Revert "VBoot Reference: Refactor Part 2 - Crypto Libraries"

This reverts commit e018a80a37aaa45681f45f5852f04d20aedd8b2d.

Review URL: http://codereview.chromium.org/1593002
diff --git a/crypto/rsa.c b/crypto/rsa.c
index bfc6446..c84ae4e 100644
--- a/crypto/rsa.c
+++ b/crypto/rsa.c
@@ -8,7 +8,10 @@
  * support multiple RSA key lengths and hash digest algorithms.
  */
 
-#include "cryptolib.h"
+#include <stdio.h>
+
+#include "padding.h"
+#include "rsa.h"
 #include "utility.h"
 
 /* a[] -= mod */
@@ -135,17 +138,17 @@
   int success = 1;
 
   if (sig_len != (key->len * sizeof(uint32_t))) {
-    debug("Signature is of incorrect length!\n");
+    fprintf(stderr, "Signature is of incorrect length!\n");
     return 0;
   }
 
   if (sig_type >= kNumAlgorithms) {
-    debug("Invalid signature type!\n");
+    fprintf(stderr, "Invalid signature type!\n");
     return 0;
   }
 
   if (key->len != siglen_map[sig_type] / sizeof(uint32_t)) {
-    debug("Wrong key passed in!\n");
+    fprintf(stderr, "Wrong key passed in!\n");
     return 0;
   }
 
@@ -162,7 +165,7 @@
     if (buf[i] != padding[i]) {
 #ifndef NDEBUG
 /* TODO(gauravsh): Replace with a macro call for logging. */
-      debug("Padding: Expecting = %02x Got = %02x\n", padding[i],
+      fprintf(stderr, "Padding: Expecting = %02x Got = %02x\n", padding[i],
               buf[i]);
 #endif
       success = 0;
@@ -174,7 +177,7 @@
     if (buf[i] != *hash++) {
 #ifndef NDEBUG
 /* TODO(gauravsh): Replace with a macro call for logging. */
-      debug("Digest: Expecting = %02x Got = %02x\n", padding[i],
+      fprintf(stderr, "Digest: Expecting = %02x Got = %02x\n", padding[i],
               buf[i]);
 #endif
       success = 0;