Lines Matching refs:stderr

92             fprintf(stderr, "Failed to open /dev/urandom. Cannot procceed!\n");  in rand32_no_zero_bytes()
100 fprintf(stderr, "Failed to read /dev/urandom. Cannot procceed!\n"); in rand32_no_zero_bytes()
134 printHashRev(stderr, "RSA cyphertext", rsa->num, RSA_LIMBS); in validateSignature()
143 printHashRev(stderr, "RSA plaintext", rsaResult, RSA_LIMBS); in validateSignature()
147 fprintf(stderr, "Padding header is invalid\n"); in validateSignature()
153 fprintf(stderr, "Padding bytes 0..1 are invalid\n"); in validateSignature()
159 fprintf(stderr, "Padding last bytes & terminator invalid\n"); in validateSignature()
166 fprintf(stderr, "Padding word %d invalid\n", i); in validateSignature()
171 printHash(stderr, "Recovered hash ", rsaResult, SHA2_HASH_WORDS); in validateSignature()
172 printHash(stderr, "Calculated hash", refHash, SHA2_HASH_WORDS); in validateSignature()
178 fprintf(stderr, "hash mismatch\n"); in validateSignature()
207 fprintf(stderr, "Invalid text RSA input data\n"); in handleConvertKey()
221 fprintf(stderr, "Conversion status: %d\n", ret); in handleConvertKey()
243 fprintf(stderr, "Invalid signature header: file is too short\n"); in handleVerify()
248 … fprintf(stderr, "Original Data len=%" PRIu32 " b; file size=%" PRIu32 " b; diff=%" PRIu32 " b\n", in handleVerify()
252 fprintf(stderr, "image is not marked as signed, can not verify\n"); in handleVerify()
257 fprintf(stderr, "Invalid signature header: data size mismatch\n"); in handleVerify()
267 fprintf(stderr, "Signature verification failed: signature block #%d\n", block); in handleVerify()
271 fprintf(stderr, "Key in block %d is trusted\n", block); in handleVerify()
282 fprintf(stderr, "Trusted key is not the last in key sequence\n"); in handleVerify()
293 printHash(stderr, "File hash", hash, SHA2_HASH_WORDS); in handleVerify()
295 printHashRev(stderr, "File PubKey", (uint32_t *)(sigPack + RSA_BYTES), RSA_LIMBS); in handleVerify()
297 fprintf(stderr, "Signature verification failed on raw data\n"); in handleVerify()
301 fprintf(stderr, "Signature verification passed and the key is trusted\n"); in handleVerify()
304 fprintf(stderr, "Signature verification passed but the key is not trusted\n"); in handleVerify()
308 fprintf(stderr, "Not enough raw data to extract signature from\n"); in handleVerify()
336 fprintf(stderr, "Generating signature header\n"); in handleSign()
341 fprintf(stderr, "Rehashing file\n"); in handleSign()
348 fprintf(stderr, "Invalid signature block(s) detected\n"); in handleSign()
351 fprintf(stderr, "Found %d appended signature(s)\n", numSigs); in handleSign()
353 fprintf(stderr, "Hashing last signature's PubKey\n"); in handleSign()
359 fprintf(stderr, "Signing raw data\n"); in handleSign()
367 printHash(stderr, "SHA2 hash", hash, SHA2_HASH_WORDS); in handleSign()
380 printHashRev(stderr, "RSA plaintext", rsa->num, RSA_LIMBS); in handleSign()
383 fprintf(stderr, "Retriculating splines..."); in handleSign()
385 fprintf(stderr, "DONE\n"); in handleSign()
389 printHashRev(stderr, "RSA cyphertext", rsaResult, RSA_LIMBS); in handleSign()
397 fprintf(stderr, "Status: %s (%d)\n", ret == 0 ? "success" : "failed", ret); in handleSign()
405 fprintf(stderr, "Error: %s: %s\n\n", msg, arg); in fatalUsage()
407 fprintf(stderr, "Error: %s\n\n", msg); in fatalUsage()
409 …fprintf(stderr, "USAGE: %s [-v] [-e <pvt key>] [-m <pub key>] [-t] [-s] [-b] <input file> [<output… in fatalUsage()
507 printHashRev(stderr, "RSA exponent", rsa.exponent, RSA_LIMBS); in main()
515 printHashRev(stderr, "RSA modulus", rsa.modulus, RSA_LIMBS); in main()
519 fprintf(stderr, "Read %" PRIu32 " bytes\n", bufUsed); in main()
527 fprintf(stderr, "Found AOSP header\n"); in main()
529 fprintf(stderr, "Unknown binary format\n"); in main()