/system/tpm/trunks/ |
D | trunks_client_test.cc | 76 LOG(ERROR) << "Error starting hmac session."; in RNGTest() 84 LOG(ERROR) << "Error stirring TPM RNG: " << GetErrorString(result); in RNGTest() 90 LOG(ERROR) << "Error getting random bytes from TPM: " in RNGTest() 95 LOG(ERROR) << "Error not enough random bytes received."; in RNGTest() 105 LOG(ERROR) << "Error starting hmac session."; in SignTest() 115 LOG(ERROR) << "Error creating signing key: " << GetErrorString(result); in SignTest() 121 LOG(ERROR) << "Error loading signing key: " << GetErrorString(result); in SignTest() 130 LOG(ERROR) << "Error using key to sign: " << GetErrorString(result); in SignTest() 136 LOG(ERROR) << "Error using key to verify: " << GetErrorString(result); in SignTest() 146 LOG(ERROR) << "Error starting hmac session."; in DecryptTest() [all …]
|
D | trunks_client.cc | 84 LOG(ERROR) << "Error allocating PCR:" << trunks::GetErrorString(result); in AllocatePCR() 97 LOG(ERROR) << "Error taking ownership: " << trunks::GetErrorString(rc); in TakeOwnership() 107 LOG(ERROR) << "Failed to read TPM state: " in DumpStatus() 142 LOG(ERROR) << "ReadPCR: " << trunks::GetErrorString(result); in ReadPCR() 155 LOG(ERROR) << "ExtendPCR: " << trunks::GetErrorString(result); in ExtendPCR() 199 LOG(ERROR) << "Error running RNGtest."; in main() 204 LOG(ERROR) << "Error running SignTest."; in main() 208 LOG(ERROR) << "Error running DecryptTest."; in main() 212 LOG(ERROR) << "Error running ImportTest."; in main() 216 LOG(ERROR) << "Error running AuthChangeTest."; in main() [all …]
|
D | blob_parser.cc | 36 LOG(ERROR) << "Error serializing public info: " << GetErrorString(result); in SerializeKeyBlob() 41 LOG(ERROR) << "Error serializing private info: " << GetErrorString(result); in SerializeKeyBlob() 60 LOG(ERROR) << "Error parsing public info: " << GetErrorString(result); in ParseKeyBlob() 65 LOG(ERROR) << "Error parsing private info: " << GetErrorString(result); in ParseKeyBlob() 79 LOG(ERROR) << "Error serializing creation_data: " << GetErrorString(result); in SerializeCreationBlob() 84 LOG(ERROR) << "Error serializing creation_hash: " << GetErrorString(result); in SerializeCreationBlob() 89 LOG(ERROR) << "Error serializing creation_ticket: " in SerializeCreationBlob() 110 LOG(ERROR) << "Error parsing creation_data: " << GetErrorString(result); in ParseCreationBlob() 115 LOG(ERROR) << "Error parsing creation_hash: " << GetErrorString(result); in ParseCreationBlob() 121 LOG(ERROR) << "Error parsing creation_ticket: " << GetErrorString(result); in ParseCreationBlob()
|
D | tpm_utility_impl.cc | 88 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in Startup() 93 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in Startup() 121 LOG(ERROR) << __func__ in Clear() 131 LOG(ERROR) << __func__ in Shutdown() 141 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in InitializeTpm() 165 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in InitializeTpm() 170 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in InitializeTpm() 177 LOG(ERROR) << __func__ << ": " << GetErrorString(result); in InitializeTpm() 192 LOG(ERROR) << __func__ in AllocatePCR() 237 LOG(ERROR) << __func__ in AllocatePCR() [all …]
|
/system/core/debuggerd/client/ |
