Hello, 

I am doing the same as in [ath9k-devel] ath9k as simultaneous AP/client but 
using wiphys. I am working with Linux kernel 2.6.34 and an atheros AR298x. 
Running hostapd works fine with the small test: 

interface=wlan1
driver=nl80211

hw_mode=g
channel=1
ssid=test

wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
wpa_passphrase=12345678

After I try to connect a station to the "test" AP, I got following: 

Mode: IEEE 802.11g  Channel: 1  Frequency: 2412 MHz

Using interface wlan1 with hwaddr 02:22:43:21:82:ac and ssid 'test'

SSID - hexdump_ascii(len=4):

     74 65 73 74                                       test            

PSK (ASCII passphrase) - hexdump_ascii(len=8):

     31 32 33 34 35 36 37 38                           12345678        

PSK (from passphrase) - hexdump(len=32): fe 72 7a a8 b6 4a c9 b3 f5 4c 72 43 2d 
a1 4f ae d9 33 ea 51 1e ca b1 5b bc 6c 52 e7 52 2f 70 9a

WPA: group state machine entering state GTK_INIT (VLAN-ID 0)

GMK - hexdump(len=32): [REMOVED]

GTK - hexdump(len=16): [REMOVED]

WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)

wlan1: Setup of interface done.

MGMT (TX callback) ACK

Malformed netlink message: len=432 left=256 plen=416

256 extra bytes in the end of netlink message

STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID

MGMT (TX callback) fail

mgmt::proberesp cb

STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID

STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID

STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID

STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID

MGMT (TX callback) fail

mgmt::proberesp cb

MGMT (TX callback) fail

mgmt::proberesp cb

MGMT (TX callback) fail

mgmt::proberesp cb

MGMT (TX callback) fail

mgmt::proberesp cb

MGMT

mgmt::auth

authentication: STA=00:12:f0:b2:1b:0f auth_alg=0 auth_transaction=1 
status_code=0 wep=0

  New STA

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: authentication OK (open system)

wlan1: STA 00:12:f0:b2:1b:0f MLME: 
MLME-AUTHENTICATE.indication(00:12:f0:b2:1b:0f, OPEN_SYSTEM)

wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-DELETEKEYS.request(00:12:f0:b2:1b:0f)

authentication reply: STA=00:12:f0:b2:1b:0f auth_alg=0 auth_transaction=2 
resp=0 (IE len=0)

MGMT (TX callback) ACK

mgmt::auth cb

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: authenticated

MGMT

mgmt::assoc_req

association request: STA=00:12:f0:b2:1b:0f capab_info=0x411 listen_interval=10

  new AID 1

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: association OK (aid 1)

MGMT (TX callback) ACK

mgmt::assoc_resp cb

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: associated (aid 1)

wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-ASSOCIATE.indication(00:12:f0:b2:1b:0f)

wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-DELETEKEYS.request(00:12:f0:b2:1b:0f)

wlan1: STA 00:12:f0:b2:1b:0f WPA: event 1 notification

wlan1: STA 00:12:f0:b2:1b:0f WPA: start authentication

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state INITIALIZE

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.1X: unauthorizing port

WPA: 00:12:f0:b2:1b:0f WPA_PTK_GROUP entering state IDLE

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state AUTHENTICATION

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state AUTHENTICATION2

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state INITPSK

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART

wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake

WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 
keyidx=0 encr=0)

IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1

wlan1: STA 00:12:f0:b2:1b:0f WPA: EAPOL-Key timeout

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART

wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake

WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 
keyidx=0 encr=0)

IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1

wlan1: STA 00:12:f0:b2:1b:0f WPA: EAPOL-Key timeout

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART

wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake

WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0 
keyidx=0 encr=0)

IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1

IEEE 802.1X: 121 bytes from 00:12:f0:b2:1b:0f

   IEEE 802.1X: version=1 type=3 length=117

wlan1: STA 00:12:f0:b2:1b:0f WPA: received EAPOL-Key frame (2/4 Pairwise)

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKCALCNEGOTIATING

WPA: PTK derivation - A1=02:22:43:21:82:ac A2=00:12:f0:b2:1b:0f

WPA: PMK - hexdump(len=32): [REMOVED]

WPA: PTK - hexdump(len=64): [REMOVED]

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKCALCNEGOTIATING2

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKINITNEGOTIATING

wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 3/4 msg of 4-Way Handshake

WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46 
keyidx=1 encr=1)

Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]

IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=151 - ack=1

IEEE 802.1X: 99 bytes from 00:12:f0:b2:1b:0f

   IEEE 802.1X: version=1 type=3 length=95

wlan1: STA 00:12:f0:b2:1b:0f WPA: received EAPOL-Key frame (4/4 Pairwise)

WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKINITDONE

wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.1X: authorizing port

wlan1: STA 00:12:f0:b2:1b:0f RADIUS: starting accounting session 
4C866BA6-00000000

wlan1: STA 00:12:f0:b2:1b:0f WPA: pairwise key handshake completed (RSN)

But after this the station can not longer communicate to the AP. 
Has someone an idea of what is missing??

thanks in advanced

Lorna Glez. 

-- 
GMX DSL SOMMER-SPECIAL: Surf & Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl


-- 
GMX DSL SOMMER-SPECIAL: Surf & Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
_______________________________________________
ath9k-devel mailing list
[email protected]
https://lists.ath9k.org/mailman/listinfo/ath9k-devel

Reply via email to