diff ed25519.c @ 1727:93dcc97c3f3f

fix trace messages (#105)
author Ilya <instenet@gmail.com>
date Tue, 23 Jun 2020 17:20:05 +0300
parents 41a0ff8d5a89
children 35d504d59c05
line wrap: on
line diff
--- a/ed25519.c	Tue Jun 23 21:38:46 2020 +0800
+++ b/ed25519.c	Tue Jun 23 17:20:05 2020 +0300
@@ -84,7 +84,7 @@
 	memcpy(key->pub, buf_getptr(buf, CURVE25519_LEN), CURVE25519_LEN);
 	buf_incrpos(buf, CURVE25519_LEN);
 
-	TRACE(("leave buf_get_ed25519_pub_key: success"))
+	TRACE(("leave buf_get_ed25519_priv_key: success"))
 	return DROPBEAR_SUCCESS;
 }
 
@@ -100,7 +100,7 @@
 	m_burn(key->priv, CURVE25519_LEN);
 	m_free(key);
 
-	TRACE2(("leave rsa_key_free"))
+	TRACE2(("leave ed25519_key_free"))
 }
 
 /* Put the public ed25519 key into the buffer in the required format */
@@ -160,7 +160,7 @@
 
 	slen = buf_getint(buf);
 	if (slen != 64 || buf->len - buf->pos < slen) {
-		TRACE(("bad size"))
+		TRACE(("leave buf_ed25519_verify: bad size"))
 		goto out;
 	}
 	s = buf_getptr(buf, slen);
@@ -168,7 +168,7 @@
 	if (dropbear_ed25519_verify(data_buf->data, data_buf->len,
 				    s, slen, key->pub) == 0) {
 		/* signature is valid */
-		TRACE(("success!"))
+		TRACE(("leave buf_ed25519_verify: success!"))
 		ret = DROPBEAR_SUCCESS;
 	}