/packages/modules/DnsResolver/ |
D | DnsTlsSocket.cpp | 72 LOG(DEBUG) << mMark << " connecting TCP socket"; in tcpConnect() 84 LOG(ERROR) << "Failed to create socket"; in tcpConnect() 92 LOG(ERROR) << "Failed to set socket mark"; in tcpConnect() 99 LOG(WARNING) << "Failed to enable TFO: " << tfo.msg(); in tcpConnect() 108 LOG(DEBUG) << "Socket failed to connect"; in tcpConnect() 121 LOG(ERROR) << "Failed to read cert"; in setTestCaCertificate() 127 LOG(ERROR) << "Failed to add cert"; in setTestCaCertificate() 153 LOG(WARNING) << "Setting test CA certificate. This should never happen in production code."; in initialize() 155 LOG(ERROR) << "Failed to set test CA certificate"; in initialize() 160 LOG(ERROR) << "Failed to load CA cert dir: " << kCaCertDir; in initialize() [all …]
|
D | res_cache.cpp | 338 LOG(INFO) << __func__ << ": malformed QNAME"; in _dnsPacket_checkQName() 354 LOG(INFO) << __func__ << ": unsupported TYPE"; in _dnsPacket_checkQR() 359 LOG(INFO) << __func__ << ": unsupported CLASS"; in _dnsPacket_checkQR() 374 LOG(INFO) << __func__ << ": query packet too small"; in _dnsPacket_checkQuery() 381 LOG(INFO) << __func__ << ": query packet flags unsupported"; in _dnsPacket_checkQuery() 409 LOG(INFO) << __func__ << ": query packet contains non-query records"; in _dnsPacket_checkQuery() 414 LOG(INFO) << __func__ << ": query packet doesn't contain query record"; in _dnsPacket_checkQuery() 457 LOG(INFO) << __func__ << ": INTERNAL_ERROR: read-overflow"; in _dnsPacket_hashQName() 466 LOG(INFO) << __func__ << ": INTERNAL_ERROR: malformed domain"; in _dnsPacket_hashQName() 470 LOG(INFO) << __func__ << ": INTERNAL_ERROR: simple label read-overflow"; in _dnsPacket_hashQName() [all …]
|
D | DnsTlsTransport.cpp | 47 LOG(DEBUG) << "No socket for query. Opening socket and sending."; in query() 71 LOG(DEBUG) << "Constructing new socket"; in doConnect() 77 LOG(DEBUG) << "Initialization succeeded. Reissuing " << queries.size() << " queries."; in doConnect() 84 LOG(DEBUG) << "Initialization failed."; in doConnect() 86 LOG(DEBUG) << "Failing all pending queries."; in doConnect() 123 LOG(DEBUG) << "Fast reconnect to retry remaining queries"; in doReconnect() 126 LOG(DEBUG) << "No pending queries. Going idle."; in doReconnect() 132 LOG(DEBUG) << "Destructor"; in ~DnsTlsTransport() 135 LOG(DEBUG) << "Locked destruction procedure"; in ~DnsTlsTransport() 143 LOG(DEBUG) << "Waiting for reconnect thread to terminate"; in ~DnsTlsTransport() [all …]
|
D | PrivateDnsConfiguration.cpp | 66 LOG(WARNING) << "Failed to parse server address (" << server << "): " << gai_strerror(err); in parseServer() 78 LOG(DEBUG) << "PrivateDnsConfiguration::set(" << netId << ", 0x" << std::hex << mark << std::dec in set() 94 LOG(DEBUG) << "Set DoT connect timeout " << server.connectTimeout.count() << "ms for " << s; in set() 121 LOG(ERROR) << "Memory error while recording private DNS for netId " << netId; in set() 165 LOG(DEBUG) << "PrivateDnsConfiguration::clear(" << netId << ")"; in clear() 176 LOG(DEBUG) << "Server " << addrToString(&server.ss) << " marked as in_process on netId " in validatePrivateDnsProvider() 208 LOG(WARNING) << "Validating DnsTlsServer on netId " << netId; in validatePrivateDnsProvider() 210 LOG(DEBUG) << "validateDnsTlsServer returned " << success << " for " in validatePrivateDnsProvider() 238 LOG(WARNING) << "netId " << netId << " was erased during private DNS validation"; in recordPrivateDnsValidation() 244 LOG(WARNING) << "netId " << netId << " has no private DNS validation mode"; in recordPrivateDnsValidation() [all …]
