wolfSSL: Better error message in pbkdf2_sha1() for FIPS password failure
Signed-off-by: Juliusz Sosinowicz <juliusz@wolfssl.com>
This commit is contained in:
parent
aa4c4d079b
commit
10fd91d8fb
1 changed files with 2 additions and 3 deletions
|
@ -420,9 +420,8 @@ int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
|
||||||
ssid, ssid_len, iterations, buflen, WC_SHA);
|
ssid, ssid_len, iterations, buflen, WC_SHA);
|
||||||
if (ret != 0) {
|
if (ret != 0) {
|
||||||
if (ret == HMAC_MIN_KEYLEN_E) {
|
if (ret == HMAC_MIN_KEYLEN_E) {
|
||||||
wpa_printf(MSG_ERROR,
|
LOG_WOLF_ERROR_VA("wolfSSL: Password is too short. Make sure your password is at least %d characters long. This is a requirement for FIPS builds.",
|
||||||
"wolfSSL: Password is too short. Make sure your password is at least %d characters long. This is a requirement for FIPS builds.",
|
HMAC_FIPS_MIN_KEY);
|
||||||
HMAC_FIPS_MIN_KEY);
|
|
||||||
}
|
}
|
||||||
return -1;
|
return -1;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue