P2P: Be more careful with wpa_config_update_psk() call
Commit bb4d4deb4b
introduced a code path
that could potentially end up calling wpa_config_update_psk() with NULL
passphrase. While that may not happen in practice, it is better to make
sure it doesn't happen since that function will dereference the
passphrase pointer unconditionally.
Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
bb4d4deb4b
commit
6350a148c4
1 changed files with 1 additions and 1 deletions
|
@ -900,7 +900,7 @@ static void wpas_start_wps_go(struct wpa_supplicant *wpa_s,
|
|||
ssid->psk_set = params->psk_set;
|
||||
if (ssid->psk_set)
|
||||
os_memcpy(ssid->psk, params->psk, sizeof(ssid->psk));
|
||||
else
|
||||
else if (ssid->passphrase)
|
||||
wpa_config_update_psk(ssid);
|
||||
ssid->ap_max_inactivity = wpa_s->parent->conf->p2p_go_max_inactivity;
|
||||
|
||||
|
|
Loading…
Reference in a new issue