diff --git a/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211.c b/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211.c index 6ffe53d8d5eb10eac191c3a85e5c4837a085cc6f..665e5be996500792f709c1e66db55538096ca1e5 100644 --- a/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211.c +++ b/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211.c @@ -7336,7 +7336,7 @@ skip_auth_type: #ifdef CONFIG_DRIVER_NL80211_QCA drv->roam_indication_done = false; #endif /* CONFIG_DRIVER_NL80211_QCA */ - wpa_printf(MSG_WARNING, + wpa_printf(MSG_INFO, "nl80211: Connect request send successfully"); } @@ -9473,7 +9473,7 @@ static int wpa_driver_nl80211_remain_on_channel(void *priv, unsigned int freq, cookie = 0; ret = send_and_recv_resp(drv, msg, cookie_handler, &cookie); if (ret == 0) { - wpa_printf(MSG_WARNING, "nl80211: Remain-on-channel cookie " + wpa_printf(MSG_INFO, "nl80211: Remain-on-channel cookie " "0x%llx for freq=%u MHz duration=%u", (long long unsigned int) cookie, freq, duration); drv->remain_on_chan_cookie = cookie; diff --git a/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211_event.c b/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211_event.c index 237a0b65c605d225a87190a0d285cc986123a948..8e99b6bc8c20a13fa9c86587cfc25b02c2373778 100644 --- a/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211_event.c +++ b/wpa_supplicant-2.9_standard/src/drivers/driver_nl80211_event.c @@ -2045,7 +2045,7 @@ static void send_scan_event(struct wpa_driver_nl80211_data *drv, int aborted, info->freqs = freqs; info->num_freqs = num_freqs; msg[sizeof(msg) - 1] = '\0'; - wpa_printf(MSG_WARNING, "nl80211: Scan included frequencies:%s", + wpa_printf(MSG_INFO, "nl80211: Scan included frequencies:%s", msg); } diff --git a/wpa_supplicant-2.9_standard/src/p2p/p2p.c b/wpa_supplicant-2.9_standard/src/p2p/p2p.c index 8e74ded4c3417a48767b5422817821f19fe9ef15..f44ada02e31506e1fdb66a069ef3e93a28ca759f 100644 --- a/wpa_supplicant-2.9_standard/src/p2p/p2p.c +++ b/wpa_supplicant-2.9_standard/src/p2p/p2p.c @@ -249,7 +249,7 @@ void p2p_clear_provisioning_info(struct p2p_data *p2p, const u8 *addr) void p2p_set_state(struct p2p_data *p2p, int new_state) { - p2p_warning(p2p, "State %s -> %s", + p2p_info(p2p, "State %s -> %s", p2p_state_txt(p2p->state), p2p_state_txt(new_state)); p2p->state = new_state; @@ -265,7 +265,7 @@ void p2p_set_state(struct p2p_data *p2p, int new_state) void p2p_set_timeout(struct p2p_data *p2p, unsigned int sec, unsigned int usec) { - p2p_warning(p2p, "Set timeout (state=%s): %u.%06u sec", + p2p_info(p2p, "Set timeout (state=%s): %u.%06u sec", p2p_state_txt(p2p->state), sec, usec); eloop_cancel_timeout(p2p_state_timeout, p2p, NULL); eloop_register_timeout(sec, usec, p2p_state_timeout, p2p, NULL); @@ -3566,7 +3566,7 @@ static void p2p_retry_pd(struct p2p_data *p2p) static void p2p_prov_disc_cb(struct p2p_data *p2p, int success) { - p2p_warning(p2p, "Provision Discovery Request TX callback: success=%d", + p2p_info(p2p, "Provision Discovery Request TX callback: success=%d", success); /* diff --git a/wpa_supplicant-2.9_standard/src/p2p/p2p_build.c b/wpa_supplicant-2.9_standard/src/p2p/p2p_build.c index e85919a8973825ad6614af1e2749bce39134614e..6fa3e786062a7887c15b979b41b23d169355ccdb 100644 --- a/wpa_supplicant-2.9_standard/src/p2p/p2p_build.c +++ b/wpa_supplicant-2.9_standard/src/p2p/p2p_build.c @@ -78,7 +78,7 @@ void p2p_buf_add_go_intent(struct wpabuf *buf, u8 go_intent) wpabuf_put_u8(buf, P2P_ATTR_GROUP_OWNER_INTENT); wpabuf_put_le16(buf, 1); wpabuf_put_u8(buf, go_intent); - wpa_printf(MSG_WARNING, "P2P: * GO Intent: Intent %u Tie breaker %u", + wpa_printf(MSG_INFO, "P2P: p2p_build * GO Intent: Intent %u Tie breaker %u", go_intent >> 1, go_intent & 0x01); } diff --git a/wpa_supplicant-2.9_standard/src/p2p/p2p_go_neg.c b/wpa_supplicant-2.9_standard/src/p2p/p2p_go_neg.c index 9fd5ad416ad92a8b20386693ea5ffd6a219814ae..550fd76e5cbf8a7c86ce6fa92031cbacd3765349 100644 --- a/wpa_supplicant-2.9_standard/src/p2p/p2p_go_neg.c +++ b/wpa_supplicant-2.9_standard/src/p2p/p2p_go_neg.c @@ -288,7 +288,7 @@ int p2p_connect_send(struct p2p_data *p2p, struct p2p_device *dev) req = p2p_build_go_neg_req(p2p, dev); if (req == NULL) return -1; - p2p_warning(p2p, "Sending GO Negotiation Request"); + p2p_info(p2p, "Sending GO Negotiation Request"); p2p_set_state(p2p, P2P_CONNECT); p2p->pending_action_state = P2P_PENDING_GO_NEG_REQUEST; p2p->go_neg_peer = dev; @@ -930,7 +930,7 @@ void p2p_process_go_neg_req(struct p2p_data *p2p, const u8 *sa, int tie_breaker = 0; int freq; - p2p_warning(p2p, "Received GO Negotiation Request from " MACSTR_SEC "(freq=%d)", + p2p_info(p2p, "Received GO Negotiation Request from " MACSTR_SEC "(freq=%d)", MAC2STR_SEC(sa), rx_freq); if (p2p_parse(data, len, &msg)) @@ -1258,7 +1258,7 @@ fail: p2p_parse_free(&msg); if (resp == NULL) return; - p2p_warning(p2p, "Sending GO Negotiation Response"); + p2p_info(p2p, "Sending GO Negotiation Response"); #ifdef CONFIG_MIRACAST_SOURCE_OPT p2p_dbg(p2p, "Use cfg channel for sending action frame Tx"); @@ -1429,7 +1429,7 @@ void p2p_process_go_neg_resp(struct p2p_data *p2p, const u8 *sa, goto fail; } if (*msg.status) { - p2p_warning(p2p, "GO Negotiation rejected: status %d", *msg.status); + p2p_info(p2p, "GO Negotiation rejected: status %d", *msg.status); dev->go_neg_req_sent = 0; if (*msg.status == P2P_SC_FAIL_INFO_CURRENTLY_UNAVAILABLE) { p2p_dbg(p2p, "Wait for the peer to become ready for GO Negotiation"); @@ -1677,7 +1677,7 @@ void p2p_process_go_neg_conf(struct p2p_data *p2p, const u8 *sa, struct p2p_device *dev; struct p2p_message msg; - p2p_warning(p2p, "Received GO Negotiation Confirm from " MACSTR_SEC, + p2p_info(p2p, "Received GO Negotiation Confirm from " MACSTR_SEC, MAC2STR_SEC(sa)); dev = p2p_get_device(p2p, sa); if (dev == NULL || dev->wps_method == WPS_NOT_READY || diff --git a/wpa_supplicant-2.9_standard/src/p2p/p2p_parse.c b/wpa_supplicant-2.9_standard/src/p2p/p2p_parse.c index 14fb006dda1475f35f89c4a0627bff5ef3f41662..da38e4def517dc27c528d02ef3c4339760d20242 100644 --- a/wpa_supplicant-2.9_standard/src/p2p/p2p_parse.c +++ b/wpa_supplicant-2.9_standard/src/p2p/p2p_parse.c @@ -69,7 +69,7 @@ static int p2p_parse_attribute(u8 id, const u8 *data, u16 len, return -1; } msg->go_intent = data; - wpa_printf(MSG_WARNING, "P2P: * GO Intent: Intent %u " + wpa_printf(MSG_INFO, "P2P: * p2p_parse GO Intent: Intent %u " "Tie breaker %u", data[0] >> 1, data[0] & 0x01); break; case P2P_ATTR_STATUS: diff --git a/wpa_supplicant-2.9_standard/src/p2p/p2p_pd.c b/wpa_supplicant-2.9_standard/src/p2p/p2p_pd.c index 2a26bbf4b8fbbb119f36b576e640aed719e80df0..36f4d6153f39a714fbab12fea67183edbab5191c 100644 --- a/wpa_supplicant-2.9_standard/src/p2p/p2p_pd.c +++ b/wpa_supplicant-2.9_standard/src/p2p/p2p_pd.c @@ -1353,7 +1353,7 @@ void p2p_process_prov_disc_resp(struct p2p_data *p2p, const u8 *sa, } } - p2p_warning(p2p, "Received Provision Discovery Response from " MACSTR_SEC + p2p_info(p2p, "Received Provision Discovery Response from " MACSTR_SEC " with config methods 0x%x", MAC2STR_SEC(sa), msg.wps_config_methods); diff --git a/wpa_supplicant-2.9_standard/src/wps/wps_enrollee.c b/wpa_supplicant-2.9_standard/src/wps/wps_enrollee.c index 96b11399402ba1145bc52d9bce08da3ce771479b..056d39818aae7c429300202310baacf9a1a2f481 100644 --- a/wpa_supplicant-2.9_standard/src/wps/wps_enrollee.c +++ b/wpa_supplicant-2.9_standard/src/wps/wps_enrollee.c @@ -112,7 +112,7 @@ static struct wpabuf * wps_build_m1(struct wps_data *wps) wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce", wps->nonce_e, WPS_NONCE_LEN); - wpa_printf(MSG_EXCESSIVE, "WPS: Building Message M1"); + wpa_printf(MSG_INFO, "WPS: Building Message M1"); msg = wpabuf_alloc(1000); if (msg == NULL) return NULL; @@ -171,7 +171,7 @@ static struct wpabuf * wps_build_m3(struct wps_data *wps) { struct wpabuf *msg; - wpa_printf(MSG_DEBUG, "WPS: Building Message M3"); + wpa_printf(MSG_INFO, "WPS: Building Message M3"); if (wps->dev_password == NULL) { wpa_printf(MSG_DEBUG, "WPS: No Device Password available"); @@ -209,7 +209,7 @@ static struct wpabuf * wps_build_m5(struct wps_data *wps) { struct wpabuf *msg, *plain; - wpa_printf(MSG_DEBUG, "WPS: Building Message M5"); + wpa_printf(MSG_INFO, "WPS: Building Message M5"); plain = wpabuf_alloc(200); if (plain == NULL) @@ -378,7 +378,7 @@ static struct wpabuf * wps_build_m7(struct wps_data *wps) { struct wpabuf *msg, *plain; - wpa_printf(MSG_DEBUG, "WPS: Building Message M7"); + wpa_printf(MSG_INFO, "WPS: Building Message M7"); plain = wpabuf_alloc(500 + wps->wps->ap_settings_len); if (plain == NULL) @@ -424,7 +424,7 @@ static struct wpabuf * wps_build_wsc_done(struct wps_data *wps) { struct wpabuf *msg; - wpa_printf(MSG_DEBUG, "WPS: Building Message WSC_Done"); + wpa_printf(MSG_INFO, "WPS: Building Message WSC_Done"); msg = wpabuf_alloc(1000); if (msg == NULL) @@ -960,7 +960,7 @@ static enum wps_process_res wps_process_m2(struct wps_data *wps, const struct wpabuf *msg, struct wps_parse_attr *attr) { - wpa_printf(MSG_DEBUG, "WPS: Received M2"); + wpa_printf(MSG_INFO, "WPS: Received M2"); if (wps->state != RECV_M2) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -1099,7 +1099,7 @@ static enum wps_process_res wps_process_m4(struct wps_data *wps, struct wpabuf *decrypted; struct wps_parse_attr eattr; - wpa_printf(MSG_DEBUG, "WPS: Received M4"); + wpa_printf(MSG_INFO, "WPS: Received M4"); if (wps->state != RECV_M4) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -1154,7 +1154,7 @@ static enum wps_process_res wps_process_m6(struct wps_data *wps, struct wpabuf *decrypted; struct wps_parse_attr eattr; - wpa_printf(MSG_DEBUG, "WPS: Received M6"); + wpa_printf(MSG_INFO, "WPS: Received M6"); if (wps->state != RECV_M6) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -1211,7 +1211,7 @@ static enum wps_process_res wps_process_m8(struct wps_data *wps, struct wpabuf *decrypted; struct wps_parse_attr eattr; - wpa_printf(MSG_EXCESSIVE, "WPS: Received M8"); + wpa_printf(MSG_INFO, "WPS: Received M8"); if (wps->state != RECV_M8) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " diff --git a/wpa_supplicant-2.9_standard/src/wps/wps_registrar.c b/wpa_supplicant-2.9_standard/src/wps/wps_registrar.c index c5283ab9a90b2fa9cd0ba9b58a4b3ae629227113..6b257531b7290d5b6717d936fa6b617853dc0c9a 100644 --- a/wpa_supplicant-2.9_standard/src/wps/wps_registrar.c +++ b/wpa_supplicant-2.9_standard/src/wps/wps_registrar.c @@ -1887,7 +1887,7 @@ static struct wpabuf * wps_build_m2(struct wps_data *wps) wps->nonce_r, WPS_NONCE_LEN); wpa_hexdump(MSG_DEBUG, "WPS: UUID-R", wps->uuid_r, WPS_UUID_LEN); - wpa_printf(MSG_DEBUG, "WPS: Building Message M2"); + wpa_printf(MSG_INFO, "WPS: Building Message M2"); msg = wpabuf_alloc(1000); if (msg == NULL) return NULL; @@ -1954,7 +1954,7 @@ static struct wpabuf * wps_build_m2d(struct wps_data *wps) struct wpabuf *msg; u16 err = wps->config_error; - wpa_printf(MSG_DEBUG, "WPS: Building Message M2D"); + wpa_printf(MSG_INFO, "WPS: Building Message M2D"); msg = wpabuf_alloc(1000); if (msg == NULL) return NULL; @@ -1992,7 +1992,7 @@ static struct wpabuf * wps_build_m4(struct wps_data *wps) { struct wpabuf *msg, *plain; - wpa_printf(MSG_DEBUG, "WPS: Building Message M4"); + wpa_printf(MSG_INFO, "WPS: Building Message M4"); if (wps_derive_psk(wps, wps->dev_password, wps->dev_password_len) < 0) return NULL; @@ -2031,7 +2031,7 @@ static struct wpabuf * wps_build_m6(struct wps_data *wps) { struct wpabuf *msg, *plain; - wpa_printf(MSG_DEBUG, "WPS: Building Message M6"); + wpa_printf(MSG_INFO, "WPS: Building Message M6"); plain = wpabuf_alloc(200); if (plain == NULL) @@ -2067,7 +2067,7 @@ static struct wpabuf * wps_build_m8(struct wps_data *wps) { struct wpabuf *msg, *plain; - wpa_printf(MSG_DEBUG, "WPS: Building Message M8"); + wpa_printf(MSG_INFO, "WPS: Building Message M8"); plain = wpabuf_alloc(500); if (plain == NULL) @@ -2655,7 +2655,7 @@ static int wps_registrar_skip_overlap(struct wps_data *wps) static enum wps_process_res wps_process_m1(struct wps_data *wps, struct wps_parse_attr *attr) { - wpa_printf(MSG_DEBUG, "WPS: Received M1"); + wpa_printf(MSG_INFO, "WPS: Received M1"); if (wps->state != RECV_M1) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -2790,7 +2790,7 @@ static enum wps_process_res wps_process_m3(struct wps_data *wps, const struct wpabuf *msg, struct wps_parse_attr *attr) { - wpa_printf(MSG_DEBUG, "WPS: Received M3"); + wpa_printf(MSG_INFO, "WPS: Received M3"); if (wps->state != RECV_M3) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -2828,7 +2828,7 @@ static enum wps_process_res wps_process_m5(struct wps_data *wps, struct wpabuf *decrypted; struct wps_parse_attr eattr; - wpa_printf(MSG_DEBUG, "WPS: Received M5"); + wpa_printf(MSG_INFO, "WPS: Received M5"); if (wps->state != RECV_M5) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " @@ -2979,7 +2979,7 @@ static enum wps_process_res wps_process_m7(struct wps_data *wps, struct wpabuf *decrypted; struct wps_parse_attr eattr; - wpa_printf(MSG_DEBUG, "WPS: Received M7"); + wpa_printf(MSG_INFO, "WPS: Received M7"); if (wps->state != RECV_M7) { wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for " diff --git a/wpa_supplicant-2.9_standard/wpa_supplicant/events.c b/wpa_supplicant-2.9_standard/wpa_supplicant/events.c index d1132f3dc078232ff3be7bae120714ff5b73b1d0..bd12a96d43af090ab1e2406b3b9a9993182e6301 100644 --- a/wpa_supplicant-2.9_standard/wpa_supplicant/events.c +++ b/wpa_supplicant-2.9_standard/wpa_supplicant/events.c @@ -4982,7 +4982,7 @@ static void wpa_supplicant_event_disassoc_finish(struct wpa_supplicant *wpa_s, #endif wpas_wps_searching(wpa_s) || wpas_wps_reenable_networks_pending(wpa_s))) { - wpa_dbg(wpa_s, MSG_WARNING, "Auto connect enabled: try to " + wpa_dbg(wpa_s, MSG_INFO, "Auto connect enabled: try to " "reconnect (wps=%d/%d wpa_state=%d)", wpa_s->key_mgmt == WPA_KEY_MGMT_WPS, wpas_wps_searching(wpa_s), diff --git a/wpa_supplicant-2.9_standard/wpa_supplicant/p2p_supplicant.c b/wpa_supplicant-2.9_standard/wpa_supplicant/p2p_supplicant.c index e935d6c37826ec9169f445454c5e407822be3f8c..c0dbf27c4580fd9d4ccf568ad1486ccb91affdd3 100644 --- a/wpa_supplicant-2.9_standard/wpa_supplicant/p2p_supplicant.c +++ b/wpa_supplicant-2.9_standard/wpa_supplicant/p2p_supplicant.c @@ -2817,7 +2817,7 @@ static void wpas_go_neg_completed(void *ctx, struct p2p_go_neg_results *res) MAC2STR(res->peer_device_addr), MAC2STR(res->peer_interface_addr), p2p_wps_method_text(res->wps_method)); - wpa_printf(MSG_WARNING, P2P_EVENT_GO_NEG_SUCCESS "role=%s " + wpa_printf(MSG_INFO, P2P_EVENT_GO_NEG_SUCCESS "role=%s " "freq=%d ht40=%d peer_dev=" MACSTR_SEC " peer_iface=" MACSTR_SEC " wps_method=%s", res->role_go ? "GO" : "client", res->freq, res->ht40, diff --git a/wpa_supplicant-2.9_standard/wpa_supplicant/scan.c b/wpa_supplicant-2.9_standard/wpa_supplicant/scan.c index 2fe787fbe99b96d793a93bba5881b8dce4a7e68b..50abc29e9cb49691e559839816b7570c47cd3223 100644 --- a/wpa_supplicant-2.9_standard/wpa_supplicant/scan.c +++ b/wpa_supplicant-2.9_standard/wpa_supplicant/scan.c @@ -553,7 +553,7 @@ static void wpa_supplicant_optimize_freqs( params, false, false, false); } else { - wpa_dbg(wpa_s, MSG_DEBUG, + wpa_dbg(wpa_s, MSG_INFO, "P2P: Scan only GO preferred frequency %d MHz during invitation", wpa_s->p2p_invite_go_freq); params->freqs = os_calloc(2, sizeof(int)); diff --git a/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_supplicant.c b/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_supplicant.c index 6e2f41c244e08623b28f0912c79141b5d36fe1e6..d8852da2e54eda1ba724b6e347fac76907e2a1cc 100644 --- a/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_supplicant.c +++ b/wpa_supplicant-2.9_standard/wpa_supplicant/wpa_supplicant.c @@ -5862,7 +5862,7 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr, const u8 *connected_addr = wpa_s->valid_links ? wpa_s->ap_mld_addr : wpa_s->bssid; - wpa_dbg(wpa_s, MSG_WARNING, "RX EAPOL from " MACSTR " (encrypted=%d)", + wpa_dbg(wpa_s, MSG_INFO, "RX EAPOL from " MACSTR " (encrypted=%d)", MAC2STR(src_addr), encrypted); wpa_hexdump(MSG_MSGDUMP, "RX EAPOL", buf, len);