time_print
time_print ("got CTL=%x\n", stype);
time_print("Got deauth=%u\n", le16toh(*rc));
time_print("Warning got auth algo=%x\n", *sc);
time_print("Warning got auth seq=%x\n", *sc);
time_print("Auth rejected... trying to spoof mac.\n");
time_print("Authenticated\n");
time_print("Got auth %x\n", *sc);
time_print("Associated (ID=%x)\n", aid);
time_print("Assoc rejected..."
time_print("got assoc %x\n", *sc);
time_print("\nGOT MAN=%x\n", stype);
time_print("WARNING: Got NON wep packet from %s dlen %d stype=%x\n",
time_print("Got arp reply from (%s)\n", mac2str(rtrmac));
time_print("oops. ttl changed from %d to %d\n",
time_print("Got TTL of %d\n", ttl_val);
time_print("Got ARP request from (%s)\n", mac2str(wh->i_addr3));
time_print("short write %d out of %d\n", rd, len);
time_print("Had PRGA (%s) but too little (%d/%d)\n", path, rd,
time_print("HAD PRGA (%s) checksum mismatch! (%x %x)\n",
time_print("Decrypted packet [%d bytes]!!! w00t\n", dlen);
time_print("Key index=%x!!\n", body[3]);
time_print("Got clear-text byte: %d\n",
time_print("Got IP=(%s)\n", netip);
time_print("My IP=(%s)\n", myip);
time_print("Datalen %d Known clear %d\n", dlen, clearsize);
time_print("Trying to use MAC=(%s)\n", mac2str(mymac));
time_print("rd=%d\n", rd);
time_print("Sending arp request for: %s\n", arp_ip);
time_print("Warning... previous crack still running!\n");
time_print("Starting crack PID=%d\n", crack_pid);
time_print("Opened tap device: %s\n", tapdev);
time_print("Sorry... want to send %d but only got %d prga\n",
time_print("Sorry... overflow in TAP queue [of 1 packet =P] overwriting\n");
time_print("WARNING: Appending in %s\n", WEP_FILE);
time_print("WARNING: reading prga from %s\n", PRGA_FILE);
time_print("Creating dictionary directory (%s)\n", DICT_PATH);
time_print("Set tap MAC to: %s\n", mac2str(mymac));
time_print("Looking for a victim...\n");
time_print("WEP=%.9d (next crack at %d) IV=%.2x:%.2x:%.2x (rate=%d) \r",
time_print("Chan %.02d %c\r", chaninfo.chan, *pbarp);
time_print("Guessing PRGA %.2x (IP byte=%d) \r",
time_print("%c\r", *pbarp);
time_print("KEY=(%s)\n", buf);
time_print("Stopping crack PID=%d\n", crack_pid);
time_print("\nDying...\n");
time_print("Interface name too long...\n");
time_print("Setting up %s... ", dev);
time_print("Error Wrote %d out of %d\n", rc,
time_print("ERROR Max retransmists for (%d bytes):\n",
time_print("too many fragments (%d)\n", fn);
time_print("Warning: short packet in get_victim_ssid()\n");
time_print("Warning short.asdfasdf\n");
time_print("Warning short....\n");
time_print("Warning len of chan not 1\n");
time_print("Found SSID(%s) BSS=(%s) chan=%d\n",
time_print("Got %d bytes of prga IV=(%.02x:%.02x:%.02x) PRGA=",
time_print("Not logging IV %.2X:%.2X:%.2X cuz we got it\n",