/system/update_engine/aosp/ |
D | boot_control_android.cc | 114 << SlotName(slot) << ": " << ret.errMsg; in MarkSlotUnbootable() 124 << ": " << result.errMsg; in SetActiveBootSlot() 129 << ": " << result.errMsg.c_str(); in SetActiveBootSlot() 138 LOG(ERROR) << "Unable to MarkBootSuccessful: " << ret.errMsg; in MarkBootSuccessfulAsync()
|
/system/keymaster/ng/ |
D | AndroidRemotelyProvisionedComponentDevice.cpp | 61 Status(int32_t errCode, const std::string& errMsg) in Status() argument 62 : status_(AStatus_fromServiceSpecificErrorWithMessage(errCode, errMsg.c_str())) {} in Status() 63 explicit Status(const std::string& errMsg) in Status() argument 64 : status_(AStatus_fromServiceSpecificErrorWithMessage(STATUS_FAILED, errMsg.c_str())) {} in Status()
|
/system/core/trusty/keymaster/keymint/ |
D | TrustyRemotelyProvisionedComponentDevice.cpp | 55 Status(int32_t errCode, const std::string& errMsg) in Status() argument 56 : status_(AStatus_fromServiceSpecificErrorWithMessage(errCode, errMsg.c_str())) {} in Status() 57 explicit Status(const std::string& errMsg) in Status() argument 58 : status_(AStatus_fromServiceSpecificErrorWithMessage(STATUS_FAILED, errMsg.c_str())) {} in Status()
|
/system/keymaster/android_keymaster/ |
D | remote_provisioning_utils.cpp | 68 auto [item, newPos, errMsg] = in validateAndExtractEekPubAndId() 72 LOG_E("Error parsing EEK chain: %s", errMsg.c_str()); in validateAndExtractEekPubAndId() 149 auto [protectedMap, __, errMsg] = cppbor::parse(protectedParms); in validateAndExtractPubkeys() 151 LOG_E("Invalid Mac0 protected: %s", errMsg.c_str()); in validateAndExtractPubkeys()
|
/system/security/provisioner/ |
D | rkp_factory_extraction_tool.cpp | 84 auto [request, errMsg] = getCsr(name, rkp_service.get(), FLAGS_self_test); in getCsrForInstance() 86 std::cerr << "Unable to build CSR for '" << fullName << ": " << errMsg << std::endl; in getCsrForInstance()
|
D | rkp_factory_extraction_lib.h | 35 std::string errMsg; member
|
D | rkp_factory_extraction_lib.cpp | 121 auto [parsedProtectedData, ignore2, errMsg] = parse(protectedData.protectedData); in composeCertificateRequestV1() 123 std::cerr << "Error parsing protected data: '" << errMsg << "'" << std::endl; in composeCertificateRequestV1() 124 return {nullptr, errMsg}; in composeCertificateRequestV1()
|
/system/keymaster/include/keymaster/cppcose/ |
D | cppcose.h | 98 ErrMsgOr(std::string errMsg) // NOLINT(google-explicit-constructor) in ErrMsgOr() argument 99 : errMsg_(std::move(errMsg)) {} in ErrMsgOr() 100 ErrMsgOr(const char* errMsg) // NOLINT(google-explicit-constructor) in ErrMsgOr() argument 101 : errMsg_(errMsg) {} in ErrMsgOr() 152 auto [parsedKey, _, errMsg] = cppbor::parse(coseKey); in parse() 153 if (!parsedKey) return errMsg + " when parsing key"; in parse()
|
/system/core/fs_mgr/libsnapshot/ |
D | device_info.cpp | 89 LOG(ERROR) << "Unable to set the snapshot merge status " << ret.errMsg; in SetBootControlMergeStatus() 115 LOG(ERROR) << "Error setting slot " << slot << " unbootable: " << result.errMsg; in SetSlotAsUnbootable()
|
D | snapshotctl.cpp | 185 std::cerr << "Could not set active boot slot: " << cr.errMsg; in CreateTestUpdate()
|
/system/keymaster/cppcose/ |
D | cppcose.cpp | 281 auto [protectedMap, _, errMsg] = cppbor::parse(protectedParms); in verifyAndParseCoseMac0() 283 return "Invalid Mac0 protected: " + errMsg; in verifyAndParseCoseMac0() 381 auto [parsedProtParams, _, errMsg] = cppbor::parse(protectedParams); in verifyAndParseCoseSign1() 383 return errMsg + " when parsing protected params."; in verifyAndParseCoseSign1() 516 auto [parsedProtParms, _, errMsg] = cppbor::parse(protParms->asBstr()); in getSenderPubKeyFromCoseEncrypt() 517 if (!parsedProtParms) return "Failed to parse protected params: " + errMsg; in getSenderPubKeyFromCoseEncrypt() 591 auto [parsedProtParams, _, errMsg] = cppbor::parse(protParms->asBstr()->value()); in decryptCoseEncrypt() 593 return errMsg + " when parsing protected params."; in decryptCoseEncrypt()
|
/system/extras/bootctl/ |
D | bootctl.cpp | 96 fprintf(stderr, errStr, cr.errMsg.c_str()); in handle_return() 99 fprintf(stderr, errStr, cr.errMsg.c_str()); in handle_return()
|
/system/netd/server/ |
D | NdcDispatcher.cpp | 53 #define PARSE_INT_RETURN_IF_FAIL(cli, label, intLabel, errMsg, addErrno) \ argument 57 (cli)->sendMsg(ResponseCode::OperationFailed, (errMsg), (addErrno)); \ 62 #define PARSE_UINT_RETURN_IF_FAIL(cli, label, intLabel, errMsg, addErrno) \ argument 66 (cli)->sendMsg(ResponseCode::OperationFailed, (errMsg), (addErrno)); \ 550 const char* errMsg) const { in sendGenericOpFailed() 551 cli->sendMsg(ResponseCode::OperationFailed, errMsg, false); in sendGenericOpFailed()
|
D | NdcDispatcher.h | 116 void sendGenericOpFailed(NdcClient* cli, const char* errMsg) const;
|
/system/core/fastboot/ |
D | fastboot.cpp | 2029 const char* errMsg = nullptr; in fb_perform_format() local 2043 errMsg = "Can't determine partition type.\n"; in fb_perform_format() 2055 errMsg = "Unable to get partition size\n"; in fb_perform_format() 2103 if (errMsg) fprintf(stderr, "%s", errMsg); in fb_perform_format()
|
/system/vold/ |
D | Checkpoint.cpp | 179 return error(EINVAL, "Error marking booted successfully: " + std::string(cr.errMsg)); in cp_commitChanges()
|
/system/core/fastboot/device/ |
D | commands.cpp | 720 ret.errMsg); in SnapshotUpdateHandler()
|