Add the selector suite into wpa_parse_wpa_ie_rsn() "invalid group cipher"
authorJouni Malinen <jouni@qca.qualcomm.com>
Wed, 3 Feb 2016 10:58:07 +0000 (12:58 +0200)
committerJouni Malinen <j@w1.fi>
Wed, 3 Feb 2016 10:58:07 +0000 (12:58 +0200)
This makes it easier to debug AP selection issues in case of a invalid
RSN element or use of customer cipher suites that are not supported by
wpa_supplicant.

Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
src/common/wpa_common.c

index b5f57b3..d6295b2 100644 (file)
@@ -600,8 +600,10 @@ int wpa_parse_wpa_ie_rsn(const u8 *rsn_ie, size_t rsn_ie_len,
        if (left >= RSN_SELECTOR_LEN) {
                data->group_cipher = rsn_selector_to_bitfield(pos);
                if (!wpa_cipher_valid_group(data->group_cipher)) {
-                       wpa_printf(MSG_DEBUG, "%s: invalid group cipher 0x%x",
-                                  __func__, data->group_cipher);
+                       wpa_printf(MSG_DEBUG,
+                                  "%s: invalid group cipher 0x%x (%08x)",
+                                  __func__, data->group_cipher,
+                                  WPA_GET_BE32(pos));
                        return -1;
                }
                pos += RSN_SELECTOR_LEN;