Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher"

This makes it easier to debug AP selection issues in case of a invalid
RSN element or use of customer cipher suites that are not supported by
wpa_supplicant.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
Jouni Malinen 2016-02-03 12:58:07 +02:00 committed by Jouni Malinen
parent d4c2860b6b
commit 0b905c8a87

View file

@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
if (left >= RSN_SELECTOR_LEN) { if (left >= RSN_SELECTOR_LEN) {
data->group_cipher = rsn_selector_to_bitfield(pos); data->group_cipher = rsn_selector_to_bitfield(pos);
if (!wpa_cipher_valid_group(data->group_cipher)) { if (!wpa_cipher_valid_group(data->group_cipher)) {
wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x", wpa_printf(MSG_DEBUG,
__func__, data->group_cipher); "%s: invalid group cipher 0x%x (%08x)",
__func__, data->group_cipher,
WPA_GET_BE32(pos));
return -1; return -1;
} }
pos += RSN_SELECTOR_LEN; pos += RSN_SELECTOR_LEN;