Hello,
I am doing the same as in [ath9k-devel] ath9k as simultaneous AP/client but
using wiphys. I am working with Linux kernel 2.6.34 and an atheros AR298x.
Running hostapd works fine with the small test:
interface=wlan1
driver=nl80211
hw_mode=g
channel=1
ssid=test
wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
wpa_passphrase=12345678
After I try to connect a station to the "test" AP, I got following:
Mode: IEEE 802.11g Channel: 1 Frequency: 2412 MHz
Using interface wlan1 with hwaddr 02:22:43:21:82:ac and ssid 'test'
SSID - hexdump_ascii(len=4):
74 65 73 74 test
PSK (ASCII passphrase) - hexdump_ascii(len=8):
31 32 33 34 35 36 37 38 12345678
PSK (from passphrase) - hexdump(len=32): fe 72 7a a8 b6 4a c9 b3 f5 4c 72 43 2d
a1 4f ae d9 33 ea 51 1e ca b1 5b bc 6c 52 e7 52 2f 70 9a
WPA: group state machine entering state GTK_INIT (VLAN-ID 0)
GMK - hexdump(len=32): [REMOVED]
GTK - hexdump(len=16): [REMOVED]
WPA: group state machine entering state SETKEYSDONE (VLAN-ID 0)
wlan1: Setup of interface done.
MGMT (TX callback) ACK
Malformed netlink message: len=432 left=256 plen=416
256 extra bytes in the end of netlink message
STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID
MGMT (TX callback) fail
mgmt::proberesp cb
STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID
STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID
STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID
STA 00:12:f0:b2:1b:0f sent probe request for broadcast SSID
MGMT (TX callback) fail
mgmt::proberesp cb
MGMT (TX callback) fail
mgmt::proberesp cb
MGMT (TX callback) fail
mgmt::proberesp cb
MGMT (TX callback) fail
mgmt::proberesp cb
MGMT
mgmt::auth
authentication: STA=00:12:f0:b2:1b:0f auth_alg=0 auth_transaction=1
status_code=0 wep=0
New STA
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: authentication OK (open system)
wlan1: STA 00:12:f0:b2:1b:0f MLME:
MLME-AUTHENTICATE.indication(00:12:f0:b2:1b:0f, OPEN_SYSTEM)
wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-DELETEKEYS.request(00:12:f0:b2:1b:0f)
authentication reply: STA=00:12:f0:b2:1b:0f auth_alg=0 auth_transaction=2
resp=0 (IE len=0)
MGMT (TX callback) ACK
mgmt::auth cb
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: authenticated
MGMT
mgmt::assoc_req
association request: STA=00:12:f0:b2:1b:0f capab_info=0x411 listen_interval=10
new AID 1
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: association OK (aid 1)
MGMT (TX callback) ACK
mgmt::assoc_resp cb
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.11: associated (aid 1)
wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-ASSOCIATE.indication(00:12:f0:b2:1b:0f)
wlan1: STA 00:12:f0:b2:1b:0f MLME: MLME-DELETEKEYS.request(00:12:f0:b2:1b:0f)
wlan1: STA 00:12:f0:b2:1b:0f WPA: event 1 notification
wlan1: STA 00:12:f0:b2:1b:0f WPA: start authentication
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state INITIALIZE
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.1X: unauthorizing port
WPA: 00:12:f0:b2:1b:0f WPA_PTK_GROUP entering state IDLE
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state AUTHENTICATION
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state AUTHENTICATION2
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state INITPSK
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART
wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0
keyidx=0 encr=0)
IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1
wlan1: STA 00:12:f0:b2:1b:0f WPA: EAPOL-Key timeout
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART
wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0
keyidx=0 encr=0)
IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1
wlan1: STA 00:12:f0:b2:1b:0f WPA: EAPOL-Key timeout
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKSTART
wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 1/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=0
keyidx=0 encr=0)
IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=95 - ack=1
IEEE 802.1X: 121 bytes from 00:12:f0:b2:1b:0f
IEEE 802.1X: version=1 type=3 length=117
wlan1: STA 00:12:f0:b2:1b:0f WPA: received EAPOL-Key frame (2/4 Pairwise)
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKCALCNEGOTIATING
WPA: PTK derivation - A1=02:22:43:21:82:ac A2=00:12:f0:b2:1b:0f
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKCALCNEGOTIATING2
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKINITNEGOTIATING
wlan1: STA 00:12:f0:b2:1b:0f WPA: sending 3/4 msg of 4-Way Handshake
WPA: Send EAPOL(version=2 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=46
keyidx=1 encr=1)
Plaintext EAPOL-Key Key Data - hexdump(len=56): [REMOVED]
IEEE 802.1X: 00:12:f0:b2:1b:0f TX status - version=2 type=3 length=151 - ack=1
IEEE 802.1X: 99 bytes from 00:12:f0:b2:1b:0f
IEEE 802.1X: version=1 type=3 length=95
wlan1: STA 00:12:f0:b2:1b:0f WPA: received EAPOL-Key frame (4/4 Pairwise)
WPA: 00:12:f0:b2:1b:0f WPA_PTK entering state PTKINITDONE
wlan1: STA 00:12:f0:b2:1b:0f IEEE 802.1X: authorizing port
wlan1: STA 00:12:f0:b2:1b:0f RADIUS: starting accounting session
4C866BA6-00000000
wlan1: STA 00:12:f0:b2:1b:0f WPA: pairwise key handshake completed (RSN)
But after this the station can not longer communicate to the AP.
Has someone an idea of what is missing??
thanks in advanced
Lorna Glez.
--
GMX DSL SOMMER-SPECIAL: Surf & Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
--
GMX DSL SOMMER-SPECIAL: Surf & Phone Flat 16.000 für nur 19,99 Euro/mtl.!*
http://portal.gmx.net/de/go/dsl
_______________________________________________
ath9k-devel mailing list
[email protected]
https://lists.ath9k.org/mailman/listinfo/ath9k-devel