Am 05.01.20 um 22:06 schrieb Markus Theil:
I didn't fully understand what the changes were doing with nl_event and
why the changes looked so inconsistent on using
send_and_recv_msgs_event() vs. send_and_recv_msmgs(). I tried to fix
those, but that did not remove the issues (but probably fixed some other
cases that I did not hit yet due to those other problems preventing full
testing). Anyway, the change itself did allow a simple test sequence
like the ap_wpa2_psk test case to complete full connection on both the
AP and station side using the nl80211 control port, so most of the
functionality is working, but something is just messing up what happens
for following operations.
I also tried the series with the tests and it broke the very first..
Not finished looking into that when I had to stop for today at least but
it looks like the patch series is breaking deauthentication for
wpa_supplicant or at least for the test ap_mixed_security.
It seems to generate invalid deauthentication requests and I assume it's
also not deleting the STA from the kernel. Nl80211 then balks when asked
to associate again when already having an association... at least that
is assumption I was planning to verify tomorrow.
(I checked the pcapng file from the test, try the filter
"(wlan.fc.type_subtype == 0x000c) || (frame.cap_len == 48))" and compare
it to a working testrun.)
Alexander
_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap