[PATCH 08/12] wolfssl: Better error message in pbkdf2_sha1 for FIPS password failure

Juliusz Sosinowicz juliusz at wolfssl.com
Wed Mar 8 09:18:46 PST 2023


Signed-off-by: Juliusz Sosinowicz <juliusz at wolfssl.com>
---
 src/crypto/crypto_wolfssl.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/src/crypto/crypto_wolfssl.c b/src/crypto/crypto_wolfssl.c
index d8d014a07..62eeee6a4 100644
--- a/src/crypto/crypto_wolfssl.c
+++ b/src/crypto/crypto_wolfssl.c
@@ -416,9 +416,9 @@ int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
 			ssid, ssid_len, iterations, buflen, WC_SHA);
 	if (ret != 0) {
 		if (ret == HMAC_MIN_KEYLEN_E) {
-			wpa_printf(MSG_ERROR,
-				   "wolfSSL: Password is too short. Make sure your password is at least %d characters long. This is a requirement for FIPS builds.",
-				   HMAC_FIPS_MIN_KEY);
+			LOG_WOLF_ERROR_VA("wolfSSL: Password is too short. Make sure your "
+					"password is at least %d characters long. This is a "
+					"requirement for FIPS builds.", HMAC_FIPS_MIN_KEY);
 		}
 		return -1;
 	}
-- 
2.25.1




More information about the Hostap mailing list