PERFORCE change 1202624 for review

John-Mark Gurney jmg at FreeBSD.org
Fri Nov 7 21:26:14 UTC 2014


http://p4web.freebsd.org/@@1202624?ac=10

Change 1202624 by jmg at jmg_carbon2 on 2014/11/07 21:25:16

	remove some debugging...

Affected files ...

.. //depot/projects/opencrypto/sys/crypto/aesni/aesni.c#13 edit

Differences ...

==== //depot/projects/opencrypto/sys/crypto/aesni/aesni.c#13 (text+ko) ====

@@ -443,17 +443,6 @@
 	return (error);
 }
 
-#if 0
-static void
-printhexstr(uint8_t *ptr, int len)
-{
-	int i;
-
-	for (i = 0; i < len; i++)
-		printf("%02hhx", ptr[i]);
-}
-#endif
-
 /*
  * authcrd contains the associated date.
  */
@@ -517,7 +506,6 @@
 
 	/* Setup ses->iv */
 	bzero(ses->iv, sizeof ses->iv);
-	/*printf("crd_flags: %#x, ivlen: %d, iv: ", enccrd->crd_flags, ivlen);*/
 	if (encflag) {
 		if ((enccrd->crd_flags & CRD_F_IV_EXPLICIT) != 0)
 			bcopy(enccrd->crd_iv, ses->iv, ivlen);
@@ -533,18 +521,12 @@
 			crypto_copydata(crp->crp_flags, crp->crp_buf,
 			    enccrd->crd_inject, ivlen, ses->iv);
 	}
-	/*printhexstr(ses->iv, ivlen);
-	printf("\n");*/
 
-	if (authcrd != NULL && !encflag) {
+	if (authcrd != NULL && !encflag)
 		crypto_copydata(crp->crp_flags, crp->crp_buf,
 		    authcrd->crd_inject, GMAC_DIGEST_LEN, tag);
-	} else {
-		/*printf("ptag: ");
-		printhexstr(tag, sizeof tag);
-		printf("\n");*/
+	else
 		bzero(tag, sizeof tag);
-	}
 
 	/* Do work */
 	switch (ses->algo) {
@@ -572,18 +554,6 @@
 			    ses->iv);
 		break;
 	case CRYPTO_AES_NIST_GCM_16:
-		/*printf("GCM: %d\n", encflag);
-		printf("buf(%d): ", enccrd->crd_len);
-		printhexstr(buf, enccrd->crd_len);
-		printf("\nauthbuf(%d): ", authcrd->crd_len);
-		printhexstr(authbuf, authcrd->crd_len);
-		printf("\niv: ");
-		printhexstr(ses->iv, ivlen);
-		printf("\ntag: ");
-		printhexstr(tag, 16);
-		printf("\nsched: ");
-		printhexstr(ses->enc_schedule, 16 * (ses->rounds + 1));
-		printf("\n");*/
 		if (encflag)
 			AES_GCM_encrypt(buf, buf, authbuf, ses->iv, tag,
 			    enccrd->crd_len, authcrd->crd_len, ivlen,
@@ -605,7 +575,6 @@
 	 * OpenBSD doesn't copy this back.  This primes the IV for the next
 	 * chain.  Why do we not do it for decrypt?
 	 */
-	/*printf("t: %d, %d, %d, %d\n", enccrd->crd_skip, enccrd->crd_len, enccrd->crd_skip + enccrd->crd_len - AES_BLOCK_LEN, AES_BLOCK_LEN);*/
 	if (encflag && enccrd->crd_alg == CRYPTO_AES_CBC)
 		bcopy(buf + enccrd->crd_len - AES_BLOCK_LEN, ses->iv, AES_BLOCK_LEN);
 


More information about the p4-projects mailing list