/system/keymaster/km_openssl/ |
D | ecies_kem.cpp | 28 LOG_E("%s", "EciesKem: no curve specified"); in EciesKem() 40 LOG_E("EciesKem: curve %d is unsupported", curve_); in EciesKem() 47 LOG_E("EciesKem: No KDF specified", 0); in EciesKem() 56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem() 66 LOG_E("%s", "EciesKem: no key length specified"); in EciesKem() 93 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Encrypt() 97 LOG_E("EciesKem: Can't obtain public value", 0); in Encrypt() 115 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt() 121 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt() 146 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Decrypt() [all …]
|
D | ecdh_operation.cpp | 54 LOG_E("Error decoding key", 0); in Finish() 61 LOG_E("Memory allocation failed", 0); in Finish() 65 LOG_E("Context initialization failed", 0); in Finish() 69 LOG_E("Error setting peer key", 0); in Finish() 74 LOG_E("Error deriving key", 0); in Finish() 78 LOG_E("Error reserving data in output buffer", 0); in Finish() 82 LOG_E("Error deriving key", 0); in Finish() 97 LOG_E("Error decoding key", 0); in Finish() 104 LOG_E("Unexpected peer public key type %d", pkey_type); in Finish() 111 LOG_E("Error extracting key", 0); in Finish() [all …]
|
D | rsa_key_factory.cpp | 64 LOG_E("No public exponent specified for RSA key generation", 0); in GenerateKey() 68 LOG_E("Invalid public exponent specified for RSA key generation", 0); in GenerateKey() 74 LOG_E("No key size specified for RSA key generation", 0); in GenerateKey() 78 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); in GenerateKey() 192 LOG_E("Imported public exponent (%u) does not match specified public exponent (%u)", in UpdateImportKeyDescription() 201 LOG_E("Imported key size (%u bits) does not match specified key size (%u bits)", in UpdateImportKeyDescription()
|
D | hmac_operation.cpp | 41 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in CreateOperation() 49 LOG_E("MAC length may not be specified for verify", 0); in CreateOperation() 54 LOG_E("MAC length must be a multiple of 8", mac_length_bits); in CreateOperation() 67 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1", in CreateOperation()
|
D | nist_curve_key_exchange.cpp | 54 LOG_E("Not a NIST curve: %d", curve); in GenerateKeyExchange() 107 LOG_E("Can't convert peer public value to point: %d", TranslateLastOpenSslError()); in CalculateSharedKey() 115 LOG_E("Can't compute ECDH shared key: %d", TranslateLastOpenSslError()); in CalculateSharedKey()
|
D | block_cipher_operation.cpp | 62 LOG_E("AES GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in GetAndValidateGcmTagLength() 85 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation() 89 LOG_E("Block mode %d not supported", block_mode); in CreateOperation() 93 LOG_E("Block mode %d was specified, but not authorized by key", block_mode); in CreateOperation() 111 LOG_E("Mode does not support padding", 0); in CreateOperation() 206 LOG_E("Error encrypting final block: %s", buf); in Finish() 265 LOG_E("No IV provided", 0); in GetIv() 270 LOG_E("Expected %d-byte IV for operation, but got %d bytes", block_size_bytes(), in GetIv() 276 LOG_E("Expected %d-byte nonce for GCM operation, but got %d bytes", GCM_NONCE_SIZE, in GetIv()
|
D | hmac_key.cpp | 52 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey() 71 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST)); in validate_algorithm_specific_new_key_params()
|
D | openssl_utils.cpp | 93 LOG_E("EVP key algorithm was unknown (type %d), not the expected %d", in convert_pkcs8_blob_to_evp() 99 LOG_E("EVP key algorithm was %d (from type %d), not the expected %d", got_algorithm, in convert_pkcs8_blob_to_evp() 197 LOG_E("Failed to get EC group order", 0); in ec_group_size_bits()
|
D | symmetric_key.cpp | 58 LOG_E("Error generating %d bit symmetric key", key_size_bits); in GenerateKey() 92 LOG_E("Expected %d-bit key data but got %d-bit key", key_bits, in ImportKey()
|
D | openssl_err.cpp | 85 LOG_E("ASN.1 parsing error %d", reason); in TranslateLastOpenSslError() 90 LOG_E("Openssl error %d, %d", ERR_GET_LIB(error), reason); in TranslateLastOpenSslError()
|
D | rsa_operation.cpp | 144 LOG_E("%d MGF digests specified in begin params and SHA1 not authorized", in GetAndValidateMgfDigest() 150 LOG_E("MGF Digest %d not supported", *digest); in GetAndValidateMgfDigest() 153 LOG_E("MGF Digest %d was specified, but not authorized by key", *digest); in GetAndValidateMgfDigest() 201 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key", in StoreData() 265 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS " in GetOpensslPadding() 358 LOG_E("Input too long: cannot sign %u-byte message with PKCS1 padding with %u-bit key", in SignUndigested() 443 LOG_E("Input too long: cannot verify %u-byte message with PKCS1 padding && %u-bit key", in VerifyUndigested()
|
D | aes_key.cpp | 58 LOG_E("AES-GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey()
|
/system/keymaster/android_keymaster/ |
