This website requires JavaScript.
Explore
Help
Sign In
Kernel
/
iwd
Watch
3
Star
0
Fork
0
You've already forked iwd
mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced
2024-11-05 11:39:24 +01:00
Code
Releases
Activity
45d74ac1ed
iwd
/
autotests
/
testSAQuery-spoofing
/
hw.conf
7 lines
65 B
Plaintext
Raw
Normal View
History
Unescape
Escape
auto-t: add SA Query tests Two autotests: 1. Tests SA Query procedure when the AP goes down. In this case the AP goes down ungracefully, now allowing it to send out any deauth frames. When the AP comes back up, IWD still thinks its connected. The AP will then send unprotected disassociate frames so the client can re-connect. This kicks off the SA Query procedure, which the AP will not respond to. At this point we can deauth and reconnect to the AP. 2. Test SA Query procedure when a disassociate frame has been spoofed. In this case we receive an unprotected disassociate frame and start SA Query. The AP should then respond to the SA query within the timeout. We then know the frame was spoofed and can remain connected.
2018-01-31 18:56:00 +01:00
[SETUP]
num_radios=2
auto-t: require "needs_hwsim" on hwsim tests Running autotests with native hardware will not work on tests which depend on the hwsim python API (since hwsim will not be running). For these tests, it will now be required that they specify: needs_hwsim=1 This allows the test to be skipped when running with native hardware rather than the test failing with a python exception.
2019-04-23 20:18:26 +02:00
needs_hwsim=1
auto-t: add SA Query tests Two autotests: 1. Tests SA Query procedure when the AP goes down. In this case the AP goes down ungracefully, now allowing it to send out any deauth frames. When the AP comes back up, IWD still thinks its connected. The AP will then send unprotected disassociate frames so the client can re-connect. This kicks off the SA Query procedure, which the AP will not respond to. At this point we can deauth and reconnect to the AP. 2. Test SA Query procedure when a disassociate frame has been spoofed. In this case we receive an unprotected disassociate frame and start SA Query. The AP should then respond to the SA query within the timeout. We then know the frame was spoofed and can remain connected.
2018-01-31 18:56:00 +01:00
[HOSTAPD]
rad0=ssidCCMP.conf
Copy Permalink