diff options
author | Kai Michaelis <kai@sequoia-pgp.org> | 2019-01-25 13:52:46 +0100 |
---|---|---|
committer | Kai Michaelis <kai@sequoia-pgp.org> | 2019-01-25 13:54:08 +0100 |
commit | eac75e99e14f8860aeee7574bdd01081b4782b02 (patch) | |
tree | 6bb16582f94dbd36a0bef5f95a8b909f8789f210 | |
parent | 84bae04b2fa3615ec0f95c1608abd5883d89fbe0 (diff) |
openpgp: remove tracing output from ecdh::wrap_session_key
-rw-r--r-- | openpgp/src/crypto/ecdh.rs | 4 |
1 files changed, 0 insertions, 4 deletions
diff --git a/openpgp/src/crypto/ecdh.rs b/openpgp/src/crypto/ecdh.rs index 9258b785..88ebd684 100644 --- a/openpgp/src/crypto/ecdh.rs +++ b/openpgp/src/crypto/ecdh.rs @@ -79,21 +79,17 @@ pub(crate) fn wrap_session_key_deterministic(recipient: &Key, session_key: &[u8] // Note: We always pad up to 40 bytes to obfuscate the // length of the symmetric key. - eprintln!("m: {:?}", m); // Compute KDF input. let param = make_param(recipient, curve, hash, sym); - eprintln!("param: {:?}", param); // Z_len = the key size for the KEK_alg_ID used with AESKeyWrap // Compute Z = KDF( S, Z_len, Param ); #[allow(non_snake_case)] let Z = kdf(S, sym.key_size()?, *hash, ¶m)?; - eprintln!("Z: {:?}", Z); // Compute C = AESKeyWrap( Z, m ) as per [RFC3394] #[allow(non_snake_case)] let C = aes_key_wrap(*sym, &Z, &m)?; - eprintln!("C: {:?}", C); // Output (MPI(VB) || len(C) || C). Ok(Ciphertext::ECDH { |