yogesh powar | 1 Apr 07:22 2010

nl80211 and switching between WPS-PIN and WPS-PBC

With nl80211 driver, switching between WPS-PBC & WPS-PIN does not work
since AP does not advertise the active WPS-PBC/PIN session in beacon.

Whenever we use WPS-PIN after a WPS-PBC session or vice-e-versa, later
does not get advertised in the beacon. Reason for this behavior is
set_ap_wps_ie function pointer in driver_nl80211 is set to null. 

As per my understanding, set_ap_wps_ie function can be set to null if
kernel driver uses the beacon template from set_beacon(). Whenever WPS
registrar information is changed, hostapd gives modified WPS IE to the
driver through this function. But, this information is not reflected in
the beacons by hostapd when the driver does not provide set_ap_wps_ie
function.

Issue is observed in hostapd 6.9, 6,10, and 7.1 with driver
driver_nl80211.

Simple solution for this would be calling set_beacon every time WPS-IE
information is modified/changed whenever set_ap_wps_ie function is NULL.

Attached is RFC for invoking set_beacon() every time WPS IE is modified.

Thanks 
Yogesh 
_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
(Continue reading)

Peter Fortuin | 1 Apr 09:01 2010
Picon

Re: wpa_driver_priv_driver_cmd failed

Thanks for your response.
You are right. It's code from the Android version of wpa_supplicant. I didn't see that this function only excisted in there version.
 I already send my question to the android-porting mailing list.

Kind regards,

Peter


2010/3/31 Jouni Malinen <j <at> w1.fi>
On Wed, Mar 31, 2010 at 10:54:00AM +0200, Peter Fortuin wrote:

> I'm working on getting wpa_supplicant working on my system, but I run into a
> problem.
>
> When I enable everything and start the wpa_supplicant I get the following
> message:
>
> wpa_driver_priv_driver_cmd failed

Where did you get wpa_supplicant from? This function does not exist in
my repository..

> I added some debug printf's into driver_wext.c (in
> wpa_driver_priv_driver_cmd function) and found out that every call to this
> functions gives this error message. As command he uses RSSI, LINKSPEED,
> SCAN-ACTIVE and STOP. But all fails.

All this sounds like some custom modifications for wpa_supplicant..
Please direct this question to whoever is maintaining that code.

--
Jouni Malinen                                            PGP id EFC895FA
_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap

_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Andriy Tkachuk | 1 Apr 11:37 2010

Re: [patch] WPS: hostapd fails to proxy registrations with Intel ext. registrar

On 2010-03-31 19:34, Jouni Malinen wrote:
> On Wed, Mar 31, 2010 at 09:53:11AM +0300, Andriy Tkachuk wrote:
>
>   
>> I used here the Intel card and SW (driver & Intel PROSet application)
>> versions from WFA testbed...
>>     
>
> Interesting.. I have not seen this in my tests, but maybe I have only
> tested with different PROset versions.
>   

I used PROSet version 11.5.0.0 (that conforms with
WPS_TestPlan_v1-10_2009-11-02a.pdf)

>> 1269872027.309206: WPS UPnP: Got HTTP request type 4 from 192.168.1.111:60057
>> 1269872027.309228: WPS UPnP: PutWLANResponse
>> 1269872027.309259: WPS UPnP: POST failure ret=600
>>
>> This failure, as appeared, happened on parsing the NewWLANEventMAC value
>> in web_process_put_wlan_response() here:
>>
>>         val = xml_get_first_item(data, "NewWLANEventMAC");
>>         if (val == NULL || hwaddr_aton(val, macaddr)) {
>>                 wpabuf_free(msg);
>>                 os_free(val);
>>                 return UPNP_ARG_VALUE_INVALID;
>>         }
>>     
>
> OK. I would prefer this to be worked around in more visible way, i.e.,
> something like (completely untested; hwaddr_aton_dots would be the new
> function handling the incorrect format that was used by the ER).
>
> val = xml_get_first_item(data, "NewWLANEventMAC");
> if (val) {
> 	if (hwaddr_aton(val, macaddr)) {
> 	    wpa_printf(MSG_DEBUG, "WPS: Invalid NewWLANEventMAC '%s'",
> 		       val);
> 	    if (hwaddr_aton_dots(val, macaddr)) {
> 		os_free(val);
> 		val = NULL;
> 	    } else
> 		wpa_printf(MSG_DEBUG, "WPS: Workaround - accepted "
> 			   "incorrect NewWLANEventMAC format");
> 	}
> }
> if (val == NULL) {
> 	wpabuf_free(msg);
> 	return UPNP_ARG_VALUE_INVALID;
> }
> os_free(val);
>   

Ok, will try it...

BTW, why you are against dots in mac address format so much - is it
really so critical?

Thank you,
    Andriy
Frank Hartmann | 3 Apr 12:14 2010
Picon
Picon

Intersil prism 2.5 && WPA

Hi,

I have problems connecting to my WLAN with my laptop.  I am running
debian/squeeze and tried all variations of things I could find.

The last time it was working was around debian etch and the bits of
configuration which were left over seem to indicate I was using hostap
and hostap_pci as kernel module and a tool called wpa_supplicant for
other things in user space. I had to blacklist some other drivers,
because there were multiple drivers for this chipset.

Nowaday in debian squeeze it seems, that I can still use the kernel
modules, but cannot configure wpa_supplicant to use them.

I tried then several live CDs with no good results.

Fedora-12-i686-Live.iso: I could not connect using a GUI called Network
Manager, it offered only WEP support, and some other stuff, but no WPA

ubuntu-9.10-desktop-i386.iso: exactly the same as fedora: Same tool,
same options, WPA seems missing. The kernel modules loaded were hostap,
hostap_pci, orinoco, orinoco_pci. I was able to connect to my WLAN using
this life CD and another laptop with  a different chipset. There a
choice "personal WPA" was visible.

KNOPPIX_V6.2.1CD-2010-01-31-EN.iso: Same Network Manager GUI, but no
wireless networks were shown. The kernel module used was orinoco_pci and
I found a kernel crash related to this module in the output of dmesg.

So I was wondering :

Is someone still using this chipset in combination with WPA and could
direct me in the right direction?

Or if I am the only one left with old hardware, is there a good place to
start for debugging this a bit more? Is someone intersted in more details
with respect to one of the listed setups, please? 

kind regards
  Frank
Hanno Böck | 5 Apr 13:31 2010
Picon

WPA-EAP/PEAP on an intel ipw2100 card

Hi,

I have a problem trying to connect to the eduroam system used at many 
universities in germany with a ipw2100 card.

The system uses WPA professional and the interesting parts of the config file 
are probably:
network={
    ssid=[...]
    key_mgmt=WPA-EAP
    eap=PEAP
    identity=[...]
    anonymous_identity=[...]
    ca_cert="/etc/wpa_supplicant/deutsche-telekom-ca-2.pem"
    phase1="peaplabel=0"
    phase2="auth=MSCHAPV2"
    priority=2
}

The output of wpa_supplicant is:
CTRL-EVENT-SCAN-RESULTS 
Trying to associate with 00:15:c7:29:ce:72 (SSID='eduroam' freq=2412 MHz)
ioctl[SIOCSIWFREQ]: Operation not supported
Association request to the driver failed
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys

From then, this loops. Debugging output below.

I can also provide debugging output if needed.

The exact device (lspci) is:
01:02.0 Network controller: Intel Corporation PRO/Wireless LAN 2100 3B Mini 
PCI Adapter (rev 04)

Debugging output:
ioctl[SIOCSIWFREQ]: Operation not supported
Initializing interface 'eth1' conf '/etc/wpa_supplicant/fu-eduroam-
wireless.conf' driver 'default' ctrl_interface 'N/A' bridge 'N/A'
Configuration file '/etc/wpa_supplicant/fu-eduroam-wireless.conf' -> 
'/etc/wpa_supplicant/fu-eduroam-wireless.conf'
Reading configuration file '/etc/wpa_supplicant/fu-eduroam-wireless.conf'
Priority group 2
   id=0 ssid='eduroam'
Interface eth1 set UP - waiting a second for the driver to complete 
initialization
SIOCGIWRANGE: WE(compiled)=22 WE(source)=18 enc_capa=0xf
  capabilities: key_mgmt 0xf enc 0xf flags 0x0
WEXT: Operstate: linkmode=1, operstate=5
Own MAC address: 00:0c:f1:0f:19:03
wpa_driver_wext_set_wpa
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_countermeasures
wpa_driver_wext_set_drop_unencrypted
RSN: flushing PMKID list in the driver
Setting scan request: 0 sec 100000 usec
WPS: UUID based on MAC address - hexdump(len=16): 13 e8 5f cf ce 13 5a db a7 
18 f5 ba 10 34 c3 03
WPS: Build Beacon and Probe Response IEs
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Version
WPS:  * Wi-Fi Protected Setup State (0)
WPS:  * Response Type (2)
WPS:  * UUID-E
WPS:  * Manufacturer
WPS:  * Model Name
WPS:  * Model Number
WPS:  * Serial Number
WPS:  * Primary Device Type
WPS:  * Device Name
WPS:  * Config Methods (0)
WPS:  * RF Bands (3)
EAPOL: SUPP_PAE entering state DISCONNECTED
EAPOL: KEY_RX entering state NO_KEY_RECEIVE
EAPOL: SUPP_BE entering state INITIALIZE
EAP: EAP entering state DISABLED
Added interface eth1
RTM_NEWLINK: operstate=0 ifi_flags=0x1002 ()
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
State: DISCONNECTED -> SCANNING
Starting AP scan (broadcast SSID)
Trying to get current scan results first without requesting a new scan to 
speed up initial association
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5400 bytes of scan results (21 BSSes)
CTRL-EVENT-SCAN-RESULTS 
Selecting BSS from priority group 2
Try to find WPA-enabled AP
0: 00:15:c7:29:ce:73 ssid='voice' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
1: 00:15:c7:29:ce:76 ssid='' wpa_ie_len=24 rsn_ie_len=0 caps=0x11
   skip - SSID mismatch
2: 00:15:c7:29:ce:72 ssid='eduroam' wpa_ie_len=28 rsn_ie_len=26 caps=0x11
   selected based on RSN IE
   selected WPA AP 00:15:c7:29:ce:72 ssid='eduroam'
Trying to associate with 00:15:c7:29:ce:72 (SSID='eduroam' freq=2412 MHz)
Cancelling scan request
WPA: clearing own WPA/RSN IE
Automatic auth_alg selection: 0x1
RSN: using IEEE 802.11i/D9.0
WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2
WPA: set AP WPA IE - hexdump(len=30): dd 1c 00 50 f2 01 01 00 00 50 f2 02 02 
00 00 50 f2 02 00 50 f2 04 01 00 00 50 f2 01 00 00
WPA: set AP RSN IE - hexdump(len=28): 30 1a 01 00 00 0f ac 02 02 00 00 0f ac 
02 00 0f ac 04 01 00 00 0f ac 01 28 00 00 00
WPA: using GTK TKIP
WPA: using PTK CCMP
WPA: using KEY_MGMT 802.1X
WPA: not using MGMT group cipher
WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 
00 0f ac 04 01 00 00 0f ac 01 00 00
No keys have been configured - skip key clearing
wpa_driver_wext_set_drop_unencrypted
State: SCANNING -> ASSOCIATING
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
wpa_driver_wext_associate
wpa_driver_wext_set_psk
Association request to the driver failed
Setting authentication timeout: 5 sec 0ioctl[SIOCSIWFREQ]: Operation not 
supported
 usec
EAPOL: External notification - EAP success=0
EAPOL: External notification - EAP fail=0
EAPOL: External notification - portControl=Auto
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RSN: Ignored PMKID candidate without preauth flag
RTM_NEWLINK: operstate=0 ifi_flags=0x11043 ([UP][RUNNING][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b06 len=8
RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1043 ([UP][RUNNING])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b15 len=20
Wireless event: new AP: 00:00:00:00:00:00
Added BSSID 00:15:c7:29:ce:72 into blacklist
CTRL-EVENT-DISCONNECTED - Disconnect event - remove keys
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=1 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=2 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=3 set_tx=0 seq_len=0 key_len=0
wpa_driver_wext_set_key: alg=0 key_idx=0 set_tx=0 seq_len=0 key_len=0
State: ASSOCIATING -> DISCONNECTED
wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)
WEXT: Operstate: linkmode=-1, operstate=5
EAPOL: External notification - portEnabled=0
EAPOL: External notification - portValid=0
RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])
RTM_NEWLINK, IFLA_IFNAME: Interface 'eth1' added
Wireless event: cmd=0x8b19 len=8
Scan results did not fit - trying larger buffer (8192 bytes)
Received 5982 bytes of scan results (23 BSSes)

--

-- 
Hanno Böck		Blog:		http://www.hboeck.de/
GPG: 3DBD3B20		Jabber/Mail:	hanno <at> hboeck.de

http://schokokeks.org - professional webhosting
_______________________________________________
HostAP mailing list
HostAP <at> lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap
Pavel Roskin | 5 Apr 16:55 2010
Picon

Re: Intersil prism 2.5 && WPA

On Sat, 2010-04-03 at 12:14 +0200, Frank Hartmann wrote:

> The last time it was working was around debian etch and the bits of
> configuration which were left over seem to indicate I was using hostap
> and hostap_pci as kernel module and a tool called wpa_supplicant for
> other things in user space. I had to blacklist some other drivers,
> because there were multiple drivers for this chipset.

This should change in Linux 2.6.35, where the orinoco driver won't
support Prism chipset by default.

> Nowaday in debian squeeze it seems, that I can still use the kernel
> modules, but cannot configure wpa_supplicant to use them.
> 
> I tried then several live CDs with no good results.
> 
> Fedora-12-i686-Live.iso: I could not connect using a GUI called Network
> Manager, it offered only WEP support, and some other stuff, but no WPA

It looks like orinoco is loaded.

> ubuntu-9.10-desktop-i386.iso: exactly the same as fedora: Same tool,
> same options, WPA seems missing. The kernel modules loaded were hostap,
> hostap_pci, orinoco, orinoco_pci. I was able to connect to my WLAN using
> this life CD and another laptop with  a different chipset. There a
> choice "personal WPA" was visible.

It looks like the same problem.

> KNOPPIX_V6.2.1CD-2010-01-31-EN.iso: Same Network Manager GUI, but no
> wireless networks were shown. The kernel module used was orinoco_pci and
> I found a kernel crash related to this module in the output of dmesg.

Again, it's not a problem with the hostap driver.

> Is someone still using this chipset in combination with WPA and could
> direct me in the right direction?

Last time I tried hostap with WPA, it worked just fine.

> Or if I am the only one left with old hardware, is there a good place to
> start for debugging this a bit more? Is someone intersted in more details
> with respect to one of the listed setups, please? 

I'm not sure you have actually observed a problem with hostap.

--

-- 
Regards,
Pavel Roskin
Jouni Malinen | 6 Apr 09:50 2010
Picon

Re: [patch] WPS: hostapd fails to proxy registrations with Intel ext. registrar

On Thu, Apr 01, 2010 at 12:37:07PM +0300, Andriy Tkachuk wrote:
> I used PROSet version 11.5.0.0 (that conforms with
> WPS_TestPlan_v1-10_2009-11-02a.pdf)

OK. I was able to reproduce this.

> BTW, why you are against dots in mac address format so much - is it
> really so critical?

I want to be able to build a tool that verifies WPS protocol correctness
and for that to work properly, a strict parser is useful. In addition,
there are many users of hwaddr_aton() and I do not want to review them
for potential issues with changed behavior. The change you proposed is
unlikely to cause problems, but this could as well be extended to handle
formats that have different length (e.g., 0011.2233.4455) and at that
point, the existing users may not work anymore.

There is now a new function, hwaddr_aton2(), that will accept various
MAC address text formats (including ones with different length) and it
returns the number of used characters on success. I added the workaround
code for PutWLANResponse handling and that resolved the interoperability
issue with Intel PROSet.

--

-- 
Jouni Malinen                                            PGP id EFC895FA
Helmut Schaa | 6 Apr 09:58 2010

Re: [RFC] Allow the wpa_ie to be updated when reassociating to a different AP

Ping. Any ideas regarding the issue below?

