From c59d342def7bfdbf23025cbccefe3aacdf315dba Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Horia=20Geant=C4=83?= <horia.geanta@nxp.com>
Date: Thu, 7 Feb 2019 20:07:04 +0200
Subject: [PATCH] crypto: caam - lower SM test verbosity
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

Let's use dev_dbg() instead of dev_info() to minimize verbosity in case
we're not interested in low-level details.

While here, replace dev_info() with dev_err() in places where errors are
reported.

Reported-by: Abel Vesa <abel.vesa@nxp.com>
Signed-off-by: Horia Geantă <horia.geanta@nxp.com>
---
 drivers/crypto/caam/sm_test.c | 46 +++++++++++++++++------------------
 1 file changed, 23 insertions(+), 23 deletions(-)

diff --git a/drivers/crypto/caam/sm_test.c b/drivers/crypto/caam/sm_test.c
index 9a366e8c02a33e..7eef4c6b9c2cb2 100644
--- a/drivers/crypto/caam/sm_test.c
+++ b/drivers/crypto/caam/sm_test.c
@@ -74,12 +74,12 @@ static void key_display(struct device *dev, u8 *label, u16 size, u8 *key)
 {
 	unsigned i;
 
-	dev_info(dev, label);
+	dev_dbg(dev, label);
 	for (i = 0; i < size; i += 8)
-		dev_info(dev,
-			 "[%04d] %02x %02x %02x %02x %02x %02x %02x %02x\n",
-			 i, key[i], key[i + 1], key[i + 2], key[i + 3],
-			 key[i + 4], key[i + 5], key[i + 6], key[i + 7]);
+		dev_dbg(dev,
+			"[%04d] %02x %02x %02x %02x %02x %02x %02x %02x\n",
+			i, key[i], key[i + 1], key[i + 2], key[i + 3],
+			key[i + 4], key[i + 5], key[i + 6], key[i + 7]);
 }
 
 int caam_sm_example_init(struct platform_device *pdev)
@@ -308,25 +308,25 @@ int caam_sm_example_init(struct platform_device *pdev)
 
 	if (sm_keystore_slot_export(ksdev, unit, keyslot8, BLACK_KEY,
 				    KEY_COVER_ECB, blob8, 8, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't encapsulate 64-bit key\n");
+		dev_err(ksdev, "blkkey_ex: can't encapsulate 64-bit key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_export(ksdev, unit, keyslot16, BLACK_KEY,
 				    KEY_COVER_ECB, blob16, 16, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't encapsulate 128-bit key\n");
+		dev_err(ksdev, "blkkey_ex: can't encapsulate 128-bit key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_export(ksdev, unit, keyslot24, BLACK_KEY,
 				    KEY_COVER_ECB, blob24, 24, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't encapsulate 192-bit key\n");
+		dev_err(ksdev, "blkkey_ex: can't encapsulate 192-bit key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_export(ksdev, unit, keyslot32, BLACK_KEY,
 				    KEY_COVER_ECB, blob32, 32, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't encapsulate 256-bit key\n");
+		dev_err(ksdev, "blkkey_ex: can't encapsulate 256-bit key\n");
 		goto dealloc;
 	}
 
@@ -345,25 +345,25 @@ int caam_sm_example_init(struct platform_device *pdev)
 	 */
 	if (sm_keystore_slot_import(ksdev, unit, keyslot8, BLACK_KEY,
 				    KEY_COVER_ECB, blob8, 8, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't decapsulate 64-bit blob\n");
+		dev_err(ksdev, "blkkey_ex: can't decapsulate 64-bit blob\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_import(ksdev, unit, keyslot16, BLACK_KEY,
 				    KEY_COVER_ECB, blob16, 16, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't decapsulate 128-bit blob\n");
+		dev_err(ksdev, "blkkey_ex: can't decapsulate 128-bit blob\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_import(ksdev, unit, keyslot24, BLACK_KEY,
 				    KEY_COVER_ECB, blob24, 24, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't decapsulate 196-bit blob\n");
+		dev_err(ksdev, "blkkey_ex: can't decapsulate 196-bit blob\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_import(ksdev, unit, keyslot32, BLACK_KEY,
 				    KEY_COVER_ECB, blob32, 32, skeymod)) {
-		dev_info(ksdev, "blkkey_ex: can't decapsulate 256-bit blob\n");
+		dev_err(ksdev, "blkkey_ex: can't decapsulate 256-bit blob\n");
 		goto dealloc;
 	}
 
@@ -374,29 +374,29 @@ int caam_sm_example_init(struct platform_device *pdev)
 	 */
 	if (sm_keystore_slot_read(ksdev, unit, keyslot8, AES_BLOCK_PAD(8),
 				  rstkey8)) {
-		dev_info(ksdev,
+		dev_err(ksdev,
 			"blkkey_ex: can't read restored 64-bit black key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_read(ksdev, unit, keyslot16, AES_BLOCK_PAD(16),
 				  rstkey16)) {
-		dev_info(ksdev,
-			 "blkkey_ex: can't read restored 128-bit black key\n");
+		dev_err(ksdev,
+			"blkkey_ex: can't read restored 128-bit black key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_read(ksdev, unit, keyslot24, AES_BLOCK_PAD(24),
 				  rstkey24)) {
-		dev_info(ksdev,
-			 "blkkey_ex: can't read restored 196-bit black key\n");
+		dev_err(ksdev,
+			"blkkey_ex: can't read restored 196-bit black key\n");
 		goto dealloc;
 	}
 
 	if (sm_keystore_slot_read(ksdev, unit, keyslot32, AES_BLOCK_PAD(32),
 				  rstkey32)) {
-		dev_info(ksdev,
-			 "blkkey_ex: can't read restored 256-bit black key\n");
+		dev_err(ksdev,
+			"blkkey_ex: can't read restored 256-bit black key\n");
 		goto dealloc;
 	}
 
@@ -423,18 +423,18 @@ int caam_sm_example_init(struct platform_device *pdev)
 	 */
 
 	if (memcmp(rstkey16, blkkey16, AES_BLOCK_PAD(16))) {
-		dev_info(ksdev, "blkkey_ex: 128-bit restored key mismatch\n");
+		dev_err(ksdev, "blkkey_ex: 128-bit restored key mismatch\n");
 		rtnval--;
 	}
 
 	/* Only first AES block will match, remainder subject to padding */
 	if (memcmp(rstkey24, blkkey24, 16)) {
-		dev_info(ksdev, "blkkey_ex: 192-bit restored key mismatch\n");
+		dev_err(ksdev, "blkkey_ex: 192-bit restored key mismatch\n");
 		rtnval--;
 	}
 
 	if (memcmp(rstkey32, blkkey32, AES_BLOCK_PAD(32))) {
-		dev_info(ksdev, "blkkey_ex: 256-bit restored key mismatch\n");
+		dev_err(ksdev, "blkkey_ex: 256-bit restored key mismatch\n");
 		rtnval--;
 	}
 
-- 
GitLab