Lines Matching refs:pkiDebug

103     pkiDebug("kdc_options = 0x%x  till = %d\n",
107 pkiDebug("No request->client; aborting PKINIT\n");
114 pkiDebug("pkinit_get_kdc_cert returned %d\n", retval);
121 pkiDebug("encode_krb5_kdc_req_body returned %d\n", (int) retval);
130 pkiDebug("calculating checksum on buf size (%d)\n", der_req->length);
148 pkiDebug("error %d on pkinit_as_req_create; aborting PKINIT\n",
238 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type);
279 pkiDebug("as_req: unrecognized pa_type = %d\n",
287 pkiDebug("as_req: DH key transport algorithm\n");
290 pkiDebug("failed to copy dh_oid\n");
301 pkiDebug("failed to create dh parameters\n");
306 pkiDebug("as_req: RSA key transport algorithm\n");
318 pkiDebug("as_req: unknown key transport protocol %d\n",
335 pkiDebug("failed to encode the AuthPack %d\n", retval);
397 pkiDebug("failed to create pkcs7 signed data\n");
454 pkiDebug("pkinit_as_req_create retval=%d\n", (int) retval);
478 pkiDebug("pa_pkinit_parse_rep: no in_padata\n");
489 pkiDebug("pkinit_as_rep_parse returned %d (%s)\n",
523 pkiDebug("%s: No pkinit_kdc_hostname values found in config file\n",
527 pkiDebug("%s: pkinit_kdc_hostname values found in config file\n",
536 pkiDebug("%s: error from retrieve_certificate_sans()\n", __FUNCTION__);
544 pkiDebug("%s: call_san_checking_plugins() returned retval %d\n",
550 pkiDebug("%s: call_san_checking_plugins() returned decision %d and "
559 pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__);
562 pkiDebug("%s: pkinit san match found\n", __FUNCTION__);
569 pkiDebug("%s: no pkinit san match found\n", __FUNCTION__);
572 pkiDebug("%s: no certhosts (or we wouldn't accept them anyway)\n",
580 pkiDebug("%s: comparing cert name '%s' with config name '%s'\n",
584 pkiDebug("%s: we have a dnsName match\n", __FUNCTION__);
591 pkiDebug("%s: no dnsName san match found\n", __FUNCTION__);
610 pkiDebug("%s: returning retval %d, valid_san %d, need_eku_checking %d\n",
626 pkiDebug("%s: configuration requests no EKU checking\n", __FUNCTION__);
637 pkiDebug("%s: Error from crypto_check_cert_eku %d (%s)\n",
643 pkiDebug("%s: returning retval %d, eku_accepted %d\n",
687 pkiDebug("decode_krb5_as_rep failed %d\n", retval);
693 pkiDebug("as_rep: DH key transport algorithm\n");
705 pkiDebug("failed to verify pkcs7 signed data\n");
711 pkiDebug("as_rep: RSA key transport algorithm\n");
718 pkiDebug("failed to verify pkcs7 enveloped data\n");
723 pkiDebug("unknown as_rep type %d\n", kdc_reply->choice);
741 pkiDebug("%s: did not find an acceptable SAN in KDC certificate\n",
753 pkiDebug("%s: did not find an acceptable EKU in KDC certificate\n",
759 pkiDebug("%s: skipping EKU check\n", __FUNCTION__);
771 pkiDebug("failed to decode kdc_dh_key_info\n");
781 pkiDebug("failed to process dh params\n");
788 pkiDebug("failed to create key pkinit_octetstring2key %s\n",
801 pkiDebug("failed to decode reply_key_pack\n");
817 pkiDebug("failed to decode reply_key_pack_draft9\n");
820 pkiDebug("decode reply_key_pack_draft9\n");
822 pkiDebug("nonce in AS_REP=%d doesn't match AS_REQ=%d\n", key_pack9->nonce, request->nonce);
844 pkiDebug("failed to make a checksum\n");
851 pkiDebug("failed to match the checksums\n");
853 pkiDebug("calculating checksum on buf size (%d)\n",
856 pkiDebug("encrypting key (%d)\n", key_pack->replyKey.length);
859 pkiDebug("received checksum type=%d size=%d ",
864 pkiDebug("expected checksum type=%d size=%d ",
870 pkiDebug("checksums match\n");
877 pkiDebug("unknow as_rep type %d\n", kdc_reply->choice);
899 pkiDebug("pkinit_as_rep_parse returning %d (%s)\n",
912 pkiDebug("pkinit_client_profile %p %p %p %p\n",
933 pkiDebug("%s: invalid value (%d) for pkinit_dh_min_bits, "
952 pkiDebug("%s: Invalid value for pkinit_eku_checking: '%s'\n",
1009 pkiDebug("pkinit_client_process %p %p %p %p\n",
1025 pkiDebug("processing KRB5_PADATA_PK_AS_REQ\n");
1030 pkiDebug("processing KRB5_PADATA_PK_AS_REP\n");
1035 pkiDebug("processing KRB5_PADATA_PK_AS_REQ_OLD\n");
1039 pkiDebug("processing KRB5_PADATA_PK_AS_REP_OLD\n");
1044 pkiDebug("unrecognized patype = %d for PKINIT\n",
1056 pkiDebug("pkinit_identity_set_prompter returned %d (%s)\n",
1065 pkiDebug("pkinit_identity_initialize returned %d (%s)\n",
1079 pkiDebug("get_data_proc returned %d (%s)\n",
1091 pkiDebug("pkinit_client_process: returning %d (%s)\n",
1126 pkiDebug("pkinit_client_tryagain %p %p %p %p\n",
1138 pkiDebug("decode_krb5_typed_data failed\n");
1153 pkiDebug("failed to decode sequence of trusted certifiers\n");
1165 pkiDebug("failed to decode td_dh_parameters\n");
1196 pkiDebug("pkinit_client_tryagain: returning %d (%s)\n",
1260 pkiDebug("%s: returning reqctx at %p\n", __FUNCTION__, reqctx);
1285 pkiDebug("%s: received reqctx at %p\n", __FUNCTION__, reqctx);
1289 pkiDebug("%s: Bad magic value (%x) in req ctx\n",
1342 pkiDebug("%s: returning plgctx at %p\n", __FUNCTION__, ctx);
1357 pkiDebug("pkinit_lib_fini: got bad plgctx (%p)!\n", ctx);
1360 pkiDebug("%s: got plgctx at %p\n", __FUNCTION__, ctx);
1432 pkiDebug("Setting flag to use RSA_PROTOCOL\n");
1454 pkiDebug("(pkinit) received '%s' = '%s'\n", attr, value);