From: Kern Sibbald Date: Thu, 6 Nov 2008 19:10:08 +0000 (+0000) Subject: Tweak debug code X-Git-Tag: Release-3.0.0~627 X-Git-Url: https://git.sur5r.net/?a=commitdiff_plain;h=4cbd08daa0244b14eb529b86ff1a431750ecdc77;p=bacula%2Fbacula Tweak debug code git-svn-id: https://bacula.svn.sourceforge.net/svnroot/bacula/trunk@7996 91ce42f0-d328-0410-95d8-f526ca767f89 --- diff --git a/bacula/src/lib/crypto.c b/bacula/src/lib/crypto.c index 55611b4b1e..25b1d44a5c 100644 --- a/bacula/src/lib/crypto.c +++ b/bacula/src/lib/crypto.c @@ -597,7 +597,7 @@ DIGEST *crypto_digest_new(JCR *jcr, crypto_digest_t type) digest = (DIGEST *)malloc(sizeof(DIGEST)); digest->type = type; digest->jcr = jcr; - Dmsg1(50, "crypto_digest_new jcr=%p\n", jcr); + Dmsg1(150, "crypto_digest_new jcr=%p\n", jcr); /* Initialize the OpenSSL message digest context */ EVP_MD_CTX_init(&digest->ctx); @@ -632,7 +632,7 @@ DIGEST *crypto_digest_new(JCR *jcr, crypto_digest_t type) err: /* This should not happen, but never say never ... */ - Dmsg0(50, "Digest init failed.\n"); + Dmsg0(150, "Digest init failed.\n"); openssl_post_errors(jcr, M_ERROR, _("OpenSSL digest initialization failed")); crypto_digest_free(digest); return NULL; @@ -646,7 +646,7 @@ err: bool crypto_digest_update(DIGEST *digest, const uint8_t *data, uint32_t length) { if (EVP_DigestUpdate(&digest->ctx, data, length) == 0) { - Dmsg0(50, "digest update failed\n"); + Dmsg0(150, "digest update failed\n"); openssl_post_errors(digest->jcr, M_ERROR, _("OpenSSL digest update failed")); return false; } else { @@ -664,7 +664,7 @@ bool crypto_digest_update(DIGEST *digest, const uint8_t *data, uint32_t length) bool crypto_digest_finalize(DIGEST *digest, uint8_t *dest, uint32_t *length) { if (!EVP_DigestFinal(&digest->ctx, dest, (unsigned int *)length)) { - Dmsg0(50, "digest finalize failed\n"); + Dmsg0(150, "digest finalize failed\n"); openssl_post_errors(digest->jcr, M_ERROR, _("OpenSSL digest finalize failed")); return false; } else { @@ -697,7 +697,7 @@ SIGNATURE *crypto_sign_new(JCR *jcr) sig->sigData = SignatureData_new(); sig->jcr = jcr; - Dmsg1(50, "crypto_sign_new jcr=%p\n", jcr); + Dmsg1(150, "crypto_sign_new jcr=%p\n", jcr); if (!sig->sigData) { /* Allocation failed in OpenSSL */ @@ -731,7 +731,7 @@ crypto_error_t crypto_sign_get_digest(SIGNATURE *sig, X509_KEYPAIR *keypair, si = sk_SignerInfo_value(signers, i); if (M_ASN1_OCTET_STRING_cmp(keypair->keyid, si->subjectKeyIdentifier) == 0) { /* Get the digest algorithm and allocate a digest context */ - Dmsg1(50, "crypto_sign_get_digest jcr=%p\n", sig->jcr); + Dmsg1(150, "crypto_sign_get_digest jcr=%p\n", sig->jcr); switch (OBJ_obj2nid(si->digestAlgorithm)) { case NID_md5: Dmsg0(100, "sign digest algorithm is MD5\n");