aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJouni Malinen <jouni@qca.qualcomm.com>2016-02-03 10:58:07 (GMT)
committerJouni Malinen <j@w1.fi>2016-02-03 10:58:07 (GMT)
commit0b905c8a87b53e0942506a8aeaae47869af91727 (patch)
treec9651033723ede41e851469167098f7cf9ecec97
parentd4c2860b6be214eecb842ceb4830587b61c7cf4e (diff)
downloadhostap-0b905c8a87b53e0942506a8aeaae47869af91727.zip
hostap-0b905c8a87b53e0942506a8aeaae47869af91727.tar.gz
hostap-0b905c8a87b53e0942506a8aeaae47869af91727.tar.bz2
Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher"
This makes it easier to debug AP selection issues in case of a invalid RSN element or use of customer cipher suites that are not supported by wpa_supplicant. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
-rw-r--r--src/common/wpa_common.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/src/common/wpa_common.c b/src/common/wpa_common.c
index b5f57b3..d6295b2 100644
--- a/src/common/wpa_common.c
+++ b/src/common/wpa_common.c
@@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
if (left >= RSN_SELECTOR_LEN) {
data->group_cipher = rsn_selector_to_bitfield(pos);
if (!wpa_cipher_valid_group(data->group_cipher)) {
- wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x",
- __func__, data->group_cipher);
+ wpa_printf(MSG_DEBUG,
+ "%s: invalid group cipher 0x%x (%08x)",
+ __func__, data->group_cipher,
+ WPA_GET_BE32(pos));
return -1;
}
pos += RSN_SELECTOR_LEN;