| /OK3568_Linux_fs/external/security/librkcrypto/test/ |
| H A D | test_multi.c | 38 E_TRACE("test_cipher error[%x]\n", res); in test_nosupport_multi() 44 E_TRACE("test_hash error[%x]\n", res); in test_nosupport_multi() 50 E_TRACE("test_hash error[%x]\n", res); in test_nosupport_multi() 68 E_TRACE("rk_crypto_init error[%x]\n", res); in test_nosupport_multi() 74 E_TRACE("rk_cipher_init error[%x]\n", res); in test_nosupport_multi() 80 E_TRACE("rk_cipher_init should be busy[%x]\n", res); in test_nosupport_multi() 90 E_TRACE("rk_hash_init should be busy[%x]\n", res); in test_nosupport_multi() 98 E_TRACE("rk_cipher_init error[%x]\n", res); in test_nosupport_multi() 104 E_TRACE("rk_cipher_init should be busy[%x]\n", res); in test_nosupport_multi() 115 E_TRACE("test_cipher error[%x]\n", res); in test_nosupport_multi() [all …]
|
| H A D | test_cipher.c | 103 E_TRACE("plain malloc %uByte error!\n", data_len); in test_cipher_item_virt() 108 E_TRACE("cipher_soft malloc %uByte error!\n", data_len); in test_cipher_item_virt() 113 E_TRACE("cipher_hard malloc %uByte error!\n", data_len); in test_cipher_item_virt() 155 E_TRACE("rk_cipher_init error[%x]\n", res); in test_cipher_item_virt() 186 E_TRACE("rk_cipher_crypt_virt error[%x]\n", res); in test_cipher_item_virt() 202 E_TRACE("soft_cipher error[%x]\n", res); in test_cipher_item_virt() 208 E_TRACE("rkcrypto_test_cipher_virt compare failed.\n"); in test_cipher_item_virt() 256 E_TRACE("plain malloc %uByte error!\n", data_len); in test_cipher_item_fd() 262 E_TRACE("cipher_soft malloc %uByte error!\n", data_len); in test_cipher_item_fd() 268 E_TRACE("cipher_hard malloc %uByte error!\n", data_len); in test_cipher_item_fd() [all …]
|
| H A D | test_hash.c | 77 E_TRACE("rk_hash_init error[%x]\n", res); in test_hash_item_virt() 95 E_TRACE("rk_hash_update_virt[%lu/%u] error = %d\n", in test_hash_item_virt() 111 E_TRACE("soft_%s error[%x]\n", test_name, res); in test_hash_item_virt() 117 E_TRACE("test_%s_item_virt compare failed.\n", test_name); in test_hash_item_virt() 169 E_TRACE("rk_hash_init error[%x]\n", res); in test_hash_item_fd() 182 E_TRACE("rk_hash_update error = %d\n", res); in test_hash_item_fd() 194 E_TRACE("soft_%s error[%x]\n", test_name, res); in test_hash_item_fd() 200 E_TRACE("test_%s_item_fd compare failed.\n", test_name); in test_hash_item_fd() 237 E_TRACE("test hash malloc buffer %uByte error!\n", buffer_len); in test_hash() 243 E_TRACE("test hash rk_crypto_mem_alloc %uByte error!\n", buffer_len); in test_hash() [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/src/ |
| H A D | rkcrypto_otp_key.c | 87 E_TRACE("TEEC_InitializeContext failed with code TEEC res= 0x%x", res); in rk_write_oem_otp_key() 94 E_TRACE("TEEC_Opensession failed with code TEEC res= 0x%x origin 0x%x", in rk_write_oem_otp_key() 111 E_TRACE("InvokeCommand ERR! TEEC res= 0x%x, error_origin= 0x%x", in rk_write_oem_otp_key() 139 E_TRACE("TEEC_InitializeContext failed with code TEEC res= 0x%x", res); in rk_oem_otp_key_is_written() 146 E_TRACE("TEEC_Opensession failed with code TEEC res= 0x%x origin 0x%x", in rk_oem_otp_key_is_written() 161 E_TRACE("Check if it has been set oem_hr_otp_read_lock!"); in rk_oem_otp_key_is_written() 163 E_TRACE("InvokeCommand ERR! TEEC res= 0x%x, error_origin= 0x%x", in rk_oem_otp_key_is_written() 192 E_TRACE("TEEC_InitializeContext failed with code TEEC res= 0x%x", res); in rk_set_oem_hr_otp_read_lock() 199 E_TRACE("TEEC_Opensession failed with code TEEC res= 0x%x origin 0x%x", in rk_set_oem_hr_otp_read_lock() 214 E_TRACE("InvokeCommand ERR! TEEC res= 0x%x, error_origin= 0x%x", in rk_set_oem_hr_otp_read_lock() [all …]
|
| H A D | rkcrypto_core.c | 81 E_TRACE("RK_CRYPTO is uninitialized\n");\ 220 E_TRACE("malloc node error!\n"); in rk_add_sess_node() 314 E_TRACE("CIOCGSESSION error %d!\n", errno); in rk_create_session() 321 E_TRACE("rk_add_sess_node error[%x]!\n", res); in rk_create_session() 336 E_TRACE("CIOCFSESSION error!"); in rk_destroy_session() 407 E_TRACE("open cryptodev error!\n"); in rk_crypto_init() 413 E_TRACE("cryptodev F_SETFD error!\n"); in rk_crypto_init() 470 E_TRACE("rk_get_crypto_id error!\n"); in rk_cipher_init() 494 E_TRACE("rk_get_sess_config error!\n"); in rk_cipher_crypt() 511 E_TRACE("RIOCCRYPT_FD error!\n"); in rk_cipher_crypt() [all …]
|
| H A D | rkcrypto_mem.c | 99 E_TRACE("failed to get dma dma_node_fd.\n"); in crypto_alloc_node_drm() 106 E_TRACE("failed to ioctl gem map offset."); in crypto_alloc_node_drm() 121 E_TRACE("failed to mmap buffer. offset = %"PRIu64", reason: %s\n", in crypto_alloc_node_drm() 205 E_TRACE("DMA_HEAP_ALLOC_BUFFER failed\n"); in crypto_alloc_node_dma_heap() 221 E_TRACE("failed to mmap buffer. fd = %"PRIu64", reason: %s\n", in crypto_alloc_node_dma_heap()
|
| H A D | rkcrypto_random.c | 24 E_TRACE("open %s error!", HWRNG_NODE); in rk_get_random() 30 E_TRACE("read %s error!", HWRNG_NODE); in rk_get_random()
|
| H A D | rkcrypto_rsa_helper.c | 192 E_TRACE("key_len is invalid.\n"); in rsa_padding_add_pkcs1_type() 238 E_TRACE("BT(0x%x) is invalid.\n", plen); in rsa_padding_add_pkcs1_type() 272 E_TRACE("EB[0] != 0x00.\n"); in rsa_padding_check_pkcs1_type() 279 E_TRACE("EB[1] != BT(0x%x).\n", bt); in rsa_padding_check_pkcs1_type() 313 E_TRACE("BT(0x%x) is invalid.\n", bt); in rsa_padding_check_pkcs1_type() 318 E_TRACE("PS Error.\n"); in rsa_padding_check_pkcs1_type()
|
| /OK3568_Linux_fs/external/security/librkcrypto/include/ |
| H A D | rkcrypto_trace.h | 31 #define E_TRACE(...) \ macro 40 E_TRACE("RK_CRYPTO_CHECK_PARAM ERR! 0x%08x", RK_CRYPTO_ERR_PARAMETER);\
|