Lines Matching refs:stderr
92 fprintf(stderr, "Failed to open /dev/urandom. Cannot procceed!\n");
100 fprintf(stderr, "Failed to read /dev/urandom. Cannot procceed!\n");
134 printHashRev(stderr, "RSA cyphertext", rsa->num, RSA_LIMBS);
143 printHashRev(stderr, "RSA plaintext", rsaResult, RSA_LIMBS);
147 fprintf(stderr, "Padding header is invalid\n");
153 fprintf(stderr, "Padding bytes 0..1 are invalid\n");
159 fprintf(stderr, "Padding last bytes & terminator invalid\n");
166 fprintf(stderr, "Padding word %d invalid\n", i);
171 printHash(stderr, "Recovered hash ", rsaResult, SHA2_HASH_WORDS);
172 printHash(stderr, "Calculated hash", refHash, SHA2_HASH_WORDS);
178 fprintf(stderr, "hash mismatch\n");
207 fprintf(stderr, "Invalid text RSA input data\n");
221 fprintf(stderr, "Conversion status: %d\n", ret);
243 fprintf(stderr, "Invalid signature header: file is too short\n");
248 fprintf(stderr, "Original Data len=%" PRIu32 " b; file size=%" PRIu32 " b; diff=%" PRIu32 " b\n",
252 fprintf(stderr, "image is not marked as signed, can not verify\n");
257 fprintf(stderr, "Invalid signature header: data size mismatch\n");
267 fprintf(stderr, "Signature verification failed: signature block #%d\n", block);
271 fprintf(stderr, "Key in block %d is trusted\n", block);
282 fprintf(stderr, "Trusted key is not the last in key sequence\n");
293 printHash(stderr, "File hash", hash, SHA2_HASH_WORDS);
295 printHashRev(stderr, "File PubKey", (uint32_t *)(sigPack + RSA_BYTES), RSA_LIMBS);
297 fprintf(stderr, "Signature verification failed on raw data\n");
301 fprintf(stderr, "Signature verification passed and the key is trusted\n");
304 fprintf(stderr, "Signature verification passed but the key is not trusted\n");
308 fprintf(stderr, "Not enough raw data to extract signature from\n");
336 fprintf(stderr, "Generating signature header\n");
341 fprintf(stderr, "Rehashing file\n");
348 fprintf(stderr, "Invalid signature block(s) detected\n");
351 fprintf(stderr, "Found %d appended signature(s)\n", numSigs);
353 fprintf(stderr, "Hashing last signature's PubKey\n");
359 fprintf(stderr, "Signing raw data\n");
367 printHash(stderr, "SHA2 hash", hash, SHA2_HASH_WORDS);
380 printHashRev(stderr, "RSA plaintext", rsa->num, RSA_LIMBS);
383 fprintf(stderr, "Retriculating splines...");
385 fprintf(stderr, "DONE\n");
389 printHashRev(stderr, "RSA cyphertext", rsaResult, RSA_LIMBS);
397 fprintf(stderr, "Status: %s (%d)\n", ret == 0 ? "success" : "failed", ret);
405 fprintf(stderr, "Error: %s: %s\n\n", msg, arg);
407 fprintf(stderr, "Error: %s\n\n", msg);
409 fprintf(stderr, "USAGE: %s [-v] [-e <pvt key>] [-m <pub key>] [-t] [-s] [-b] <input file> [<output file>]\n"
507 printHashRev(stderr, "RSA exponent", rsa.exponent, RSA_LIMBS);
515 printHashRev(stderr, "RSA modulus", rsa.modulus, RSA_LIMBS);
519 fprintf(stderr, "Read %" PRIu32 " bytes\n", bufUsed);
527 fprintf(stderr, "Found AOSP header\n");
529 fprintf(stderr, "Unknown binary format\n");