From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from 128-177-27-249.ip.openhosting.com ([128.177.27.249]:39770 "EHLO jmalinen.user.openhosting.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752992Ab0H1RMy (ORCPT ); Sat, 28 Aug 2010 13:12:54 -0400 Date: Sat, 28 Aug 2010 20:12:39 +0300 From: Jouni Malinen To: Philip Prindeville Cc: linux-wireless@vger.kernel.org, Johannes Berg Subject: Re: Marshaling issues w/ compat-wireless-2010-08-19 Message-ID: <20100828171239.GA23885@jm.kir.nu> References: <4C746F74.70401@redfish-solutions.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii In-Reply-To: <4C746F74.70401@redfish-solutions.com> Sender: linux-wireless-owner@vger.kernel.org List-ID: On Tue, Aug 24, 2010 at 06:18:44PM -0700, Philip Prindeville wrote: > I've got a stock Fedora Core 13 install (updated today) with the hostapd-0.6.10 rpm and hostapd-0.7.2 compiled from sources. The NIC is a Ubiquiti SR71e (AR9280). > (2) Some highly unlikely values from the hostapd debugging messages when parsing out WEP authentication messages (line 507): > authentication: STA=f8:1e:df:1e:c2:23 auth_alg=35510 auth_transaction=79 status_code=21688 wep=1 > Unsupported authentication algorithm (35510) I was unable to reproduce this with the current development tree snapshots. Shared key authentication worked with AR9280 and the current wireless-testing.git and hostap.git in my tests. If you are still seeing this, you could also try to disable hw crypto to remove one possible issue area by using nohwcrypt=1 module parameter when loading ath9k. -- Jouni Malinen PGP id EFC895FA