# HG changeset patch # User Ilya # Date 1592922005 -10800 # Node ID 93dcc97c3f3fc4b858068b4ce515d612b59d6cb3 # Parent ca75bb513359d4d49e7de54f5b4d905be239b326 fix trace messages (#105) diff -r ca75bb513359 -r 93dcc97c3f3f ed25519.c --- a/ed25519.c Tue Jun 23 21:38:46 2020 +0800 +++ b/ed25519.c Tue Jun 23 17:20:05 2020 +0300 @@ -84,7 +84,7 @@ memcpy(key->pub, buf_getptr(buf, CURVE25519_LEN), CURVE25519_LEN); buf_incrpos(buf, CURVE25519_LEN); - TRACE(("leave buf_get_ed25519_pub_key: success")) + TRACE(("leave buf_get_ed25519_priv_key: success")) return DROPBEAR_SUCCESS; } @@ -100,7 +100,7 @@ m_burn(key->priv, CURVE25519_LEN); m_free(key); - TRACE2(("leave rsa_key_free")) + TRACE2(("leave ed25519_key_free")) } /* Put the public ed25519 key into the buffer in the required format */ @@ -160,7 +160,7 @@ slen = buf_getint(buf); if (slen != 64 || buf->len - buf->pos < slen) { - TRACE(("bad size")) + TRACE(("leave buf_ed25519_verify: bad size")) goto out; } s = buf_getptr(buf, slen); @@ -168,7 +168,7 @@ if (dropbear_ed25519_verify(data_buf->data, data_buf->len, s, slen, key->pub) == 0) { /* signature is valid */ - TRACE(("success!")) + TRACE(("leave buf_ed25519_verify: success!")) ret = DROPBEAR_SUCCESS; }