diff --git a/src/common/sae.c b/src/common/sae.c index 3b444a01c..23588f246 100644 --- a/src/common/sae.c +++ b/src/common/sae.c @@ -908,8 +908,6 @@ u16 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len, const u8 *pos = data, *end = data + len; u16 res; - wpa_hexdump(MSG_DEBUG, "SAE: Commit fields", data, len); - /* Check Finite Cyclic Group */ if (pos + 2 > end) return WLAN_STATUS_UNSPECIFIED_FAILURE; @@ -1036,8 +1034,6 @@ int sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len) { u8 verifier[SHA256_MAC_LEN]; - wpa_hexdump(MSG_DEBUG, "SAE: Confirm fields", data, len); - if (len < 2 + SHA256_MAC_LEN) { wpa_printf(MSG_DEBUG, "SAE: Too short confirm message"); return -1; diff --git a/wpa_supplicant/sme.c b/wpa_supplicant/sme.c index 6fbb9e119..1c760e7bb 100644 --- a/wpa_supplicant/sme.c +++ b/wpa_supplicant/sme.c @@ -450,7 +450,6 @@ static int sme_sae_auth(struct wpa_supplicant *wpa_s, u16 auth_transaction, { wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE authentication transaction %u " "status code %u", auth_transaction, status_code); - wpa_hexdump(MSG_DEBUG, "SME: SAE fields", data, len); if (auth_transaction == 1 && status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ &&