Michael Buesch wrote:

> So, where's the problem? What doesn't work for you with d80211?

The mb tree cannot authenticate using wpa. When I run wpa_supplicant in debug, 
non-daemon mode, it
generates the following:

...
State: 4WAY_HANDSHAKE -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:14:bf:85:49:fa (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 
01 00 00 50 f2 02 01
00 00 50 f2 02
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
WPA: TX EAPOL-Key - hexdump(len=123): 01 03 00 77 fe 01 09 00 20 00 00 00 00 00 
00 00 03 5e 7c 57 a1
27 f5 30 f1 5e 6d c0 11 6b 22 b4 00 2d 58 3f 53 0f 35 1a 53 41 5d 96 0a 10 f7 
7f e4 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 
00 fa f8 26 f4 3b 03
83 9e 57 b0 c5 b5 06 e5 e5 c8 00 18 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 
00 50 f2 02 01 00 00
50 f2 02
Authentication with 00:14:bf:85:49:fa timed out.

-------------------------------------- This line is a killer and the process 
loops.

BSSID 00:14:bf:85:49:fa blacklist count incremented to 2
State: 4WAY_HANDSHAKE -> DISCONNECTED
wpa_driver_wext_disassociate
No keys have been configured - skip key clearing
EAPOL: External notification - portEnabled=0
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: SUPP_BE entering state INITIALIZE
EAPOL: External notification - portValid=0
Setting scan request: 0 sec 0 usec
State: DISCONNECTED -> SCANNING
...

Is anyone using d80211 with WPA-PSK TKIP?

Larry

_______________________________________________
Bcm43xx-dev mailing list
Bcm43xx-dev@lists.berlios.de
https://lists.berlios.de/mailman/listinfo/bcm43xx-dev

Reply via email to