OpenSSL: Debug message if requested AES key length is not supported
This makes it clearer why some AES operations fail especially with BoringSSL where the 192-bit case is not supported. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
5548453a2d
commit
edd72f55f8
1 changed files with 8 additions and 2 deletions
|
@ -291,8 +291,11 @@ void * aes_encrypt_init(const u8 *key, size_t len)
|
|||
return NULL;
|
||||
|
||||
type = aes_get_evp_cipher(len);
|
||||
if (type == NULL)
|
||||
if (!type) {
|
||||
wpa_printf(MSG_INFO, "%s: Unsupported len=%u",
|
||||
__func__, (unsigned int) len);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
ctx = EVP_CIPHER_CTX_new();
|
||||
if (ctx == NULL)
|
||||
|
@ -345,8 +348,11 @@ void * aes_decrypt_init(const u8 *key, size_t len)
|
|||
return NULL;
|
||||
|
||||
type = aes_get_evp_cipher(len);
|
||||
if (type == NULL)
|
||||
if (!type) {
|
||||
wpa_printf(MSG_INFO, "%s: Unsupported len=%u",
|
||||
__func__, (unsigned int) len);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
ctx = EVP_CIPHER_CTX_new();
|
||||
if (ctx == NULL)
|
||||
|
|
Loading…
Reference in a new issue