@@ -107,17 +107,17 @@ int SE05XClass::begin()
107
107
se05x_ic_power_on ();
108
108
109
109
if (nLog_Init () != 0 ) {
110
- LOG_E (" Lock initialisation failed" );
110
+ SE05X_PRINT_ERROR (" Lock initialisation failed" );
111
111
return 0 ;
112
112
}
113
113
114
114
if (kStatus_SSS_Success != ex_sss_boot_open (&_boot_ctx, " portName" )) {
115
- LOG_E (" ex_sss_session_open Failed" );
115
+ SE05X_PRINT_ERROR (" ex_sss_session_open Failed" );
116
116
return 0 ;
117
117
}
118
118
119
119
if (kStatus_SSS_Success != ex_sss_key_store_and_object_init (&_boot_ctx)) {
120
- LOG_E (" ex_sss_key_store_and_object_init Failed" );
120
+ SE05X_PRINT_ERROR (" ex_sss_key_store_and_object_init Failed" );
121
121
return 0 ;
122
122
}
123
123
@@ -231,7 +231,7 @@ int SE05XClass::generatePrivateKey(int keyId, byte pubKeyDer[], size_t pubKeyDer
231
231
}
232
232
233
233
if (status != kStatus_SSS_Success ) {
234
- LOG_E (" sss_key_store_get_key Failed" );
234
+ SE05X_PRINT_ERROR (" sss_key_store_get_key Failed" );
235
235
return 0 ;
236
236
}
237
237
@@ -270,7 +270,7 @@ int SE05XClass::generatePublicKey(int keyId, byte pubKeyDer[], size_t pubKeyDerM
270
270
status = sss_key_store_get_key (&_boot_ctx.ks , &keyObject, pubKeyDer, pubKeyDerlen, &derSzBits);
271
271
272
272
if (status != kStatus_SSS_Success ) {
273
- LOG_E (" sss_key_store_get_key Failed" );
273
+ SE05X_PRINT_ERROR (" sss_key_store_get_key Failed" );
274
274
return 0 ;
275
275
}
276
276
@@ -306,7 +306,7 @@ int SE05XClass::importPublicKey(int keyId, const byte pubKeyDer[], size_t pubKey
306
306
status = sss_key_store_set_key (&_boot_ctx.ks , &keyObject, pubKeyDer, pubKeyDerLen, _key_size_bits, NULL , 0 );
307
307
308
308
if (status != kStatus_SSS_Success ) {
309
- LOG_E (" sss_key_store_set_key Failed" );
309
+ SE05X_PRINT_ERROR (" sss_key_store_set_key Failed" );
310
310
return 0 ;
311
311
}
312
312
@@ -320,7 +320,7 @@ int SE05XClass::beginSHA256()
320
320
status = sss_digest_context_init (&_digest_ctx, &_boot_ctx.session , kAlgorithm_SSS_SHA256 , kMode_SSS_Digest );
321
321
322
322
if (status != kStatus_SSS_Success ) {
323
- LOG_E (" sss_digest_context_init Failed!!!" );
323
+ SE05X_PRINT_ERROR (" sss_digest_context_init Failed!!!" );
324
324
return 0 ;
325
325
}
326
326
@@ -334,7 +334,7 @@ int SE05XClass::updateSHA256(const byte in[], size_t inLen)
334
334
status = sss_digest_update (&_digest_ctx, in, inLen);
335
335
336
336
if (status != kStatus_SSS_Success ) {
337
- LOG_E (" sss_digest_update Failed!!!" );
337
+ SE05X_PRINT_ERROR (" sss_digest_update Failed!!!" );
338
338
return 0 ;
339
339
}
340
340
@@ -360,15 +360,15 @@ int SE05XClass::SHA256(const byte in[], size_t inLen, byte out[], size_t outMaxL
360
360
361
361
status = sss_digest_context_init (&_digest_ctx, &_boot_ctx.session , kAlgorithm_SSS_SHA256 , kMode_SSS_Digest );
362
362
if (status != kStatus_SSS_Success ) {
363
- LOG_E (" sss_digest_context_init Failed!!!" );
363
+ SE05X_PRINT_ERROR (" sss_digest_context_init Failed!!!" );
364
364
return 0 ;
365
365
}
366
366
367
367
* outLen = outMaxLen;
368
368
status = sss_digest_one_go (&_digest_ctx, in, inLen, out, outLen);
369
369
sss_digest_context_free (&_digest_ctx);
370
370
if (status != kStatus_SSS_Success ) {
371
- LOG_E (" sss_digest_one_go Failed!!!" );
371
+ SE05X_PRINT_ERROR (" sss_digest_one_go Failed!!!" );
372
372
return 0 ;
373
373
}
374
374
@@ -392,13 +392,13 @@ int SE05XClass::Sign(int keyId, const byte hash[], size_t hashLen, byte sig[], s
392
392
kMode_SSS_Sign );
393
393
394
394
if (status != kStatus_SSS_Success ) {
395
- LOG_E (" sss_asymmetric_context_init Failed" );
395
+ SE05X_PRINT_ERROR (" sss_asymmetric_context_init Failed" );
396
396
return 0 ;
397
397
}
398
398
399
399
