well, I tried it in windows, and got same results.  As soon as I
turned back on windows zero config, it prompted me for the wpa ascii
password, i put it in, and i am connected through that:(  Below is my
config and debug info

network={
      ssid="dapt"
        scan_ssid=1
        pairwise=TKIP
        psk="d00lahfz"
       #psk=5e73b610917f12228e803718ccdf722d1a3fca76a14edcf5a5101e553018142e
        group=TKIP
        key_mgmt=WPA-PSK
        proto=WPA
}

---------------------


ap_scan=1



cd wpa_supplicant-windows-bin-0.5.3

wpa_supplicant-windows-bin-0.5.3>wpa_sup
plicant.exe -w -i  \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} -c wpa_sup
plicant.conf -dd
Initializing interface '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' conf
'wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Reading configuration file 'wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=1
Line: 192 - start of a new network block
ssid - hexdump_ascii(len=4):
    64 61 70 74                                       dapt
scan_ssid=1 (0x1)
pairwise: 0x8
PSK (ASCII passphrase) - hexdump_ascii(len=8): [REMOVED]
group: 0x8
key_mgmt: 0x2
proto: 0x1
PSK (from passphrase) - hexdump(len=32): [REMOVED]
Priority group 0
  id=0 ssid='dapt'
Initializing interface (2) '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
NDIS: Packet.dll version: 3, 1, 0, 27
NDIS: 3 adapter names found
NDIS: 3 adapter descriptions found
NDIS: 0 - \Device\NPF_GenericDialupAdapter - Generic dialup adapter
NDIS: 1 - \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} - ZyDAS ZD1211 802.
11b+g Wireless LAN (Microsoft's Packet Scheduler)
NDIS: 2 - \Device\NPF_{D87AE589-A1B6-4C39-B8EC-F646D0521165} - NETGEAR FA312 Fas
t Ethernet PCI Adapter (Microsoft's Packet Scheduler)
NDIS: Adapter description prefix 'ZyDAS ZD1211 802.11b+g Wireless LAN'
OID_802_11_CAPABILITY - hexdump(len=104): 68 00 00 00 02 00 00 00 03 00 00 00 0b
00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 0
0 03 00 00 00 04 00 00 00 03 00 00 00 06 00 00 00 04 00 00 00 04 00 00 00 04 00
00 00 06 00 00 00 06 00 00 00 04 00 00 00 06 00 00 00 06 00 00 00 07 00 00 00 04
00 00 00 07 00 00 00 06 00 00 00
NDIS: Driver supports OID_802_11_CAPABILITY - NoOfPMKIDs 3 NoOfAuthEncrPairs 11
NDIS: 0 - auth 0 encr 1
NDIS: 1 - auth 0 encr 0
NDIS: 2 - auth 1 encr 0
NDIS: 3 - auth 3 encr 4
NDIS: 4 - auth 3 encr 6
NDIS: 5 - auth 4 encr 4
NDIS: 6 - auth 4 encr 6
NDIS: 7 - auth 6 encr 4
NDIS: 8 - auth 6 encr 6
NDIS: 9 - auth 7 encr 4
NDIS: 10 - auth 7 encr 6
NDIS: driver capabilities: key_mgmt 0xf enc 0xf auth 0x3
NDIS: OID_802_11_PMKID (flush) - hexdump(len=8): 08 00 00 00 00 00 00 00
Connected to ROOT\WMI.
Own MAC address: 00:12:0e:11:b7:42
wpa_driver_ndis_set_wpa: enabled=1
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
Setting scan request: 0 sec 100000 usec
Added interface \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}
State: DISCONNECTED -> SCANNING
Starting AP scan (specific SSID)
Scan SSID - hexdump_ascii(len=4):
    64 61 70 74                                       dapt
Trying to get current scan results first without requesting a new scan to speed
up initial association
Scan results: 2
Selecting BSS from priority group 0
0: 00:14:bf:db:a9:91 ssid='linksys' wpa_ie_len=0 rsn_ie_len=0 caps=0x0
  skip - no WPA/RSN IE
1: 00:90:4b:36:b8:66 ssid='dapt' wpa_ie_len=24 rsn_ie_len=0 caps=0x10
  selected based on WPA IE
Trying to associate with 00:90:4b:36:b8:66 (SSID='dapt' freq=2437 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: using IEEE 802.11i/D3.0
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 10 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
ndis_get_oid: oid=0xd010101 len (6) failed
MSNdis_StatusMediaConnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 0
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter
MSNdis_StatusMediaDisconnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 1
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter
MSNdis_StatusMediaConnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 0
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter
MSNdis_StatusMediaDisconnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 1
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter
MSNdis_StatusMediaConnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 00 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 0
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter
MSNdis_StatusMediaDisconnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: received event data - hexdump(len=42): 01 00 00 00 25 28 5a 44 31 32 31 31
29 49 45 45 45 20 38 30 32 2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74 65 7
2 20 23 36
NDIS: event - type 1
NDIS: event InstanceName - hexdump_ascii(len=37):
    28 5a 44 31 32 31 31 29 49 45 45 45 20 38 30 32   (ZD1211)IEEE 802
    2e 31 31 62 2b 67 20 55 53 42 20 41 64 61 70 74   .11b+g USB Adapt
    65 72 20 23 36                                    er #6
NDIS: ignored event for another adapter








