![]() A malicious station could try to do FT-over-DS with a non WPA-enabled BSS. When this BSS is located in the same hostapd instance, internal RRB delivery will be used and thus the FT Action Frame will be processed by a non-WPA enabled BSS. This processing used to crash hostapd as hapd->wpa_auth is NULL. This test implements such a malicious request for regression testing. Signed-off-by: Michael Braun <michael-dev@fami-braun.de> |
||
---|---|---|
.. | ||
ap-mgmt-fuzzer | ||
eapol-fuzzer | ||
hwsim | ||
p2p-fuzzer | ||
wnm-fuzzer | ||
.gitignore | ||
Makefile | ||
test-aes.c | ||
test-asn1.c | ||
test-base64.c | ||
test-https.c | ||
test-list.c | ||
test-md4.c | ||
test-milenage.c | ||
test-rc4.c | ||
test-rsa-sig-ver.c | ||
test-sha1.c | ||
test-sha256.c | ||
test-x509.c | ||
test-x509v3.c | ||
test_x509v3_nist.sh | ||
test_x509v3_nist2.sh |