Michael Braun 186ca4736d tests: FT RRB internal delivery to non-WPA BSS
A malicious station could try to do FT-over-DS with a non WPA-enabled
BSS. When this BSS is located in the same hostapd instance, internal RRB
delivery will be used and thus the FT Action Frame will be processed by
a non-WPA enabled BSS. This processing used to crash hostapd as
hapd->wpa_auth is NULL.

This test implements such a malicious request for regression testing.

Signed-off-by: Michael Braun <michael-dev@fami-braun.de>
2016-02-28 17:45:45 +02:00
..
2015-04-22 11:44:19 +03:00
2015-04-22 11:44:19 +03:00
2015-04-22 11:44:19 +03:00
2013-10-26 17:49:05 +03:00
2013-10-26 17:49:05 +03:00