Failing EAP-TLSv1.2 on WICED 6.0 after Handshake completes

Tip / Sign in to post questions, reply, level up, and achieve exciting badges. Know more

cross mob
lock attach
Attachments are accessible only for community members.
LeWi_2227251
Level 3
Level 3
First like received Welcome!

Using join_ent test application on the 43362 platform:

Platform DPM3_ISM43362_M3G_L44 initialised

Initialising NetX_Duo v5.7_sp2

Creating Packet pools

WLAN MAC Address : C4:7F:51:01:6A:E9

WLAN Firmware    : wl0: Oct 23 2017 09:31:05 version 5.90.230.22 FWID 01-303030

Console app

> join_ent it-test eap_tls wpa2

trying to connect using Enterprise EAP-TLS.  Works for TLSv1.0 and TLSv1.1.  TLSv1.2 appears to complete the handshake, then receives the following event WLC_E_DEAUTH_IND and starts the connection again:

wiced_join_events_handler: event_type=0x2e status=0x105 reason=0x20e wiced_join_status=0x16

wiced_join_events_handler: Waiting Key Exchange

wwd_wifi_check_join_status: wiced_join_status=0x16

wiced_join_events_handler: event_type=0x6 status=0x0 reason=0xf wiced_join_status=0x16

wwd_wifi_check_join_status: wiced_join_status=0x14

wiced_join_events_handler: event_type=0x3 status=0x0 reason=0x0 wiced_join_status=0x14

wwd_wifi_check_join_status: wiced_join_status=0x16

wiced_join_events_handler: event_type=0x10 status=0x0 reason=0x0 wiced_join_status=0x16

Any reason why it is receiving error event after completing the handshake?

I have included logs for both TLSv1.1 and TLSv1.2

Regards,

Leif

0 Likes
1 Solution

Yes. The issue persists in WICED 6.2.1 but there is a patch available for the same here https://community.cypress.com/thread/35745. To get supplicant debug info, you can uncomment the following macros from wiced_defaults.h:

//#define WPRINT_ENABLE_SECURITY_INFO    /* Security stack prints */
//#define WPRINT_ENABLE_SECURITY_DEBUG
//#define WPRINT_ENABLE_SECURITY_ERROR

View solution in original post

8 Replies