Has anyone recently run a regression with connman against full, 64-character
"raw" WPA/WPA2 PSKs? I found the following results today:
http://pastebin.com/y73zH074
While the following non-upstreamed wpa_s patch looks relevant
http://codereview.chromium.org/6783033/diff/1/wpa_supplicant/dbus/dbus_new_handlers.c
It doesn't appear to make any difference.
I need to take a look at what's going across the D-Bus wire, but I suspect that
connman is handing the "raw" PSK to the supplicant in a format it doesn't
understand or isn't parsing correctly.
-Grant
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman