}
if (elems.wmm_len != sizeof(*wmm_params)) {
- wpa_printf(MSG_WARNING, "WMM AC: Invalid WMM ie length");
+ wpa_printf(MSG_DEBUG, "WMM AC: Invalid WMM ie length");
return NULL;
}
wmm_ac_del_ts_idx(wpa_s, ac, idx);
- wpa_printf(MSG_INFO,
+ wpa_printf(MSG_DEBUG,
"TS was deleted successfully (tsid=%u address=" MACSTR ")",
tsid, MAC2STR(sa));
}
/* make sure we have a matching addts request */
if (!req || req->dialog_token != resp_dialog_token) {
- wpa_printf(MSG_ERROR,
+ wpa_printf(MSG_DEBUG,
"WMM AC: no req with dialog=%u, ignoring frame",
resp_dialog_token);
return;
tsid != wmm_ac_get_tsid(&req->tspec) ||
up != wmm_ac_get_user_priority(&req->tspec) ||
dir != wmm_ac_get_direction(&req->tspec)) {
- wpa_printf(MSG_ERROR,
+ wpa_printf(MSG_DEBUG,
"WMM AC: ADDTS params do not match, ignoring frame");
return;
}
/* delete pending request */
wmm_ac_del_req(wpa_s, 0);
- wpa_printf(MSG_INFO,
+ wpa_printf(MSG_DEBUG,
"ADDTS response status=%d tsid=%u up=%u direction=%u",
status_code, tsid, up, dir);
struct wmm_tspec_element *tspec;
if (wpa_s->wmm_ac_assoc_info == NULL) {
- wpa_printf(MSG_WARNING,
+ wpa_printf(MSG_DEBUG,
"WMM AC: WMM AC is disabled, ignoring action frame");
return;
}
if (action != WMM_ACTION_CODE_ADDTS_RESP &&
action != WMM_ACTION_CODE_DELTS) {
- wpa_printf(MSG_WARNING,
+ wpa_printf(MSG_DEBUG,
"WMM AC: Unknown action (%d), ignoring action frame",
action);
return;