Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher"
This makes it easier to debug AP selection issues in case of a invalid RSN element or use of customer cipher suites that are not supported by wpa_supplicant. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
d4c2860b6b
commit
0b905c8a87
1 changed files with 4 additions and 2 deletions
|
@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
|
||||||
if (left >= RSN_SELECTOR_LEN) {
|
if (left >= RSN_SELECTOR_LEN) {
|
||||||
data->group_cipher = rsn_selector_to_bitfield(pos);
|
data->group_cipher = rsn_selector_to_bitfield(pos);
|
||||||
if (!wpa_cipher_valid_group(data->group_cipher)) {
|
if (!wpa_cipher_valid_group(data->group_cipher)) {
|
||||||
wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x",
|
wpa_printf(MSG_DEBUG,
|
||||||
__func__, data->group_cipher);
|
"%s: invalid group cipher 0x%x (%08x)",
|
||||||
|
__func__, data->group_cipher,
|
||||||
|
WPA_GET_BE32(pos));
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
pos += RSN_SELECTOR_LEN;
|
pos += RSN_SELECTOR_LEN;
|
||||||
|
|
Loading…
Reference in a new issue