• Home
  • Raw
  • Download

Lines Matching refs:LOG

129     LOG(ERROR) << "not big enough to contain footer";  in verify_file()
135 LOG(ERROR) << "Failed to read footer"; in verify_file()
140 LOG(ERROR) << "footer is wrong"; in verify_file()
146 LOG(INFO) << "comment is " << comment_size << " bytes; signature is " << signature_start in verify_file()
150 LOG(ERROR) << "signature start: " << signature_start in verify_file()
156 LOG(ERROR) << "Signature start is in the footer"; in verify_file()
166 LOG(ERROR) << "not big enough to contain EOCD"; in verify_file()
177 LOG(ERROR) << "Failed to read EOCD of " << eocd_size << " bytes"; in verify_file()
183 LOG(ERROR) << "signature length doesn't match EOCD marker"; in verify_file()
192 LOG(ERROR) << "EOCD marker occurs after start of EOCD"; in verify_file()
249 LOG(INFO) << "signature (offset: " << std::hex << (length - signature_start) in verify_file()
254 LOG(ERROR) << "Could not find signature DER block"; in verify_file()
282 LOG(INFO) << "failed to verify against RSA key " << i; in verify_file()
286 LOG(INFO) << "whole-file signature verified against RSA key " << i; in verify_file()
290 LOG(INFO) << "failed to verify against EC key " << i; in verify_file()
294 LOG(INFO) << "whole-file signature verified against EC key " << i; in verify_file()
297 LOG(INFO) << "Unknown key type " << key.key_type; in verify_file()
303 LOG(INFO) << "SHA-1 digest: " << print_hex(sha1, SHA_DIGEST_LENGTH); in verify_file()
306 LOG(INFO) << "SHA-256 digest: " << print_hex(sha256, SHA256_DIGEST_LENGTH); in verify_file()
308 LOG(ERROR) << "failed to verify whole-file signature"; in verify_file()
316 LOG(ERROR) << "Failed to iterate over entries in the certificate zipfile: " in IterateZipEntriesAndSearchForKeys()
327 LOG(ERROR) << "Failed to extract " << name in IterateZipEntriesAndSearchForKeys()
336 LOG(ERROR) << "Failed to extract " << name; in IterateZipEntriesAndSearchForKeys()
343 LOG(ERROR) << "Failed to load keys from " << name; in IterateZipEntriesAndSearchForKeys()
351 LOG(ERROR) << "Error while iterating over zip entries: " << ErrorCodeString(iter_status); in IterateZipEntriesAndSearchForKeys()
361 LOG(ERROR) << "Failed to open " << zip_name << ": " << ErrorCodeString(open_status); in LoadKeysFromZipfile()
380 LOG(ERROR) << "Modulus should be 2048 or 4096 bits long, actual: " << modulus_bits; in CheckRSAKey()
386 LOG(ERROR) << "Public exponent should be 3 or 65537, actual: " << exponent; in CheckRSAKey()
400 LOG(ERROR) << "Failed to get the ec_group from the ec_key"; in CheckECKey()
405 LOG(ERROR) << "Field size of the ec key should be 256 bits long, actual: " << degree; in CheckECKey()
419 LOG(ERROR) << "Failed to read x509 certificate"; in LoadCertificateFromBuffer()
438 LOG(ERROR) << "Unrecognized signature nid " << OBJ_nid2ln(nid); in LoadCertificateFromBuffer()
445 LOG(ERROR) << "Failed to extract the public key from x509 certificate"; in LoadCertificateFromBuffer()
455 LOG(ERROR) << "Failed to validate the rsa key info from public key"; in LoadCertificateFromBuffer()
463 LOG(ERROR) << "Failed to validate the ec key info from the public key"; in LoadCertificateFromBuffer()
467 LOG(ERROR) << "Unrecognized public key type " << OBJ_nid2ln(key_type); in LoadCertificateFromBuffer()