Mark RSN msg 1/2 key data debug dump as key material
This debug print can include GTK and IGTK, so use wpa_hexdump_key() instead of wpa_hexdump() for it to avoid undesired exposure of keys in debug log. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
209527aeed
commit
ecbdc1a1fc
1 changed files with 2 additions and 1 deletions
|
@ -1393,7 +1393,8 @@ static int wpa_supplicant_process_1_of_2_rsn(struct wpa_sm *sm,
|
||||||
int maxkeylen;
|
int maxkeylen;
|
||||||
struct wpa_eapol_ie_parse ie;
|
struct wpa_eapol_ie_parse ie;
|
||||||
|
|
||||||
wpa_hexdump(MSG_DEBUG, "RSN: msg 1/2 key data", keydata, keydatalen);
|
wpa_hexdump_key(MSG_DEBUG, "RSN: msg 1/2 key data",
|
||||||
|
keydata, keydatalen);
|
||||||
if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
|
if (wpa_supplicant_parse_ies(keydata, keydatalen, &ie) < 0)
|
||||||
return -1;
|
return -1;
|
||||||
if (ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
|
if (ie.gtk && !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
|
||||||
|
|
Loading…
Add table
Reference in a new issue