This patch adds support for 802.11w for rt2800. This is achieved by
using the 802.11w implementation in mac80211.
To get this working, it is necessary that hw encryption of
rt2800pci / rt2800usb is disabled, because I don't know of any support
in hardware for 802.11w and therefore let mac80211 do the whole job.
The user can enable 802.11w support by disabling hw encryption by
setting module parameter nohwcrypt=1.
Tested with rt2860 and rt3572.
This is a workaround as long as there isn't hardware support implemented
in the driver.
Signed-off-by: Andreas Hartmann <[email protected]>
---
diff -ru compat-wireless-2012-04-26.orig/drivers/net/wireless/rt2x00/rt2800pci.c compat-wireless-2012-04-26/drivers/net/wireless/rt2x00/rt2800pci.c
--- compat-wireless-2012-04-26.orig/drivers/net/wireless/rt2x00/rt2800pci.c 2012-04-26 22:10:30.000000000 +0200
+++ compat-wireless-2012-04-26/drivers/net/wireless/rt2x00/rt2800pci.c 2012-05-10 19:06:51.813040835 +0200
@@ -52,7 +52,7 @@
*/
static bool modparam_nohwcrypt = false;
module_param_named(nohwcrypt, modparam_nohwcrypt, bool, S_IRUGO);
-MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
+MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption. Enable MFP (802.11w)");
static void rt2800pci_mcu_status(struct rt2x00_dev *rt2x00dev, const u8 token)
{
@@ -1020,6 +1020,11 @@
__set_bit(REQUIRE_TASKLET_CONTEXT, &rt2x00dev->cap_flags);
if (!modparam_nohwcrypt)
__set_bit(CAPABILITY_HW_CRYPTO, &rt2x00dev->cap_flags);
+ else {
+ INFO(rt2x00dev, "802.11w support (MFP) enabled.\n");
+ rt2x00dev->hw->flags |=
+ IEEE80211_HW_MFP_CAPABLE;
+ }
__set_bit(CAPABILITY_LINK_TUNING, &rt2x00dev->cap_flags);
__set_bit(REQUIRE_HT_TX_DESC, &rt2x00dev->cap_flags);
diff -ru compat-wireless-2012-04-26.orig/drivers/net/wireless/rt2x00/rt2800usb.c compat-wireless-2012-04-26/drivers/net/wireless/rt2x00/rt2800usb.c
--- compat-wireless-2012-04-26.orig/drivers/net/wireless/rt2x00/rt2800usb.c 2012-04-26 22:10:30.000000000 +0200
+++ compat-wireless-2012-04-26/drivers/net/wireless/rt2x00/rt2800usb.c 2012-05-10 19:08:06.642042805 +0200
@@ -47,7 +47,7 @@
*/
static bool modparam_nohwcrypt;
module_param_named(nohwcrypt, modparam_nohwcrypt, bool, S_IRUGO);
-MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption.");
+MODULE_PARM_DESC(nohwcrypt, "Disable hardware encryption. Enable MFP (802.11w).");
/*
* Queue handlers.
@@ -769,6 +769,11 @@
__set_bit(REQUIRE_L2PAD, &rt2x00dev->cap_flags);
if (!modparam_nohwcrypt)
__set_bit(CAPABILITY_HW_CRYPTO, &rt2x00dev->cap_flags);
+ else {
+ INFO(rt2x00dev, "802.11w support (MFP) enabled.\n");
+ rt2x00dev->hw->flags |=
+ IEEE80211_HW_MFP_CAPABLE;
+ }
__set_bit(CAPABILITY_LINK_TUNING, &rt2x00dev->cap_flags);
__set_bit(REQUIRE_HT_TX_DESC, &rt2x00dev->cap_flags);
__set_bit(REQUIRE_TXSTATUS_FIFO, &rt2x00dev->cap_flags);
Andreas Hartmann wrote:
> This patch adds support for 802.11w for rt2800. This is achieved by
> using the 802.11w implementation in mac80211.
>
> To get this working, it is necessary that hw encryption of
> rt2800pci / rt2800usb is disabled, because I don't know of any support
> in hardware for 802.11w and therefore let mac80211 do the whole job.
>
> The user can enable 802.11w support by disabling hw encryption by
> setting module parameter nohwcrypt=1.
>
> Tested with rt2860 and rt3572.
>
> This is a workaround as long as there isn't hardware support implemented
> in the driver.
Did anybody do some testing?
My long term test showed up one critical issue: If there is network load
during 4 way handshake (EAP-TLS), the 4 way handshake breaks most of the
time, because AP doesn't get the 4/4-package sent by the supplicant
(this is an old problem and not related to MFP).
This means:
supplicant operates with new keys, AP uses the old ones. Hence,
deauth-package of AP -> STA isn't understood by STA and therefore
ignored. Consequence: the connection is broken. You have to restart the
supplicant to get it working again.
Following the log of the AP:
1336729364.917156: IEEE 802.1X: 48:5d:60:11:22:33 REAUTH_TIMER entering state REAUTHENTICATE
1336729364.917173: 1336729364.917204: WPA: 48:5d:60:11:22:33 WPA_PTK entering state AUTHENTICATION2
1336729364.917559: WPA: Assign ANonce - hexdump(len=32): 2f 7a be 8a 70 c8 14 63 3b af 3e fc 0e 4d a0 68 71 b0 c6 f9 16 08 c8 2a f6 b5 60 67 72 03 50 1d
1336729364.917567: IEEE 802.1X: 48:5d:60:11:22:33 AUTH_PAE entering state RESTART
1336729364.917570: IEEE 802.1X: 48:5d:60:11:22:33 REAUTH_TIMER entering state INITIALIZE
1336729364.917572: EAP: EAP entering state INITIALIZE
1336729364.917576: wlan0: CTRL-EVENT-EAP-STARTED 48:5d:60:11:22:33
1336729364.917578: EAP: EAP entering state SELECT_ACTION
1336729364.917579: EAP: getDecision: no identity known yet -> CONTINUE
1336729364.917581: EAP: EAP entering state PROPOSE_METHOD
1336729364.917582: EAP: getNextMethod: vendor 0 type 1
1336729364.917585: wlan0: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 method=1
1336729364.917586: EAP: EAP entering state METHOD_REQUEST
1336729364.917588: EAP: building EAP-Request: Identifier 90
1336729364.917593: EAP: EAP entering state SEND_REQUEST
1336729364.917595: EAP: EAP entering state IDLE
1336729364.917596: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1336729364.917598: IEEE 802.1X: 48:5d:60:11:22:33 AUTH_PAE entering state CONNECTING
1336729364.917600: IEEE 802.1X: 48:5d:60:11:22:33 AUTH_PAE entering state AUTHENTICATING
1336729364.917602: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state REQUEST
1336729364.917606: 1336729364.958554: wlan0: Event EAPOL_RX (27) received
1336729364.958565: IEEE 802.1X: 27 bytes from 48:5d:60:11:22:33
1336729364.958571: IEEE 802.1X: version=1 type=0 length=23
1336729364.958575: EAP: code=2 identifier=90 length=23
1336729364.958578: (response)
1336729364.958587: 1336729364.958619: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state RESPONSE
1336729364.958627: EAP: EAP entering state RECEIVED
1336729364.958630: EAP: parseEapResp: rxResp=1 respId=90 respMethod=1 respVendor=0 respVendorMethod=0
1336729364.958636: EAP: EAP entering state INTEGRITY_CHECK
1336729364.958640: EAP: EAP entering state METHOD_RESPONSE
1336729364.958644: EAP-Identity: Peer identity - hexdump_ascii(len=18):
...
1336729364.958662: EAP: EAP entering state SELECT_ACTION
1336729364.958665: EAP: getDecision: -> PASSTHROUGH
1336729364.958669: EAP: EAP entering state INITIALIZE_PASSTHROUGH
1336729364.958673: EAP: EAP entering state AAA_REQUEST
1336729364.958677: EAP: EAP entering state AAA_IDLE
1336729364.958687: 1336729364.958700: Encapsulating EAP message into a RADIUS packet
1336729364.958734: 1336729364.958776: 1336729364.960027: 1336729364.960039: 1336729364.960047: 1336729364.960057: RADIUS packet matching with station 48:5d:60:11:22:33
1336729364.960067: 1336729364.960077: EAP: EAP entering state AAA_RESPONSE
1336729364.960080: EAP: getId: id=91
1336729364.960081: EAP: EAP entering state SEND_REQUEST2
1336729364.960083: EAP: EAP entering state IDLE2
1336729364.960085: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1336729364.960087: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state REQUEST
1336729364.960092: 1336729365.000720: wlan0: Event EAPOL_RX (27) received
1336729365.000735: IEEE 802.1X: 250 bytes from 48:5d:60:11:22:33
1336729365.000742: IEEE 802.1X: version=1 type=0 length=246
1336729365.000747: EAP: code=2 identifier=91 length=246
1336729365.000751: (response)
1336729365.000761: 1336729365.000800: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state RESPONSE
1336729365.000810: EAP: EAP entering state RECEIVED2
1336729365.000814: EAP: parseEapResp: rxResp=1 respId=91 respMethod=13 respVendor=0 respVendorMethod=0
1336729365.000820: EAP: EAP entering state AAA_REQUEST
1336729365.000826: EAP: EAP entering state AAA_IDLE
1336729365.000832: Encapsulating EAP message into a RADIUS packet
1336729365.000858: Copied RADIUS State Attribute
1336729365.000874: 1336729365.000926: 1336729365.002215: 1336729365.002243: 1336729365.002264: 1336729365.002291: RADIUS packet matching with station 48:5d:60:11:22:33
1336729365.002313: 1336729365.002338: EAP: EAP entering state AAA_RESPONSE
1336729365.002346: EAP: getId: id=92
1336729365.002375: EAP: EAP entering state SEND_REQUEST2
1336729365.002383: EAP: EAP entering state IDLE2
1336729365.002388: EAP: retransmit timeout 3 seconds (from dynamic back off; retransCount=0)
1336729365.002393: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state REQUEST
1336729365.002407: 1336729365.071186: wlan0: Event EAPOL_RX (27) received
1336729365.071201: IEEE 802.1X: 69 bytes from 48:5d:60:11:22:33
1336729365.071208: IEEE 802.1X: version=1 type=0 length=65
1336729365.071213: EAP: code=2 identifier=92 length=65
1336729365.071216: (response)
1336729365.071227: 1336729365.071265: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state RESPONSE
1336729365.071277: EAP: EAP entering state RECEIVED2
1336729365.071282: EAP: parseEapResp: rxResp=1 respId=92 respMethod=13 respVendor=0 respVendorMethod=0
1336729365.071298: EAP: EAP entering state AAA_REQUEST
1336729365.071306: EAP: EAP entering state AAA_IDLE
1336729365.071312: Encapsulating EAP message into a RADIUS packet
1336729365.071339: Copied RADIUS State Attribute
1336729365.071396: 1336729365.071449: 1336729365.072682: 1336729365.072719: 1336729365.072741: 1336729365.072754: RADIUS packet matching with station 48:5d:60:11:22:33
1336729365.072764: MS-MPPE-Send-Key - hexdump(len=32): [REMOVED]
1336729365.072767: MS-MPPE-Recv-Key - hexdump(len=32): [REMOVED]
1336729365.072772: 1336729365.072781: 1336729365.072791: EAP: EAP entering state SUCCESS2
1336729365.072794: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state SUCCESS
1336729365.072800: 1336729365.072819: IEEE 802.1X: 48:5d:60:11:22:33 AUTH_PAE entering state AUTHENTICATED
1336729365.072865: 1336729365.072902: 1336729365.072918: RSN: added PMKSA cache entry for 48:5d:60:11:22:33
1336729365.072922: RSN: added PMKID - hexdump(len=16): 5e c4 b7 eb 46 bf e4 20 c9 5e d8 ca f2 13 3b 42
1336729365.072929: 1336729365.072934: IEEE 802.1X: 48:5d:60:11:22:33 BE_AUTH entering state IDLE
1336729365.072942: WPA: 48:5d:60:11:22:33 WPA_PTK entering state INITPMK
1336729365.072946: WPA: PMK from EAPOL state machine (len=64)
1336729365.072948: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKSTART
1336729365.072953: 1336729365.072962: WPA: Send EAPOL(version=3 secure=0 mic=0 ack=1 install=0 pairwise=8 kde_len=22 keyidx=0 encr=0)
1336729365.072975: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
1336729365.134552: wlan0: Event EAPOL_RX (27) received
1336729365.134558: IEEE 802.1X: 127 bytes from 48:5d:60:11:22:33
1336729365.134561: IEEE 802.1X: version=1 type=3 length=123
1336729365.134563: WPA: Received EAPOL-Key from 48:5d:60:11:22:33 key_info=0x10b type=2 key_data_length=28
1336729365.134565: WPA: Received Key Nonce - hexdump(len=32): 10 fa 2a b7 96 a5 21 0b 38 87 86 3c 88 8a ba 75 bc 75 77 89 40 b5 4c 1a 4a ff 17 3a 1b 30 1d c3
1336729365.134570: WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 09
1336729365.134576: 1336729365.134590: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKCALCNEGOTIATING
1336729365.134603: WPA: PTK derivation - A1=96:2d:a6:46:e4:d1 A2=48:5d:60:11:22:33
1336729365.134606: WPA: Nonce1 - hexdump(len=32): 2f 7a be 8a 70 c8 14 63 3b af 3e fc 0e 4d a0 68 71 b0 c6 f9 16 08 c8 2a f6 b5 60 67 72 03 50 1d
1336729365.134612: WPA: Nonce2 - hexdump(len=32): 10 fa 2a b7 96 a5 21 0b 38 87 86 3c 88 8a ba 75 bc 75 77 89 40 b5 4c 1a 4a ff 17 3a 1b 30 1d c3
1336729365.134618: WPA: PMK - hexdump(len=32): [REMOVED]
1336729365.134619: WPA: PTK - hexdump(len=48): [REMOVED]
1336729365.134626: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKCALCNEGOTIATING2
1336729365.134629: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKINITNEGOTIATING
1336729365.134664: 1336729365.134784: WPA: Send EAPOL(version=3 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=86 keyidx=1 encr=1)
1336729365.134793: Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
1336729365.134818: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1)
1336729366.135174: 1336729366.135211: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKINITNEGOTIATING
1336729366.135322: 1336729366.135406: WPA: Send EAPOL(version=3 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=86 keyidx=1 encr=1)
1336729366.135421: Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
1336729366.135489: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2)
1336729367.135845: 1336729367.135882: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKINITNEGOTIATING
1336729367.135986: 1336729367.136045: WPA: Send EAPOL(version=3 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=86 keyidx=1 encr=1)
1336729367.136058: Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
1336729367.136127: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3)
1336729367.920344: IEEE 802.1X: 48:5d:60:11:22:33 - (EAP) retransWhile --> 0
1336729368.136312: 1336729368.136348: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKINITNEGOTIATING
1336729368.136482: 1336729368.136542: WPA: Send EAPOL(version=3 secure=1 mic=1 ack=1 install=1 pairwise=8 kde_len=86 keyidx=1 encr=1)
1336729368.136557: Plaintext EAPOL-Key Key Data - hexdump(len=96): [REMOVED]
1336729368.136626: WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4)
1336729369.136869: 1336729369.136885: WPA: 48:5d:60:11:22:33 WPA_PTK entering state PTKINITNEGOTIATING
1336729369.136896: 1336729369.136902: WPA: 48:5d:60:11:22:33 WPA_PTK entering state DISCONNECT
1336729369.136905: wpa_sta_disconnect STA 48:5d:60:11:22:33
1336729369.136907: hostapd_wpa_auth_disconnect: WPA authenticator requests disconnect: STA 48:5d:60:11:22:33 reason 2
1336729369.136937: nl80211: Frame TX command accepted; cookie 0xffff88015c3193c0
1336729369.136942: wlan0: AP-STA-DISCONNECTED 48:5d:60:11:22:33
1336729369.136948: 1336729369.136964: wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x673fc0 key_idx=0 set_tx=1 seq_len=0 key_len=0
1336729369.136969: addr=48:5d:60:11:22:33
1336729369.136980: WPA: wpa_sm_step() called recursively
1336729369.136983: WPA: 48:5d:60:11:22:33 WPA_PTK entering state DISCONNECTED
1336729369.136986: WPA: 48:5d:60:11:22:33 WPA_PTK entering state INITIALIZE
1336729369.136994: wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x673fc0 key_idx=0 set_tx=1 seq_len=0 key_len=0
1336729369.136998: addr=48:5d:60:11:22:33
1336729369.137010: IEEE 802.1X: 48:5d:60:11:22:33 AUTH_PAE entering state INITIALIZE
1336729369.137014: EAP: EAP entering state DISABLED
1336729369.733812: nl80211: Event message available
1336729369.733846: nl80211: MLME event 60
1336729369.733854: nl80211: MLME event frame - hexdump(len=42): c0 40 30 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 c0 2d ca fd 00 20 e4 00 00 00 06 dc 8f 76 18 39 35 c3 79 92
1336729369.733880: wlan0: Event TX_STATUS (18) received
1336729369.733888: mgmt::deauth cb
1336729369.733893: STA 48:5d:60:11:22:33 acknowledged deauth
1336729369.733901: Removing STA 48:5d:60:11:22:33 from kernel driver
1336729369.760615: 1336729369.760651: 1336729369.760686: wpa_driver_nl80211_set_key: ifindex=15 alg=0 addr=0x673fc0 key_idx=0 set_tx=1 seq_len=0 key_len=0
1336729369.760706: addr=48:5d:60:11:22:33
1336729369.760754: nl80211: Event message available
1336729369.760770: nl80211: Delete station 48:5d:60:11:22:33
1336729369.809948: nl80211: Event message available
1336729369.809982: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729369.809989: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729369.809994: Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with 48:5d:60:11:22:33
1336729369.910003: nl80211: Event message available
1336729369.910036: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729369.910043: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729369.910048: Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with 48:5d:60:11:22:33
1336729370.812457: nl80211: Event message available
1336729370.812495: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729370.812502: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729370.812508: Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with 48:5d:60:11:22:33
1336729370.912038: nl80211: Event message available
1336729370.912071: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729370.912078: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729370.912083: Association Response to the STA has already been sent, but no TX status yet known - ignore Class 3 frame issue with 48:5d:60:11:22:33
1336729374.137324: 1336729374.137484: 1336729374.137552: 1336729374.137575: 1336729374.137628: hostapd_ht_operation_update current operation mode=0x4
1336729374.137642: hostapd_ht_operation_update new operation mode=0x0 changes=1
1336729374.137670: nl80211: Set beacon (beacon_set=1)
1336729374.137750: EAP: Server state machine removed
1336729374.138723: 1336729374.138754: 1336729374.138775: 1336729374.961061: nl80211: Event message available
1336729374.961088: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729374.961091: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729374.961119: nl80211: Frame TX command accepted; cookie 0xffff88015e2ef2c0
1336729374.961270: nl80211: Event message available
1336729374.961275: nl80211: MLME event 60
1336729374.961277: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 f0 2d 07 00
1336729374.961283: wlan0: Event TX_STATUS (18) received
1336729374.961285: mgmt::deauth cb
1336729374.961286: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
1336729377.806532: nl80211: Event message available
1336729377.806589: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729377.806597: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729377.806657: nl80211: Frame TX command accepted; cookie 0xffff880148208880
1336729377.806673: nl80211: Event message available
1336729377.806685: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729377.806690: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729377.806722: nl80211: Frame TX command accepted; cookie 0xffff8801f47d9780
1336729377.806811: nl80211: Event message available
1336729377.806823: nl80211: MLME event 60
1336729377.806828: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 00 2e 07 00
1336729377.806843: wlan0: Event TX_STATUS (18) received
1336729377.806848: mgmt::deauth cb
1336729377.806852: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
1336729377.806965: nl80211: Event message available
1336729377.806976: nl80211: MLME event 60
1336729377.806980: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 10 2e 07 00
1336729377.806994: wlan0: Event TX_STATUS (18) received
1336729377.806998: mgmt::deauth cb
1336729377.807001: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
1336729377.810459: nl80211: Event message available
1336729377.810492: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729377.810499: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729377.810549: nl80211: Frame TX command accepted; cookie 0xffff880148208880
1336729377.810705: nl80211: Event message available
1336729377.810717: nl80211: MLME event 60
1336729377.810722: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 20 2e 07 00
1336729377.810740: wlan0: Event TX_STATUS (18) received
1336729377.810745: mgmt::deauth cb
1336729377.810748: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
1336729377.909258: nl80211: Event message available
1336729377.909290: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729377.909297: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729377.909347: nl80211: Frame TX command accepted; cookie 0xffff8801fc54ab80
1336729377.909501: nl80211: Event message available
1336729377.909513: nl80211: MLME event 60
1336729377.909518: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 30 2e 07 00
1336729377.909533: wlan0: Event TX_STATUS (18) received
1336729377.909538: mgmt::deauth cb
1336729377.909542: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
1336729378.135421: nl80211: Event message available
1336729378.135455: wlan0: Event RX_FROM_UNKNOWN (19) received
1336729378.135462: Data/PS-poll frame from not associated STA 48:5d:60:11:22:33
1336729378.135513: nl80211: Frame TX command accepted; cookie 0xffff880220622580
1336729378.135668: nl80211: Event message available
1336729378.135681: nl80211: MLME event 60
1336729378.135685: nl80211: MLME event frame - hexdump(len=26): c0 00 ac 00 48 5d 60 3e a3 18 96 2d a6 46 e4 d1 96 2d a6 46 e4 d1 40 2e 07 00
1336729378.135700: wlan0: Event TX_STATUS (18) received
1336729378.135705: mgmt::deauth cb
1336729378.135709: handle_deauth_cb: STA 48:5d:60:11:22:33 not found
...
Kind regards,
Andreas