P2P: Make sure parsed Device Name gets null terminated
If the msg->device_name buffer is filled from two different sources, the copy from the P2P Device Info attribute needs to make sure that the values gets null terminated to match the length of the correct string should the other place use another string (which is not really allowed by the spec, but could happen).
This commit is contained in:
parent
b73bf0a74b
commit
e2197af1b2
1 changed files with 1 additions and 0 deletions
|
@ -162,6 +162,7 @@ static int p2p_parse_attribute(u8 id, const u8 *data, u16 len,
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
os_memcpy(msg->device_name, pos, nlen);
|
os_memcpy(msg->device_name, pos, nlen);
|
||||||
|
msg->device_name[nlen] = '\0';
|
||||||
for (i = 0; i < nlen; i++) {
|
for (i = 0; i < nlen; i++) {
|
||||||
if (msg->device_name[i] == '\0')
|
if (msg->device_name[i] == '\0')
|
||||||
break;
|
break;
|
||||||
|
|
Loading…
Reference in a new issue