|
D | res_send.cpp | 425 LOG(DEBUG) << __func__; in res_nsend() 475 LOG(DEBUG) << __func__ << ": got answer from DoT"; in res_nsend() 532 LOG(DEBUG) << __func__ << ": Querying server (# " << ns + 1 in res_nsend() 558 LOG(INFO) << __func__ << ": used send_vc " << resplen << " terrno: " << terrno; in res_nsend() 565 LOG(INFO) << __func__ << ": used send_dg " << resplen << " terrno: " << terrno; in res_nsend() 616 LOG(DEBUG) << __func__ << ": got answer:"; in res_nsend() 650 LOG(INFO) << __func__ << ": using timeout of " << msec << " msec"; in get_timeout() 670 LOG(INFO) << __func__ << ": using send_vc"; in send_vc() 674 LOG(ERROR) << __func__ << ": Out-of-bound indexing: " << ns; in send_vc() 800 LOG(DEBUG) << __func__ << ": response truncated"; in send_vc() [all …]
|
D | DnsProxyListener.cpp | 83 LOG(VERBOSE) << __func__ << ": argv[" << i << "]=" << (argv[i] ? argv[i] : "null"); in logArguments() 370 LOG(ERROR) << __func__ 433 LOG(DEBUG) << __func__ << ": DNS records:"; in logDnsQueryResult() 437 LOG(DEBUG) << __func__ << ": [" << i << "] " << hp->h_addrtype; in logDnsQueryResult() 450 LOG(DEBUG) << __func__ << ": DNS records:"; in logDnsQueryResult() 457 LOG(DEBUG) << __func__ << ": [" << i << "] " << ai->ai_flags << " " << ai->ai_family in logDnsQueryResult() 460 LOG(DEBUG) << __func__ << ": [" << i << "] numeric hostname translation fail " << ret; in logDnsQueryResult() 467 LOG(ERROR) << __func__ << ": Only IPv6 NAT64 prefixes are supported " << prefix.family(); in isValidNat64Prefix() 471 LOG(ERROR) << __func__ << ": Only /96 NAT64 prefixes are supported " << prefix.length(); in isValidNat64Prefix() 498 LOG(VERBOSE) << __func__ << ": DNS A record: " << buf; in synthesizeNat64PrefixWithARecord() [all …]
|
/packages/modules/DnsResolver/tests/dns_responder/ |
D | dns_responder.cpp | 162 LOG(ERROR) << "parsing failed at line " << __LINE__; in read() 175 LOG(ERROR) << "logic error: all names are expected to end with a '.'"; in write() 180 LOG(ERROR) << "name component '" << name.substr(pos, dot_pos - pos) << "' is " << len in write() 185 LOG(ERROR) << "buffer overflow at line " << __LINE__; in write() 200 LOG(ERROR) << "parsing failed at line " << __LINE__; in parseField() 213 LOG(ERROR) << "parsing failed at line " << __LINE__; in parseField() 220 LOG(ERROR) << "name compression not implemented"; in parseField() 223 LOG(ERROR) << "invalid name field type"; in parseField() 230 LOG(ERROR) << "parsing failed at line " << __LINE__; in read() 234 LOG(ERROR) << "parsing failed at line " << __LINE__; in read() [all …]
|
D | dns_tls_frontend.cpp | 72 LOG(ERROR) << "SSL context creation failed"; in startServer() 80 LOG(ERROR) << "StringToX509Certs failed"; in startServer() 85 LOG(ERROR) << "SSL_CTX_use_certificate failed"; in startServer() 91 LOG(ERROR) << "Error loading client RSA Private Key data."; in startServer() 106 LOG(ERROR) << "frontend getaddrinfo(" << listen_address_.c_str() << ", " in startServer() 125 LOG(INFO) << "bound to TCP " << host_str.c_str() << ":" << listen_service_.c_str(); in startServer() 142 LOG(ERROR) << "backend getaddrinfo(" << listen_address_.c_str() << ", " in startServer() 168 LOG(INFO) << "server started successfully"; in startServer() 173 LOG(DEBUG) << "Request handler started"; in requestHandler() 194 LOG(DEBUG) << "Trying to accept a client"; in requestHandler() [all …]
|
/packages/apps/Nfc/nci/jni/ |
