return -EINVAL;
                break;
        default:
-               dev_err(dev, "Invalid auth_mode=%d\n", ctx->auth_mode);
+               dev_dbg(dev, "Invalid auth_mode=%d\n", ctx->auth_mode);
                return -EINVAL;
        }
        /* Check cipher key size */
        if (ctx->flow_mode == S_DIN_to_DES) {
                if (ctx->enc_keylen != DES3_EDE_KEY_SIZE) {
-                       dev_err(dev, "Invalid cipher(3DES) key size: %u\n",
+                       dev_dbg(dev, "Invalid cipher(3DES) key size: %u\n",
                                ctx->enc_keylen);
                        return -EINVAL;
                }
                if (ctx->enc_keylen != AES_KEYSIZE_128 &&
                    ctx->enc_keylen != AES_KEYSIZE_192 &&
                    ctx->enc_keylen != AES_KEYSIZE_256) {
-                       dev_err(dev, "Invalid cipher(AES) key size: %u\n",
+                       dev_dbg(dev, "Invalid cipher(AES) key size: %u\n",
                                ctx->enc_keylen);
                        return -EINVAL;
                }
        /* taken from crypto/ccm.c */
        /* 2 <= L <= 8, so 1 <= L' <= 7. */
        if (l < 2 || l > 8) {
-               dev_err(dev, "illegal iv value %X\n", req->iv[0]);
+               dev_dbg(dev, "illegal iv value %X\n", req->iv[0]);
                return -EINVAL;
        }
        memcpy(b0, req->iv, AES_BLOCK_SIZE);
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
        int rc = -EINVAL;
 
        if (!valid_assoclen(req)) {
-               dev_err(dev, "invalid Assoclen:%u\n", req->assoclen);
+               dev_dbg(dev, "invalid Assoclen:%u\n", req->assoclen);
                goto out;
        }
 
 
        keylen = hki.keylen;
 
        if (validate_keys_sizes(ctx_p, keylen)) {
-               dev_err(dev, "Unsupported key size %d.\n", keylen);
+               dev_dbg(dev, "Unsupported key size %d.\n", keylen);
                return -EINVAL;
        }
 
        /* STAT_PHASE_0: Init and sanity checks */
 
        if (validate_keys_sizes(ctx_p, keylen)) {
-               dev_err(dev, "Unsupported key size %d.\n", keylen);
+               dev_dbg(dev, "Unsupported key size %d.\n", keylen);
                return -EINVAL;
        }
 
 
        /* TODO: check data length according to mode */
        if (validate_data_size(ctx_p, nbytes)) {
-               dev_err(dev, "Unsupported data size %d.\n", nbytes);
+               dev_dbg(dev, "Unsupported data size %d.\n", nbytes);
                rc = -EINVAL;
                goto exit_process;
        }