D | debuggerd_client.cpp | 51 PLOG(ERROR) << "libdebuggerd_client: failed to send signal to pid " << pid; in send_signal() 78 LOG(ERROR) << "libdebuggerd_client: timeout expired"; in debuggerd_trigger_dump() 86 PLOG(ERROR) << "libdebuggerd_client: failed to set receive timeout"; in debuggerd_trigger_dump() 90 PLOG(ERROR) << "libdebuggerd_client: failed to set send timeout"; in debuggerd_trigger_dump() 99 PLOG(ERROR) << "libdebugger_client: failed to create socket"; in debuggerd_trigger_dump() 105 PLOG(ERROR) << "libdebuggerd_client: failed to connect to tombstoned"; in debuggerd_trigger_dump() 111 PLOG(ERROR) << "libdebugger_client: failed to set timeout"; in debuggerd_trigger_dump() 118 PLOG(ERROR) << "libdebuggerd_client: failed to create pipe"; in debuggerd_trigger_dump() 133 PLOG(ERROR) << "failed to set pipe buffer size"; in debuggerd_trigger_dump() 137 PLOG(ERROR) << "libdebuggerd_client: failed to send output fd to tombstoned"; in debuggerd_trigger_dump() [all …]
|
/system/bt/tools/mcap_tool/ |
D | mcap_test_app.cc | 116 LOG(ERROR) << "callback is null"; in Register() 138 LOG(ERROR) << "Application not registered"; in ConnectMcl() 148 LOG(ERROR) << "MCL is still active, cannot make another connection"; in ConnectMcl() 157 LOG(ERROR) << "Data callback is null"; in CreateMdep() 215 LOG(ERROR) << "MCAP handle mismatch, self=" << _mcap_handle in ControlCallback() 228 LOG(ERROR) << "No MCL for mcl_handle " << (int)mcl; in ControlCallback() 232 LOG(ERROR) << "MCL " << (int)mcl << " not connected"; in ControlCallback() 237 LOG(ERROR) << "MDL not found for id " << p_data->create_cfm.mdl_id; in ControlCallback() 241 LOG(ERROR) << "MDL already got response " << mcap_mdl->GetResponseCode() in ControlCallback() 252 LOG(ERROR) << "No MCL for mcl_handle " << (int)mcl; in ControlCallback() [all …]
|
/system/tpm/attestation/common/ |
D | tpm_utility_v1.cc | 81 LOG(ERROR) << __func__ << ": Failed to connect to the TPM."; in Initialize() 112 LOG(ERROR) << "SRK is not ready."; in ActivateIdentity() 121 LOG(ERROR) << __func__ << ": Could not connect to the TPM."; in ActivateIdentity() 128 LOG(ERROR) << __func__ << ": Failed to load SRK."; in ActivateIdentity() 140 TPM_LOG(ERROR, result) << __func__ << ": Failed to load AIK."; in ActivateIdentity() 155 TPM_LOG(ERROR, result) << __func__ << ": Failed to activate identity."; in ActivateIdentity() 174 LOG(ERROR) << "SRK is not ready."; in CreateCertifiedKey() 178 LOG(ERROR) << "Only RSA supported on TPM v1.2."; in CreateCertifiedKey() 186 LOG(ERROR) << __func__ << "Failed to load AIK."; in CreateCertifiedKey() 199 TPM_LOG(ERROR, result) << __func__ << ": Failed to create object."; in CreateCertifiedKey() [all …]
|
D | crypto_utility_impl.cc | 85 LOG(ERROR) << __func__ << ": GetRandom failed."; in CreateSealedKey() 89 LOG(ERROR) << __func__ << ": Failed to seal cipher key."; in CreateSealedKey() 101 LOG(ERROR) << __func__ << ": GetRandom failed."; in EncryptData() 106 LOG(ERROR) << __func__ << ": AES encryption failed."; in EncryptData() 115 LOG(ERROR) << __func__ << ": Failed to serialize protobuf."; in EncryptData() 126 LOG(ERROR) << __func__ << ": Failed to parse protobuf."; in UnsealKey() 131 LOG(ERROR) << __func__ << ": Cannot unseal aes key."; in UnsealKey() 142 LOG(ERROR) << __func__ << ": Failed to parse protobuf."; in DecryptData() 148 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; in DecryptData() 153 LOG(ERROR) << __func__ << ": Corrupted data in encrypted pb."; in DecryptData() [all …]
|
/system/update_engine/ |
