From: Benjamin Berg <benjamin.berg@xxxxxxxxx> Logically, it makes more sense to pass the ap_info_len as that is the length that the function is permitted to process. Effectively it does not make a difference and the code was entirely safe, but change it nontheless to be more correct. Fixes: de5e01010cb2 ("wpa_supplicant: Support ML probe request") Signed-off-by: Benjamin Berg <benjamin.berg@xxxxxxxxx> --- wpa_supplicant/bss.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/wpa_supplicant/bss.c b/wpa_supplicant/bss.c index 39de8bac35..ec23ffad3e 100644 --- a/wpa_supplicant/bss.c +++ b/wpa_supplicant/bss.c @@ -1822,7 +1822,7 @@ int wpa_bss_parse_basic_ml_element(struct wpa_supplicant *wpa_s, goto out; wpa_bss_parse_ml_rnr_ap_info(wpa_s, bss, mbssid_idx, - ap_info, len, &seen, + ap_info, ap_info_len, &seen, &missing, ssid); pos += ap_info_len; -- 2.43.0 _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap