well, I tried it in windows, and got same results. As soon as I turned back on windows zero config, it prompted me for the wpa ascii password, i put it in, and i am connected through that:( Below is my config and debug info
network={ ssid="dapt" scan_ssid=1 pairwise=TKIP psk="d00lahfz" #psk=5e73b610917f12228e803718ccdf722d1a3fca76a14edcf5a5101e553018142e group=TKIP key_mgmt=WPA-PSK proto=WPA } --------------------- ap_scan=1 cd wpa_supplicant-windows-bin-0.5.3 wpa_supplicant-windows-bin-0.5.3>wpa_sup plicant.exe -w -i \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} -c wpa_sup plicant.conf -dd Initializing interface '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' conf 'wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Reading configuration file 'wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=1 Line: 192 - start of a new network block ssid - hexdump_ascii(len=4): 64 61 70 74 dapt scan_ssid=1 (0x1) pairwise: 0x8 PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED] group: 0x8 key_mgmt: 0x2 proto: 0x1 PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 0 id=0 ssid='dapt' Initializing interface (2) '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 NDIS: Packet.dll version: 3, 1, 0, 27 NDIS: 3 adapter names found NDIS: 3 adapter descriptions found NDIS: 0 - \Device\NPF_GenericDialupAdapter - Generic dialup adapter NDIS: 1 - \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} - ZyDAS ZD1211 802. 11b+g Wireless LAN (Microsoft's Packet Scheduler) NDIS: 2 - \Device\NPF_{D87AE589-A1B6-4C39-B8EC-F646D0521165} - NETGEAR FA312 Fas t Ethernet PCI Adapter (Microsoft's Packet Scheduler) NDIS: Adapter description prefix 'ZyDAS ZD1211 802.11b+g Wireless LAN' OID_802_11_CAPABILITY - hexdump(len=104): 68 00 00 00 02 00 00 00 03 00 00 00 0b 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0 0 03 00 00 00 04 00 00 00 03 00 00 00 06 00 00 00 04 00 00 00 04 00 00 00 04 00 00 00 06 00 00 00 06 00 00 00 04 00 00 00 06 00 00 00 06 00 00 00 07 00 00 00 04 00 00 00 07 00 00 00 06 00 00 00 NDIS: Driver supports OID_802_11_CAPABILITY - NoOfPMKIDs 3 NoOfAuthEncrPairs 11 NDIS: 0 - auth 0 encr 1 NDIS: 1 - auth 0 encr 0 NDIS: 2 - auth 1 encr 0 NDIS: 3 - auth 3 encr 4 NDIS: 4 - auth 3 encr 6 NDIS: 5 - auth 4 encr 4 NDIS: 6 - auth 4 encr 6 NDIS: 7 - auth 6 encr 4 NDIS: 8 - auth 6 encr 6 NDIS: 9 - auth 7 encr 4 NDIS: 10 - auth 7 encr 6 NDIS: driver capabilities: key_mgmt 0xf enc 0xf auth 0x3 NDIS: OID_802_11_PMKID (flush) - hexdump(len=8): 08 00 00 00 00 00 00 00 Connected to ROOT\WMI. Own MAC address: 00:12:0e:11:b7:42 wpa_driver_ndis_set_wpa: enabled=1 ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed Setting scan request: 0 sec 100000 usec Added interface \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} State: DISCONNECTED -> SCANNING Starting AP scan (specific SSID) Scan SSID - hexdump_ascii(len=4): 64 61 70 74 dapt Trying to get current scan results first without requesting a new scan to speed up initial association Scan results: 2 Selecting BSS from priority group 0 0: 00:14:bf:db:a9:91 ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x0 skip - no WPA/RSN IE 1: 00:90:4b:36:b8:66 ssid='dapt' wpa_ie_len=24 rsn_ie_len=0 caps=0x10 selected based on WPA IE Trying to associate with 00:90:4b:36:b8:66 (SSID='dapt' freq=2437 MHz) Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: using IEEE 802.11i/D3.0 WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING Setting authentication timeout: 10 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto ndis_get_oid: oid=0xd010101 len (6) failed MSNdis_StatusMediaConnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 0 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter MSNdis_StatusMediaDisconnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 1 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter MSNdis_StatusMediaConnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 0 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter MSNdis_StatusMediaDisconnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 1 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter MSNdis_StatusMediaConnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 0 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter MSNdis_StatusMediaDisconnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7 2 20 23 36 NDIS: event - type 1 NDIS: event InstanceName - hexdump_ascii(len=37): 28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32 (ZD1211)IEEE 802 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 .11b+g USB Adapt 65 72 20 23 36 er #6 NDIS: ignored event for another adapter here's with ap_scan=2 wpa_sup plicant.exe -w -i \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} -c wpa_sup plicant.conf -d Initializing interface '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' conf 'wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A' Reading configuration file 'wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' eapol_version=1 ap_scan=2 Priority group 0 id=0 ssid='dapt' Initializing interface (2) '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' EAPOL: SUPP_PAE entering state DISCONNECTED EAPOL: KEY_RX entering state NO_KEY_RECEIVE EAPOL: SUPP_BE entering state INITIALIZE EAP: EAP entering state DISABLED EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 NDIS: Packet.dll version: 3, 1, 0, 27 NDIS: 3 adapter names found NDIS: 3 adapter descriptions found NDIS: 0 - \Device\NPF_GenericDialupAdapter - Generic dialup adapter NDIS: 1 - \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} - ZyDAS ZD1211 802. 