694a1c6873
Authentication frames include several fixed body parts (see Table 9-68 (Authentication frame body) and Table 9-69 (Presence of fields and elements in Authentication frames) in IEEE P802.11-REVme/D2.0). To be able to parse the IE part, these fields need to be skipped. Since SAE logic already implements this parsing, change SAE authentication handling functions to return the offset to the IE part. This preparation is needed for future MLD patches that need to parse out the ML related elements in the Authentication frames. Signed-off-by: Andrei Otcheretianski <andrei.otcheretianski@intel.com> |
||
---|---|---|
.. | ||
ap-mgmt | ||
asn1 | ||
dpp-uri | ||
eap-aka-peer | ||
eap-mschapv2-peer | ||
eap-sim-peer | ||
eapol-key-auth | ||
eapol-key-supp | ||
eapol-supp | ||
json | ||
p2p | ||
pasn-init | ||
pasn-resp | ||
sae | ||
tls-client | ||
tls-server | ||
wnm | ||
x509 | ||
build-test.sh | ||
fuzzer-common.c | ||
fuzzer-common.h | ||
README | ||
rules.include |
hostap.git fuzz testing ----------------------- These tools can be used for fuzz testing of various components used within wpa_supplicant and hostapd. Each directory contains a fuzzing tool that focuses on one input handler. Each tool can be compiled either to work with the libFuzzer or as a separate tool that reads the input from a file specified on the command line, e.g., for American fuzzy lop (afl-fuzz). Example test corpus is included in */corpus directory. Example fuzzing with libFuzzer cd @TOOL@ make clean make LIBFUZZER=y ./@TOOL@ corpus Example fuzzing with afl-fuzz cd @TOOL@ make clean CC=afl-gcc make afl-fuzz -i corpus -o findings -- $PWD/@TOOL@ @@