Index: net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
diff --git a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
index e497ef43e6adb459bd2e334652846c1589ddaf92..e0b423780211bf804290b8512184a0093acad3bd 100644 |
--- a/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
+++ b/net/quic/crypto/aes_128_gcm_12_decrypter_nss.cc |
@@ -142,7 +142,7 @@ SECStatus My_Decrypt(PK11SymKey* key, |
DCHECK_EQ(gcm_params->ulTagBits, |
static_cast<CK_ULONG>(Aes128Gcm12Decrypter::kAuthTagSize * 8)); |
if (gcm_params->ulIvLen != 12u) { |
- DLOG(INFO) << "ulIvLen is not equal to 12"; |
+ DVLOG(1) << "ulIvLen is not equal to 12"; |
PORT_SetError(SEC_ERROR_INPUT_LEN); |
return SECFailure; |
} |
@@ -154,20 +154,20 @@ SECStatus My_Decrypt(PK11SymKey* key, |
crypto::ScopedPK11Context ctx(PK11_CreateContextBySymKey( |
CKM_AES_ECB, CKA_ENCRYPT, key, &my_param)); |
if (!ctx) { |
- DLOG(INFO) << "PK11_CreateContextBySymKey failed"; |
+ DVLOG(1) << "PK11_CreateContextBySymKey failed"; |
return SECFailure; |
} |
int output_len; |
if (PK11_CipherOp(ctx.get(), ghash_key, &output_len, sizeof(ghash_key), |
ghash_key, sizeof(ghash_key)) != SECSuccess) { |
- DLOG(INFO) << "PK11_CipherOp failed"; |
+ DVLOG(1) << "PK11_CipherOp failed"; |
return SECFailure; |
} |
PK11_Finalize(ctx.get()); |
if (output_len != sizeof(ghash_key)) { |
- DLOG(INFO) << "Wrong output length"; |
+ DVLOG(1) << "Wrong output length"; |
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
return SECFailure; |
} |
@@ -188,7 +188,7 @@ SECStatus My_Decrypt(PK11SymKey* key, |
ctx.reset(PK11_CreateContextBySymKey(CKM_AES_CTR, CKA_ENCRYPT, key, |
&my_param)); |
if (!ctx) { |
- DLOG(INFO) << "PK11_CreateContextBySymKey failed"; |
+ DVLOG(1) << "PK11_CreateContextBySymKey failed"; |
return SECFailure; |
} |
@@ -196,11 +196,11 @@ SECStatus My_Decrypt(PK11SymKey* key, |
unsigned char tag_mask[16] = {0}; |
if (PK11_CipherOp(ctx.get(), tag_mask, &output_len, sizeof(tag_mask), |
tag_mask, sizeof(tag_mask)) != SECSuccess) { |
- DLOG(INFO) << "PK11_CipherOp failed"; |
+ DVLOG(1) << "PK11_CipherOp failed"; |
return SECFailure; |
} |
if (output_len != sizeof(tag_mask)) { |
- DLOG(INFO) << "Wrong output length"; |
+ DVLOG(1) << "Wrong output length"; |
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
return SECFailure; |
} |
@@ -216,7 +216,7 @@ SECStatus My_Decrypt(PK11SymKey* key, |
if (PK11_CipherOp(ctx.get(), out, &output_len, max_len, |
const_cast<unsigned char*>(enc), |
enc_len - Aes128Gcm12Decrypter::kAuthTagSize) != SECSuccess) { |
- DLOG(INFO) << "PK11_CipherOp failed"; |
+ DVLOG(1) << "PK11_CipherOp failed"; |
return SECFailure; |
} |
@@ -224,7 +224,7 @@ SECStatus My_Decrypt(PK11SymKey* key, |
if (static_cast<unsigned int>(output_len) != |
enc_len - Aes128Gcm12Decrypter::kAuthTagSize) { |
- DLOG(INFO) << "Wrong output length"; |
+ DVLOG(1) << "Wrong output length"; |
PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); |
return SECFailure; |
} |
@@ -314,7 +314,7 @@ bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce, |
PK11_FreeSlot(slot); |
slot = NULL; |
if (!aes_key) { |
- DLOG(INFO) << "PK11_ImportSymKey failed"; |
+ DVLOG(1) << "PK11_ImportSymKey failed"; |
return false; |
} |
@@ -341,7 +341,7 @@ bool Aes128Gcm12Decrypter::Decrypt(StringPiece nonce, |
} |
if (output_len != plaintext_size) { |
- DLOG(INFO) << "Wrong output length"; |
+ DVLOG(1) << "Wrong output length"; |
return false; |
} |
*output_length = output_len; |