@@ -315,11 +315,11 @@ static int pkcs11_try_pkey_rsa_sign(EVP_PKEY_CTX *evp_pkey_ctx,
315315 ctx = slot -> ctx ;
316316 if (!ctx )
317317 return -1 ;
318-
318+ #ifdef DEBUG
319319 pkcs11_log (ctx , LOG_DEBUG , "%s:%d pkcs11_try_pkey_rsa_sign() "
320320 "sig=%p *siglen=%lu tbs=%p tbslen=%lu\n" ,
321321 __FILE__ , __LINE__ , sig , * siglen , tbs , tbslen );
322-
322+ #endif
323323 if (EVP_PKEY_CTX_get_signature_md (evp_pkey_ctx , & sig_md ) <= 0 )
324324 return -1 ;
325325 if (tbslen != (size_t )EVP_MD_size (sig_md ))
@@ -329,8 +329,7 @@ static int pkcs11_try_pkey_rsa_sign(EVP_PKEY_CTX *evp_pkey_ctx,
329329 EVP_PKEY_CTX_get_rsa_padding (evp_pkey_ctx , & padding );
330330 switch (padding ) {
331331 case RSA_PKCS1_PSS_PADDING :
332- pkcs11_log (ctx , LOG_DEBUG , "%s:%d padding=RSA_PKCS1_PSS_PADDING\n" ,
333- __FILE__ , __LINE__ );
332+ pkcs11_log (ctx , LOG_DEBUG , "padding=RSA_PKCS1_PSS_PADDING\n" );
334333 if (pkcs11_params_pss (& pss_params , evp_pkey_ctx , ctx ) < 0 )
335334 return -1 ;
336335 mechanism .mechanism = CKM_RSA_PKCS_PSS ;
@@ -418,26 +417,24 @@ static int pkcs11_try_pkey_rsa_decrypt(EVP_PKEY_CTX *evp_pkey_ctx,
418417 ctx = slot -> ctx ;
419418 if (!ctx )
420419 return -1 ;
421-
420+ #ifdef DEBUG
422421 pkcs11_log (ctx , LOG_DEBUG , "%s:%d pkcs11_try_pkey_rsa_decrypt() "
423422 "out=%p *outlen=%lu in=%p inlen=%lu\n" ,
424423 __FILE__ , __LINE__ , out , * outlen , in , inlen );
425-
424+ #endif
426425 memset (& mechanism , 0 , sizeof mechanism );
427426 EVP_PKEY_CTX_get_rsa_padding (evp_pkey_ctx , & padding );
428427 switch (padding ) {
429428 case RSA_PKCS1_OAEP_PADDING :
430- pkcs11_log (ctx , LOG_DEBUG , "%s:%d padding=RSA_PKCS1_OAEP_PADDING\n" ,
431- __FILE__ , __LINE__ );
429+ pkcs11_log (ctx , LOG_DEBUG , "padding=RSA_PKCS1_OAEP_PADDING\n" );
432430 if (pkcs11_params_oaep (& oaep_params , evp_pkey_ctx , ctx ) < 0 )
433431 return -1 ;
434432 mechanism .mechanism = CKM_RSA_PKCS_OAEP ;
435433 mechanism .pParameter = & oaep_params ;
436434 mechanism .ulParameterLen = sizeof oaep_params ;
437435 break ;
438436 case RSA_PKCS1_PADDING :
439- pkcs11_log (ctx , LOG_DEBUG , "%s:%d padding=RSA_PKCS1_PADDING\n" ,
440- __FILE__ , __LINE__ );
437+ pkcs11_log (ctx , LOG_DEBUG , "padding=RSA_PKCS1_PADDING\n" );
441438 mechanism .mechanism = CKM_RSA_PKCS ;
442439 mechanism .pParameter = NULL ;
443440 mechanism .ulParameterLen = 0 ;
@@ -559,11 +556,11 @@ static int pkcs11_try_pkey_ec_sign(EVP_PKEY_CTX *evp_pkey_ctx,
559556 ctx = slot -> ctx ;
560557 if (!ctx )
561558 goto error ;
562-
559+ #ifdef DEBUG
563560 pkcs11_log (ctx , LOG_DEBUG , "%s:%d pkcs11_try_pkey_ec_sign() "
564561 "sig=%p *siglen=%lu tbs=%p tbslen=%lu\n" ,
565562 __FILE__ , __LINE__ , sig , * siglen , tbs , tbslen );
566-
563+ #endif
567564 if (EVP_PKEY_CTX_get_signature_md (evp_pkey_ctx , & sig_md ) <= 0 )
568565 goto error ;
569566
@@ -637,10 +634,11 @@ static int pkcs11_eddsa_sign(unsigned char *sigret, unsigned int *siglen,
637634 memset (& mechanism , 0 , sizeof (mechanism ));
638635 mechanism .mechanism = CKM_EDDSA ;
639636
637+ #ifdef DEBUG
640638 pkcs11_log (ctx , LOG_DEBUG , "%s:%d pkcs11_eddsa_sign() "
641639 "sigret=%p *siglen=%u tbs=%p tbslen=%u\n" ,
642640 __FILE__ , __LINE__ , sigret , * siglen , tbs , tbslen );
643-
641+ #endif
644642 if (pkcs11_get_session (slot , 0 , & session ))
645643 return -1 ;
646644
0 commit comments