summaryrefslogtreecommitdiff
path: root/sbin/isakmpd
diff options
context:
space:
mode:
authorChad Loder <cloder@cvs.openbsd.org>2007-05-07 18:25:31 +0000
committerChad Loder <cloder@cvs.openbsd.org>2007-05-07 18:25:31 +0000
commite97c51fba46eff780f0f01fa4f56f9ad4f3acb28 (patch)
treefa30ea6348f9e0c376082323a24068f4b6f153e4 /sbin/isakmpd
parentacceddf5dd8bab21684dfcdd31519f1432ad546d (diff)
Bump crypto buffer logging (before crypto/after crypto) to level 70 from
level 30. This was a huge cause of log spam at level 30 and below, and is really not that useful.
Diffstat (limited to 'sbin/isakmpd')
-rw-r--r--sbin/isakmpd/crypto.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/sbin/isakmpd/crypto.c b/sbin/isakmpd/crypto.c
index 5a9361d17e7..9843c682eac 100644
--- a/sbin/isakmpd/crypto.c
+++ b/sbin/isakmpd/crypto.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: crypto.c,v 1.28 2005/04/08 22:32:09 cloder Exp $ */
+/* $OpenBSD: crypto.c,v 1.29 2007/05/07 18:25:30 cloder Exp $ */
/* $EOM: crypto.c,v 1.32 2000/03/07 20:08:51 niklas Exp $ */
/*
@@ -338,18 +338,18 @@ crypto_init_iv(struct keystate *ks, u_int8_t *buf, size_t len)
void
crypto_encrypt(struct keystate *ks, u_int8_t *buf, u_int16_t len)
{
- LOG_DBG_BUF((LOG_CRYPTO, 30, "crypto_encrypt: before encryption", buf,
+ LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_encrypt: before encryption", buf,
len));
ks->xf->encrypt(ks, buf, len);
memcpy(ks->liv, buf + len - ks->xf->blocksize, ks->xf->blocksize);
- LOG_DBG_BUF((LOG_CRYPTO, 30, "crypto_encrypt: after encryption", buf,
+ LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_encrypt: after encryption", buf,
len));
}
void
crypto_decrypt(struct keystate *ks, u_int8_t *buf, u_int16_t len)
{
- LOG_DBG_BUF((LOG_CRYPTO, 30, "crypto_decrypt: before decryption", buf,
+ LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_decrypt: before decryption", buf,
len));
/*
* XXX There is controversy about the correctness of updating the IV
@@ -357,7 +357,7 @@ crypto_decrypt(struct keystate *ks, u_int8_t *buf, u_int16_t len)
*/
memcpy(ks->liv, buf + len - ks->xf->blocksize, ks->xf->blocksize);
ks->xf->decrypt(ks, buf, len);
- LOG_DBG_BUF((LOG_CRYPTO, 30, "crypto_decrypt: after decryption", buf,
+ LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_decrypt: after decryption", buf,
len));
}