From f1f4fa797277cb2519d406a2ee4a15a2a9462bf2 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 2 Jul 2017 12:36:01 +0300 Subject: [PATCH] DPP: Fix JWK debug prints This function is used for parsing both the C-sign-key and netAccessKey, so better not imply that all cases are C-sign-key in the debug prints. Signed-off-by: Jouni Malinen --- src/common/dpp.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/common/dpp.c b/src/common/dpp.c index 361a9d7dd..f564929ff 100644 --- a/src/common/dpp.c +++ b/src/common/dpp.c @@ -3364,10 +3364,10 @@ static EVP_PKEY * dpp_parse_jwk(struct json_token *jwk, wpa_printf(MSG_DEBUG, "DPP: No x in JWK"); goto fail; } - wpa_hexdump_buf(MSG_DEBUG, "DPP: C-sign x", x); + wpa_hexdump_buf(MSG_DEBUG, "DPP: JWK x", x); if (wpabuf_len(x) != curve->prime_len) { wpa_printf(MSG_DEBUG, - "DPP: Unexpected C-sign x length %u (expected %u for curve %s)", + "DPP: Unexpected JWK x length %u (expected %u for curve %s)", (unsigned int) wpabuf_len(x), (unsigned int) curve->prime_len, curve->name); goto fail; @@ -3378,10 +3378,10 @@ static EVP_PKEY * dpp_parse_jwk(struct json_token *jwk, wpa_printf(MSG_DEBUG, "DPP: No y in JWK"); goto fail; } - wpa_hexdump_buf(MSG_DEBUG, "DPP: C-sign y", y); + wpa_hexdump_buf(MSG_DEBUG, "DPP: JWK y", y); if (wpabuf_len(y) != curve->prime_len) { wpa_printf(MSG_DEBUG, - "DPP: Unexpected C-sign y length %u (expected %u for curve %s)", + "DPP: Unexpected JWK y length %u (expected %u for curve %s)", (unsigned int) wpabuf_len(y), (unsigned int) curve->prime_len, curve->name); goto fail;