<div>Dan,</div> <div> </div> <div>Authenticantion is failed.</div> <div>Auth request packet contains open and seq. num is 1</div> <div>Auth response packet from AP contains algorithm is shared key<BR>and seq. num is 14.</div> <div> </div> <div>So auth failed. I expect seq. num should be 2 but it is 14.</div> <div>Another thing is I cannot make ieee80211_ioctl_setmlme() work right.</div> <div> </div> <div>Any clue?</div> <div> </div> <div>----henry</div> <div><BR><B><I>Dan Williams <dcbw@redhat.com></I></B> wrote:</div> <BLOCKQUOTE class=replbq style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #1010ff 2px solid">On Wed, 2007-02-28 at 21:49 -0800, hong zhang wrote:<BR>> Dan,<BR>> <BR>> I look at my AP beacon and find two ucastcipher. One is tkip and<BR>> another one is ccmp. I can not make it as only one ucastcipher<BR>> ---tkip. I do not want to have ccmp.<BR>> <BR>> Also, how to decide wpa_ie
value?<BR><BR>Configure the access point to only support TKIP if you really want this.<BR>But what are you trying to do here? You should be using CCMP on all<BR>stations if you can, but if you have any stations that do not support<BR>CCMP, you want to use TKIP with those. So you should probably have<BR>_both_ CCMP and TKIP enabled on the AP.<BR><BR>It shouldn't matter to the station what cipher the AP uses. The client<BR>will just pick the one that both it and the AP support, and use that.<BR>You shouldn't need to disable one.<BR><BR>To specify only TKIP in wpa_supplicant, you use:<BR><BR>pairwise=TKIP<BR>group=TKIP<BR><BR>but if you're dealing with a hidden AP, you need to make sure that your<BR>pairwise and group cipher options match _exactly_ what the AP says in<BR>its information element, and therefore you'd want both TKIP and CCMP in<BR>the wpa_supplicant config file.<BR><BR>Dan<BR><BR>> ---henry<BR>> <BR>> Dan Williams <DCBW@REDHAT.COM>wrote:<BR>> On Wed,
2007-02-28 at 12:42 -0800, hong zhang wrote:<BR>> > List,<BR>> > <BR>> > wpa_passphrase requires ssidname and passphrase as input.<BR>> But if one<BR>> > client/station wants to associate an hidden AP. That means<BR>> client<BR>> > could not see AP's ssid name (empty). How can we run<BR>> > wpa_passphrase without ssid input and wpa_passphrase would<BR>> not work.<BR>> <BR>> You just have to know the SSID, even if the AP is hidden. You<BR>> cannot<BR>> connect to a hidden AP unless you know the SSID, so you'll<BR>> have the SSID<BR>> for the passphrase anyway.<BR>> <BR>> Dan<BR>> <BR>> <BR>> <BR>> <BR><BR></BLOCKQUOTE><BR>