<meta http-equiv="content-type" content="text/html; charset=utf-8"><span class="Apple-style-span" style="font-family: arial, sans-serif; font-size: 13px; border-collapse: collapse; color: rgb(68, 68, 68); "><font face="'courier new', monospace">Thank you for your rapid response, Mr. Ortiz.<br>
<br></font><div><font face="'courier new', monospace">After applying your patch and recompiling, </font><span style="font-family: 'courier new', monospace; ">I unfortunately see no change in the behavior</span></div>
<div><span style="font-family: 'courier new', monospace; ">of wpa_supplicant. With key_mgmt=PSK, a node will </span><span style="font-family: 'courier new', monospace; ">associate with a BSSID but will still</span></div>
<div><span style="font-family: 'courier new', monospace; ">experience an authentication timeout roughly ten </span><span style="font-family: 'courier new', monospace; ">seconds later. Similarly, with</span></div>
<div><span style="font-family: 'courier new', monospace; ">key_mgmt=NONE, a node still continuously searches for an </span><span style="font-family: 'courier new', monospace; ">IBSS network to join, and</span></div>
<div><span style="font-family: 'courier new', monospace; ">wpa_supplicant prints "Invalid key management type (16)." The </span><span style="font-family: 'courier new', monospace; ">process mentioned in my</span></div>
<div><span style="font-family: 'courier new', monospace; ">original posting still succeeds in setting up an IBSS with proto=RSN.</span></div></span>