A malicious station could try to do FT-over-DS with a non WPA-enabled BSS. When this BSS is located in the same hostapd instance, internal RRB delivery will be used and thus the FT Action Frame will be processed by a non-WPA enabled BSS. This processing used to crash hostapd as hapd->wpa_auth is NULL. This test implements such a malicious request for regression testing. Signed-off-by: Michael Braun <michael-dev@fami-braun.de> |
||
|---|---|---|
| .. | ||
| ap-mgmt-fuzzer | ||
| eapol-fuzzer | ||
| hwsim | ||
| p2p-fuzzer | ||
| wnm-fuzzer | ||
| .gitignore | ||
| Makefile | ||
| test-aes.c | ||
| test-asn1.c | ||
| test-base64.c | ||
| test-https.c | ||
| test-list.c | ||
| test-md4.c | ||
| test-milenage.c | ||
| test-rc4.c | ||
| test-rsa-sig-ver.c | ||
| test-sha1.c | ||
| test-sha256.c | ||
| test-x509.c | ||
| test-x509v3.c | ||
| test_x509v3_nist.sh | ||
| test_x509v3_nist2.sh | ||