Hi, I'm Mitsuo. Dose anyone work the hostapd without OpenSSL? I managed to build it however it dosen't work well now. It seems to have some problem around crypto module maybe and details below. It works well when it's build with OpenSSL. My hostapd version is 2.4 on NetBSD ARM architecture. I'd appreciate if I were given some helpful advice. Regards, -- Kuroishi Mitsuo - hostapd side log debug wlan osif_assoc_indication:wlan0: sta assoc [80:be:05:cf:57:68] status = 0 info wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 IEEE 802.11: associated debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: event 1 notification debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: start authentication debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 IEEE 802.1X: unauthorizing port debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: sending 1/4 msg of 4-Way Handshake debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: received EAPOL-Key frame (2/4 Pairwise) debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: sending 3/4 msg of 4-Way Handshake debug wlan hostapd[-]: wlan0[00:e0:4d:ff:05:49]: STA 80:be:05:cf:57:68 WPA: EAPOL-Key timeout - supplicant side log wlan9: RX EAPOL from 00:e0:4d:ff:05:4d RX EAPOL - hexdump(len=123): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 31 30 3a 36 66 3a 33 66 3a 35 39 3a 62 34 3a 63 36 20 57 50 41 3a 20 wlan9: Setting authentication timeout: 10 sec 0 usec wlan9: IEEE 802.1X RX: version=2 type=3 length=95 wlan9: EAPOL-Key type=2 wlan9: key_info 0x8a (ver=2 keyidx=0 rsvd=0 Pairwise Ack) wlan9: key_length=16 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 01 key_nonce - hexdump(len=32): 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: RX EAPOL-Key - hexdump(len=123): 02 03 00 5f 02 00 8a 00 10 00 00 00 00 00 00 00 01 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 31 30 3a 36 66 3a 33 66 3a 35 39 3a 62 34 3a 63 36 20 57 50 41 3a 20 wlan9: WPA: ignoring 24 bytes after the IEEE 802.1X data wlan9: State: ASSOCIATED -> 4WAY_HANDSHAKE wlan9: WPA: RX message 1 of 4-Way Handshake from 00:e0:4d:ff:05:4d (ver=2) RSN: msg 1/4 key data - hexdump(len=0): Get randomness: len=32 entropy=11 random from os_get_random - hexdump(len=32): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] random_mix_pool - hexdump(len=20): [REMOVED] random from internal pool - hexdump(len=16): [REMOVED] mixed random - hexdump(len=32): [REMOVED] WPA: Renewed SNonce - hexdump(len=32): 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49 WPA: PTK derivation - A1=10:6f:3f:59:b4:c6 A2=00:e0:4d:ff:05:4d WPA: Nonce1 - hexdump(len=32): 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49 WPA: Nonce2 - hexdump(len=32): 4d 52 73 c7 76 79 8d a1 cd 30 9b aa df 1d 46 cf ac bb d0 34 c1 47 22 a2 8e 34 9f f1 5b ff 0b 59 WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=48): [REMOVED] WPA: WPA IE for msg 2/4 - hexdump(len=22): 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 01 wlan9: WPA: Sending EAPOL-Key 2/4 WPA: KCK - hexdump(len=16): [REMOVED] WPA: Derived Key MIC - hexdump(len=16): 64 88 5c 7e 76 29 97 66 47 ad 77 f2 a9 5d d5 48 WPA: TX EAPOL-Key - hexdump(len=121): 01 03 00 75 02 01 0a 00 00 00 00 00 00 00 00 00 01 37 b0 fd f7 b6 ae 5c 55 d6 f4 dd 49 21 fc 59 80 7b 7b f5 f6 bc e6 3d 37 1e 51 59 d6 a0 df d3 49 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64 88 5c 7e 76 29 97 66 47 ad 77 f2 a9 5d d5 48 00 16 30 14 01 00 00 0f ac 04 01 00 00 0f ac 04 01 00 00 0f ac 02 00 00 EAPOL: startWhen --> 0 EAPOL: disable timer tick EAPOL: SUPP_PAE entering state CONNECTING EAPOL: enable timer tick EAPOL: txStart WPA: drop TX EAPOL in non-IEEE 802.1X mode (type=1 len=0) RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan9' added WEXT: if_removed already cleared - ignore event RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP]) RTM_NEWLINK, IFLA_IFNAME: Interface 'wlan9' added WEXT: if_removed already cleared - ignore event Wireless event: cmd=0x8b15 len=20 Wireless event: new AP: 00:00:00:00:00:00 wlan9: Event DISASSOC (1) received wlan9: Disassociation notification wlan9: CTRL-EVENT-DISCONNECTED bssid=00:e0:4d:ff:05:4d reason=0 wlan9: WPA: 4-Way Handshake failed - pre-shared key may be incorrect _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap