]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher
authorJouni Malinen <quic_jouni@quicinc.com>
Fri, 1 Apr 2022 08:12:09 +0000 (11:12 +0300)
committerJouni Malinen <j@w1.fi>
Fri, 1 Apr 2022 08:13:10 +0000 (11:13 +0300)
This makes the debug log clearer for one of the more likely cases of
"invalid group cipher" preventing RSNE parsing.

Signed-off-by: Jouni Malinen <quic_jouni@quicinc.com>
src/common/wpa_common.c

index b78db05a143033c0e04f642717bf5d9eb56ac3b2..27336c9277b6b1eb3258974e6e7e42dfecbdfc9e 100644 (file)
@@ -1599,6 +1599,13 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
                                   "%s: invalid group cipher 0x%x (%08x)",
                                   __func__, data->group_cipher,
                                   WPA_GET_BE32(pos));
+#ifdef CONFIG_NO_TKIP
+                       if (RSN_SELECTOR_GET(pos) == RSN_CIPHER_SUITE_TKIP) {
+                               wpa_printf(MSG_DEBUG,
+                                          "%s: TKIP as group cipher not supported in CONFIG_NO_TKIP=y build",
+                                          __func__);
+                       }
+#endif /* CONFIG_NO_TKIP */
                        return -1;
                }
                pos += RSN_SELECTOR_LEN;