summaryrefslogtreecommitdiffstats
path: root/openpgp
diff options
context:
space:
mode:
authorKai Michaelis <kai@sequoia-pgp.org>2019-01-25 13:52:46 +0100
committerKai Michaelis <kai@sequoia-pgp.org>2019-01-25 13:54:08 +0100
commiteac75e99e14f8860aeee7574bdd01081b4782b02 (patch)
tree6bb16582f94dbd36a0bef5f95a8b909f8789f210 /openpgp
parent84bae04b2fa3615ec0f95c1608abd5883d89fbe0 (diff)
openpgp: remove tracing output from ecdh::wrap_session_key
Diffstat (limited to 'openpgp')
-rw-r--r--openpgp/src/crypto/ecdh.rs4
1 files changed, 0 insertions, 4 deletions
diff --git a/openpgp/src/crypto/ecdh.rs b/openpgp/src/crypto/ecdh.rs
index 9258b785..88ebd684 100644
--- a/openpgp/src/crypto/ecdh.rs
+++ b/openpgp/src/crypto/ecdh.rs
@@ -79,21 +79,17 @@ pub(crate) fn wrap_session_key_deterministic(recipient: &Key, session_key: &[u8]
// Note: We always pad up to 40 bytes to obfuscate the
// length of the symmetric key.
- eprintln!("m: {:?}", m);
// Compute KDF input.
let param = make_param(recipient, curve, hash, sym);
- eprintln!("param: {:?}", param);
// Z_len = the key size for the KEK_alg_ID used with AESKeyWrap
// Compute Z = KDF( S, Z_len, Param );
#[allow(non_snake_case)]
let Z = kdf(S, sym.key_size()?, *hash, &param)?;
- eprintln!("Z: {:?}", Z);
// Compute C = AESKeyWrap( Z, m ) as per [RFC3394]
#[allow(non_snake_case)]
let C = aes_key_wrap(*sym, &Z, &m)?;
- eprintln!("C: {:?}", C);
// Output (MPI(VB) || len(C) || C).
Ok(Ciphertext::ECDH {