Add the beginnings of logging infrastructure.
Change-Id: Ic36134402bfbb098d2242c463a3b4265d1d65209
diff --git a/asymmetric_key.cpp b/asymmetric_key.cpp
index 8698ff4..b3bf733 100644
--- a/asymmetric_key.cpp
+++ b/asymmetric_key.cpp
@@ -121,7 +121,8 @@
}
/* static */
-RsaKey* RsaKey::GenerateKey(const AuthorizationSet& key_description, keymaster_error_t* error) {
+RsaKey* RsaKey::GenerateKey(const AuthorizationSet& key_description, const Logger& logger,
+ keymaster_error_t* error) {
if (!error)
return NULL;
@@ -149,14 +150,14 @@
return NULL;
}
- RsaKey* new_key = new RsaKey(rsa_key.release(), authorizations);
+ RsaKey* new_key = new RsaKey(rsa_key.release(), authorizations, logger);
*error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
return new_key;
}
/* static */
RsaKey* RsaKey::ImportKey(const AuthorizationSet& key_description, EVP_PKEY* pkey,
- keymaster_error_t* error) {
+ const Logger& logger, keymaster_error_t* error) {
if (!error)
return NULL;
*error = KM_ERROR_UNKNOWN_ERROR;
@@ -213,10 +214,11 @@
// missing, the error will be diagnosed when the key is used (when auth checking is
// implemented).
*error = KM_ERROR_OK;
- return new RsaKey(rsa_key.release(), authorizations);
+ return new RsaKey(rsa_key.release(), authorizations, logger);
}
-RsaKey::RsaKey(const KeyBlob& blob, keymaster_error_t* error) : AsymmetricKey(blob) {
+RsaKey::RsaKey(const KeyBlob& blob, const Logger& logger, keymaster_error_t* error)
+ : AsymmetricKey(blob, logger) {
if (error)
*error = LoadKey(blob);
}
@@ -264,7 +266,8 @@
delete[] blob.data;
}
-DsaKey* DsaKey::GenerateKey(const AuthorizationSet& key_description, keymaster_error_t* error) {
+DsaKey* DsaKey::GenerateKey(const AuthorizationSet& key_description, const Logger& logger,
+ keymaster_error_t* error) {
if (!error)
return NULL;
@@ -325,12 +328,13 @@
return NULL;
}
- DsaKey* new_key = new DsaKey(dsa_key.release(), authorizations);
+ DsaKey* new_key = new DsaKey(dsa_key.release(), authorizations, logger);
*error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
return new_key;
}
-DsaKey::DsaKey(const KeyBlob& blob, keymaster_error_t* error) : AsymmetricKey(blob) {
+DsaKey::DsaKey(const KeyBlob& blob, const Logger& logger, keymaster_error_t* error)
+ : AsymmetricKey(blob, logger) {
if (error)
*error = LoadKey(blob);
}
@@ -363,7 +367,8 @@
}
/* static */
-EcdsaKey* EcdsaKey::GenerateKey(const AuthorizationSet& key_description, keymaster_error_t* error) {
+EcdsaKey* EcdsaKey::GenerateKey(const AuthorizationSet& key_description, const Logger& logger,
+ keymaster_error_t* error) {
if (!error)
return NULL;
@@ -396,7 +401,7 @@
return NULL;
}
- EcdsaKey* new_key = new EcdsaKey(ecdsa_key.release(), authorizations);
+ EcdsaKey* new_key = new EcdsaKey(ecdsa_key.release(), authorizations, logger);
*error = new_key ? KM_ERROR_OK : KM_ERROR_MEMORY_ALLOCATION_FAILED;
return new_key;
}
@@ -425,7 +430,8 @@
}
}
-EcdsaKey::EcdsaKey(const KeyBlob& blob, keymaster_error_t* error) : AsymmetricKey(blob) {
+EcdsaKey::EcdsaKey(const KeyBlob& blob, const Logger& logger, keymaster_error_t* error)
+ : AsymmetricKey(blob, logger) {
if (error)
*error = LoadKey(blob);
}