On Wed, Feb 05, 2025 at 04:19:39PM +0100, Nico Sonack wrote:
> On Wednesday, 5 February 2025 14:25:01 CET Bjoern A. Zeeb wrote:
> > > wpa_supplicant:
> > >    wpa_supplicant[36003]: bsd_set_key: unknown alg=4
> >
> > alg=4 would be WPA_ALG_BIP_CMAC_128 which is in in the file:
> >
> >      384         case WPA_ALG_BIP_CMAC_128:
> >      385                 wk.ik_type = IEEE80211_CIPHER_BIP_CMAC_128;
> >      386                 break;
> >      387         default:
> >
> > so I am a bit confused as to why it would log the default case below.
> > Oh, this is main where Adrian has added the placeholders.  Let me check
> > stable/14.  Yepp, there they are not avail and the deault printf is
> > expected.
> Urgh yes, that is a good point. I have experimented here before and applied
> https://reviews.freebsd.org/rG05540e62e75f8b2de7e337738eacfb0b159515a6 without
> reverting the change. I am going to revert this change and recompile the
> kernel.
>
> I am going to test this tomorrow since this is my workstation at $WORK.
>
> > Can you actually add proto=WPA2 as indicated in the Subject line and see
> > what happens?

After having a clean kernel source tree of 14.2-RELEASE and a clean
wpa_supplicant from base as well as setting proto=WPA2:

    # service netif start wlan0 && wpa_cli log_level debug
    ....
    # tail -fq /var/log/messages /var/log/debug.log
    ...