here's with ap_scan=2

wpa_sup
plicant.exe -w -i  \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} -c wpa_sup
plicant.conf -d
Initializing interface '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}' conf
'wpa_supplicant.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Reading configuration file 'wpa_supplicant.conf'
ctrl_interface='/var/run/wpa_supplicant'
eapol_version=1
ap_scan=2
Priority group 0
  id=0 ssid='dapt'
Initializing interface (2) '\Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}'
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
NDIS: Packet.dll version: 3, 1, 0, 27
NDIS: 3 adapter names found
NDIS: 3 adapter descriptions found
NDIS: 0 - \Device\NPF_GenericDialupAdapter - Generic dialup adapter
NDIS: 1 - \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3} - ZyDAS ZD1211 802.
11b+g Wireless LAN (Microsoft's Packet Scheduler)
NDIS: 2 - \Device\NPF_{D87AE589-A1B6-4C39-B8EC-F646D0521165} - NETGEAR FA312 Fas
t Ethernet PCI Adapter (Microsoft's Packet Scheduler)
NDIS: Adapter description prefix 'ZyDAS ZD1211 802.11b+g Wireless LAN'
NDIS: Driver supports OID_802_11_CAPABILITY - NoOfPMKIDs 3 NoOfAuthEncrPairs 11
NDIS: driver capabilities: key_mgmt 0xf enc 0xf auth 0x3
Connected to ROOT\WMI.
Own MAC address: 00:12:0e:11:b7:42
wpa_driver_ndis_set_wpa: enabled=1
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
ndis_get_oid: oid=0xd010101 len (6) failed
Setting scan request: 0 sec 100000 usec
Added interface \Device\NPF_{EB8D4A8B-6375-4B60-9F12-59EC0440FAA3}
State: DISCONNECTED -> SCANNING
Trying to associate with SSID 'dapt'
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
WPA: No WPA/RSN IE available from association info
WPA: Set cipher suites based on configuration
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
No keys have been configured - skip key clearing
State: SCANNING -> ASSOCIATING
Setting authentication timeout: 60 sec 0 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RX EAPOL from 00:90:4b:36:b8:66
Setting authentication timeout: 10 sec 0 usec
MSNdis_StatusMediaConnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: ReqFixed=0x3 RespFixed=0x7 off_req=40 off_resp=78 len_req=38 len_resp=6
NDIS: 2 BSSID items to process for AssocInfo
Association info event
req_ies - hexdump(len=38): 00 04 64 61 70 74 01 04 82 84 8b 96 dd 18 00 50 f2 01
01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02 00 00
resp_ies - hexdump(len=6): 01 04 82 84 8b 96
beacon_ies - hexdump(len=39): 00 04 64 61 70 74 01 04 82 84 8b 96 03 01 06 dd 16
00 50 f2 01 01 00 00 50 f2 02 01 00 00 50 f2 02 01 00 00 50 f2 02
WPA: set own WPA/RSN IE - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0
1 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: set AP WPA IE - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2 02 01 00
00 50 f2 02 01 00 00 50 f2 02
WPA: clearing AP RSN IE
State: ASSOCIATING -> ASSOCIATED
Associated to a new BSS: BSSID=00:90:4b:36:b8:66
No keys have been configured - skip key clearing
Network configuration found for the current AP
WPA: Using WPA IE from AssocReq to set cipher suites
WPA: Selected cipher suites: group 8 pairwise 8 key_mgmt 2
WPA: clearing AP WPA IE
WPA: clearing AP RSN IE
WPA: using GTK TKIP
WPA: using PTK TKIP
WPA: using KEY_MGMT WPA-PSK
WPA: Set own WPA IE default - hexdump(len=24): dd 16 00 50 f2 01 01 00 00 50 f2
02 01 00 00 50 f2 02 01 00 00 50 f2 02
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
Associated with 00:90:4b:36:b8:66
WPA: Association event - clear replay counter
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
EAPOL: External notification - EAP success=0
EAPOL: External notification - portEnabled=1
EAPOL: SUPP_PAE entering state CONNECTING
EAPOL: SUPP_BE entering state IDLE
Setting authentication timeout: 10 sec 0 usec
IEEE 802.1X RX: version=1 type=3 length=95
 EAPOL-Key type=254
 key_info 0x89 (ver=1 keyidx=0 rsvd=0 Pairwise Ack)
 key_length=32 key_data_length=0
 replay_counter - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_nonce - hexdump(len=32): df 63 89 da 9b 75 23 8d 7b b3 00 3d 5a 20 a1 20 2
8 62 35 22 a7 be 7e 03 f5 77 cb ff ff ff ff ff
 key_iv - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
 key_rsc - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_id (reserved) - hexdump(len=8): 00 00 00 00 00 00 00 00
 key_mic - hexdump(len=16): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
State: ASSOCIATED -> 4WAY_HANDSHAKE
WPA: RX message 1 of 4-Way Handshake from 00:90:4b:36:b8:66 (ver=1)
WPA: WPA IE for msg 2/4 - hexdump(len=26): dd 18 00 50 f2 01 01 00 00 50 f2 02 0
1 00 00 50 f2 02 01 00 00 50 f2 02 00 00
WPA: Renewed SNonce - hexdump(len=32): 45 fd 54 3f 99 6d 72 b5 12 b1 77 f4 75 be
8e 4d e7 87 a9 be 33 3e 06 c2 f7 86 a4 a2 f2 00 94 af
WPA: PMK - hexdump(len=32): [REMOVED]
WPA: PTK - hexdump(len=64): [REMOVED]
WPA: Sending EAPOL-Key 2/4
NDIS: event - type 0
NDIS: ignored event for another adapter
MSNdis_StatusMediaDisconnect
 InstanceName: '(ZD1211)IEEE 802.11b+g USB Adapter #6'
NDIS: event - type 1




