From ecd9ea0c8afdaabd5d44f83bf4431043e0255d2b Mon Sep 17 00:00:00 2001 From: Ilan Peer Date: Tue, 21 Nov 2023 17:23:57 +0200 Subject: [PATCH] AP MLD: Do not access WPA authenticator object if not valid Signed-off-by: Ilan Peer --- src/ap/wpa_auth_glue.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/ap/wpa_auth_glue.c b/src/ap/wpa_auth_glue.c index 23c7bbe2b..742f6d419 100644 --- a/src/ap/wpa_auth_glue.c +++ b/src/ap/wpa_auth_glue.c @@ -1538,7 +1538,8 @@ static int hostapd_wpa_auth_get_ml_rsn_info(void *ctx, if (!iface->bss[0]->conf->mld_ap || hapd->conf->mld_id != iface->bss[0]->conf->mld_id || - link_id != iface->bss[0]->mld_link_id) + link_id != iface->bss[0]->mld_link_id || + !iface->bss[0]->wpa_auth) continue; wpa_auth_ml_get_rsn_info(iface->bss[0]->wpa_auth, @@ -1580,7 +1581,8 @@ static int hostapd_wpa_auth_get_ml_key_info(void *ctx, if (!iface->bss[0]->conf->mld_ap || hapd->conf->mld_id != iface->bss[0]->conf->mld_id || - link_id != iface->bss[0]->mld_link_id) + link_id != iface->bss[0]->mld_link_id || + !iface->bss[0]->wpa_auth) continue; wpa_auth_ml_get_key_info(iface->bss[0]->wpa_auth,