@@ -385,21 +385,21 @@ static int validate_keys_sizes(struct cc_aead_ctx *ctx)
385
385
return - EINVAL ;
386
386
break ;
387
387
default :
388
- dev_err (dev , "Invalid auth_mode=%d\n" , ctx -> auth_mode );
388
+ dev_dbg (dev , "Invalid auth_mode=%d\n" , ctx -> auth_mode );
389
389
return - EINVAL ;
390
390
}
391
391
/* Check cipher key size */
392
392
if (ctx -> flow_mode == S_DIN_to_DES ) {
393
393
if (ctx -> enc_keylen != DES3_EDE_KEY_SIZE ) {
394
- dev_err (dev , "Invalid cipher(3DES) key size: %u\n" ,
394
+ dev_dbg (dev , "Invalid cipher(3DES) key size: %u\n" ,
395
395
ctx -> enc_keylen );
396
396
return - EINVAL ;
397
397
}
398
398
} else { /* Default assumed to be AES ciphers */
399
399
if (ctx -> enc_keylen != AES_KEYSIZE_128 &&
400
400
ctx -> enc_keylen != AES_KEYSIZE_192 &&
401
401
ctx -> enc_keylen != AES_KEYSIZE_256 ) {
402
- dev_err (dev , "Invalid cipher(AES) key size: %u\n" ,
402
+ dev_dbg (dev , "Invalid cipher(AES) key size: %u\n" ,
403
403
ctx -> enc_keylen );
404
404
return - EINVAL ;
405
405
}
@@ -1559,7 +1559,7 @@ static int config_ccm_adata(struct aead_request *req)
1559
1559
/* taken from crypto/ccm.c */
1560
1560
/* 2 <= L <= 8, so 1 <= L' <= 7. */
1561
1561
if (l < 2 || l > 8 ) {
1562
- dev_err (dev , "illegal iv value %X\n" , req -> iv [0 ]);
1562
+ dev_dbg (dev , "illegal iv value %X\n" , req -> iv [0 ]);
1563
1563
return - EINVAL ;
1564
1564
}
1565
1565
memcpy (b0 , req -> iv , AES_BLOCK_SIZE );
@@ -2056,7 +2056,7 @@ static int cc_rfc4309_ccm_encrypt(struct aead_request *req)
2056
2056
int rc = - EINVAL ;
2057
2057
2058
2058
if (!valid_assoclen (req )) {
2059
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2059
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2060
2060
goto out ;
2061
2061
}
2062
2062
@@ -2106,7 +2106,7 @@ static int cc_rfc4309_ccm_decrypt(struct aead_request *req)
2106
2106
int rc = - EINVAL ;
2107
2107
2108
2108
if (!valid_assoclen (req )) {
2109
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2109
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2110
2110
goto out ;
2111
2111
}
2112
2112
@@ -2225,7 +2225,7 @@ static int cc_rfc4106_gcm_encrypt(struct aead_request *req)
2225
2225
int rc = - EINVAL ;
2226
2226
2227
2227
if (!valid_assoclen (req )) {
2228
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2228
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2229
2229
goto out ;
2230
2230
}
2231
2231
@@ -2256,7 +2256,7 @@ static int cc_rfc4543_gcm_encrypt(struct aead_request *req)
2256
2256
int rc = - EINVAL ;
2257
2257
2258
2258
if (!valid_assoclen (req )) {
2259
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2259
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2260
2260
goto out ;
2261
2261
}
2262
2262
@@ -2290,7 +2290,7 @@ static int cc_rfc4106_gcm_decrypt(struct aead_request *req)
2290
2290
int rc = - EINVAL ;
2291
2291
2292
2292
if (!valid_assoclen (req )) {
2293
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2293
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2294
2294
goto out ;
2295
2295
}
2296
2296
@@ -2321,7 +2321,7 @@ static int cc_rfc4543_gcm_decrypt(struct aead_request *req)
2321
2321
int rc = - EINVAL ;
2322
2322
2323
2323
if (!valid_assoclen (req )) {
2324
- dev_err (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2324
+ dev_dbg (dev , "invalid Assoclen:%u\n" , req -> assoclen );
2325
2325
goto out ;
2326
2326
}
2327
2327
0 commit comments