D | update_engine_client.cc | 76 LOG(ERROR) << "UpdateEngineService not available."; in OnInit() 126 LOG(ERROR) << error; in IPCError() 232 LOG(ERROR) << "Update failed, current operation is " in HandleStatusUpdate() 306 LOG(ERROR) << "Found a positional argument '" << positional_args.front() in ProcessFlags() 322 LOG(ERROR) << "ResetStatus failed"; in ProcessFlags() 331 LOG(ERROR) << "Unknown option: \"" << FLAGS_update_over_cellular in ProcessFlags() 335 LOG(ERROR) << "Error setting the update over cellular setting."; in ProcessFlags() 346 LOG(ERROR) << "Error getting the update over cellular setting."; in ProcessFlags() 360 LOG(ERROR) << "Error setting the cohort hint."; in ProcessFlags() 368 LOG(ERROR) << "Error getting the cohort hint."; in ProcessFlags() [all …]
|
D | boot_control_android.cc | 60 LOG(ERROR) << "Error getting bootctrl HIDL module."; in Init() 104 LOG(ERROR) << "Device file " << misc_device.value() << " for /misc " in GetPartitionDevice() 116 LOG(ERROR) << "boot_control impl returned no suffix for slot " in GetPartitionDevice() 123 LOG(ERROR) << "Device file " << path.value() << " does not exist."; in GetPartitionDevice() 134 LOG(ERROR) << "Unable to determine if slot " << SlotName(slot) in IsSlotBootable() 140 LOG(ERROR) << "Invalid slot: " << SlotName(slot); in IsSlotBootable() 150 LOG(ERROR) << "Unable to call MarkSlotUnbootable for slot " in MarkSlotUnbootable() 156 LOG(ERROR) << "Unable to mark slot " << SlotName(slot) in MarkSlotUnbootable() 166 LOG(ERROR) << "Unable to call SetActiveBootSlot for slot " << SlotName(slot) in SetActiveBootSlot() 171 LOG(ERROR) << "Unable to set the active slot to slot " << SlotName(slot) in SetActiveBootSlot() [all …]
|
/system/vold/model/ |
D | PrivateVolume.cpp | 69 PLOG(ERROR) << getId() << " Raw keysize " << mKeyRaw.size() << in doCreate() 85 PLOG(ERROR) << getId() << " failed to setup cryptfs"; in doCreate() 94 LOG(ERROR) << getId() << " failed to revert cryptfs"; in doDestroy() 101 LOG(ERROR) << getId() << " failed to read metadata"; in doMount() 109 PLOG(ERROR) << getId() << " failed to create mount point " << mPath; in doMount() 118 PLOG(ERROR) << getId() << " failed filesystem check"; in doMount() 123 PLOG(ERROR) << getId() << " failed to mount"; in doMount() 132 PLOG(ERROR) << getId() << " failed filesystem check"; in doMount() 137 PLOG(ERROR) << getId() << " failed to mount"; in doMount() 142 LOG(ERROR) << getId() << " unsupported filesystem " << mFsType; in doMount() [all …]
|
/system/core/libsuspend/ |
D | autosuspend_wakeup_count.cpp | 76 PLOG(ERROR) << "error reading from " << sys_power_wakeup_count; in suspend_thread_func() 82 LOG(ERROR) << "empty wakeup count"; in suspend_thread_func() 89 PLOG(ERROR) << "error waiting on semaphore"; in suspend_thread_func() 103 PLOG(ERROR) << "error writing to " << sys_power_wakeup_count; in suspend_thread_func() 109 PLOG(ERROR) << "error releasing semaphore"; in suspend_thread_func() 122 PLOG(ERROR) << "error opening " << sys_power_state; in init_state_fd() 143 PLOG(ERROR) << "error opening " << sys_power_wakeup_count; in autosuspend_init() 149 PLOG(ERROR) << "error creating suspend_lockout semaphore"; in autosuspend_init() 155 LOG(ERROR) << "error creating thread: " << strerror(ret); in autosuspend_init() 176 LOG(ERROR) << "autosuspend_init failed"; in autosuspend_wakeup_count_enable() [all …]
|
/system/vold/ |
D | Loop.cpp | 52 PLOG(ERROR) << "Failed to open loop-control"; in create() 58 PLOG(ERROR) << "Failed LOOP_CTL_GET_FREE"; in create() 66 PLOG(ERROR) << "Failed to open " << target; in create() 71 PLOG(ERROR) << "Failed to open " << out_device; in create() 76 PLOG(ERROR) << "Failed to LOOP_SET_FD"; in create() 84 PLOG(ERROR) << "Failed to LOOP_SET_STATUS64"; in create() 96 PLOG(ERROR) << "Failed to open " << loopDevice; in destroyByDevice() 101 PLOG(ERROR) << "Failed to destroy " << loopDevice; in destroyByDevice() 116 PLOG(ERROR) << "Failed to opendir"; in destroyAll() 159 PLOG(ERROR) << "Failed to create image " << file; in createImageFile() [all …]
|
D | MetadataCrypt.cpp | 58 PLOG(ERROR) << "Failed to setexeccon"; in mount_via_fs_mgr() 64 PLOG(ERROR) << "Failed to clear setexeccon"; in mount_via_fs_mgr() 68 LOG(ERROR) << "fs_mgr_do_mount failed with rc " << mount_rc; in mount_via_fs_mgr() 77 LOG(ERROR) << "Failed to get key_dir"; in read_key() 84 PLOG(ERROR) << "Creating directories: " << dir; in read_key() 95 LOG(ERROR) << "Failed to turn key to hex"; in default_key_params() 106 PLOG(ERROR) << "Unable to open " << real_blkdev << " to measure size"; in get_number_of_sectors() 113 PLOG(ERROR) << "Unable to measure size of " << real_blkdev; in get_number_of_sectors() 123 LOG(ERROR) << "dm_ioctl buffer too small"; in dm_ioctl_init() 145 PLOG(ERROR) << "Cannot open device-mapper"; in create_crypto_blk_dev() [all …]
|
D | Keymaster.cpp | 55 LOG(ERROR) << "update failed: " << error.description(); in updateCompletely() 60 LOG(ERROR) << "update failed, code " << int32_t(km_error); in updateCompletely() 65 LOG(ERROR) << "update reported too much input consumed"; in updateCompletely() 86 LOG(ERROR) << "finish failed: " << error.description(); in finish() 90 LOG(ERROR) << "finish failed, code " << int32_t(km_error); in finish() 131 LOG(ERROR) << "generate_key failed: " << error.description(); in generateKey() 135 LOG(ERROR) << "generate_key failed, code " << int32_t(km_error); in generateKey() 145 LOG(ERROR) << "delete_key failed: " << error.description(); in deleteKey() 149 LOG(ERROR) << "delete_key failed, code " << int32_t(km::ErrorCode(error)); in deleteKey() 168 LOG(ERROR) << "upgrade_key failed: " << error.description(); in upgradeKey() [all …]
|
/system/connectivity/wificond/net/ |
D | netlink_utils.cpp | 110 LOG(ERROR) << "NL80211_CMD_GET_WIPHY dump failed"; in GetWiphyIndex() 119 LOG(ERROR) << "Receive ERROR message: " in GetWiphyIndex() 124 LOG(ERROR) << "Wrong message type for new interface message: " in GetWiphyIndex() 129 LOG(ERROR) << "Wrong command in response to " in GetWiphyIndex() 135 LOG(ERROR) << "Failed to get wiphy index from reply message"; in GetWiphyIndex() 155 LOG(ERROR) << "NL80211_CMD_GET_INTERFACE dump failed"; in GetInterfaces() 159 LOG(ERROR) << "No interface is found"; in GetInterfaces() 164 LOG(ERROR) << "Receive ERROR message: " in GetInterfaces() 169 LOG(ERROR) << "Wrong message type for new interface message: " in GetInterfaces() 174 LOG(ERROR) << "Wrong command in response to " in GetInterfaces() [all …]
|
D | netlink_manager.cpp | 73 LOG(ERROR) << "Unknown bandwidth type: " << bandwidth; in getBandwidthType() 98 LOG(ERROR) << "Failed to read packet from buffer"; in ReceivePacketAndRunHandler() 109 LOG(ERROR) << "payload is broken."; in ReceivePacketAndRunHandler() 117 LOG(ERROR) << "Receive invalid packet"; in ReceivePacketAndRunHandler() 146 LOG(ERROR) << "Get message overrun notification"; in ReceivePacketAndRunHandler() 171 LOG(ERROR) << "Wrong message type for new family message"; in OnNewFamily() 175 LOG(ERROR) << "Wrong command for new family message"; in OnNewFamily() 180 LOG(ERROR) << "Failed to get family id"; in OnNewFamily() 185 LOG(ERROR) << "Failed to get family name"; in OnNewFamily() 204 LOG(ERROR) << "Failed to get group name"; in OnNewFamily() [all …]
|
/system/tpm/tpm_manager/server/ |
