/system/keymaster/ |
D | ecies_kem.cpp | 28 LOG_E("%s", "EciesKem: no curve specified"); in EciesKem() 40 LOG_E("EciesKem: curve %d is unsupported", curve_); in EciesKem() 47 LOG_E("EciesKem: No KDF specified", 0); in EciesKem() 56 LOG_E("Kdf %d is unsupported", kdf); in EciesKem() 66 LOG_E("%s", "EciesKem: no key length specified"); in EciesKem() 93 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Encrypt() 97 LOG_E("EciesKem: Can't obtain public value", 0); in Encrypt() 115 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt() 121 LOG_E("EciesKem: KDF failed, can't derived keys", 0); in Encrypt() 146 LOG_E("EciesKem: ECDH failed, can't obtain shared secret", 0); in Decrypt() [all …]
|
D | operation.cpp | 93 LOG_E("%d padding modes specified in begin params", begin_params.GetTagCount(TAG_PADDING)); in GetAndValidatePadding() 96 LOG_E("Padding mode %d not supported", *padding); in GetAndValidatePadding() 104 LOG_E("Padding mode %d was specified, but not authorized by key", *padding); in GetAndValidatePadding() 118 LOG_E("%d digests specified in begin params", begin_params.GetTagCount(TAG_DIGEST)); in GetAndValidateDigest() 121 LOG_E("Digest %d not supported", *digest); in GetAndValidateDigest() 129 LOG_E("Digest %d was specified, but not authorized by key", *digest); in GetAndValidateDigest()
|
D | keymaster_enforcement.cpp | 348 LOG_E("Auth required but no matching auth token found", 0); in AuthorizeBegin() 363 LOG_E("Rate-limited keys table full. Entries will time out.", 0); in AuthorizeBegin() 375 LOG_E("Usage count-limited keys table full, until reboot.", 0); in AuthorizeBegin() 442 LOG_E("Authentication required, but auth token not provided", 0); in AuthTokenMatches() 447 LOG_E("Bug: Auth token is the wrong size (%d expected, %d found)", sizeof(hw_auth_token_t), in AuthTokenMatches() 455 LOG_E("Bug: Auth token is the version %d (or is not an auth token). Expected %d", in AuthTokenMatches() 461 LOG_E("Auth token signature invalid", 0); in AuthTokenMatches() 466 LOG_E("Auth token has the challenge %llu, need %llu", auth_token.challenge, op_handle); in AuthTokenMatches() 477 LOG_E("Auth required but no auth type found", 0); in AuthTokenMatches() 488 LOG_E("Key requires match of auth type mask 0%uo, but token contained 0%uo", in AuthTokenMatches() [all …]
|
D | rsa_key_factory.cpp | 63 LOG_E("%s", "No public exponent specified for RSA key generation"); in GenerateKey() 69 LOG_E("No key size specified for RSA key generation", 0); in GenerateKey() 73 LOG_E("Invalid key size of %u bits specified for RSA key generation", key_size); in GenerateKey() 147 LOG_E("Imported public exponent (%u) does not match specified public exponent (%u)", in UpdateImportKeyDescription() 156 LOG_E("Imported key size (%u bits) does not match specified key size (%u bits)", in UpdateImportKeyDescription()
|
D | nist_curve_key_exchange.cpp | 54 LOG_E("Not a NIST curve: %d", curve); in GenerateKeyExchange() 105 LOG_E("Can't convert peer public value to point: %d", TranslateLastOpenSslError()); in CalculateSharedKey() 112 LOG_E("Can't compute ECDH shared key: %d", TranslateLastOpenSslError()); in CalculateSharedKey()
|
D | hmac_key.cpp | 53 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey() 72 LOG_E("%d digests specified for HMAC key", key_description.GetTagCount(TAG_DIGEST)); in validate_algorithm_specific_new_key_params()
|
D | aes_operation.cpp | 61 LOG_E("AES GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in GetAndValidateGcmTagLength() 96 LOG_E("%d block modes specified in begin params", begin_params.GetTagCount(TAG_BLOCK_MODE)); in CreateOperation() 100 LOG_E("Block mode %d not supported", block_mode); in CreateOperation() 104 LOG_E("Block mode %d was specified, but not authorized by key", block_mode); in CreateOperation() 122 LOG_E("Mode does not support padding", 0); in CreateOperation() 231 LOG_E("Error encrypting final block: %s", ERR_error_string(ERR_peek_last_error(), NULL)); in Finish() 350 LOG_E("No IV provided", 0); in GetIv() 354 LOG_E("Expected %d-byte IV for AES operation, but got %d bytes", AES_BLOCK_SIZE, in GetIv() 359 LOG_E("Expected %d-byte nonce for AES-GCM operation, but got %d bytes", GCM_NONCE_SIZE, in GetIv()
|
D | hmac_operation.cpp | 41 LOG_E("HMAC key must have KM_TAG_MIN_MAC_LENGTH", 0); in CreateOperation() 49 LOG_E("MAC length may not be specified for verify", 0); in CreateOperation() 62 LOG_E("%d digests found in HMAC key authorizations; must be exactly 1", in CreateOperation()
|
