[PATCH 08/12] wolfssl: Better error message in pbkdf2_sha1 for FIPS password failure
Juliusz Sosinowicz
juliusz at wolfssl.com
Wed Mar 8 09:18:46 PST 2023
Signed-off-by: Juliusz Sosinowicz <juliusz at wolfssl.com>
---
src/crypto/crypto_wolfssl.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/src/crypto/crypto_wolfssl.c b/src/crypto/crypto_wolfssl.c
index d8d014a07..62eeee6a4 100644
--- a/src/crypto/crypto_wolfssl.c
+++ b/src/crypto/crypto_wolfssl.c
@@ -416,9 +416,9 @@ int pbkdf2_sha1(const char *passphrase, const u8 *ssid, size_t ssid_len,
ssid, ssid_len, iterations, buflen, WC_SHA);
if (ret != 0) {
if (ret == HMAC_MIN_KEYLEN_E) {
- wpa_printf(MSG_ERROR,
- "wolfSSL: Password is too short. Make sure your password is at least %d characters long. This is a requirement for FIPS builds.",
- HMAC_FIPS_MIN_KEY);
+ LOG_WOLF_ERROR_VA("wolfSSL: Password is too short. Make sure your "
+ "password is at least %d characters long. This is a "
+ "requirement for FIPS builds.", HMAC_FIPS_MIN_KEY);
}
return -1;
}
--
2.25.1
More information about the Hostap
mailing list