D | tpm_initializer_impl.cc | 73 LOG(ERROR) << "Error saving local data."; in InitializeTpm() 105 TPM_LOG(ERROR, result) << "Error calling Tspi_Context_CreateObject"; in InitializeEndorsementKey() 110 TPM_LOG(ERROR, result) << "Error calling Tspi_TPM_CreateEndorsementKey"; in InitializeEndorsementKey() 127 TPM_LOG(ERROR, result) << "Error calling Tspi_Context_CreateObject"; in TakeOwnership() 133 TPM_LOG(ERROR, result) << "Error calling Tspi_GetPolicyObject"; in TakeOwnership() 141 TPM_LOG(ERROR, result) << "Error calling Tspi_Policy_SetSecret"; in TakeOwnership() 158 TPM_LOG(ERROR, result) << "Error calling Tspi_TPM_TakeOwnership, attempts: " in TakeOwnership() 172 TPM_LOG(ERROR, result) << "Error calling Tspi_Context_LoadKeyByUUID"; in InitializeSrk() 180 TPM_LOG(ERROR, result) << "Error calling Tspi_Context_CreateObject"; in InitializeSrk() 186 TPM_LOG(ERROR, result) << "Error calling Tspi_Policy_SetSecret"; in InitializeSrk() [all …]
|
D | tpm2_initializer_impl.cc | 70 LOG(ERROR) << "Error reading local data."; in InitializeTpm() 83 LOG(ERROR) << "Error generating a random owner password."; in InitializeTpm() 87 LOG(ERROR) << "Error generating a random endorsement password."; in InitializeTpm() 91 LOG(ERROR) << "Error generating a random lockout password."; in InitializeTpm() 105 LOG(ERROR) << "Error saving local data."; in InitializeTpm() 111 LOG(ERROR) << "Error taking ownership of TPM2.0"; in InitializeTpm() 127 LOG(ERROR) << "Failed to read PCR " << pcr << ": " in VerifiedBootHelper() 136 LOG(ERROR) << "Failed to extend PCR " << pcr << ": " in VerifiedBootHelper() 146 LOG(ERROR) << __func__ << ": Error reading local data."; in ResetDictionaryAttackLock() 150 LOG(ERROR) << __func__ << ": Lockout password not available."; in ResetDictionaryAttackLock() [all …]
|
D | tpm_connection.cc | 55 TPM_LOG(ERROR, result) << "Error getting a handle to the TPM."; in GetTpm() 67 TPM_LOG(ERROR, result) << "Error connecting to TPM."; in ConnectContextIfNeeded() 77 TPM_LOG(ERROR, result) << "Error connecting to TPM."; in ConnectContextIfNeeded() 85 LOG(ERROR) << "Unexpected NULL context."; in ConnectContextIfNeeded() 96 TPM_LOG(ERROR, result) << "Error getting a handle to the TPM."; in ConnectContextIfNeeded() 103 TPM_LOG(ERROR, result) << "Error calling Tspi_GetPolicyObject"; in ConnectContextIfNeeded() 112 TPM_LOG(ERROR, result) << "Error calling Tspi_Policy_SetSecret"; in ConnectContextIfNeeded()
|
/system/extras/ext4_utils/ |
D | ext4_crypt.cpp | 85 PLOG(ERROR) << argv[0] << " " << argv[1] << " " << argv[2] << "failed"; in log_ls() 89 LOG(ERROR) << argv[0] << " " << argv[1] << " " << argv[2] in log_ls() 94 LOG(ERROR) << argv[0] << " " << argv[1] << " " << argv[2] in log_ls() 113 PLOG(ERROR) << "Unable to read directory: " << dirname; in is_dir_empty() 121 PLOG(ERROR) << "Unable to read directory: " << dirname; in is_dir_empty() 155 LOG(ERROR) << "Policy wrong length: " << policy_length; in e4crypt_policy_set() 163 PLOG(ERROR) << "Failed to open directory " << directory; in e4crypt_policy_set() 174 PLOG(ERROR) << "Failed to set encryption policy for " << directory << " to " << policy_hex in e4crypt_policy_set() 191 LOG(ERROR) << "Policy wrong length: " << policy_length; in e4crypt_policy_get() 197 PLOG(ERROR) << "Failed to open directory " << directory; in e4crypt_policy_get() [all …]
|
/system/core/init/ |
