@@ -2929,10 +2929,8 @@ static int _HandleMlDsaKeyGen(whServerContext* ctx, uint16_t magic,
29292929 ret = wh_Server_MlDsaKeyCacheImport (
29302930 ctx , key , key_id , flags , label_size , label );
29312931 }
2932- #ifdef WOLFHSM_CFG_DEBUG
29332932 WH_DEBUG_SERVER ("CacheImport: keyId:%u, ret:%d\n" ,
29342933 key_id , ret );
2935- #endif
29362934 }
29372935 }
29382936 }
@@ -3216,12 +3214,10 @@ int wh_Server_HandleCryptoRequest(whServerContext* ctx, uint16_t magic,
32163214 magic , (whMessageCrypto_GenericRequestHeader * )req_packet , & rqstHeader );
32173215
32183216
3219- #ifdef WOLFHSM_CFG_DEBUG
32203217 WH_DEBUG_SERVER_VERBOSE ("HandleCryptoRequest. Action:%u\n" , action );
32213218#ifdef WOLFHSM_CFG_HEXDUMP
32223219 wh_Utils_Hexdump ("[server] Crypto Request:\n" , (const uint8_t * )req_packet ,
32233220 req_size );
3224- #endif
32253221#endif
32263222 switch (action ) {
32273223 case WC_ALGO_TYPE_CIPHER :
@@ -3484,9 +3480,7 @@ int wh_Server_HandleCryptoRequest(whServerContext* ctx, uint16_t magic,
34843480 sizeof (whMessageCrypto_GenericResponseHeader ) + cryptoOutSize ;
34853481 }
34863482
3487- #ifdef WOLFHSM_CFG_DEBUG
34883483 WH_DEBUG_SERVER_VERBOSE ("End ret:%d\n" , ret );
3489- #endif
34903484
34913485 /* Since crypto error codes are propagated to the client in the response
34923486 * packet, return success to the caller unless a cancellation has occurred
0 commit comments