diff mbox series

[3/4] wiphy: clean up some spammy prints

Message ID 20250211192656.83157-3-prestwoj@gmail.com (mailing list archive)
State New
Headers show
Series [1/4] eap: initialize vendor_id/vendor_type to zero | expand

Checks

Context Check Description
tedd_an/pre-ci_am success Success

Commit Message

James Prestwood Feb. 11, 2025, 7:26 p.m. UTC
First, wiphy_select_akm is called multiple times for any connection
so we shouldn't be printing in here as its redundant.

Second, the external auth print was in a similar situation but this
would even print when scanning, which really clouds the logs.
---
 src/wiphy.c | 6 ------
 1 file changed, 6 deletions(-)
diff mbox series

Patch

diff --git a/src/wiphy.c b/src/wiphy.c
index 3d761251..c7df648a 100644
--- a/src/wiphy.c
+++ b/src/wiphy.c
@@ -245,10 +245,6 @@  static bool wiphy_can_connect_sae(struct wiphy *wiphy)
 			return true;
 
 		/* Case 3 */
-		iwd_notice(IWD_NOTICE_CONNECT_INFO,
-			"FullMAC driver: %s using SAE.  Expect EXTERNAL_AUTH",
-			wiphy->driver_str);
-
 		return true;
 	}
 
@@ -312,8 +308,6 @@  enum ie_rsn_akm_suite wiphy_select_akm(struct wiphy *wiphy,
 		 * met, we can fallback to WPA2 (if the AKM is present).
 		 */
 		if (ie_rsne_is_wpa3_personal(info)) {
-			l_debug("Network is WPA3-Personal...");
-
 			if (!wiphy_can_connect_sae(wiphy)) {
 				l_debug("Can't use SAE, trying WPA2");
 				goto wpa2_personal;