Johannes Berg wrote: > On Wed, 2006-06-07 at 10:47 -0500, Larry Finger wrote: > >> I have a little more information on what is happening. > > Great. > >> In IEEE Std 802.11i-2004, which defines the >> WPA protocol, Figure 11a shows the sequence of exchanges needed to >> associate. Both bcm43xx-softmac >> and ndiswrapper go through the "Open System Authentication" process. > > Right, you always have to do that. > >> Where they seem to diverge is >> in the STA's "Association Request (Security Parameters)" step. With >> ndiswrapper, the AP responds >> with a WPA EAPOL-Key message; whereas with softmac, the AP sends back the >> "invalid pairwise cipher >> message" and rejects the association. > > Interesting. That's strange. > >> Can anyone point to a reference that states what the content of the >> Association Request should be to >> get the AP to respond with the EAPOL-Key message? Unfortunately, I have no >> possibility of >> implementing a sniffer to see what a "correct" message contains. > > Well, it should be shown in the 802.11i spec too.
Beware of the order of IE's in the management frames; some AP's are touchy about this. Sam - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html