* sigLen = sigMaxLen;
400
400
if (kStatus_SSS_Success != sss_asymmetric_sign_digest (&ctx_asymm, (uint8_t *)hash, hashLen, (uint8_t *)sig, sigLen)) {
401
- LOG_E (" sss_asymmetric_sign_digest Failed" );
401
+ SE05X_PRINT_ERROR (" sss_asymmetric_sign_digest Failed" );
402
402
return 0 ;
403
403
}
404
404
@@ -440,12 +440,12 @@ int SE05XClass::Verify(int keyId, const byte hash[], size_t hashLen, const byte
440
440
kMode_SSS_Verify );
441
441
442
442
if (status != kStatus_SSS_Success ) {
443
- LOG_E (" sss_asymmetric_context_init Failed" );
443
+ SE05X_PRINT_ERROR (" sss_asymmetric_context_init Failed" );
444
444
return 0 ;
445
445
}
446
446
447
447
if (kStatus_SSS_Success != sss_asymmetric_verify_digest (&ctx_asymm, (uint8_t *)hash, hashLen, (uint8_t *)sig, sigLen)) {
448
- LOG_E (" sss_asymmetric_verify_digest Failed" );
448
+ SE05X_PRINT_ERROR (" sss_asymmetric_verify_digest Failed" );
449
449
return 0 ;
450
450
}
451
451
@@ -490,7 +490,7 @@ int SE05XClass::readBinaryObject(int objectId, byte data[], size_t dataMaxLen, s
490
490
* length = dataMaxLen;
491
491
status = sss_key_store_get_key (&_boot_ctx.ks , &binObject, data, length, &binSizeBits);
492
492
if (status != kStatus_SSS_Success ) {
493
- LOG_E (" sss_key_store_get_key Failed" );
493
+ SE05X_PRINT_ERROR (" sss_key_store_get_key Failed" );
494
494
return 0 ;
495
495
}
496
496
@@ -514,7 +514,7 @@ int SE05XClass::writeBinaryObject(int objectId, const byte data[], size_t length
514
514
515
515
status = sss_key_store_set_key (&_boot_ctx.ks , &binObject, data, length, length * 8 , NULL , 0 );
516
516
if (status != kStatus_SSS_Success ) {
517
- LOG_E (" sss_key_store_set_key Failed" );
517
+ SE05X_PRINT_ERROR (" sss_key_store_set_key Failed" );
518
518
return 0 ;
519
519
}
520
520
@@ -553,7 +553,7 @@ int SE05XClass::deleteBinaryObject(int objectId)
553
553
554
554
status = sss_key_store_erase_key (&_boot_ctx.ks , &binObject);
555
555
if (status != kStatus_SSS_Success ) {
556
- LOG_E (" sss_key_store_erase_key Failed" );
556
+ SE05X_PRINT_ERROR (" sss_key_store_erase_key Failed" );
557
557
return 0 ;
558
558
}
559
559
@@ -576,12 +576,12 @@ int SE05XClass::getObjectHandle(int objectId, sss_object_t * object)
576
576
sss_status_t status;
577
577
578
578
if (kStatus_SSS_Success != sss_key_object_init (object, &_boot_ctx.ks )) {
579
- LOG_E (" sss_key_object_init Failed" );
579
+ SE05X_PRINT_ERROR (" sss_key_object_init Failed" );
580
580
return 0 ;
581
581
}
582
582
583
583
if (kStatus_SSS_Success != sss_key_object_get_handle (object, objectId)) {
584
- LOG_E (" sss_key_object_get_handle Failed" );
584
+ SE05X_PRINT_ERROR (" sss_key_object_get_handle Failed" );
585
585
return 0 ;
586
586
}
587
587
@@ -597,14 +597,14 @@ int SE05XClass::initObject(size_t objectId, sss_object_t * object, sss_key_part_
597
597
sss_status_t status;
598
598
599
599
if (kStatus_SSS_Success != sss_key_object_init (object, &_boot_ctx.ks )) {
600
- LOG_E (" sss_key_object_init Failed" );
600
+ SE05X_PRINT_ERROR (" sss_key_object_init Failed" );
601
601
return 0 ;
602
602
}
603
603
604
604
status = sss_key_object_get_handle (object, objectId);
605
605
606
606
if (status != kStatus_SSS_Success ) {
607
- LOG_E (" sss_key_object_get_handle Failed" );
607
+ SE05X_PRINT_ERROR (" sss_key_object_get_handle Failed" );
608
608
status = sss_key_object_allocate_handle (object,
609
609
objectId,
610
610
objectPart,
@@ -614,7 +614,7 @@ int SE05XClass::initObject(size_t objectId, sss_object_t * object, sss_key_part_
614
614
}
615
615
616
616
if (status != kStatus_SSS_Success ) {
617
- LOG_E (" sss_key_object_allocate_handle Failed" );
617
+ SE05X_PRINT_ERROR (" sss_key_object_allocate_handle Failed" );
618
618
return 0 ;
619
619
}
620
620
0 commit comments