Some sensitive data is logged at levels other than DEBUG. Having
all of these at DEBUG can help ensure in release builds secret
data isn't inadvertently leaked through logging.
Change-Id: I58aa4ebc8e8dcdbc9d267d7eef3135a21e6daa0b
Signed-off-by: Kevin Kane <kkane@microsoft.com>
Reviewed-on: https://gerrit.iotivity.org/gerrit/14085
Tested-by: jenkins-iotivity <jenkins-iotivity@opendaylight.org>
Reviewed-by: Dave Thaler <dthaler@microsoft.com>
Reviewed-by: Dan Mihai <Daniel.Mihai@microsoft.com>
Reviewed-by: Uze Choi <uzchoi@samsung.com>
Reviewed-by: Randeep Singh <randeep.s@samsung.com>
(cherry picked from commit
7257937531b5a9165f58e377eafffae175259665)
Reviewed-on: https://gerrit.iotivity.org/gerrit/14321
if (CA_STATUS_OK == pskRet)
{
- OIC_LOG(INFO, TAG, "SubOwner PSK dump:");
- OIC_LOG_BUFFER(INFO, TAG, ownerPSK, OWNER_PSK_LENGTH_128);
+ OIC_LOG(DEBUG, TAG, "SubOwner PSK dump:");
+ OIC_LOG_BUFFER(DEBUG, TAG, ownerPSK, OWNER_PSK_LENGTH_128);
//Generating new credential for provisioning tool
OicSecCred_t *cred = GenerateCredential(&selectedDeviceInfo->doxm->deviceID,
SYMMETRIC_PAIR_WISE_KEY, NULL,
if (CA_STATUS_OK == pskRet)
{
- OIC_LOG(INFO, TAG,"Owner PSK dump:\n");
- OIC_LOG_BUFFER(INFO, TAG,ownerPSK, OWNER_PSK_LENGTH_128);
+ OIC_LOG(DEBUG, TAG,"Owner PSK dump:\n");
+ OIC_LOG_BUFFER(DEBUG, TAG,ownerPSK, OWNER_PSK_LENGTH_128);
//Generating new credential for provisioning tool
OicSecCred_t *cred = GenerateCredential(&selectedDeviceInfo->doxm->deviceID,
SYMMETRIC_PAIR_WISE_KEY, NULL,
OIC_LOG(WARNING, TAG, "[Subject] : ");
OIC_LOG_BUFFER(WARNING, TAG, prevCred->subject.id, sizeof(prevCred->subject.id));
OIC_LOG_V(WARNING, TAG, "[Encoding Type] : %d", prevCred->privateData.encoding);
- OIC_LOG(WARNING, TAG, "[Private Data] : ");
- OIC_LOG_BUFFER(WARNING, TAG, prevCred->privateData.data, prevCred->privateData.len);
+ OIC_LOG(DEBUG, TAG, "[Private Data] : ");
+ OIC_LOG_BUFFER(DEBUG, TAG, prevCred->privateData.data, prevCred->privateData.len);
OIC_LOG(WARNING, TAG, "Previous OwnerPSK will be removed.");
res = RemoveCredentialByCredId(credId);
OIC_LOG(ERROR, TAG, "Failed to DpairingToCBORPayload");
return OC_STACK_NO_MEMORY;
}
- OIC_LOG(INFO, TAG, "DPARING CBOR data:");
- OIC_LOG_BUFFER(INFO, TAG, secPayload->securityData, secPayload->payloadSize);
+ OIC_LOG(DEBUG, TAG, "DPARING CBOR data:");
+ OIC_LOG_BUFFER(DEBUG, TAG, secPayload->securityData, secPayload->payloadSize);
char query[MAX_URI_LENGTH + MAX_QUERY_LENGTH] = {0};
if(!DPGenerateQuery(true,
OIC_LOG(ERROR, TAG, "Failed to DpairingToCBORPayload");
return OC_STACK_NO_MEMORY;
}
- OIC_LOG(INFO, TAG, "DPARING CBOR data:");
- OIC_LOG_BUFFER(INFO, TAG, secPayload->securityData, secPayload->payloadSize);
+ OIC_LOG(DEBUG, TAG, "DPARING CBOR data:");
+ OIC_LOG_BUFFER(DEBUG, TAG, secPayload->securityData, secPayload->payloadSize);
char query[MAX_URI_LENGTH + MAX_QUERY_LENGTH] = {0};
if(!DPGenerateQuery(false,
if (CA_STATUS_OK == pskRet)
{
- OIC_LOG(INFO, TAG, "pairingPSK dump:\n");
- OIC_LOG_BUFFER(INFO, TAG, pairingPSK, OWNER_PSK_LENGTH_128);
+ OIC_LOG(DEBUG, TAG, "pairingPSK dump:\n");
+ OIC_LOG_BUFFER(DEBUG, TAG, pairingPSK, OWNER_PSK_LENGTH_128);
//Generating new credential for direct-pairing client
OicSecCred_t *cred = GenerateCredential(peerDevID,