Your message dated Mon, 13 Feb 2006 22:32:46 +0100 with message-id <[EMAIL PROTECTED]> and subject line Current package ships example for WEP104 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: wpasupplicant Version: 0.4.4-1 Severity: normal Hello, The wep_key%d parameters only accept 64 bits keys. There is no example of how to setup a static WEP AP with a 104 bits key. I'm not even sure if that is possible at all. Sincerely, -- System Information: Debian Release: testing/unstable APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.14 Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8) Versions of packages wpasupplicant depends on: ii libc6 2.3.5-7 GNU C Library: Shared libraries an ii libncurses5 5.5-1 Shared libraries for terminal hand ii libreadline5 5.0-11 GNU readline and history libraries ii libssl0.9.7 0.9.7g-5 SSL shared libraries wpasupplicant recommends no packages. -- no debconf information
--- End Message ---
--- Begin Message ---The current package ships an example file in /usr/share/doc/wpasupplicant/examples/ with an example stanza for use with WEP104. I'm currently not using it myself, but the last time I tried it, it worked for me. Gruesse, Reinhard
--- End Message ---

