diff options
author | Pascal Quantin <pascal.quantin@gmail.com> | 2015-06-06 19:29:21 +0200 |
---|---|---|
committer | Pascal Quantin <pascal.quantin@gmail.com> | 2015-06-07 13:07:33 +0000 |
commit | 99d56fb0f883b07662490644a9459d4ab75baf31 (patch) | |
tree | 3486d2b0f025d3b3b3bc77dd34cd02968cb3eb22 /epan/crypt | |
parent | e9c94731f6da1564ee7b266747a08d05aa5a9af8 (diff) |
airpdcap: fix V512 warning reported by PVS-Studio
A call of the 'memcpy' function will lead to the '& tmp_key' buffer becoming out of range.
Change-Id: I615a6c3e0dab8cfc2d240b6b39cff387e0689f35
Reviewed-on: https://code.wireshark.org/review/8796
Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com>
Diffstat (limited to 'epan/crypt')
-rw-r--r-- | epan/crypt/airpdcap.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c index 66d9a85346..6533edf05a 100644 --- a/epan/crypt/airpdcap.c +++ b/epan/crypt/airpdcap.c @@ -1324,7 +1324,7 @@ AirPDcapRsna4WHandshake( sa->key=tmp_key; if (key!=NULL) { - memcpy(key, &tmp_key, sizeof(AIRPDCAP_KEY_ITEM)); + memcpy(key, tmp_key, sizeof(AIRPDCAP_KEY_ITEM)); if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_NOT_CCMP) key->KeyType=AIRPDCAP_KEY_TYPE_TKIP; else if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_AES_CCMP) |