diff options
author | Paul Stewart <pstew@google.com> | 2010-10-09 17:29:51 +0300 |
---|---|---|
committer | Jouni Malinen <j@w1.fi> | 2010-10-09 17:29:51 +0300 |
commit | 8ee69e06336d65b15364f4db82d91775d0fe47c6 (patch) | |
tree | bc54a60f5aadced3ac5fc3956d048a0b3ba0dcea /src/p2p | |
parent | 556522ee09cf574acbdbbc375783d981dfb0f9e3 (diff) | |
download | external_wpa_supplicant_8_ti-8ee69e06336d65b15364f4db82d91775d0fe47c6.zip external_wpa_supplicant_8_ti-8ee69e06336d65b15364f4db82d91775d0fe47c6.tar.gz external_wpa_supplicant_8_ti-8ee69e06336d65b15364f4db82d91775d0fe47c6.tar.bz2 |
dbus_new_handlers: Don't send NULL to dbus_message_new_error
The new DBus API helper function wpas_dbus_error_unknown_error
function can be called as a result of a failure within internal
getter calls, which will call this function with a NULL message
parameter. However, dbus_message_new_error looks very unkindly
(i.e, abort()) on a NULL message, so in this case, we should not
call it.
I've observed this course of events during a call to
wpas_dbus_getter_bss_wpa with a faileld parse of the IE parameter.
We got here through a call to fill_dict_with_properties which
explicitly calls getters with a NULL message parameter. Judging
from the way it is called, this could easily occur if an AP sends
out a malformed (or mis-received) probe response. I usually run
into this problem while driving through San Francisco, so I'm
exposed to any number of base stations along this path.
Diffstat (limited to 'src/p2p')
0 files changed, 0 insertions, 0 deletions