Add a NULL check for device PASN PMKSA in p2p_invitation_resp_cb(). This
is to ensure stability and prevent a crash in wpa_supplicant triggered
by a P2P invitation request that reinvokes an unknown group.
Fixes: ff02a87c1931 ("P2P2: Fetch PMK and PMKID for invitation using pairing verification")
Signed-off-by: Shivani Baranwal <shivbara@qti.qualcomm.com>
struct p2p_device *dev;
dev = p2p_get_device(p2p, peer);
- if (dev && dev->pasn) {
+ if (dev && dev->pasn && dev->pasn->pmksa) {
pasn_responder_pmksa_cache_get(dev->pasn->pmksa,
dev->pasn->peer_addr, _pmkid,
_pmk, &pmk_len);