D | ocb_utils.cpp | 145 LOG_E("Error %d while encrypting key", ae_err); in OcbEncryptKey() 184 LOG_E("Failed to validate authentication tag during key decryption", 0); in OcbDecryptKey() 187 LOG_E("Failed to decrypt key, error: %d", ae_err); in OcbDecryptKey()
|
D | ecdsa_keymaster1_operation.cpp | 65 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish() 115 LOG_E( in CreateOperation()
|
D | ec_key_factory.cpp | 50 LOG_E("%s", "No curve or key size specified for EC key generation"); in GetCurveAndSize() 65 LOG_E("Curve key size %d and specified key size %d don't match", key_size_bits, in GetCurveAndSize() 101 LOG_E("Unable to get EC group for curve %d", ec_curve); in GenerateKey()
|
D | openssl_err.cpp | 83 LOG_E("ASN.1 parsing error %d", reason); in TranslateLastOpenSslError() 88 LOG_E("Openssl error %d, %d", ERR_GET_LIB(error), reason); in TranslateLastOpenSslError()
|
D | openssl_utils.cpp | 98 LOG_E("EVP key algorithm was %d, not the expected %d", EVP_PKEY_type((*pkey)->type), in convert_pkcs8_blob_to_evp() 136 LOG_E("Failed to get EC group order", 0); in ec_group_size_bits()
|
D | rsa_keymaster0_key.cpp | 45 LOG_E("%s", "No public exponent specified for RSA key generation"); in GenerateKey() 51 LOG_E("%s", "No key size specified for RSA key generation"); in GenerateKey()
|
D | symmetric_key.cpp | 57 LOG_E("Error generating %d bit symmetric key", key_size_bits); in GenerateKey() 94 LOG_E("Expected %d-bit key data but got %d bits", key_size_bits, in ImportKey()
|
D | rsa_keymaster1_operation.cpp | 81 LOG_E("Could not get extended key data... not a Keymaster1Engine key?", 0); in PrepareFinish() 139 LOG_E("Bug: Pubkey operation requested. Those should be handled by normal RSA operations.", in CreateOperation()
|
D | authorization_set.cpp | 415 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeIndirectData() 428 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 438 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 450 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in DeserializeElementsData() 466 LOG_E("Malformed data found in AuthorizationSet deserialization", 0); in Deserialize()
|
D | aes_key.cpp | 59 LOG_E("AES-GCM key must have KM_TAG_MIN_MAC_LENGTH", 0); in LoadKey()
|
D | rsa_operation.cpp | 166 LOG_E("Input too long: cannot operate on %u bytes of data with %u-byte RSA key", in StoreData() 250 LOG_E("Input too long: %d-byte digest cannot be used with %d-byte RSA key in PSS " in GetOpensslPadding() 351 LOG_E("Input too long: cannot sign %u-byte message with PKCS1 padding with %u-bit key", in SignUndigested() 446 LOG_E("Input too long: cannot verify %u-byte message with PKCS1 padding && %u-bit key", in VerifyUndigested()
|
D | soft_keymaster_device.cpp | 93 LOG_E("Error %d getting supported digests from keymaster1 device", error); in add_digests() 417 LOG_E("get_supported_algorithms failed with %d", response.error); in get_supported_algorithms() 454 LOG_E("get_supported_block_modes failed with %d", response.error); in get_supported_block_modes() 491 LOG_E("get_supported_padding_modes failed with %d", response.error); in get_supported_padding_modes() 526 LOG_E("get_supported_digests failed with %d", response.error); in get_supported_digests() 558 LOG_E("get_supported_import_formats failed with %d", response.error); in get_supported_import_formats() 591 LOG_E("get_supported_export_formats failed with %d", response.error); in get_supported_export_formats() 612 LOG_E("Configuration parameters must contain OS version and patch level", 0); in configure() 638 LOG_E("add_rng_entropy failed with %d", response.error); in add_rng_entropy() 1067 LOG_E("%d-byte attestation challenge; only %d bytes allowed", in attest_key()
|
D | soft_keymaster_context.cpp | 321 LOG_E("SoftKeymasterContext only wraps hardware keymaster0 devices", 0); in SetHardwareDevice() 419 LOG_E("Root of trust and origin tags may not be specified", 0); in SetAuthorizations() 424 LOG_E("KM_TAG_ROLLBACK_RESISTANT not supported", 0); in SetAuthorizations() 676 LOG_E("Failed to parse key; not a valid software blob, no hardware module configured", 0); in ParseKeyBlob()
|
D | keymaster1_engine.cpp | 296 LOG_E("Expected sign_raw with padding %d but got padding %d", in rsa_sign_raw() 321 LOG_E("Expected sign_raw with padding %d but got padding %d", in rsa_decrypt()
|
D | attestation_record.cpp | 499 LOG_E("Unique ID cannot be created without creation datetime", 0); in build_attestation_record()
|
/system/keymaster/include/keymaster/ |
D | logger.h | 65 #define LOG_E(fmt, ...) Logger::Error(FILE_LINE fmt, __VA_ARGS__) macro
|