On Thu, 2013-12-12 at 11:16 +0100, Philippe Coval wrote:
> When connecting WiFi with a wrong passphrase,
> connman is longer than it should to cancel the attempt.
>
> The effect is this change, is to have a quicker feedback to the agent
> in charge of passphrase input.
>
> Since, Wpa_supplicant 2.0 and later
> is already managing its own retry mechanism,
> let's use it because it's overkill to have this also inside comman
> and even more if it add an unnecessary delay.
Applied, thanks!
With this change we also recommend to use wpa_supplicant 2.0 or later.
1.x versions will still work, but they may sometimes erroneously report
the passphrase being wrong if an error occurs during the key exchange.
Cheers,
Patrik
_______________________________________________
connman mailing list
[email protected]
https://lists.connman.net/mailman/listinfo/connman