D | remote_provisioning_utils.cpp | 72 LOG_E("Error parsing EEK chain: %s", errMsg.c_str()); in validateAndExtractEekPubAndId() 82 LOG_E("Failed to validate EEK chain: %s", cosePubKey.moveMessage().c_str()); in validateAndExtractEekPubAndId() 91 LOG_E("%s", parsedPubKey.moveMessage().c_str()); in validateAndExtractEekPubAndId() 97 LOG_E("Key is missing required label 'CURVE'", 0); in validateAndExtractEekPubAndId() 103 LOG_E("Key is missing required label 'PUBKEY_X'", 0); in validateAndExtractEekPubAndId() 111 LOG_E("Unrecognized root of EEK chain", 0); in validateAndExtractEekPubAndId() 119 LOG_E("Failed to get EEK: %s", eek.moveMessage().c_str()); in validateAndExtractEekPubAndId() 136 LOG_E("Invalid COSE_Mac0 structure", 0); in validateAndExtractPubkeys() 145 LOG_E("Invalid COSE_Mac0 contents", 0); in validateAndExtractPubkeys() 151 LOG_E("Invalid Mac0 protected: %s", errMsg.c_str()); in validateAndExtractPubkeys() [all …]
|
D | operation.cpp | 91 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding() 94 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding() 102 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding() 128 LOG_E("%d digests specified in begin params and NONE not authorized", in GetAndValidateDigest() 133 LOG_E("Digest %d not supported", *digest); in GetAndValidateDigest() 141 LOG_E("Digest %d was specified, but not authorized by key", *digest); in GetAndValidateDigest()
|
D | keymaster_enforcement.cpp | 399 LOG_E("Auth required but no matching auth token found", 0); in AuthorizeBegin() 414 LOG_E("Rate-limited keys table full. Entries will time out.", 0); in AuthorizeBegin() 426 LOG_E("Usage count-limited keys table full, until reboot.", 0); in AuthorizeBegin() 455 LOG_E("Authentication required, but auth token not provided", 0); in GetAndValidateAuthToken() 460 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken() 467 LOG_E("Bug: Auth token is the version %d (or is not an auth token). Expected %d", in GetAndValidateAuthToken() 473 LOG_E("Auth token signature invalid", 0); in GetAndValidateAuthToken() 496 LOG_E("Auth token has the challenge %llu, need %llu", auth_token->challenge, op_handle); in AuthTokenMatches() 507 LOG_E("Auth required but no auth type found", 0); in AuthTokenMatches() 516 LOG_E("Key requires match of auth type mask 0%uo, but token contained 0%uo", in AuthTokenMatches() [all …]
|
D | android_keymaster.cpp | 71 LOG_E("Key blob invalid! key patchlevel %lu is > current patchlevel %lu", in CheckPatchLevel() 439 LOG_E("Couldn't get a pointer to the remote provisioning context, returned null.", 0); in GenerateCsr() 455 LOG_E("Failed to validate and extract the public keys for the CSR", 0); in GenerateCsr() 462 LOG_E("Failed to generate a random mac key.", 0); in GenerateCsr() 474 LOG_E("Failed to generate COSE_Mac0 over the public keys to sign.", 0); in GenerateCsr() 494 LOG_E("Failed to construct ProtectedData: %s", protectedDataPayload.moveMessage().c_str()); in GenerateCsr() 505 LOG_E("Failed to validate and extract the endpoint encryption key.", 0); in GenerateCsr() 513 LOG_E("Failed to derive the session key.", 0); in GenerateCsr() 520 LOG_E("Failed to generate a random nonce.", 0); in GenerateCsr() 531 LOG_E("Failed to construct a COSE_Encrypt ProtectedData structure", 0); in GenerateCsr() [all …]
|
D | authorization_set.cpp | 421 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeIndirectData() 434 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 455 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 466 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 475 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 491 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in Deserialize()
|
D | pure_soft_secure_key_storage.cpp | 95 LOG_E("Pure software secure key storage slot full.", 0); in WriteKey()
|
/system/keymaster/key_blob_utils/ |
D | ocb_utils.cpp | 136 LOG_E("Error %d while encrypting key", ae_err); in OcbEncryptKey() 171 LOG_E("Failed to validate authentication tag during key decryption", 0); in OcbDecryptKey() 174 LOG_E("Failed to decrypt key, error: %d", ae_err); in OcbDecryptKey()
|
D | software_keyblobs.cpp | 270 LOG_E("Root of trust and origin tags may not be specified", 0); in SetKeyBlobAuthorizations() 286 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations() 295 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations() 311 LOG_E("Tag %d not allowed in key generation/import", entry.tag); in SetKeyBlobAuthorizations()
|
D | auth_encrypted_key_blob.cpp | 298 LOG_E("Invalid key blob format %d", retval.encrypted_key.format); in DeserializeAuthEncryptedBlob() 333 LOG_E("Invalid key blob format %d", format); in EncryptKey() 357 LOG_E("Invalid key blob format %d", key.encrypted_key.format); in DecryptKey()
|
/system/keymaster/legacy_support/ |
D | ecdsa_keymaster1_operation.cpp | 62 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish() 110 LOG_E( in CreateOperation()
|
D | rsa_keymaster1_operation.cpp | 83 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish() 139 LOG_E("Bug: Pubkey operation requested. Those should be handled by normal RSA operations.", in CreateOperation()
|
/system/keymaster/include/keymaster/ |
D | logger.h | 65 #define LOG_E(fmt, ...) Logger::Error(__KM_FILE_LINE fmt, __VA_ARGS__) macro
|
D | serializable.h | 131 LOG_E("Skip collection serialization due to integer overflow", 0); in append_collection_to_buf() 232 LOG_E("Skip collection deserialization due size mismatch", 0); in copy_collection_from_buf()
|