Helmut

Am Freitag 19 März 2010 schrieb Helmut Schaa:
> Allow the wpa_ie to be updated when reassociating to a different AP. This
> fixes issues when reassociating with a new AP we have preauthenticated
> first.
> 
> The association with the first AP sets the appropriate wpa_ie. However,
> when reassociating to a new AP within the same ESS (without prior
> disassociation) wpa_sm_set_assoc_wpa_ie_default generates a correct wpa_ie
> and returns it for use in the reassociation request but does not store it
> in assoc_wpa_ie. Hence, the stored assoc_wpa_ie is still the one from the
> previous association and won't contain the correct PMKID. As a result the
> AP will refuse the second message of the 4-way handshake due to a
> different wpa_ie (compared to the reassoc req).
> 
> Signed-off-by: Helmut Schaa <helmut.schaa <at> googlemail.com>
> ---
> 
> Since I'm not 100% sure to not create a different issue with this patch I'll
> send it as RFC.
> 
> Jouni, if you want to see a logfile with -ddt for this issue I can reproduce
> this behavior but I don't have the file from yesterday anymore :( and would
> have to set my environment up again. Nevertheless the logfile clearly showed
> that the wpa_ie's used in the reassoc request and in the 2nd message of the
> 4-way handshake were different.
> 
> Helmut
> 
>  src/rsn_supp/wpa.c |   22 ++++++++++------------
>  1 files changed, 10 insertions(+), 12 deletions(-)
> 
> diff --git a/src/rsn_supp/wpa.c b/src/rsn_supp/wpa.c
> index df0688c..3264607 100644
> --- a/src/rsn_supp/wpa.c
> +++ b/src/rsn_supp/wpa.c
>  <at>  <at>  -2225,19 +2225,17  <at>  <at>  int wpa_sm_set_assoc_wpa_ie_default(struct wpa_sm *sm, u8 *wpa_ie,
>  	wpa_hexdump(MSG_DEBUG, "WPA: Set own WPA IE default",
>  		    wpa_ie, *wpa_ie_len);
>  
> -	if (sm->assoc_wpa_ie == NULL) {
> -		/*
> -		 * Make a copy of the WPA/RSN IE so that 4-Way Handshake gets
> -		 * the correct version of the IE even if PMKSA caching is
> -		 * aborted (which would remove PMKID from IE generation).
> -		 */
> -		sm->assoc_wpa_ie = os_malloc(*wpa_ie_len);
> -		if (sm->assoc_wpa_ie == NULL)
> -			return -1;
> +	/*
> +	 * Make a copy of the WPA/RSN IE so that 4-Way Handshake gets
> +	 * the correct version of the IE even if PMKSA caching is
> +	 * aborted (which would remove PMKID from IE generation).
> +	 */
> +	sm->assoc_wpa_ie = os_malloc(*wpa_ie_len);
> +	if (sm->assoc_wpa_ie == NULL)
> +		return -1;
>  
> -		os_memcpy(sm->assoc_wpa_ie, wpa_ie, *wpa_ie_len);
> -		sm->assoc_wpa_ie_len = *wpa_ie_len;
> -	}
> +	os_memcpy(sm->assoc_wpa_ie, wpa_ie, *wpa_ie_len);
> +	sm->assoc_wpa_ie_len = *wpa_ie_len;
>  
>  	return 0;
>  }
> 
Jouni Malinen | 6 Apr 16:13 2010
Picon

Re: [PATCH] hostapd: Use cp -f in make install

On Sun, Apr 04, 2010 at 06:15:39PM +0100, Michael Buesch wrote:
> If hostapd is running, a make install fails with
> cp: cannot create regular file `/usr/local/bin/hostapd': Text file busy
> 
> Use cp -f to avoid this error and force-override the file.

Thanks, applied.

--

-- 
Jouni Malinen                                            PGP id EFC895FA
Jouni Malinen | 6 Apr 17:09 2010
Picon

Re: nl80211 and switching between WPS-PIN and WPS-PBC

On Thu, Apr 01, 2010 at 10:52:00AM +0530, yogesh powar wrote:
> With nl80211 driver, switching between WPS-PBC & WPS-PIN does not work
> since AP does not advertise the active WPS-PBC/PIN session in beacon.
> 
> Whenever we use WPS-PIN after a WPS-PBC session or vice-e-versa, later
> does not get advertised in the beacon. Reason for this behavior is
> set_ap_wps_ie function pointer in driver_nl80211 is set to null. 

Thanks for reporting this.

> As per my understanding, set_ap_wps_ie function can be set to null if
> kernel driver uses the beacon template from set_beacon(). Whenever WPS
> registrar information is changed, hostapd gives modified WPS IE to the
> driver through this function. But, this information is not reflected in
> the beacons by hostapd when the driver does not provide set_ap_wps_ie
> function.

Your understanding is correct and a call to set_beacon() is indeed
missing in this case.

> Simple solution for this would be calling set_beacon every time WPS-IE
> information is modified/changed whenever set_ap_wps_ie function is NULL.
> 
> Attached is RFC for invoking set_beacon() every time WPS IE is modified.

I prefer to handle this with a call to set_beacon from the actual WPS IE
update function instead of doing this indirectly through the
set_ap_wps_ie handler. This is now in the git repository (0.7.x branch
only at this point; I will merge it into 0.6.x, too).

--

-- 
Jouni Malinen                                            PGP id EFC895FA

Gmane