From: Jouni Malinen Date: Fri, 1 Apr 2022 08:12:09 +0000 (+0300) Subject: Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher X-Git-Tag: hostap_2_11~2127 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0c88d1487cfd2643bf206541884d63869da7a4a3;p=thirdparty%2Fhostap.git Debug print on CONFIG_NO_TKIP=y prevent RSNE with TKIP as group cipher This makes the debug log clearer for one of the more likely cases of "invalid group cipher" preventing RSNE parsing. Signed-off-by: Jouni Malinen --- diff --git a/src/common/wpa_common.c b/src/common/wpa_common.c index b78db05a1..27336c927 100644 --- a/src/common/wpa_common.c +++ b/src/common/wpa_common.c @@ -1599,6 +1599,13 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len, "%s: invalid group cipher 0x%x (%08x)", __func__, data->group_cipher, WPA_GET_BE32(pos)); +#ifdef CONFIG_NO_TKIP + if (RSN_SELECTOR_GET(pos) == RSN_CIPHER_SUITE_TKIP) { + wpa_printf(MSG_DEBUG, + "%s: TKIP as group cipher not supported in CONFIG_NO_TKIP=y build", + __func__); + } +#endif /* CONFIG_NO_TKIP */ return -1; } pos += RSN_SELECTOR_LEN;