Lines Matching defs:error
82 keymaster_error_t* error) {
83 *error = KM_ERROR_OK;
92 *error = KM_ERROR_UNSUPPORTED_KEY_SIZE;
99 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
103 *error = KM_ERROR_UNSUPPORTED_BLOCK_MODE;
107 *error = KM_ERROR_INCOMPATIBLE_BLOCK_MODE;
113 *error = GetAndValidateGcmTagLength(begin_params, key.authorizations(), &tag_length);
114 if (*error != KM_ERROR_OK) {
120 if (!GetAndValidatePadding(begin_params, key, &padding, error)) {
125 *error = KM_ERROR_INCOMPATIBLE_PADDING_MODE;
144 *error = KM_ERROR_UNSUPPORTED_PURPOSE;
149 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
199 keymaster_error_t error;
201 if (!HandleAad(additional_params, input, &error))
202 return error;
204 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error))
205 return error;
211 inline bool is_bad_decrypt(unsigned long error) {
212 return (ERR_GET_LIB(error) == ERR_LIB_CIPHER && //
213 ERR_GET_REASON(error) == CIPHER_R_BAD_DECRYPT);
222 keymaster_error_t error;
224 !ProcessBufferedAadBlock(&error)) {
225 return error;
232 LOG_E("Error encrypting final block: %s", ERR_error_string(ERR_peek_last_error(), NULL));
379 keymaster_error_t* error) {
381 assert(error);
386 *error = KM_ERROR_INVALID_TAG;
392 if (aad_block_buf_length_ == AES_BLOCK_SIZE && !ProcessBufferedAadBlock(error))
397 if (blocks_to_process && !ProcessAadBlocks(aad.data, blocks_to_process, error))
409 if (aad_block_buf_length_ > 0 && !ProcessBufferedAadBlock(error))
416 bool AesEvpOperation::ProcessBufferedAadBlock(keymaster_error_t* error) {
423 *error = TranslateLastOpenSslError();
428 keymaster_error_t* error) {
432 *error = TranslateLastOpenSslError();
449 keymaster_error_t* error) {
451 assert(error);
457 *error = KM_ERROR_MEMORY_ALLOCATION_FAILED;
463 *error = TranslateLastOpenSslError();
475 keymaster_error_t error = KM_ERROR_OK;
477 error = GenerateIv();
479 error = GetIv(input_params);
481 error = KM_ERROR_CALLER_NONCE_PROHIBITED;
483 if (error == KM_ERROR_OK)
486 return error;
498 keymaster_error_t error =
500 if (error != KM_ERROR_OK)
501 return error;
529 keymaster_error_t error = GetIv(input_params);
530 if (error != KM_ERROR_OK)
531 return error;
551 // Barring error, we'll consume it all.
554 keymaster_error_t error;
556 if (!HandleAad(additional_params, input, &error))
557 return error;
561 if (!InternalUpdate(input.peek_read(), input.available_read(), output, &error))
562 return error;
582 keymaster_error_t error;
583 if (!ProcessTagBufContentsAsData(to_process_from_tag_buf, output, &error))
584 return error;
586 if (!InternalUpdate(input.peek_read(), to_process_from_input, output, &error))
587 return error;
597 keymaster_error_t* error) {
599 if (!InternalUpdate(tag_buf_.get(), to_process, output, error))