[RFC 10/13] hostapd: More wpa_auth debugging messages.

greearb at candelatech.com greearb
Fri Oct 14 15:34:34 PDT 2011


From: Ben Greear <greearb at candelatech.com>

Also converts a few wpa_printf to wpa_msg.

Signed-off-by: Ben Greear <greearb at candelatech.com>
---
:100644 100644 8da4d40... fe4e1a4... M	src/ap/wpa_auth.c
 src/ap/wpa_auth.c |   28 ++++++++++++++--------------
 1 files changed, 14 insertions(+), 14 deletions(-)

diff --git a/src/ap/wpa_auth.c b/src/ap/wpa_auth.c
index 8da4d40..fe4e1a4 100644
--- a/src/ap/wpa_auth.c
+++ b/src/ap/wpa_auth.c
@@ -739,26 +739,26 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
 	key_info = WPA_GET_BE16(key->key_info);
 	key_data_length = WPA_GET_BE16(key->key_data_length);
 	if (key_data_length > data_len - sizeof(*hdr) - sizeof(*key)) {
-		wpa_printf(MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
-			   "key_data overflow (%d > %lu)",
-			   key_data_length,
-			   (unsigned long) (data_len - sizeof(*hdr) -
-					    sizeof(*key)));
+		wpa_msg(NULL, MSG_INFO, "WPA: Invalid EAPOL-Key frame - "
+			"key_data overflow (%d > %lu)",
+			key_data_length,
+			(unsigned long) (data_len - sizeof(*hdr) -
+					 sizeof(*key)));
 		return;
 	}
 
 	if (sm->wpa == WPA_VERSION_WPA2) {
 		if (key->type != EAPOL_KEY_TYPE_RSN) {
-			wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
-				   "unexpected type %d in RSN mode",
-				   key->type);
+			wpa_msg(NULL, MSG_DEBUG, "Ignore EAPOL-Key with "
+				"unexpected type %d in RSN mode",
+				key->type);
 			return;
 		}
 	} else {
 		if (key->type != EAPOL_KEY_TYPE_WPA) {
-			wpa_printf(MSG_DEBUG, "Ignore EAPOL-Key with "
-				   "unexpected type %d in WPA mode",
-				   key->type);
+			wpa_msg(NULL, MSG_DEBUG, "Ignore EAPOL-Key with "
+				"unexpected type %d in WPA mode",
+				key->type);
 			return;
 		}
 	}
@@ -873,9 +873,9 @@ void wpa_receive(struct wpa_authenticator *wpa_auth,
 			 * Counter update and the station will be allowed to
 			 * continue.
 			 */
-			wpa_printf(MSG_DEBUG, "WPA: Reject 4-way handshake to "
-				   "collect more entropy for random number "
-				   "generation");
+			wpa_msg(NULL, MSG_DEBUG, "WPA: Reject 4-way handshake to "
+				"collect more entropy for random number "
+				"generation");
 			sm->group->reject_4way_hs_for_entropy = FALSE;
 			random_mark_pool_ready();
 			sm->group->first_sta_seen = FALSE;
-- 
1.7.3.4




More information about the Hostap mailing list