OicUuid_t uuidPT = {.id={0}};
if (OC_STACK_OK != GetDoxmDeviceID(&uuidPT))
{
- OC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
+ OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
return NULL;
}
memcpy(otmCtx->selectedDeviceInfo->doxm->owner.id, uuidPT.id, UUID_LENGTH);
if (OC_STACK_OK != GetDoxmDeviceID(&uuidPT))
{
- OC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
+ OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
return NULL;
}
memcpy(otmCtx->selectedDeviceInfo->doxm->owner.id, uuidPT.id , UUID_LENGTH);
OCStackResult res = InputPin((char*)pinData, OXM_RANDOM_PIN_SIZE + 1);
if(OC_STACK_OK != res)
{
- OC_LOG(ERROR, TAG, "Failed to input PIN");
+ OIC_LOG(ERROR, TAG, "Failed to input PIN");
return res;
}
OicUuid_t deviceUUID = {.id={0}};
if (OC_STACK_OK != GetDoxmDeviceID(&deviceUUID))
{
- OC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
+ OIC_LOG(ERROR, TAG, "Error while retrieving provisioning tool's device ID");
return OC_STACK_ERROR;
}
1, &deviceUUID, &otmCtx->subIdForPinOxm);
if(res != OC_STACK_OK)
{
- OC_LOG_V(ERROR, TAG, "Failed to save the temporal PSK : %d", res);
+ OIC_LOG_V(ERROR, TAG, "Failed to save the temporal PSK : %d", res);
}
return res;
OCStackResult CreateSecureSessionRandomPinCallbak(OTMContext_t* otmCtx)
{
- OC_LOG(INFO, TAG, "IN CreateSecureSessionRandomPinCallbak");
+ OIC_LOG(INFO, TAG, "IN CreateSecureSessionRandomPinCallbak");
if(!otmCtx || !otmCtx->selectedDeviceInfo)
{
CAResult_t caresult = CAEnableAnonECDHCipherSuite(false);
if (CA_STATUS_OK != caresult)
{
- OC_LOG_V(ERROR, TAG, "Unable to disable anon cipher suite");
+ OIC_LOG_V(ERROR, TAG, "Unable to disable anon cipher suite");
return OC_STACK_ERROR;
}
- OC_LOG(INFO, TAG, "Anonymous cipher suite disabled.");
+ OIC_LOG(INFO, TAG, "Anonymous cipher suite disabled.");
caresult = CASelectCipherSuite(TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256);
if (CA_STATUS_OK != caresult)
{
- OC_LOG_V(ERROR, TAG, "Failed to select TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256");
+ OIC_LOG_V(ERROR, TAG, "Failed to select TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256");
return OC_STACK_ERROR;
}
- OC_LOG(INFO, TAG, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256 cipher suite selected.");
+ OIC_LOG(INFO, TAG, "TLS_ECDHE_PSK_WITH_AES_128_CBC_SHA_256 cipher suite selected.");
OCProvisionDev_t* selDevInfo = otmCtx->selectedDeviceInfo;
OICFree(endpoint);
if (CA_STATUS_OK != caresult)
{
- OC_LOG_V(ERROR, TAG, "DTLS handshake failure.");
+ OIC_LOG_V(ERROR, TAG, "DTLS handshake failure.");
return OC_STACK_ERROR;
}
- OC_LOG(INFO, TAG, "OUT CreateSecureSessionRandomPinCallbak");
+ OIC_LOG(INFO, TAG, "OUT CreateSecureSessionRandomPinCallbak");
return OC_STACK_OK;
}