From: Jouni Malinen Date: Wed, 3 Feb 2016 10:58:07 +0000 (+0200) Subject: Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" X-Git-Tag: hostap_2_6~967 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0b905c8a87b53e0942506a8aeaae47869af91727;p=thirdparty%2Fhostap.git Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" This makes it easier to debug AP selection issues in case of a invalid RSN element or use of customer cipher suites that are not supported by wpa_supplicant. Signed-off-by: Jouni Malinen --- diff --git a/src/common/wpa_common.c b/src/common/wpa_common.c index b5f57b3ec..d6295b2d1 100644 --- a/src/common/wpa_common.c +++ b/src/common/wpa_common.c @@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len, if (left >= RSN_SELECTOR_LEN) { data->group_cipher = rsn_selector_to_bitfield(pos); if (!wpa_cipher_valid_group(data->group_cipher)) { - wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x", - __func__, data->group_cipher); + wpa_printf(MSG_DEBUG, + "%s: invalid group cipher 0x%x (%08x)", + __func__, data->group_cipher, + WPA_GET_BE32(pos)); return -1; } pos += RSN_SELECTOR_LEN;