR>&nbsp; capabilities: key_mgmt 0xf enc 0xf<BR>WEXT:
Operstate: linkmode=1, operstate=5<BR>Own MAC address:
00:00:f0:00:02:89<BR>wpa_driver_wext_set_wpa<BR>wpa_driver_wext_set_key: alg=0
key_idx=0 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=1 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=2 set_tx=0 seq_len=0 key_len=0<BR>wpa_driver_wext_set_key: alg=0
key_idx=3 set_tx=0 seq_len=0
key_len=0<BR>wpa_driver_wext_set_countermeasures<BR>wpa_driver_wext_set_drop_unencrypted<BR>Setting
 scan request: 0 sec 100000 usec<BR>Using existing control interface
directory.<BR>ctrl_iface bind(PF_UNIX) failed: Address already in
use<BR>ctrl_iface exists, but does not allow connections - assuming it was
leftover from forced program termination<BR>Successfully replaced leftover
ctrl_iface socket '/var/run/wpa_supplicant/tiwlan0'<BR>Added interface
tiwlan0<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event:
cmd=0x8b06 len=8<BR>State: DISCONNECTED -&gt; SCANNING<BR>Trying to associate
with SSID 'default'<BR>Cancelling scan request<BR>WPA: clearing own WPA/RSN
IE<BR>Automatic auth_alg selection: 0x1<BR>WPA: No WPA/RSN IE available from
association info<BR>WPA: Set cipher suites based on configuration<BR>WPA:
Selected cipher suites: group 24 pairwise 24 key_mgmt 2 proto 2<BR>WPA: clearing
AP WPA IE<BR>WPA: clearing AP RSN IE<BR>WPA: using GTK CCMP<BR>WPA: using PTK
CCMP<BR>WPA: using KEY_MGMT WPA-PSK<BR>WPA: Set own WPA IE default -
hexdump(len"): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00
00<BR>No keys have been configured - skip key
clearing<BR>wpa_driver_wext_set_drop_unencrypted<BR>State: SCANNING -&gt;
ASSOCIATING<BR>wpa_driver_wext_set_operstate: operstate 0-&gt;0
(DORMANT)<BR>WEXT: Operstate: linkmode=0,
operstate)5929<BR>wpa_driver_wext_associate<BR>ioctl[SIOCSIWGENIE]: Operation
not supported<BR>Association request to the driver failed<BR>Setting
authentication timeout: 5 sec 0 usec<BR>EAPOL: External notification - EAP
success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x1003
([UP])<BR>Wireless event: cmd=0x8b06 len=8<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8b1a len<BR>RTM_NEWLINK:
operstate=0 ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02
len4<BR>WEXT: Custom wireless event: ''<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x1003 ([UP])<BR>Wireless event: cmd=0x8c02 len4<BR>WEXT: Custom
wireless event: ''<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003
([UP][LOWER_UP])<BR>Wireless event: cmd=0x8c07 lenU<BR>AssocReq IE wireless
event - hexdump(lenG): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96 32 08 0c
12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02
00 00<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless
event: cmd=0x8c08 len$<BR>AssocResp IE wireless event - hexdump(len): 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00<BR>RTM_NEWLINK: operstate=0
ifi_flags=0x11003 ([UP][LOWER_UP])<BR>Wireless event: cmd=0x8b15
len <BR>Wireless event: new AP: 00:15:e9:ba:f3:66<BR>Association info
event<BR>req_ies - hexdump(lenG): 00 07 64 65 66 61 75 6c 74 01 04 82 84 8b 96
32 08 0c 12 18 24 30 48 60 6c 30 14 01 00 00 0f ac 02 01 00 00 0f ac 04 01 00 00
0f ac 02 00 00<BR>resp_ies - hexdump(len): 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00<BR>WPA: set own WPA/RSN IE - hexdump(len"): 30 14 01 00 00 0f
ac 02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>State: ASSOCIATING -&gt;
ASSOCIATED<BR>wpa_driver_wext_set_operstate: operstate 0-&gt;0
(DORMANT)<BR>WEXT: Operstate: linkmode=0, operstate)5929<BR>Associated to a
new BSS: BSSID:15:e9:ba:f3:66<BR>No keys have been configured - skip key
clearing<BR>Network configuration found for the current AP<BR>WPA: Using WPA IE
from AssocReq to set cipher suites<BR>WPA: Selected cipher suites: group 8
pairwise 16 key_mgmt 2 proto 2<BR>WPA: clearing AP WPA IE<BR>WPA: clearing AP
RSN IE<BR>WPA: using GTK TKIP<BR>WPA: using PTK CCMP<BR>WPA: using KEY_MGMT
WPA-PSK<BR>WPA: Set own WPA IE default - hexdump(len"): 30 14 01 00 00 0f ac
02 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00<BR>EAPOL: External notification -
EAP success=0<BR>EAPOL: External notification - EAP fail=0<BR>EAPOL: External
notification - portControl=Auto<BR>Associated with 00:15:e9:ba:f3:66<BR>WPA:
Association event - clear replay counter<BR>EAPOL: External notification -
portEnabled=0<BR>EAPOL: External notification - portValid=0<BR>EAPOL: External
notification - EAP success=0<BR>EAPOL: External notification -
portEnabled=1<BR>EAPOL: SUPP_PAE entering state CONNECTING<BR>EAPOL: SUPP_BE
entering state IDLE<BR>Setting authentication timeout: 10 sec 0
usec<BR>Cancelling scan request<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>RTM_NEWLINK, IFLA_IFNAME: Interface 'tiwlan0'
added<BR>RTM_NEWLINK: operstate=0 ifi_flags=0x11043
([UP][RUNNING][LOWER_UP])<BR>Wireless event: cmd=0x8c02 len4<BR>WEXT: Custom
wireless event: '&nbsp; '<BR>RX EAPOL from 00:15:e9:ba:f3:66<BR>RX EAPOL -
hexdump(len™): 01 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 f5 ca 37 67
43 26 75 b9 ab 87 f3 b4 8e 11 82 99 94 11 71 5e 4b b3 27 22 d9 44 0c 21 3f 4d 64
b7 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00<BR>Setting authentication timeout: 10 sec 0 usec<BR><STRONG>Segmentation
fault</STRONG></FONT></DIV><FONT face=Arial size=2>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>&nbsp;</DIV>
<DIV>-Raghu</FONT></DIV></BODY></HTML>



_______________________________________________
HostAP mailing list
HostAP@lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic