From 838d61d1e58d764601dc5cf563e0f0152a3853c8 Mon Sep 17 00:00:00 2001 From: Ben Greear Date: Tue, 1 Feb 2011 16:16:23 -0800 Subject: [PATCH 11/16] hostapd: More wpa_auth debugging messages. Also converts a few wpa_printf to wpa_msg. Signed-off-by: Ben Greear --- :100644 100644 da28434... 393a137... M src/ap/wpa_auth.c src/ap/wpa_auth.c | 28 ++++++++++++++-------------- 1 files changed, 14 insertions(+), 14 deletions(-) diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c index da28434..393a137 100644 --- a/src/ap/wpa_auth.c +++ b/src/ap/wpa_auth.c @@ -715,26 +715,26 @@ void wpa_receive(struct wpa_authenticator *wpa_auth, key_info = WPA_GET_BE16(key->key_info); key_data_length = WPA_GET_BE16(key->key_data_length); if (key_data_length > data_len - sizeof(*hdr) - sizeof(*key)) { - wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - " - "key_data overflow (%d > %lu)", - key_data_length, - (unsigned long) (data_len - sizeof(*hdr) - - sizeof(*key))); + wpa_msg(NULL, MSG_INFO, "WPA: Invalid EAPOL-Key frame - " + "key_data overflow (%d > %lu)", + key_data_length, + (unsigned long) (data_len - sizeof(*hdr) - + sizeof(*key))); return; } if (sm->wpa == WPA_VERSION_WPA2) { if (key->type != EAPOL_KEY_TYPE_RSN) { - wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with " - "unexpected type %d in RSN mode", - key->type); + wpa_msg(NULL, MSG_DEBUG, "Ignore EAPOL-Key with " + "unexpected type %d in RSN mode", + key->type); return; } } else { if (key->type != EAPOL_KEY_TYPE_WPA) { - wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with " - "unexpected type %d in WPA mode", - key->type); + wpa_msg(NULL, MSG_DEBUG, "Ignore EAPOL-Key with " + "unexpected type %d in WPA mode", + key->type); return; } } @@ -849,9 +849,9 @@ void wpa_receive(struct wpa_authenticator *wpa_auth, * Counter update and the station will be allowed to * continue. */ - wpa_printf(MSG_DEBUG, "WPA: Reject 4-way handshake to " - "collect more entropy for random number " - "generation"); + wpa_msg(NULL, MSG_DEBUG, "WPA: Reject 4-way handshake to " + "collect more entropy for random number " + "generation"); sm->group->reject_4way_hs_for_entropy = FALSE; random_mark_pool_ready(); sm->group->first_sta_seen = FALSE; -- 1.6.2.5