On Wed, 2006-06-07 at 10:47 -0500, Larry Finger wrote: > I have a little more information on what is happening.
Great. > In IEEE Std 802.11i-2004, which defines the > WPA protocol, Figure 11a shows the sequence of exchanges needed to associate. > Both bcm43xx-softmac > and ndiswrapper go through the "Open System Authentication" process. Right, you always have to do that. > Where they seem to diverge is > in the STA's "Association Request (Security Parameters)" step. With > ndiswrapper, the AP responds > with a WPA EAPOL-Key message; whereas with softmac, the AP sends back the > "invalid pairwise cipher > message" and rejects the association. Interesting. That's strange. > Can anyone point to a reference that states what the content of the > Association Request should be to > get the AP to respond with the EAPOL-Key message? Unfortunately, I have no > possibility of > implementing a sniffer to see what a "correct" message contains. Well, it should be shown in the 802.11i spec too. johannes
signature.asc
Description: This is a digitally signed message part