From owner-freebsd-wireless@FreeBSD.ORG Sat Mar 15 02:52:16 2014 Return-Path: Delivered-To: freebsd-wireless@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 5E264825 for ; Sat, 15 Mar 2014 02:52:16 +0000 (UTC) Received: from mail.ignoranthack.me (ujvl.x.rootbsd.net [199.102.79.106]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 3D97DF78 for ; Sat, 15 Mar 2014 02:52:15 +0000 (UTC) Received: from [192.168.43.170] (45.sub-174-236-66.myvzw.com [174.236.66.45]) (using SSLv3 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: sbruno@ignoranthack.me) by mail.ignoranthack.me (Postfix) with ESMTPSA id 7AD61192ACD; Sat, 15 Mar 2014 03:17:56 +0000 (UTC) Subject: iwn(4) and WEP From: Sean Bruno To: freebsd-wireless@freebsd.org Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="=-iIN/kLmVWWmZyinJ3JQy" Date: Sat, 15 Mar 2014 11:52:02 +0900 Message-ID: <1394851922.4791.7.camel@powernoodle.corp.yahoo.com> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list Reply-To: sbruno@freebsd.org List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 15 Mar 2014 02:52:16 -0000 --=-iIN/kLmVWWmZyinJ3JQy Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable It looks like the wpa_supplicant 2.0 import now checks the cryptocapability mask when trying to validate WEP usage. iwn(4) does not populate the mask with any values so wpa_supplicant sees a value of 0. I added the capabilites and can associate, but dhclient cannot get an IP from the AP. I assume then, that once again, I don't know what I'm doing. More or less, this is what I tried: Index: if_iwn.c =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D --- if_iwn.c (revision 263173) +++ if_iwn.c (working copy) @@ -564,6 +564,8 @@ | IEEE80211_C_PMGT /* Station-side power mgmt */ ; =20 + ic->ic_cryptocaps =3D IEEE80211_CRYPTO_WEP; + /* Read MAC address, channels, etc from EEPROM. */ if ((error =3D iwn_read_eeprom(sc, macaddr)) !=3D 0) { device_printf(dev, "could not read EEPROM, error %d\n", sean p.s. Allan Jude came up with a hack for wpa_supplicant that seems to work, so I've bcc'd him here to get a patch out of him. --=-iIN/kLmVWWmZyinJ3JQy Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQEcBAABAgAGBQJTI8BOAAoJEBkJRdwI6BaHzd0H/1YOd9h9upfKvfKlF/fma4KN I1CkMI/RrPLQu2VfhXVucR+A1uCJdoTv8AGxR4686vswcMh3yOhaZTmg4/cuB0v7 18KJb06ejnRDj0OtmqUgWf2VHqxpK2dB9uyuRANAy18OtaADc3ZZVGI8JbgFirHx Q6me0B1F8F/tQC/O8weLrBGm0KBIbdfipR4Xu/iJJXnvcDhNsF4FbBWZaiUV3k7m otWgcky6kikZXa+qYP+SKL8OqM2F9zaScIH+d2m/TFhIXxEdb7gjLE8COlVdPIT/ AYaKOQ/nbbNTsSdElG4yJivoscLqM4gz08xtDZ2Zi7xgxzGrTlZPEjoELWomgR4= =pOYs -----END PGP SIGNATURE----- --=-iIN/kLmVWWmZyinJ3JQy--