From c472a7ea6db25de474559a76453fff9382b04422 Mon Sep 17 00:00:00 2001 From: KOLANICH Date: Fri, 17 Dec 2021 00:00:00 +0000 Subject: [PATCH 1/3] Fixed error reporting (ported from the recent version of this function within brcmfmac) --- src/wl/sys/wl_cfg80211_hybrid.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/wl/sys/wl_cfg80211_hybrid.c b/src/wl/sys/wl_cfg80211_hybrid.c index 7b606e0..56d7d3b 100644 --- a/src/wl/sys/wl_cfg80211_hybrid.c +++ b/src/wl/sys/wl_cfg80211_hybrid.c @@ -907,7 +907,7 @@ wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme) val = WPA_AUTH_PSK; break; default: - WL_ERR(("invalid cipher group (%d)\n", sme->crypto.cipher_group)); + WL_ERR(("invalid akm suite (%d)\n", sme->crypto.akm_suites[0])); return -EINVAL; } } else if (val & (WPA2_AUTH_PSK | WPA2_AUTH_UNSPECIFIED)) { @@ -919,7 +919,7 @@ wl_set_key_mgmt(struct net_device *dev, struct cfg80211_connect_params *sme) val = WPA2_AUTH_PSK; break; default: - WL_ERR(("invalid cipher group (%d)\n", sme->crypto.cipher_group)); + WL_ERR(("invalid akm suite (%d)\n", sme->crypto.akm_suites[0])); return -EINVAL; } } -- 2.32.0