| Index: net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| diff --git a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| index e497ef43e6adb459bd2e334652846c1589ddaf92..e0b423780211bf804290b8512184a0093acad3bd 100644
|
| --- a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| +++ b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc
|
| @@ -142,7 +142,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| DCHECK_EQ(gcm_params->ulTagBits,
|
| static_cast<CK_ULONG>(Aes128Gcm12Decrypter::kAuthTagSize * 8));
|
| if (gcm_params->ulIvLen != 12u) {
|
| - DLOG(INFO) << "ulIvLen is not equal to 12";
|
| + DVLOG(1) << "ulIvLen is not equal to 12";
|
| PORT_SetError(SEC_ERROR_INPUT_LEN);
|
| return SECFailure;
|
| }
|
| @@ -154,20 +154,20 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| crypto::ScopedPK11Context ctx(PK11_CreateContextBySymKey(
|
| CKM_AES_ECB, CKA_ENCRYPT, key, &my_param));
|
| if (!ctx) {
|
| - DLOG(INFO) << "PK11_CreateContextBySymKey failed";
|
| + DVLOG(1) << "PK11_CreateContextBySymKey failed";
|
| return SECFailure;
|
| }
|
| int output_len;
|
| if (PK11_CipherOp(ctx.get(), ghash_key, &output_len, sizeof(ghash_key),
|
| ghash_key, sizeof(ghash_key)) != SECSuccess) {
|
| - DLOG(INFO) << "PK11_CipherOp failed";
|
| + DVLOG(1) << "PK11_CipherOp failed";
|
| return SECFailure;
|
| }
|
|
|
| PK11_Finalize(ctx.get());
|
|
|
| if (output_len != sizeof(ghash_key)) {
|
| - DLOG(INFO) << "Wrong output length";
|
| + DVLOG(1) << "Wrong output length";
|
| PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
| return SECFailure;
|
| }
|
| @@ -188,7 +188,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| ctx.reset(PK11_CreateContextBySymKey(CKM_AES_CTR, CKA_ENCRYPT, key,
|
| &my_param));
|
| if (!ctx) {
|
| - DLOG(INFO) << "PK11_CreateContextBySymKey failed";
|
| + DVLOG(1) << "PK11_CreateContextBySymKey failed";
|
| return SECFailure;
|
| }
|
|
|
| @@ -196,11 +196,11 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| unsigned char tag_mask[16] = {0};
|
| if (PK11_CipherOp(ctx.get(), tag_mask, &output_len, sizeof(tag_mask),
|
| tag_mask, sizeof(tag_mask)) != SECSuccess) {
|
| - DLOG(INFO) << "PK11_CipherOp failed";
|
| + DVLOG(1) << "PK11_CipherOp failed";
|
| return SECFailure;
|
| }
|
| if (output_len != sizeof(tag_mask)) {
|
| - DLOG(INFO) << "Wrong output length";
|
| + DVLOG(1) << "Wrong output length";
|
| PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
| return SECFailure;
|
| }
|
| @@ -216,7 +216,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
| if (PK11_CipherOp(ctx.get(), out, &output_len, max_len,
|
| const_cast<unsigned char*>(enc),
|
| enc_len - Aes128Gcm12Decrypter::kAuthTagSize) != SECSuccess) {
|
| - DLOG(INFO) << "PK11_CipherOp failed";
|
| + DVLOG(1) << "PK11_CipherOp failed";
|
| return SECFailure;
|
| }
|
|
|
| @@ -224,7 +224,7 @@ SECStatus My_Decrypt(PK11SymKey* key,
|
|
|
| if (static_cast<unsigned int>(output_len) !=
|
| enc_len - Aes128Gcm12Decrypter::kAuthTagSize) {
|
| - DLOG(INFO) << "Wrong output length";
|
| + DVLOG(1) << "Wrong output length";
|
| PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
|
| return SECFailure;
|
| }
|
| @@ -314,7 +314,7 @@ bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce,
|
| PK11_FreeSlot(slot);
|
| slot = NULL;
|
| if (!aes_key) {
|
| - DLOG(INFO) << "PK11_ImportSymKey failed";
|
| + DVLOG(1) << "PK11_ImportSymKey failed";
|
| return false;
|
| }
|
|
|
| @@ -341,7 +341,7 @@ bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce,
|
| }
|
|
|
| if (output_len != plaintext_size) {
|
| - DLOG(INFO) << "Wrong output length";
|
| + DVLOG(1) << "Wrong output length";
|
| return false;
|
| }
|
| *output_length = output_len;
|
|
|