D | selinux.cpp | 106 PLOG(ERROR) << "Failed to create pipe"; in ForkExecveAndWaitForCompletion() 112 PLOG(ERROR) << "Failed to fork for " << filename; in ForkExecveAndWaitForCompletion() 124 PLOG(ERROR) << "Failed to redirect stderr of " << filename; in ForkExecveAndWaitForCompletion() 131 PLOG(ERROR) << "Failed to execve " << filename; in ForkExecveAndWaitForCompletion() 151 PLOG(ERROR) << "Failed to capture full output of " << filename; in ForkExecveAndWaitForCompletion() 159 LOG(ERROR) << filename << ": " << line; in ForkExecveAndWaitForCompletion() 166 PLOG(ERROR) << "Failed to wait for " << filename; in ForkExecveAndWaitForCompletion() 175 LOG(ERROR) << filename << " exited with status " << status_code; in ForkExecveAndWaitForCompletion() 178 LOG(ERROR) << filename << " killed by signal " << WTERMSIG(status); in ForkExecveAndWaitForCompletion() 180 LOG(ERROR) << filename << " stopped by signal " << WSTOPSIG(status); in ForkExecveAndWaitForCompletion() [all …]
|
/system/extras/simpleperf/ |
D | gtest_main.cpp | 47 PLOG(ERROR) << "failed to create testdata_dir " << testdata_dir; in ExtractTestDataFromElfSection() 53 LOG(ERROR) << "failed to read section " << testdata_section in ExtractTestDataFromElfSection() 59 PLOG(ERROR) << "failed to write file " << tmp_file.path; in ExtractTestDataFromElfSection() 64 LOG(ERROR) << "failed to open archive " << tmp_file.path; in ExtractTestDataFromElfSection() 71 LOG(ERROR) << "failed to start iterating zip entries"; in ExtractTestDataFromElfSection() 85 LOG(ERROR) << "failed to create dir for " << path; in ExtractTestDataFromElfSection() 90 PLOG(ERROR) << "failed to create file " << path; in ExtractTestDataFromElfSection() 95 LOG(ERROR) << "failed to extract entry " << entry_name; in ExtractTestDataFromElfSection() 99 LOG(ERROR) << "failed to write file " << path; in ExtractTestDataFromElfSection() 136 PLOG(ERROR) << "ReadLink failed"; in ScopedWorkloadExecutable() [all …]
|
/system/core/adb/ |
D | adbd_auth.cpp | 58 PLOG(ERROR) << "Couldn't read " << path; in adbd_auth_verify() 71 LOG(ERROR) << "Invalid base64 key " << line.c_str() << " in " << path; in adbd_auth_verify() 77 LOG(ERROR) << "Failed to parse key " << line.c_str() << " in " << path; in adbd_auth_verify() 134 LOG(ERROR) << "Client not connected"; in adbd_auth_confirm_key() 140 LOG(ERROR) << "Key must be a null-terminated string"; in adbd_auth_confirm_key() 147 LOG(ERROR) << "Key too long (" << msg_len << ")"; in adbd_auth_confirm_key() 153 PLOG(ERROR) << "Failed to write PK"; in adbd_auth_confirm_key() 161 PLOG(ERROR) << "Failed to accept"; in adbd_auth_listener() 183 PLOG(ERROR) << "Failed to get adbd socket"; in adbd_cloexec_auth_socket() 192 PLOG(ERROR) << "Failed to get adbd socket"; in adbd_auth_init() [all …]
|
/system/tools/aidl/tests/ |
D | aidl_test_client_utf8_strings.cpp | 62 LOG(ERROR) << "Failed while requesting service to repeat utf8 string=\"" in ConfirmUtf8InCppStringRepeat() 73 LOG(ERROR) << "RepeatNullableUtf8CppString(null) did not return null"; in ConfirmUtf8InCppStringRepeat() 82 LOG(ERROR) << "Got status=" << status.toString8() << " while repeating " in ConfirmUtf8InCppStringRepeat() 87 LOG(ERROR) << "Got null reply while repeating nullable utf8 string " in ConfirmUtf8InCppStringRepeat() 92 LOG(ERROR) << "Failed while requesting service to repeat utf8 string=\"" in ConfirmUtf8InCppStringRepeat() 124 LOG(ERROR) << "Reversing null list of utf8 strings failed."; in ConfirmUtf8InCppStringCollectionReverse() 135 LOG(ERROR) << "Reversing list of utf8 strings failed."; in ConfirmUtf8InCppStringCollectionReverse() 139 LOG(ERROR) << "Bad output sizes."; in ConfirmUtf8InCppStringCollectionReverse() 149 LOG(ERROR) << "Expected null values, but got non-null."; in ConfirmUtf8InCppStringCollectionReverse() 156 LOG(ERROR) << "Expected non-null values, but got null."; in ConfirmUtf8InCppStringCollectionReverse() [all …]
|