Your message dated Mon, 13 Feb 2006 22:32:46 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Current package ships example for WEP104
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: wpasupplicant
Version: 0.4.4-1
Severity: normal


        Hello,

The wep_key%d parameters only accept 64 bits keys. There is no example
of how to setup a static WEP AP with a 104 bits key. I'm not even sure
if that is possible at all.

Sincerely,

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8)

Versions of packages wpasupplicant depends on:
ii  libc6                         2.3.5-7    GNU C Library: Shared libraries an
ii  libncurses5                   5.5-1      Shared libraries for terminal hand
ii  libreadline5                  5.0-11     GNU readline and history libraries
ii  libssl0.9.7                   0.9.7g-5   SSL shared libraries

wpasupplicant recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
The current package ships an example file in
/usr/share/doc/wpasupplicant/examples/ with an example stanza for use
with WEP104.

I'm currently not using it myself, but the last time I tried it, it
worked for me.

Gruesse,
        Reinhard


--- End Message ---

Reply via email to