From: Jouni Malinen Date: Sun, 10 Jan 2010 17:00:25 +0000 (+0200) Subject: Use zero address when reporting unknown peer in SMK error X-Git-Tag: hostap_0_7_1~33 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=0e75b3c35241f1bc7aa8a770993c347c47763568;p=thirdparty%2Fhostap.git Use zero address when reporting unknown peer in SMK error This avoids potential use of uninitialized stack memory when printing out peer address based on SMK error message that does not include the MAC address. --- diff --git a/src/rsn_supp/peerkey.c b/src/rsn_supp/peerkey.c index 59f7279b9..9d60d4ace 100644 --- a/src/rsn_supp/peerkey.c +++ b/src/rsn_supp/peerkey.c @@ -634,6 +634,8 @@ static int wpa_supplicant_process_smk_error( if (kde.mac_addr && kde.mac_addr_len >= ETH_ALEN) os_memcpy(peer, kde.mac_addr, ETH_ALEN); + else + os_memset(peer, 0, ETH_ALEN); os_memcpy(&error, kde.error, sizeof(error)); error_type = be_to_host16(error.error_type); wpa_msg(sm->ctx->msg_ctx, MSG_INFO,