On Fri, 2008-06-06 at 16:59 +0300, Tomas Winkler wrote: > On Fri, Jun 6, 2008 at 3:33 PM, Thomas Backlund <tmb@xxxxxxxxxxxx> wrote: > > Thomas Backlund skrev: > >> > >> Tomas Winkler skrev: > >>> > >>> On Fri, Jun 6, 2008 at 3:44 AM, Ian Schram <ischram@xxxxxxxxxx> wrote: > >>>> > >>>> Isn't this the Oops Joonwoo Park wanted to patch with > >>>> > >>>> "[PATCH] iwlwifi: fix oops on wep key insertion" 27/5/2008 > >>>> > >>>> invalid length of webkey that would/should be handled in mac80211? > >>>> > >>>> ian > >>> > >>> Yes, it looks like. > >> > >> Ummm, what has a wep key to do with me trying to access a WPA2-Personal > >> encrypted net ? > > Not sure yet, but mac is trying to assign default/static wep key. The output of wpa_supplicant with "-dddt" would be quite useful in figuring this out. The supplicant does always _clear_ static WEP keys when it starts the interface, when a connection drops, and when it quits. Maybe that's where it's coming from? But it should just be setting the "disabled" bit in the WEXT structure and sending a key of all zeros. Dan > :iwlcore:iwl_send_static_wepkey_cmd+0xcb/0xd5 > :iwlcore:iwl_set_default_wep_key+0xa2/0xbc > > Try to set the encryption explicitly > network={ > psk="*************************" > scan_ssid=1 > ssid="dlink" > pairwise=CCMP > group=CCMP > } > > > >> > >>> Thomas can you send out your wpa_supplicant config fiele > >>> > >> > >> I could, but since I would have to remove any sensitive info such as the > >> psk key, would it be of any use ? > > > > Anyway, here configs are: > > > > wpa_supplicant.conf > > (I stripped all the comments from the file) > > --- cut --- > > ctrl_interface=/var/run/wpa_supplicant > > > > eapol_version=1 > > > > ap_scan=1 > > > > fast_reauth=1 > > > > blob-base64-exampleblob={ > > SGVsbG8gV29ybGQhCg== > > } > > > > network={ > > psk="*************************" > > scan_ssid=1 > > ssid="dlink" > > } > > --- cut --- > > > > ifcfg-wlan0 > > --- cut --- > > DEVICE=wlan0 > > BOOTPROTO=dhcp > > ONBOOT=yes > > METRIC=35 > > MII_NOT_SUPPORTED=no > > USERCTL=no > > RESOLV_MODS=no > > WIRELESS_MODE=Managed > > WIRELESS_ESSID=dlink > > WIRELESS_ENC_KEY='s:*************************' > > WIRELESS_WPA_DRIVER=wext > > IPV6INIT=no > > IPV6TO4INIT=no > > DHCP_CLIENT=dhclient > > NEEDHOSTNAME=no > > PEERDNS=yes > > PEERYP=yes > > PEERNTPD=no > > --- cut --- > > > >> > >>> I will provide a patch that disable hw encryption on long wep keys. It > >>> get lost in my todo list. > >>> Tomas > >>> > >> > > > > -- > > Thomas > > > > > > > -- > To unsubscribe from this list: send the line "unsubscribe linux-wireless" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html