Hi Grant,

On 05/15/2012 09:27 AM, Grant Erickson wrote:
Has anyone recently run a regression with connman against full, 64-character 
"raw" WPA/WPA2 PSKs? I found the following results today:

        http://pastebin.com/y73zH074

While the following non-upstreamed wpa_s patch looks relevant

        
http://codereview.chromium.org/6783033/diff/1/wpa_supplicant/dbus/dbus_new_handlers.c

It doesn't appear to make any difference.

I need to take a look at what's going across the D-Bus wire, but I suspect that connman 
is handing the "raw" PSK to the supplicant in a format it doesn't understand or 
isn't parsing correctly.
Yes. simple-agent complains "invalid-key". Could you please report a bug for this? Thanks.

Bests
Jeff
_______________________________________________
connman mailing list
[email protected]
http://lists.connman.net/listinfo/connman

Reply via email to