Date: Mon, 03 Jan 2005 09:03:53 +0800 From: Chen Lihong <d9364104@mail.nchu.edu.tw> To: Sam Leffler <sam@errno.com> Cc: current@freebsd.org Subject: Re: 802.11 WPA and wpa_supplicant Message-ID: <1104714233.792.1.camel@OmniBook.accton.com.tw> In-Reply-To: <41D597F1.4000902@errno.com> References: <6eb82e04122905361ccd6af0@mail.gmail.com> <41D4A140.8060502@errno.com> <1104486844.43764.6.camel@ OmniBook.accton.com.tw> <41D597F1.4000902@errno.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I cvsuped src yesterday. The WPA code works very well in WPA/TKIP and WPA/AES. On Fri, 2004-12-31 at 10:18 -0800, Sam Leffler wrote: > Chen Lihong wrote: > > I am using wpa_supplicant 0.3.2. > > I can associated and authenticated with my AP with WPA/TKIP/1X-KEY-MGMT. > > The hosts that at wired side can send packets to my FreeBSD station, but > > wired hosts can not receive any station's packets. > > Then, I use AiroPeek to capture wireless packets. I saw that any data > > packet sent by wired side is encrypted, and station can decrypte that > > well. > > When station reply or send any packet it is not encrypted, at this time > > AP may drop the packet. > > > > Looks like I need to push some changes from perforce into CVS. > > Sam
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1104714233.792.1.camel>