@@ -313,11 +313,13 @@ SM_STATE(EAP, RECEIVED)
eapReqData = eapol_get_eapReqData(sm);
/* parse rxReq, rxSuccess, rxFailure, reqId, reqMethod */
eap_sm_parseEapReq(sm, eapReqData);
- sm->num_rounds++;
- if (!eapReqData || wpabuf_len(eapReqData) < 20)
- sm->num_rounds_short++;
- else
- sm->num_rounds_short = 0;
+ if (sm->selectedMethod != EAP_TYPE_NONE || sm->reqMethod != EAP_TYPE_IDENTITY) {
+ sm->num_rounds++;
+ if (!eapReqData || wpabuf_len(eapReqData) < 20)
+ sm->num_rounds_short++;
+ else
+ sm->num_rounds_short = 0;
+ }
}
@@ -1499,7 +1501,7 @@ static void eap_sm_processIdentity(struct eap_sm *sm, const struct wpabuf *req)
const u8 *pos;
size_t msg_len;
- wpa_msg(sm->msg_ctx, MSG_INFO, WPA_EVENT_EAP_STARTED
+ wpa_msg(sm->msg_ctx, MSG_DEBUG, WPA_EVENT_EAP_STARTED
"EAP authentication started");
eap_notify_status(sm, "started", "");