From 0b905c8a87b53e0942506a8aeaae47869af91727 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Wed, 3 Feb 2016 12:58:07 +0200 Subject: [PATCH] Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher" This makes it easier to debug AP selection issues in case of a invalid RSN element or use of customer cipher suites that are not supported by wpa_supplicant. Signed-off-by: Jouni Malinen --- src/common/wpa_common.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/src/common/wpa_common.c b/src/common/wpa_common.c index b5f57b3ec..d6295b2d1 100644 --- a/src/common/wpa_common.c +++ b/src/common/wpa_common.c @@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len, if (left >= RSN_SELECTOR_LEN) { data->group_cipher = rsn_selector_to_bitfield(pos); if (!wpa_cipher_valid_group(data->group_cipher)) { - wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x", - __func__, data->group_cipher); + wpa_printf(MSG_DEBUG, + "%s: invalid group cipher 0x%x (%08x)", + __func__, data->group_cipher, + WPA_GET_BE32(pos)); return -1; } pos += RSN_SELECTOR_LEN; -- 2.47.2