@@ -74,7 +74,7 @@ static int pefile_parse_binary(const void *pebuf, unsigned int pelen,
74
74
break ;
75
75
76
76
default :
77
- pr_debug ("Unknown PEOPT magic = %04hx\n" , pe32 -> magic );
77
+ pr_warn ("Unknown PEOPT magic = %04hx\n" , pe32 -> magic );
78
78
return - ELIBBAD ;
79
79
}
80
80
@@ -95,7 +95,7 @@ static int pefile_parse_binary(const void *pebuf, unsigned int pelen,
95
95
ctx -> certs_size = ddir -> certs .size ;
96
96
97
97
if (!ddir -> certs .virtual_address || !ddir -> certs .size ) {
98
- pr_debug ("Unsigned PE binary\n" );
98
+ pr_warn ("Unsigned PE binary\n" );
99
99
return - ENODATA ;
100
100
}
101
101
@@ -127,7 +127,7 @@ static int pefile_strip_sig_wrapper(const void *pebuf,
127
127
unsigned len ;
128
128
129
129
if (ctx -> sig_len < sizeof (wrapper )) {
130
- pr_debug ("Signature wrapper too short\n" );
130
+ pr_warn ("Signature wrapper too short\n" );
131
131
return - ELIBBAD ;
132
132
}
133
133
@@ -142,16 +142,16 @@ static int pefile_strip_sig_wrapper(const void *pebuf,
142
142
* rounded up since 0.110.
143
143
*/
144
144
if (wrapper .length > ctx -> sig_len ) {
145
- pr_debug ("Signature wrapper bigger than sig len (%x > %x)\n" ,
146
- ctx -> sig_len , wrapper .length );
145
+ pr_warn ("Signature wrapper bigger than sig len (%x > %x)\n" ,
146
+ ctx -> sig_len , wrapper .length );
147
147
return - ELIBBAD ;
148
148
}
149
149
if (wrapper .revision != WIN_CERT_REVISION_2_0 ) {
150
- pr_debug ("Signature is not revision 2.0\n" );
150
+ pr_warn ("Signature is not revision 2.0\n" );
151
151
return - ENOTSUPP ;
152
152
}
153
153
if (wrapper .cert_type != WIN_CERT_TYPE_PKCS_SIGNED_DATA ) {
154
- pr_debug ("Signature certificate type is not PKCS\n" );
154
+ pr_warn ("Signature certificate type is not PKCS\n" );
155
155
return - ENOTSUPP ;
156
156
}
157
157
@@ -164,7 +164,7 @@ static int pefile_strip_sig_wrapper(const void *pebuf,
164
164
ctx -> sig_offset += sizeof (wrapper );
165
165
ctx -> sig_len -= sizeof (wrapper );
166
166
if (ctx -> sig_len < 4 ) {
167
- pr_debug ("Signature data missing\n" );
167
+ pr_warn ("Signature data missing\n" );
168
168
return - EKEYREJECTED ;
169
169
}
170
170
@@ -198,7 +198,7 @@ static int pefile_strip_sig_wrapper(const void *pebuf,
198
198
return 0 ;
199
199
}
200
200
not_pkcs7 :
201
- pr_debug ("Signature data not PKCS#7\n" );
201
+ pr_warn ("Signature data not PKCS#7\n" );
202
202
return - ELIBBAD ;
203
203
}
204
204
@@ -341,8 +341,8 @@ static int pefile_digest_pe(const void *pebuf, unsigned int pelen,
341
341
digest_size = crypto_shash_digestsize (tfm );
342
342
343
343
if (digest_size != ctx -> digest_len ) {
344
- pr_debug ("Digest size mismatch (%zx != %x)\n" ,
345
- digest_size , ctx -> digest_len );
344
+ pr_warn ("Digest size mismatch (%zx != %x)\n" ,
345
+ digest_size , ctx -> digest_len );
346
346
ret = - EBADMSG ;
347
347
goto error_no_desc ;
348
348
}
@@ -373,7 +373,7 @@ static int pefile_digest_pe(const void *pebuf, unsigned int pelen,
373
373
* PKCS#7 certificate.
374
374
*/
375
375
if (memcmp (digest , ctx -> digest , ctx -> digest_len ) != 0 ) {
376
- pr_debug ("Digest mismatch\n" );
376
+ pr_warn ("Digest mismatch\n" );
377
377
ret = - EKEYREJECTED ;
378
378
} else {
379
379
pr_debug ("The digests match!\n" );
0 commit comments