]> git.saurik.com Git - apple/security.git/blobdiff - OSX/libsecurity_smime/lib/cryptohi.c
Security-58286.260.20.tar.gz
[apple/security.git] / OSX / libsecurity_smime / lib / cryptohi.c
index 4f39abf42105285e60bf00983ab81532630f9f68..5438c0b31ce4d79513154987a58b5976088e28ae 100644 (file)
@@ -172,7 +172,7 @@ SECOID_FindyCssmAlgorithmByTag(SECOidTag algTag)
 static void SEC_PrintCFError(CFErrorRef CF_RELEASES_ARGUMENT error) {
     if (error) {
     CFStringRef errorDesc = CFErrorCopyDescription(error);
 static void SEC_PrintCFError(CFErrorRef CF_RELEASES_ARGUMENT error) {
     if (error) {
     CFStringRef errorDesc = CFErrorCopyDescription(error);
-    fprintf(stderr, "SecKey API returned: %ld, %s", CFErrorGetCode(error),
+    dprintf("SecKey API returned: %ld, %s", CFErrorGetCode(error),
             errorDesc ? CFStringGetCStringPtr(errorDesc, kCFStringEncodingUTF8) : "");
     CFRelease(error);
     if (errorDesc) { CFRelease(errorDesc); }
             errorDesc ? CFStringGetCStringPtr(errorDesc, kCFStringEncodingUTF8) : "");
     CFRelease(error);
     if (errorDesc) { CFRelease(errorDesc); }
@@ -337,7 +337,7 @@ static SECStatus SGN_SignAll(uint8_t *buf, size_t len,
     /* we no longer support signing with MD5 */
     if (keyAlg == kSecKeyAlgorithmRSASignatureMessagePKCS1v15MD5 ||
         keyAlg == kSecKeyAlgorithmRSASignatureDigestPKCS1v15MD5) {
     /* we no longer support signing with MD5 */
     if (keyAlg == kSecKeyAlgorithmRSASignatureMessagePKCS1v15MD5 ||
         keyAlg == kSecKeyAlgorithmRSASignatureDigestPKCS1v15MD5) {
-        fprintf(stderr, "CMS signature failed: MD5 algorithm is disallowed for generating signatures.");
+        dprintf("CMS signature failed: MD5 algorithm is disallowed for generating signatures.");
         rv = SEC_ERROR_INVALID_ALGORITHM;
         goto out;
     }
         rv = SEC_ERROR_INVALID_ALGORITHM;
         goto out;
     }