diff options
author | Sascha Hauer <s.hauer@pengutronix.de> | 2022-05-04 14:21:55 +0200 |
---|---|---|
committer | Sascha Hauer <s.hauer@pengutronix.de> | 2022-05-04 15:12:31 +0200 |
commit | d152fda9bfe2182c93b65fe3391b848bbe64a12f (patch) | |
tree | 582c7c3baa86d686025295a4efa57bdb8d592fad | |
parent | 8a44a0c3259511f4eda61383d333f9f0858ca4a5 (diff) | |
download | barebox-d152fda9bfe2182c93b65fe3391b848bbe64a12f.tar.gz |
rsa: Add pr_fmt and use pr_debug
Add pr_fmt to print more context and use pr_debug consistently.
Signed-off-by: Sascha Hauer <s.hauer@pengutronix.de>
-rw-r--r-- | crypto/rsa.c | 23 |
1 files changed, 12 insertions, 11 deletions
diff --git a/crypto/rsa.c b/crypto/rsa.c index 2eeb9984b1..6d23ecb11c 100644 --- a/crypto/rsa.c +++ b/crypto/rsa.c @@ -5,6 +5,7 @@ * * SPDX-License-Identifier: GPL-2.0+ */ +#define pr_fmt(fmt) "rsa: " fmt #include <common.h> #include <malloc.h> @@ -184,8 +185,8 @@ static int pow_mod(const struct rsa_public_key *key, void *__inout) /* Sanity check for stack size - key->len is in 32-bit words */ if (key->len > RSA_MAX_KEY_BITS / 32) { - debug("RSA key words %u exceeds maximum %d\n", key->len, - RSA_MAX_KEY_BITS / 32); + pr_debug("RSA key words %u exceeds maximum %d\n", key->len, + RSA_MAX_KEY_BITS / 32); return -EINVAL; } @@ -199,13 +200,13 @@ static int pow_mod(const struct rsa_public_key *key, void *__inout) return -EINVAL; if (k < 2) { - debug("Public exponent is too short (%d bits, minimum 2)\n", - k); + pr_debug("Public exponent is too short (%d bits, minimum 2)\n", + k); return -EINVAL; } if (!is_public_exponent_bit_set(key, 0)) { - debug("LSB of RSA public exponent must be set.\n"); + pr_debug("LSB of RSA public exponent must be set.\n"); return -EINVAL; } @@ -317,7 +318,7 @@ int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig, return -EOPNOTSUPP; if (sig_len != (key->len * sizeof(uint32_t))) { - debug("Signature is of incorrect length %u, should be %zu\n", sig_len, + pr_debug("Signature is of incorrect length %u, should be %zu\n", sig_len, key->len * sizeof(uint32_t)); ret = -EINVAL; goto out_free_digest; @@ -325,8 +326,8 @@ int rsa_verify(const struct rsa_public_key *key, const uint8_t *sig, /* Sanity check for stack size */ if (sig_len > RSA_MAX_SIG_BITS / 8) { - debug("Signature length %u exceeds maximum %d\n", sig_len, - RSA_MAX_SIG_BITS / 8); + pr_debug("Signature length %u exceeds maximum %d\n", sig_len, + RSA_MAX_SIG_BITS / 8); ret = -EINVAL; goto out_free_digest; } @@ -408,15 +409,15 @@ struct rsa_public_key *rsa_of_read_key(struct device_node *node) rr = of_get_property(node, "rsa,r-squared", NULL); if (!key->len || !modulus || !rr) { - debug("%s: Missing RSA key info", __func__); + pr_debug("%s: Missing RSA key info", __func__); err = -EFAULT; goto out; } /* Sanity check for stack size */ if (key->len > RSA_MAX_KEY_BITS || key->len < RSA_MIN_KEY_BITS) { - debug("RSA key bits %u outside allowed range %d..%d\n", - key->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS); + pr_debug("RSA key bits %u outside allowed range %d..%d\n", + key->len, RSA_MIN_KEY_BITS, RSA_MAX_KEY_BITS); err = -EFAULT; goto out; } |