wireless driver #ifdef IWEVGENIE memset(&iwe, 0, sizeof(iwe)); memcpy(buf, se->se_wpa_ie, se->se_wpa_ie[1] + 2); iwe.cmd = IWEVGENIE; iwe.u.data.length = se->se_wpa_ie[1] + 2; #else static const char wpa_leader[ ] = "wpa_ie="; memset(&iwe, 0, sizeof(iwe)); iwe.cmd = IWEVCUSTOM; iwe.u.data.length = encode_ie(buf, sizeof(buf), se->se_wpa_ie, se->se_wpa_ie[1] + 2, wpa_leader, sizeof(wpa_leader) - 1); #endif > Model-based fuzzer is well adapted thanks to a WPA capabilities model data generation for fuzzing tests > http://www.metasploit.com/modules/exploit/linux/madwifi/madwifi_giwscan_cb Stateful Fuzzing of Network Protocol Implementations