On 4/30/06, Jouni Malinen <[EMAIL PROTECTED]> wrote:
On Sun, Apr 30, 2006 at 04:38:29PM -0500, John H. wrote:
> ok, so i will try using wpa_supplicant in XP.
>
> in linux, I use zd1211 driver, so I use hawking driver in windows.
> How do I tell windows to use wpa_supplicant instead of it's built in
> xp thing?

You will need to first disable the built-in supplicant. This can be done
either temporarily by stopping wireless zeroconf service for all
interface (run 'net stop wzcsvc') or from the per-interface advanced
options. After this, you should be able to run wpa_supplicant in the
same way as you would under Linux.

Unless you have already installed WinPcap (e.g., for Ethereal), you will
need to install that to allow wpa_supplicant to perform low-level
networking tasks. WinPcap installation package is available from
http://www.winpcap.org/

The same configuration file should work fine under Windows, too. If you
have any problems with that, I would suggest trying with ap_scan=2 (see
wpa_supplicant.conf for more details) and explicitly configured
key_mgmt, proto, pairwise, and group parameters (i.e., just one option
for each).

The interface name can be either a prefix of the interface descriptor
(usually the vendor name or something similar) or a full interface name
(quite long hex string). You can use win_if_list.exe program to list all
available interfaces.

--
Jouni Malinen                                            PGP id EFC895FA



-------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid0709&bid&3057&dat1642
_______________________________________________
Zd1211-devs mailing list - http://zd1211.ath.cx/
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/zd1211-devs

Reply via email to