mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-01-17 18:34:03 -05:00
AP: Use more readable version of management group cipher in error cases
This makes it easier to interpret AP side debug log for a case where a station specifies in unsupported management group cipher. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
0ceff76e7b
commit
b0ecbd3a4a
@ -689,9 +689,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
|
|||||||
if (left >= 4) {
|
if (left >= 4) {
|
||||||
data->mgmt_group_cipher = rsn_selector_to_bitfield(pos);
|
data->mgmt_group_cipher = rsn_selector_to_bitfield(pos);
|
||||||
if (!wpa_cipher_valid_mgmt_group(data->mgmt_group_cipher)) {
|
if (!wpa_cipher_valid_mgmt_group(data->mgmt_group_cipher)) {
|
||||||
wpa_printf(MSG_DEBUG, "%s: Unsupported management "
|
wpa_printf(MSG_DEBUG,
|
||||||
"group cipher 0x%x", __func__,
|
"%s: Unsupported management group cipher 0x%x (%08x)",
|
||||||
data->mgmt_group_cipher);
|
__func__, data->mgmt_group_cipher,
|
||||||
|
WPA_GET_BE32(pos));
|
||||||
return -10;
|
return -10;
|
||||||
}
|
}
|
||||||
pos += RSN_SELECTOR_LEN;
|
pos += RSN_SELECTOR_LEN;
|
||||||
|
Loading…
Reference in New Issue
Block a user