mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
Allow BSS to return information for AP that uses an invalid WSC IE
Previously, the BSS command returned an error if the WSC IE(s) in scan results could not be parsed. This may be not ideal for all cases, to instead of rejecting the command completely, return all other information apart from the WPS information in such a case. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
91d5a8e365
commit
fc078be2dd
@ -4184,9 +4184,10 @@ static int print_bss_info(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
||||
if (mask & WPA_BSS_MASK_WPS_SCAN) {
|
||||
ie = (const u8 *) (bss + 1);
|
||||
ret = wpas_wps_scan_result_text(ie, bss->ie_len, pos, end);
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
if (ret >= end - pos)
|
||||
return 0;
|
||||
pos += ret;
|
||||
if (ret > 0)
|
||||
pos += ret;
|
||||
}
|
||||
#endif /* CONFIG_WPS */
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user