]> git.ipfire.org Git - thirdparty/hostap.git/commitdiff
Add more wpa_auth debugging messages
authorBen Greear <greearb@candelatech.com>
Thu, 24 Feb 2011 15:35:59 +0000 (17:35 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 24 Feb 2011 15:35:59 +0000 (17:35 +0200)
src/ap/wpa_auth.c

index a5304eb6f6661dc9cb21e802eb4c8c632326559e..13e8ec43895a67d6d825b5c2a199499232dbafcb 100644 (file)
@@ -1978,8 +1978,11 @@ SM_STEP(WPA_PTK)
        if (sm->Init)
                SM_ENTER(WPA_PTK, INITIALIZE);
        else if (sm->Disconnect
-                /* || FIX: dot11RSNAConfigSALifetime timeout */)
+                /* || FIX: dot11RSNAConfigSALifetime timeout */) {
+               wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG,
+                               "WPA_PTK: sm->Disconnect");
                SM_ENTER(WPA_PTK, DISCONNECT);
+       }
        else if (sm->DeauthenticationRequest)
                SM_ENTER(WPA_PTK, DISCONNECTED);
        else if (sm->AuthenticationRequest)
@@ -2015,6 +2018,8 @@ SM_STEP(WPA_PTK)
                        SM_ENTER(WPA_PTK, PTKSTART);
                else {
                        wpa_auth->dot11RSNA4WayHandshakeFailures++;
+                       wpa_auth_logger(sm->wpa_auth, sm->addr, LOGGER_INFO,
+                                       "INITPMK - keyAvailable = false");
                        SM_ENTER(WPA_PTK, DISCONNECT);
                }
                break;
@@ -2035,6 +2040,9 @@ SM_STEP(WPA_PTK)
                else if (sm->TimeoutCtr >
                         (int) dot11RSNAConfigPairwiseUpdateCount) {
                        wpa_auth->dot11RSNA4WayHandshakeFailures++;
+                       wpa_auth_vlogger(sm->wpa_auth, sm->addr, LOGGER_DEBUG,
+                                        "PTKSTART: Retry limit %d reached",
+                                        dot11RSNAConfigPairwiseUpdateCount);
                        SM_ENTER(WPA_PTK, DISCONNECT);
                } else if (sm->TimeoutEvt)
                        SM_ENTER(WPA_PTK, PTKSTART);
@@ -2058,6 +2066,10 @@ SM_STEP(WPA_PTK)
                else if (sm->TimeoutCtr >
                         (int) dot11RSNAConfigPairwiseUpdateCount) {
                        wpa_auth->dot11RSNA4WayHandshakeFailures++;
+                       wpa_auth_vlogger(sm->wpa_auth, sm->addr, LOGGER_DEBUG,
+                                        "PTKINITNEGOTIATING: Retry limit %d "
+                                        "reached",
+                                        dot11RSNAConfigPairwiseUpdateCount);
                        SM_ENTER(WPA_PTK, DISCONNECT);
                } else if (sm->TimeoutEvt)
                        SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);