While analyzing hostapd and trying to find out where to hook in after WPA pairwise key exchange has completed, the need arose to get a gdb running on the target platform (the EPIA MII), so I could break in the function and obtain a backtrace.
Driven by technology, haunted by perfectionism
While analyzing hostapd and trying to find out where to hook in after WPA pairwise key exchange has completed, the need arose to get a gdb running on the target platform (the EPIA MII), so I could break in the function and obtain a backtrace.