Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher
This makes the debug log clearer for one of the more likely cases of "invalid group cipher" preventing RSNE parsing. Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
This commit is contained in:
parent
d5a9331f97
commit
0c88d1487c
1 changed files with 7 additions and 0 deletions
|
@ -1599,6 +1599,13 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
|
||||||
"%s: invalid group cipher 0x%x (%08x)",
|
"%s: invalid group cipher 0x%x (%08x)",
|
||||||
__func__, data->group_cipher,
|
__func__, data->group_cipher,
|
||||||
WPA_GET_BE32(pos));
|
WPA_GET_BE32(pos));
|
||||||
|
#ifdef CONFIG_NO_TKIP
|
||||||
|
if (RSN_SELECTOR_GET(pos) == RSN_CIPHER_SUITE_TKIP) {
|
||||||
|
wpa_printf(MSG_DEBUG,
|
||||||
|
"%s: TKIP as group cipher not supported in CONFIG_NO_TKIP=y build",
|
||||||
|
__func__);
|
||||||
|
}
|
||||||
|
#endif /* CONFIG_NO_TKIP */
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
pos += RSN_SELECTOR_LEN;
|
pos += RSN_SELECTOR_LEN;
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue