From b0ecbd3a4a11699195fb078eaf7a11c2e784d010 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 6 Dec 2015 20:01:05 +0200 Subject: [PATCH] AP: Use more readable version of management group cipher in error cases This makes it easier to interpret AP side debug log for a case where a station specifies in unsupported management group cipher. Signed-off-by: Jouni Malinen --- src/common/wpa_common.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/src/common/wpa_common.c b/src/common/wpa_common.c index 4091bed07..f3ea28161 100644 --- a/src/common/wpa_common.c +++ b/src/common/wpa_common.c @@ -689,9 +689,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len, if (left >= 4) { data->mgmt_group_cipher = rsn_selector_to_bitfield(pos); if (!wpa_cipher_valid_mgmt_group(data->mgmt_group_cipher)) { - wpa_printf(MSG_DEBUG, "%s: Unsupported management " - "group cipher 0x%x", __func__, - data->mgmt_group_cipher); + wpa_printf(MSG_DEBUG, + "%s: Unsupported management group cipher 0x%x (%08x)", + __func__, data->mgmt_group_cipher, + WPA_GET_BE32(pos)); return -10; } pos += RSN_SELECTOR_LEN;