- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Using join_ent test application on the 43362 platform:
Platform DPM3_ISM43362_M3G_L44 initialised
Initialising NetX_Duo v5.7_sp2
Creating Packet pools
WLAN MAC Address : C4:7F:51:01:6A:E9
WLAN Firmware : wl0: Oct 23 2017 09:31:05 version 5.90.230.22 FWID 01-303030
Console app
> join_ent it-test eap_tls wpa2
trying to connect using Enterprise EAP-TLS. Works for TLSv1.0 and TLSv1.1. TLSv1.2 appears to complete the handshake, then receives the following event WLC_E_DEAUTH_IND and starts the connection again:
wiced_join_events_handler: event_type=0x2e status=0x105 reason=0x20e wiced_join_status=0x16
wiced_join_events_handler: Waiting Key Exchange
wwd_wifi_check_join_status: wiced_join_status=0x16
wiced_join_events_handler: event_type=0x6 status=0x0 reason=0xf wiced_join_status=0x16
wwd_wifi_check_join_status: wiced_join_status=0x14
wiced_join_events_handler: event_type=0x3 status=0x0 reason=0x0 wiced_join_status=0x14
wwd_wifi_check_join_status: wiced_join_status=0x16
wiced_join_events_handler: event_type=0x10 status=0x0 reason=0x0 wiced_join_status=0x16
Any reason why it is receiving error event after completing the handshake?
I have included logs for both TLSv1.1 and TLSv1.2
Regards,
Leif
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes. The issue persists in WICED 6.2.1 but there is a patch available for the same here https://community.cypress.com/thread/35745. To get supplicant debug info, you can uncomment the following macros from wiced_defaults.h:
//#define WPRINT_ENABLE_SECURITY_INFO /* Security stack prints */
//#define WPRINT_ENABLE_SECURITY_DEBUG
//#define WPRINT_ENABLE_SECURITY_ERROR