11b+g Wireless LAN (Microsoft's Packet Scheduler) NDIS: 2 - \Device\NPF_{D87AE589-A1B6-4C39-B8EC-F646D0521165} - NETGEAR FA312 Fas t Ethernet PCI Adapter (Microsoft's Packet Scheduler) NDIS: Adapter description prefix 'ZyDAS ZD1211 802.11b+g Wireless LAN' NDIS: Driver supports OID_802_11_CAPABILITY - NoOfPMKIDs 3 NoOfAuthEncrPairs 11 NDIS: driver capabilities: key_mgmt 0xf enc 0xf auth 0x3 Connected to ROOT\WMI. Own MAC address: 00:12:0e:11:b7:42 wpa_driver_ndis_set_wpa: enabled=1 ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed ndis_get_oid: oid=0xd010101 len (6) failed Setting scan request: 0 sec 100000 usec Added interface \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} State: DISCONNECTED -> SCANNING Trying to associate with SSID 'dapt' Cancelling scan request WPA: clearing own WPA/RSN IE Automatic auth_alg selection: 0x1 WPA: No WPA/RSN IE available from association info WPA: Set cipher suites based on configuration WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 No keys have been configured - skip key clearing State: SCANNING -> ASSOCIATING Setting authentication timeout: 60 sec 0 usec EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto RX EAPOL from 00:90:4b:36:b8:66 Setting authentication timeout: 10 sec 0 usec MSNdis_StatusMediaConnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: ReqFixed=0x3 RespFixed=0x7 off_req=40 off_resp=78 len_req=38 len_resp=6 NDIS: 2 BSSID items to process for AssocInfo Association info event req_ies - hexdump(len=38): 00 04 64 61 70 74 01 04 82 84 8b 96 dd 18 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00 resp_ies - hexdump(len=6): 01 04 82 84 8b 96 beacon_ies - hexdump(len=39): 00 04 64 61 70 74 01 04 82 84 8b 96 03 01 06 dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0 1 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 WPA: clearing AP RSN IE State: ASSOCIATING -> ASSOCIATED Associated to a new BSS: BSSID=00:90:4b:36:b8:66 No keys have been configured - skip key clearing Network configuration found for the current AP WPA: Using WPA IE from AssocReq to set cipher suites WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2 WPA: clearing AP WPA IE WPA: clearing AP RSN IE WPA: using GTK TKIP WPA: using PTK TKIP WPA: using KEY_MGMT WPA-PSK WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 EAPOL: External notification - EAP success=0 EAPOL: External notification - EAP fail=0 EAPOL: External notification - portControl=Auto Associated with 00:90:4b:36:b8:66 WPA: Association event - clear replay counter EAPOL: External notification - portEnabled=0 EAPOL: External notification - portValid=0 EAPOL: External notification - EAP success=0 EAPOL: External notification - portEnabled=1 EAPOL: SUPP_PAE entering state CONNECTING EAPOL: SUPP_BE entering state IDLE Setting authentication timeout: 10 sec 0 usec IEEE 802.1X RX: version=1 type=3 length=95 EAPOL-Key type=254 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack) key_length=32 key_data_length=0 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00 key_nonce - hexdump(len=32): df 63 89 da 9b 75 23 8d 7b b3 00 3d 5a 20 a1 20 2 8 62 35 22 a7 be 7e 03 f5 77 cb ff ff ff ff ff key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 State: ASSOCIATED -> 4WAY_HANDSHAKE WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=1) WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0 1 00 00 50 f2 02 01 00 00 50 f2 02 00 00 WPA: Renewed SNonce - hexdump(len=32): 45 fd 54 3f 99 6d 72 b5 12 b1 77 f4 75 be 8e 4d e7 87 a9 be 33 3e 06 c2 f7 86 a4 a2 f2 00 94 af WPA: PMK - hexdump(len=32): [REMOVED] WPA: PTK - hexdump(len=64): [REMOVED] WPA: Sending EAPOL-Key 2/4 NDIS: event - type 0 NDIS: ignored event for another adapter MSNdis_StatusMediaDisconnect InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6' NDIS: event - type 1 On 4/30/06, Jouni Malinen <[EMAIL PROTECTED]> wrote:
On Sun, Apr 30, 2006 at 04:38:29PM -0500, John H. wrote: > ok, so i will try using wpa_supplicant in XP. > > in linux, I use zd1211 driver, so I use hawking driver in windows. > How do I tell windows to use wpa_supplicant instead of it's built in > xp thing? You will need to first disable the built-in supplicant. This can be done either temporarily by stopping wireless zeroconf service for all interface (run 'net stop wzcsvc') or from the per-interface advanced options. After this, you should be able to run wpa_supplicant in the same way as you would under Linux. Unless you have already installed WinPcap (e.g., for Ethereal), you will need to install that to allow wpa_supplicant to perform low-level networking tasks. WinPcap installation package is available from http://www.winpcap.org/ The same configuration file should work fine under Windows, too. If you have any problems with that, I would suggest trying with ap_scan=2 (see wpa_supplicant.conf for more details) and explicitly configured key_mgmt, proto, pairwise, and group parameters (i.e., just one option for each). The interface name can be either a prefix of the interface descriptor (usually the vendor name or something similar) or a full interface name (quite long hex string). You can use win_if_list.exe program to list all available interfaces. -- Jouni Malinen PGP id EFC895FA
------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642 _______________________________________________ Zd1211-devs mailing list - http://zd1211.ath.cx/ Unsubscribe: https://lists.sourceforge.net/lists/listinfo/zd1211-devs