Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 03 Jan 2005 09:03:53 +0800
From:      Chen Lihong <d9364104@mail.nchu.edu.tw>
To:        Sam Leffler <sam@errno.com>
Cc:        current@freebsd.org
Subject:   Re: 802.11 WPA and wpa_supplicant
Message-ID:  <1104714233.792.1.camel@OmniBook.accton.com.tw>
In-Reply-To: <41D597F1.4000902@errno.com>
References:  <6eb82e04122905361ccd6af0@mail.gmail.com> <41D4A140.8060502@errno.com> <1104486844.43764.6.camel@ OmniBook.accton.com.tw> <41D597F1.4000902@errno.com>

next in thread | previous in thread | raw e-mail | index | archive | help
I cvsuped src yesterday. The WPA code works very well in WPA/TKIP and
WPA/AES.

On Fri, 2004-12-31 at 10:18 -0800, Sam Leffler wrote:
> Chen Lihong wrote:
> > I am using wpa_supplicant 0.3.2.
> > I can associated and authenticated with my AP with WPA/TKIP/1X-KEY-MGMT.
> > The hosts that at wired side can send packets to my FreeBSD station, but
> > wired hosts can not receive any station's packets.
> > Then, I use AiroPeek to capture wireless packets. I saw that any data
> > packet sent by wired side is encrypted, and station can decrypte that
> > well. 
> > When station reply or send any packet it is not encrypted, at this time
> > AP may drop the packet.
> >
> 
> Looks like I need to push some changes from perforce into CVS.
> 
> 	Sam



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1104714233.792.1.camel>