D | RoutingManager.cpp | 140 LOG(ERROR) << StringPrintf("%s: fail ee register; error=0x%X", fn, in initialize() 151 LOG(INFO) << fn << "Waiting for EE info"; in initialize() 162 LOG(ERROR) << StringPrintf("Failed to configure CE IsoDep technologies"); in initialize() 167 LOG(ERROR) << fn << "Failed to register wildcard AID for DH"; in initialize() 192 LOG(ERROR) << fn << "Fail to set default proto routing for T3T"; in enableRoutingToHost() 203 LOG(ERROR) << fn << "Fail to set default proto routing for IsoDep"; in enableRoutingToHost() 216 LOG(ERROR) << fn << "Fail to set default tech routing for Nfc-A"; in enableRoutingToHost() 229 LOG(ERROR) << fn << "Fail to set default tech routing for Nfc-B"; in enableRoutingToHost() 242 LOG(ERROR) << fn << "Fail to set default tech routing for Nfc-F"; in enableRoutingToHost() 258 LOG(ERROR) << fn << "Fail to clear default proto routing for IsoDep"; in disableRoutingToHost() [all …]
|
D | NativeNfcTag.cpp | 256 LOG(ERROR) << StringPrintf("%s: Unknown event %u ????", __func__, event); in ndefHandlerCallback() 385 LOG(ERROR) << StringPrintf("%s: semaphore creation failed (errno=0x%08x)", in nativeNfcTag_doWrite() 405 LOG(ERROR) << StringPrintf("%s: can't format mifare classic tag", in nativeNfcTag_doWrite() 418 LOG(ERROR) << StringPrintf("%s: can't format mifare classic tag", in nativeNfcTag_doWrite() 427 LOG(ERROR) << StringPrintf("%s: can't format mifare classic tag", in nativeNfcTag_doWrite() 465 LOG(ERROR) << StringPrintf("%s: write/format error=%d", __func__, status); in nativeNfcTag_doWrite() 472 LOG(ERROR) << StringPrintf("%s: wait semaphore (errno=0x%08x)", __func__, in nativeNfcTag_doWrite() 482 LOG(ERROR) << StringPrintf("%s: failed destroy semaphore (errno=0x%08x)", in nativeNfcTag_doWrite() 558 LOG(ERROR) << StringPrintf("%s: Handle not found", __func__); in nativeNfcTag_doConnect() 564 LOG(ERROR) << StringPrintf("%s: tag already deactivated", __func__); in nativeNfcTag_doConnect() [all …]
|
D | PeerToPeer.cpp | 226 LOG(ERROR) << StringPrintf("%s: service name=%s no free entry", fn, in registerServer() 236 LOG(ERROR) << StringPrintf("%s: invalid server handle", fn); in registerServer() 268 LOG(ERROR) << StringPrintf("%s: unknown server jni handle: %u", fn, in removeServer() 296 LOG(ERROR) << StringPrintf("%s: jni env is null", fn); in llcpActivatedHandler() 304 LOG(ERROR) << StringPrintf("%s: fail get p2p device", fn); in llcpActivatedHandler() 346 LOG(ERROR) << StringPrintf("%s: fail notify", fn); in llcpActivatedHandler() 371 LOG(ERROR) << StringPrintf("%s: jni env is null", fn); in llcpDeactivatedHandler() 383 LOG(ERROR) << StringPrintf("%s: fail notify", fn); in llcpDeactivatedHandler() 398 LOG(ERROR) << StringPrintf("%s: jni env is null", fn); in llcpFirstPacketHandler() 410 LOG(ERROR) << StringPrintf("%s: fail notify", fn); in llcpFirstPacketHandler() [all …]
|
/packages/modules/IPsec/src/java/com/android/internal/net/eap/statemachine/ |
D | EapSimAkaMethodStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 102 LOG.d( in EapSimAkaMethodStateMachine() 185 LOG.d(tag, "MK input=" + LOG.pii(mkInput)); in generateAndPersistKeys() 186 LOG.d(tag, "MK=" + LOG.pii(mk)); in generateAndPersistKeys() 187 LOG.d(tag, "K_encr=" + LOG.pii(mKEncr)); in generateAndPersistKeys() 188 LOG.d(tag, "K_aut=" + LOG.pii(mKAut)); in generateAndPersistKeys() 189 LOG.d(tag, "MSK=" + LOG.pii(mMsk)); in generateAndPersistKeys() 190 LOG.d(tag, "EMSK=" + LOG.pii(mEmsk)); in generateAndPersistKeys() 204 String msg = "UICC authentication failed. Input: " + LOG.pii(formattedChallenge); in processUiccAuthentication() 205 LOG.e(tag, msg); in processUiccAuthentication() [all …]
|
D | EapAkaMethodStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 245 LOG.e(mTAG, "Invalid attributes: " + eapAkaTypeData.attributeMap.keySet()); in process() 254 LOG.e(mTAG, "Unable to get IMSI for subId=" + mEapUiccConfig.subId); in process() 261 LOG.d(mTAG, "EAP-AKA/Identity=" + LOG.pii(identityString)); in process() 267 LOG.wtf(mTAG, "Exception thrown while making AtIdentity attribute", ex); in process() 327 LOG.e(mTAG, "Received unexpected EAP-Success"); in process() 366 LOG.e(mTAG, "Invalid attributes: " + eapAkaTypeData.attributeMap.keySet()); in process() 382 LOG.e(mTAG, "Invalid response returned from SIM", ex); in handleChallengeAuthentication() 399 LOG.wtf(mTAG, "Error creating an AtAuts attr", ex); in handleChallengeAuthentication() 421 LOG.e(mTAG, "Error computing MAC for EapMessage", ex); in handleChallengeAuthentication() [all …]
|
D | EapMsChapV2MethodStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 257 LOG.d( in process() 260 + " Challenge=" + LOG.pii(challengeRequest.challenge) in process() 275 LOG.e(mTAG, "Error generating EAP MSCHAPv2 Challenge response", ex); in process() 279 LOG.d( in process() 282 + " Username=" + LOG.pii(mEapMsChapV2Config.username) in process() 283 + " Peer-Challenge=" + LOG.pii(peerChallenge) in process() 284 + " NT-Response=" + LOG.pii(ntResponse)); in process() 300 LOG.e(mTAG, "Error building response type data", ex); in process() 332 LOG.e(mTAG, "Empty type data received in ValidateAuthenticatorState", ex); in process() [all …]
|
D | EapAkaPrimeMethodStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 237 LOG.i( in hasMatchingNetworkNames() 240 + " Peer: " + LOG.pii(peerNetworkName) in hasMatchingNetworkNames() 241 + ", Server: " + LOG.pii(serverNetworkName)); in hasMatchingNetworkNames() 284 LOG.d(mTAG, "K_encr=" + LOG.pii(mKEncr)); in generateAndPersistEapAkaKeys() 285 LOG.d(mTAG, "K_aut=" + LOG.pii(mKAut)); in generateAndPersistEapAkaKeys() 286 LOG.d(mTAG, "K_re=" + LOG.pii(mKRe)); in generateAndPersistEapAkaKeys() 287 LOG.d(mTAG, "MSK=" + LOG.pii(mMsk)); in generateAndPersistEapAkaKeys() 288 LOG.d(mTAG, "EMSK=" + LOG.pii(mEmsk)); in generateAndPersistEapAkaKeys() 293 LOG.e(mTAG, "Error while generating keys", ex); in generateAndPersistEapAkaKeys()
|
D | EapSimMethodStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 176 LOG.wtf(mTAG, "Exception thrown while creating AtNonceMt", ex); in process() 236 LOG.e(mTAG, "Invalid attributes: " + eapSimTypeData.attributeMap.keySet()); in process() 264 LOG.wtf(mTAG, "Exception thrown while making AtIdentity attribute", ex); in process() 267 LOG.e(mTAG, "Unable to get IMSI for subId=" + mEapUiccConfig.subId); in process() 336 LOG.d(mTAG, "EAP-SIM/Identity=" + LOG.pii(identity)); in getIdentityResponse() 370 LOG.e(mTAG, "Received unexpected EAP-Success"); in process() 411 LOG.e(mTAG, "Invalid attributes: " + eapSimTypeData.attributeMap.keySet()); in process() 422 LOG.e(mTAG, "Invalid SRES/Kc tuple returned from SIM", ex); in process() 436 LOG.e(mTAG, "Error while creating keys", ex); in process() [all …]
|
D | EapStateMachine.java | 19 import static com.android.internal.net.eap.EapAuthenticator.LOG; 88 LOG.d( in EapStateMachine() 91 + LOG.pii(eapSessionConfig.eapIdentity) in EapStateMachine() 104 LOG.d( in transitionTo() 118 LOG.d(getClass().getSimpleName(), in decode() 119 "Received packet=[" + LOG.pii(packet) + "]"); in decode() 139 LOG.i(getClass().getSimpleName(), msg); in decode() 248 LOG.d(mTAG, "Returning EAP-Identity: " + LOG.pii(mEapSessionConfig.eapIdentity)); in getIdentityResponse() 254 LOG.wtf(mTAG, "Failed to create Identity response for message with identifier=" in getIdentityResponse() 255 + LOG.pii(eapIdentifier)); in getIdentityResponse() [all …]
|
/packages/apps/Car/Settings/src/com/android/car/settings/suggestions/ |
D | SuggestionsPreferenceController.java | 60 private static final Logger LOG = new Logger(SuggestionsPreferenceController.class); field in SuggestionsPreferenceController 99 LOG.v("checkInitialized"); in checkInitialized() 110 LOG.v("onStartInternal"); in onStartInternal() 117 LOG.v("onStopInternal"); in onStopInternal() 124 LOG.v("onServiceConnected"); in onServiceConnected() 131 LOG.v("onServiceDisconnected"); in onServiceDisconnected() 138 LOG.v("onCreateLoader: " + id); in onCreateLoader() 149 LOG.v("onLoadFinished"); in onLoadFinished() 193 LOG.v("onLoaderReset"); in onLoaderReset() 198 LOG.v("launchSuggestion"); in launchSuggestion() [all …]
|
/packages/services/Car/service/src/com/android/car/garagemode/ |
D | WakeupPolicy.java | 35 private static final Logger LOG = new Logger("WakeupPolicy"); field in WakeupPolicy 57 LOG.d("Initiating WakupPolicy from resources ..."); in initFromResources() 68 LOG.e("No wake up policy configuration was loaded."); in getNextWakeUpInterval() 79 LOG.w("No more garage mode wake ups scheduled; been sleeping too long."); in getNextWakeUpInterval() 90 LOG.e("Trying to parse empty policies!"); in parsePolicy() 97 LOG.e("Invalid Policy! This rule has bad format: " + rule); in parsePolicy() 109 LOG.e("Policy has bad format: " + rule); in parseRule() 117 LOG.e("One of the values is empty. Please check format: " + rule); in parseRule() 131 LOG.d("Invalid input Rule for interval " + rule); in parseRule() 136 LOG.e("Time units map does not contain extension " + unit); in parseRule() [all …]
|
D | GarageMode.java | 43 private static final Logger LOG = new Logger("GarageMode"); field in GarageMode 77 LOG.d("" + numberRunning + " jobs are still running. Need to wait more ..."); 84 LOG.d("No jobs are running. No jobs are pending. Exiting Garage Mode."); 89 LOG.d("No jobs are running. Waited too long for " 94 LOG.d("No jobs are running. Waiting " + mAdditionalChecksToDo 120 LOG.i("Stopping background user:" + userToStop + " remaining users:" 126 LOG.i("all background users stopped"); 131 LOG.i("Waiting for jobs to finish, remaining users:" + remainingUsersToStop); 178 LOG.d("Entering GarageMode"); in enterGarageMode() 216 LOG.d("Cleaning up GarageMode"); in cleanupGarageMode() [all …]
|
/packages/apps/Bluetooth/jni/ |
D | com_android_bluetooth_hearing_aid.cpp | 47 LOG(INFO) << __func__; in OnConnectionState() 56 LOG(ERROR) << "Failed to new jbyteArray bd addr for connection state"; in OnConnectionState() 68 LOG(INFO) << __func__ << ": capabilities=" << +capabilities in OnDeviceAvailable() 78 LOG(ERROR) << "Failed to new jbyteArray bd addr for connection state"; in OnDeviceAvailable() 99 LOG(INFO) << __func__ << ": succeeds"; in classInitNative() 108 LOG(ERROR) << "Bluetooth module is not loaded"; in initNative() 113 LOG(INFO) << "Cleaning up HearingAid Interface before initializing..."; in initNative() 119 LOG(INFO) << "Cleaning up HearingAid callback object"; in initNative() 125 LOG(ERROR) << "Failed to allocate Global Ref for Hearing Aid Callbacks"; in initNative() 132 LOG(ERROR) << "Failed to get Bluetooth Hearing Aid Interface"; in initNative() [all …]
|
D | com_android_bluetooth_btservice_BluetoothKeystore.cpp | 47 LOG(INFO) << __func__; in set_encrypt_key_or_remove_key() 63 LOG(INFO) << __func__; in get_key() 97 LOG(INFO) << __func__ << ": succeeds"; in classInitNative() 106 LOG(ERROR) << "Bluetooth module is not loaded"; in initNative() 111 LOG(INFO) in initNative() 117 LOG(INFO) << "Cleaning up BluetoothKeystore callback object"; in initNative() 123 LOG(ERROR) in initNative() 131 LOG(ERROR) << "Failed to get BluetoothKeystore Interface"; in initNative() 144 LOG(ERROR) << "Bluetooth module is not loaded"; in cleanupNative()
|
/packages/apps/Nfc/nci/jni/extns/pn54x/src/ |
D | phNxpExtns.cpp | 62 LOG(ERROR) << StringPrintf("EXTNS_Init(): error null callback"); in EXTNS_Init() 70 LOG(ERROR) << StringPrintf("ERROR: MFC Module Init Failed"); in EXTNS_Init() 122 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcCallBack() 153 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcCheckNDef() 185 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcReadNDef() 213 LOG(ERROR) << StringPrintf("%s: semaphore creation failed (errno=%d)", in EXTNS_MfcPresenceCheck() 220 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcPresenceCheck() 254 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcSetReadOnly() 287 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcWriteNDef() 318 LOG(ERROR) << StringPrintf("Error Sending msg to Extension Thread"); in EXTNS_MfcFormatTag() [all …]
|
/packages/apps/Car/Settings/src/com/android/car/settings/tts/ |
D | TtsPlaybackPreferenceController.java | 61 private static final Logger LOG = new Logger(TtsPlaybackPreferenceController.class); field in TtsPlaybackPreferenceController 162 LOG.e("Got unknown activity result"); in processActivityResult() 170 LOG.d("Updating engine: Checking voice data: " + intent.toUri(0)); in startEngineVoiceDataCheck() 174 LOG.e("Failed to check TTS data, no activity found for " + intent); in startEngineVoiceDataCheck() 199 LOG.d("Getting sample text: " + intent.toUri(0)); in startGetSampleText() 202 LOG.e("Failed to get sample text, no activity found for " + intent + ")"); in startGetSampleText() 210 LOG.e("Voice data check complete, but no engine bound"); in onVoiceDataIntegrityCheckDone() 215 LOG.e("Engine failed voice data integrity check (null return or invalid result code)" in onVoiceDataIntegrityCheckDone() 248 LOG.d("Got sample text: " + sample); in onSampleTextReceived() 250 LOG.d("Using default sample text :" + sample); in onSampleTextReceived() [all …]
|
/packages/apps/Car/Settings/src/com/android/car/settings/security/ |
D | CredentialStorageActivity.java | 53 private static final Logger LOG = new Logger(CredentialStorageActivity.class); field in CredentialStorageActivity 149 LOG.e(ACTION_INSTALL + " must be started with startActivityForResult"); in checkCallerIsCertInstallerOrSelfInProfile() 157 LOG.w("Unable to verify calling identity. ActivityManager is down.", e); in checkCallerIsCertInstallerOrSelfInProfile() 186 LOG.e("Failed to install credentials as uid " + uid in installIfAvailable() 200 LOG.e("Cannot install key without an alias"); in installIfAvailable() 241 LOG.w("Failed to reset KeyChain", e); in doInBackground() 247 LOG.w("Failed to reset KeyChain", e); in doInBackground() 297 LOG.w(String.format("Failed to install key %s to uid %d", mAlias, mUid), e); in doInBackground() 300 LOG.w(String.format("Interrupted while installing key %s", mAlias), e); in doInBackground() 308 LOG.i(String.format("Marked alias %s as selectable, success? %s", in onPostExecute() [all …]
|