        wpa_supplicant[37401]: wlan0: Starting radio work 
'connect'@0x295c64410500 after 0.000045 second wait
        wpa_supplicant[37401]: wlan0: WPA: clearing own WPA/RSN IE
        wpa_supplicant[37401]: wlan0: RSN: clearing own RSNXE
        wpa_supplicant[37401]: RSN: PMKSA cache search - 
network_ctx=0x295c64450000 try_opportunistic=0 akmp=0x0
        wpa_supplicant[37401]: RSN: Search for BSSID **:**:**:**:**:**
        wpa_supplicant[37401]: RSN: No PMKSA cache entry found
        wpa_supplicant[37401]: wlan0: RSN: using IEEE 802.11i/D9.0
        wpa_supplicant[37401]: wlan0: WPA: Selected cipher suites: group 16 
pairwise 16 key_mgmt 128 proto 2
        wpa_supplicant[37401]: wlan0: WPA: Selected mgmt group cipher 32
        wpa_supplicant[37401]: wlan0: WPA: clearing AP WPA IE
        wpa_supplicant[37401]: WPA: set AP RSN IE - hexdump(len=22): [...]
        wpa_supplicant[37401]: wlan0: WPA: clearing AP RSNXE
        wpa_supplicant[37401]: wlan0: WPA: AP group 0x10 network profile group 
0x10; available group 0x10
        wpa_supplicant[37401]: wlan0: WPA: using GTK CCMP
        wpa_supplicant[37401]: wlan0: WPA: AP pairwise 0x10 network profile 
pairwise 0x10; available pairwise 0x10
        wpa_supplicant[37401]: wlan0: WPA: using PTK CCMP
        wpa_supplicant[37401]: wlan0: WPA: AP key_mgmt 0x80 network profile 
key_mgmt 0x80; available key_mgmt 0x80
        wpa_supplicant[37401]: wlan0: WPA: using KEY_MGMT 802.1X with SHA256
        wpa_supplicant[37401]: wlan0: WPA: AP mgmt_group_cipher 0x20 network 
profile mgmt_group_cipher 0x0; available mgmt_group_cipher 0x20
        wpa_supplicant[37401]: wlan0: WPA: using MGMT group cipher AES-128-CMAC
        wpa_supplicant[37401]: WPA: Set own WPA IE default - hexdump(len=28): 
[...]
        wpa_supplicant[37401]: RSN: Set own RSNXE default - hexdump(len=0):
        wpa_supplicant[37401]: WPA: No current PMKSA - clear PMK
        wpa_supplicant[37401]: wlan0: Automatic auth_alg selection: 0x1
        wpa_supplicant[37401]: No supported operating classes IE to add
        wpa_supplicant[37401]: wlan0: Trying to associate with [...]
        wpa_supplicant[37401]: wlan0: Cancelling scan request
        wpa_supplicant[37401]: wlan0: State: SCANNING -> ASSOCIATING
        wpa_supplicant[37401]: Limit connection to BSSID ... based on scan 
results (bssid_set=0 wps=0)
        wpa_supplicant[37401]: wpa_driver_bsd_associate: ssid '....' wpa ie len 
28 pairwise 16 group 16 key mgmt 128
        wpa_supplicant[37401]: bsd_set_opt_ie: set WPA+RSN ie (len 28)
        ......
        wpa_supplicant[37401]: wlan0: RSN: RX message 3 of 4-Way Handshake from 
**:**:**:**:**:** (ver=3)
        wpa_supplicant[37401]: WPA: IE KeyData - hexdump(len=80): [...]
        wpa_supplicant[37401]: WPA: RSN IE in EAPOL-Key - hexdump(len=22): [...]
        wpa_supplicant[37401]: WPA: GTK in EAPOL-Key - hexdump(len=24): 
[REMOVED]
        wpa_supplicant[37401]: WPA: IGTK in EAPOL-Key - hexdump(len=30): 
[REMOVED]
        wpa_supplicant[37401]: wlan0: WPA: Sending EAPOL-Key 4/4
        wpa_supplicant[37401]: WPA: Send EAPOL-Key frame to **:**:**:**:**:** 
ver=3 mic_len=16 key_mgmt=0x80
        wpa_supplicant[37401]: WPA: EAPOL-Key MIC using AES-CMAC
        wpa_supplicant[37401]: WPA: KCK - hexdump(len=16): [REMOVED]
        wpa_supplicant[37401]: WPA: Derived Key MIC - hexdump(len=16): [...]
        wpa_supplicant[37401]: wlan0: WPA: Installing PTK to the driver
        wpa_supplicant[37401]: bsd_set_key: alg=3 addr=0x295c6445b570 key_idx=0 
set_tx=1 seq_len=6 key_len=16
        wpa_supplicant[37401]: Added PTKSA cache entry addr=**:**:**:**:**:** 
cipher=16
        wpa_supplicant[37401]: EAPOL: External notification - portValid=1
        wpa_supplicant[37401]: EAPOL: SUPP_PAE entering state AUTHENTICATED
        wpa_supplicant[37401]: EAPOL: Supplicant port status: Authorized
        wpa_supplicant[37401]: EAPOL authentication completed - result=SUCCESS
        wpa_supplicant[37401]: wlan0: State: 4WAY_HANDSHAKE -> GROUP_HANDSHAKE
        wpa_supplicant[37401]: RSN: received GTK in pairwise handshake - 
hexdump(len=18): [REMOVED]
        wpa_supplicant[37401]: WPA: Group Key - hexdump(len=16): [REMOVED]
        wpa_supplicant[37401]: wlan0: WPA: Installing GTK to the driver 
(keyidx=1 tx=0 len=16)
        wpa_supplicant[37401]: WPA: RSC - hexdump(len=6): 00 00 00 00 00 00
        wpa_supplicant[37401]: bsd_set_key: alg=3 addr=0x218b29318c1b key_idx=1 
set_tx=0 seq_len=6 key_len=16
        wpa_supplicant[37401]: wlan0: WPA: IGTK keyid 4 pn 000000000000
        wpa_supplicant[37401]: WPA: IGTK - hexdump(len=16): [REMOVED]
        wpa_supplicant[37401]: bsd_set_key: alg=4 addr=0x218b29318c1b key_idx=4 
set_tx=0 seq_len=6 key_len=16
        wpa_supplicant[37401]: wlan0: Request to deauthenticate - 
bssid=**:**:**:**:**:** pending_bssid=00:00:00:00:00:00 reason=1 (UNSPECIFIED) 
state=GROUP_HANDSHAKE valid_links=0x0 ap_mld_addr=00:00:00:00:00:00
        wpa_supplicant[37401]: TDLS: Tear down peers
        wpa_supplicant[37401]: wlan0: Event DEAUTH (11) received


Not any different if I use a different supplicant from ports ...

Nico

--
Nico Sonack <nson...@herrhotzenplotz.de>

Reply via email to