@rik
so this is going to be long I warn you. don’t complain afterwards dear sir!
1/ I don’t why do you get this idea but NEVER NEVER the firmware is unified across the board. Especially not between AP and router of the same brands. Why? Routers have a dedicated CPU for routing purposes but not only that.
Even ddwrt does not do unified build accross every devices the same.
I already point it out to the rest of the Team. ASK FUCKING KONG about it the main dev. He’s a very nice guy, never let anyone down.
2/ dimantle proof
Do you see the differences there?
3/ Did you not see the decrepencies between your 2 firmware and date of production?
His router is an FCC regulated from 2014 he has a 2015 firmware to prove it.
You, dear sir, have a fucking device from 2017 + what I suspect to be an up to date firmware.
Of course there is going to be changes in key exchange mechanism among those 2.
4/ You did notice I hope that in the review from the archer, and the routers I have mentionned many times in chat and in my posts that they are taken as comparaison . Same date of production, even different brands, same kind of implementation .
I have asked this many time to plamen and to the team. Why the fuck did you not ask Kong from ddwrt or the devs at lunarOS for the exact key exchange mechanism implementation. I am not talking about a fucking UML high abstraction schematics. I mean the fucking exact UML schematics granularity by granularity of each level of implementation.
You are not going to tell me, that and Kong and the devs at LunarOS are total morrons to who you can’t talk to no?
If lunarOS is working on the same goddamned phone in the same conditions and the iodeos is not on the same hardware in the same conditions…
It’s not like we did not test it during the beta. Mr Haack did it ofr us. Another guy User12345 did it too. So stop fucking around!
Ask the fucking implementations schematics of the devs who have already done the work on that same hardware.
We know it is not how the key is stored.
We know it is not because of some special options.
Not it is because of some special characters.
We did all those tests during the beta.
We know the problem is contained to the key exchange mechanism. That’s where the coding problem is. that’s where the problem happens. With specific encryption algorithm, proper surely to some OS implementation of routers.
But the matter stays that other devs did succeed with the same hardware and not avoid the problem like your team did.
And that every other fucking brands which are running under lineageOS don’t have the problem and still have a fucking Mediatek CPU. Don’t give me the fucking argument “it’s a lineage problem”, NO IT’s NOT.
It is a specific IodeOS problem with some encryption method exchanging with some specific cpu. Probably you did not include some conditional cases in your coding. That’s where the problem is.
So again ask people who knows better. Apparently the devs at mediatek does not help you much, so ask others.
And again… You want to reproduce the problem again and again… Ask for a free loan of hardware. The whole FFDN has plenty of those AP under ddwrt lying around.
And I ma pretty sure as soon as you have included those if missing in the programming, you will have also resolved and the wpa3 problem and the wpa2 enterprise key exchange problem. Because again, this a key exchange mechanism problem .