Home
last modified time | relevance | path

Searched refs:LOG_E (Results 1 – 25 of 31) sorted by relevance

12

/system/keymaster/km_openssl/
Decies_kem.cpp28 LOG_E("%s", "EciesKem: no curve specified"); in EciesKem()
40 LOG_E("EciesKem: curve %d is unsupported", curve_); in EciesKem()
47 LOG_E("EciesKem: No KDF specified", 0); in EciesKem()
56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem()
66 LOG_E("%s", "EciesKem: no key length specified"); in EciesKem()
93 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Encrypt()
97 LOG_E("EciesKem: Can't obtain public value", 0); in Encrypt()
115 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt()
121 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt()
146 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Decrypt()
[all …]
Decdh_operation.cpp54 LOG_E("Error decoding key", 0); in Finish()
61 LOG_E("Memory allocation failed", 0); in Finish()
65 LOG_E("Context initialization failed", 0); in Finish()
69 LOG_E("Error setting peer key", 0); in Finish()
74 LOG_E("Error deriving key", 0); in Finish()
78 LOG_E("Error reserving data in output buffer", 0); in Finish()
82 LOG_E("Error deriving key", 0); in Finish()
97 LOG_E("Error decoding key", 0); in Finish()
104 LOG_E("Unexpected peer public key type %d", pkey_type); in Finish()
111 LOG_E("Error extracting key", 0); in Finish()
[all …]
Drsa_key_factory.cpp64 LOG_E("No public exponent specified for RSA key generation", 0); in GenerateKey()
68 LOG_E("Invalid public exponent specified for RSA key generation", 0); in GenerateKey()
74 LOG_E("No key size specified for RSA key generation", 0); in GenerateKey()
78 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); in GenerateKey()
192 LOG_E("Imported public exponent (%u) does not match specified public exponent (%u)", in UpdateImportKeyDescription()
201 LOG_E("Imported key size (%u bits) does not match specified key size (%u bits)", in UpdateImportKeyDescription()
Dhmac_operation.cpp41 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in CreateOperation()
49 LOG_E("MAC length may not be specified for verify", 0); in CreateOperation()
54 LOG_E("MAC length must be a multiple of 8", mac_length_bits); in CreateOperation()
67 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1", in CreateOperation()
Dnist_curve_key_exchange.cpp54 LOG_E("Not a NIST curve: %d", curve); in GenerateKeyExchange()
107 LOG_E("Can't convert peer public value to point: %d", TranslateLastOpenSslError()); in CalculateSharedKey()
115 LOG_E("Can't compute ECDH shared key: %d", TranslateLastOpenSslError()); in CalculateSharedKey()
Dblock_cipher_operation.cpp62 LOG_E("AES GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in GetAndValidateGcmTagLength()
85 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation()
89 LOG_E("Block mode %d not supported", block_mode); in CreateOperation()
93 LOG_E("Block mode %d was specified, but not authorized by key", block_mode); in CreateOperation()
111 LOG_E("Mode does not support padding", 0); in CreateOperation()
206 LOG_E("Error encrypting final block: %s", buf); in Finish()
265 LOG_E("No IV provided", 0); in GetIv()
270 LOG_E("Expected %d-byte IV for operation, but got %d bytes", block_size_bytes(), in GetIv()
276 LOG_E("Expected %d-byte nonce for GCM operation, but got %d bytes", GCM_NONCE_SIZE, in GetIv()
Dhmac_key.cpp52 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey()
71 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST)); in validate_algorithm_specific_new_key_params()
Dopenssl_utils.cpp93 LOG_E("EVP key algorithm was unknown (type %d), not the expected %d", in convert_pkcs8_blob_to_evp()
99 LOG_E("EVP key algorithm was %d (from type %d), not the expected %d", got_algorithm, in convert_pkcs8_blob_to_evp()
197 LOG_E("Failed to get EC group order", 0); in ec_group_size_bits()
Dsymmetric_key.cpp58 LOG_E("Error generating %d bit symmetric key", key_size_bits); in GenerateKey()
92 LOG_E("Expected %d-bit key data but got %d-bit key", key_bits, in ImportKey()
Dopenssl_err.cpp85 LOG_E("ASN.1 parsing error %d", reason); in TranslateLastOpenSslError()
90 LOG_E("Openssl error %d, %d", ERR_GET_LIB(error), reason); in TranslateLastOpenSslError()
Drsa_operation.cpp144 LOG_E("%d MGF digests specified in begin params and SHA1 not authorized", in GetAndValidateMgfDigest()
150 LOG_E("MGF Digest %d not supported", *digest); in GetAndValidateMgfDigest()
153 LOG_E("MGF Digest %d was specified, but not authorized by key", *digest); in GetAndValidateMgfDigest()
201 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key", in StoreData()
265 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS " in GetOpensslPadding()
358 LOG_E("Input too long: cannot sign %u-byte message with PKCS1 padding with %u-bit key", in SignUndigested()
443 LOG_E("Input too long: cannot verify %u-byte message with PKCS1 padding && %u-bit key", in VerifyUndigested()
Daes_key.cpp58 LOG_E("AES-GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey()
/system/keymaster/android_keymaster/
Dremote_provisioning_utils.cpp72 LOG_E("Error parsing EEK chain: %s", errMsg.c_str()); in validateAndExtractEekPubAndId()
82 LOG_E("Failed to validate EEK chain: %s", cosePubKey.moveMessage().c_str()); in validateAndExtractEekPubAndId()
91 LOG_E("%s", parsedPubKey.moveMessage().c_str()); in validateAndExtractEekPubAndId()
97 LOG_E("Key is missing required label 'CURVE'", 0); in validateAndExtractEekPubAndId()
103 LOG_E("Key is missing required label 'PUBKEY_X'", 0); in validateAndExtractEekPubAndId()
111 LOG_E("Unrecognized root of EEK chain", 0); in validateAndExtractEekPubAndId()
119 LOG_E("Failed to get EEK: %s", eek.moveMessage().c_str()); in validateAndExtractEekPubAndId()
136 LOG_E("Invalid COSE_Mac0 structure", 0); in validateAndExtractPubkeys()
145 LOG_E("Invalid COSE_Mac0 contents", 0); in validateAndExtractPubkeys()
151 LOG_E("Invalid Mac0 protected: %s", errMsg.c_str()); in validateAndExtractPubkeys()
[all …]
Doperation.cpp91 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding()
94 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding()
102 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding()
128 LOG_E("%d digests specified in begin params and NONE not authorized", in GetAndValidateDigest()
133 LOG_E("Digest %d not supported", *digest); in GetAndValidateDigest()
141 LOG_E("Digest %d was specified, but not authorized by key", *digest); in GetAndValidateDigest()
Dkeymaster_enforcement.cpp399 LOG_E("Auth required but no matching auth token found", 0); in AuthorizeBegin()
414 LOG_E("Rate-limited keys table full. Entries will time out.", 0); in AuthorizeBegin()
426 LOG_E("Usage count-limited keys table full, until reboot.", 0); in AuthorizeBegin()
455 LOG_E("Authentication required, but auth token not provided", 0); in GetAndValidateAuthToken()
460 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in GetAndValidateAuthToken()
467 LOG_E("Bug: Auth token is the version %d (or is not an auth token). Expected %d", in GetAndValidateAuthToken()
473 LOG_E("Auth token signature invalid", 0); in GetAndValidateAuthToken()
496 LOG_E("Auth token has the challenge %llu, need %llu", auth_token->challenge, op_handle); in AuthTokenMatches()
507 LOG_E("Auth required but no auth type found", 0); in AuthTokenMatches()
516 LOG_E("Key requires match of auth type mask 0%uo, but token contained 0%uo", in AuthTokenMatches()
[all …]
Dandroid_keymaster.cpp71 LOG_E("Key blob invalid! key patchlevel %lu is > current patchlevel %lu", in CheckPatchLevel()
439 LOG_E("Couldn't get a pointer to the remote provisioning context, returned null.", 0); in GenerateCsr()
455 LOG_E("Failed to validate and extract the public keys for the CSR", 0); in GenerateCsr()
462 LOG_E("Failed to generate a random mac key.", 0); in GenerateCsr()
474 LOG_E("Failed to generate COSE_Mac0 over the public keys to sign.", 0); in GenerateCsr()
494 LOG_E("Failed to construct ProtectedData: %s", protectedDataPayload.moveMessage().c_str()); in GenerateCsr()
505 LOG_E("Failed to validate and extract the endpoint encryption key.", 0); in GenerateCsr()
513 LOG_E("Failed to derive the session key.", 0); in GenerateCsr()
520 LOG_E("Failed to generate a random nonce.", 0); in GenerateCsr()
531 LOG_E("Failed to construct a COSE_Encrypt ProtectedData structure", 0); in GenerateCsr()
[all …]
Dauthorization_set.cpp421 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeIndirectData()
434 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData()
455 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData()
466 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData()
475 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData()
491 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in Deserialize()
Dpure_soft_secure_key_storage.cpp95 LOG_E("Pure software secure key storage slot full.", 0); in WriteKey()
/system/keymaster/key_blob_utils/
Docb_utils.cpp136 LOG_E("Error %d while encrypting key", ae_err); in OcbEncryptKey()
171 LOG_E("Failed to validate authentication tag during key decryption", 0); in OcbDecryptKey()
174 LOG_E("Failed to decrypt key, error: %d", ae_err); in OcbDecryptKey()
Dsoftware_keyblobs.cpp270 LOG_E("Root of trust and origin tags may not be specified", 0); in SetKeyBlobAuthorizations()
286 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations()
295 LOG_E("Tag %d not supported by SoftKeymaster", entry.tag); in SetKeyBlobAuthorizations()
311 LOG_E("Tag %d not allowed in key generation/import", entry.tag); in SetKeyBlobAuthorizations()
Dauth_encrypted_key_blob.cpp298 LOG_E("Invalid key blob format %d", retval.encrypted_key.format); in DeserializeAuthEncryptedBlob()
333 LOG_E("Invalid key blob format %d", format); in EncryptKey()
357 LOG_E("Invalid key blob format %d", key.encrypted_key.format); in DecryptKey()
/system/keymaster/legacy_support/
Decdsa_keymaster1_operation.cpp62 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish()
110 LOG_E( in CreateOperation()
Drsa_keymaster1_operation.cpp83 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish()
139 LOG_E("Bug: Pubkey operation requested. Those should be handled by normal RSA operations.", in CreateOperation()
/system/keymaster/include/keymaster/
Dlogger.h65 #define LOG_E(fmt, ...) Logger::Error(__KM_FILE_LINE fmt, __VA_ARGS__) macro
Dserializable.h131 LOG_E("Skip collection serialization due to integer overflow", 0); in append_collection_to_buf()
232 LOG_E("Skip collection deserialization due size mismatch", 0); in copy_collection_from_buf()

12