Lines Matching refs:pkiDebug

429     pkiDebug("%s: initializing openssl crypto context at %p\n",
451 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx);
479 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
497 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, idctx);
523 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
534 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, req_cryptoctx);
558 pkiDebug("Error creating oid object for '%s'\n", oid); \
641 pkiDebug("failed to read certificate from %s\n", filename);
675 pkiDebug("failed to read private key from %s\n", filename);
900 pkiDebug("failed to add pkcs7 data\n");
945 pkiDebug("failed to der encode pkcs7\n");
959 pkiDebug("failed to der encode pkcs7\n");
1032 pkiDebug("only including signer's certificate\n");
1044 pkiDebug("building certificate chain\n");
1051 pkiDebug("failed to create a certificate chain: %s\n",
1054 pkiDebug("No trusted CAs found. Check your X509_anchors\n");
1059 pkiDebug("size of certificate chain = %d\n", size);
1063 pkiDebug("cert #%d: %s\n", i, buf);
1153 pkiDebug("mech = CKM_RSA_PKCS\n");
1192 pkiDebug("signing buffer\n");
1201 pkiDebug("mech = %s\n",
1221 pkiDebug("failed to add a signed digest attribute\n");
1242 pkiDebug("failed to add pkcs7 data\n");
1259 pkiDebug("failed to der encode pkcs7\n");
1273 pkiDebug("failed to der encode pkcs7\n");
1378 pkiDebug("%s: failed to decode message: %s\n",
1409 pkiDebug("Expected id-signedData CMS msg (received type = %d)\n",
1489 pkiDebug("unable to find any trusted CAs\n");
1495 pkiDebug("untrusted cert chain of size %d\n", size);
1499 pkiDebug("cert #%d: %s\n", i, buf);
1504 pkiDebug("trusted cert chain of size %d\n", size);
1508 pkiDebug("cert #%d: %s\n", i, buf);
1513 pkiDebug("CRL chain of size %d\n", size);
1517 pkiDebug("crls by CA #%d: %s\n", i , buf);
1544 pkiDebug("problem with cert DN = %s (error=%d) %s\n", buf, j,
1550 pkiDebug("received cert chain of size %d\n", size);
1554 pkiDebug("cert #%d: %s\n", j, buf);
1593 pkiDebug("CMS Verification successful\n");
1595 pkiDebug("wrong oid in eContentType\n");
1613 pkiDebug("PKCS7 Verification failure\n");
1645 pkiDebug("create_identifiers_from_stack failed\n");
1651 pkiDebug("encode_krb5_td_trusted_certifiers failed\n");
1737 pkiDebug("failed to create pkcs7 signed data\n");
1757 pkiDebug("BIO_write only wrote %d\n", retval);
1765 pkiDebug("BIO_write only wrote %d\n", retval);
1778 pkiDebug("failed to encrypt PKCS7 object\n");
1801 pkiDebug("unable to write pkcs7 object\n");
1854 pkiDebug("failed to decode pkcs7\n");
1862 pkiDebug("Expected id-enveloped PKCS7 msg (received type = %d)\n",
1871 pkiDebug("PKCS7 decryption successful\n");
1877 pkiDebug("PKCS7 decryption failed\n");
1906 pkiDebug("%s: unrecognized pa_type = %d\n", __FUNCTION__, pa_type);
1928 pkiDebug("failed to encode signeddata\n");
1943 pkiDebug("failed to encode signeddata\n");
1966 pkiDebug("PKCS7 Verification Success\n");
1968 pkiDebug("PKCS7 Verification Failure\n");
2007 pkiDebug("%s: nowhere to return any values!\n", __FUNCTION__);
2012 pkiDebug("%s: no certificate!\n", __FUNCTION__);
2018 pkiDebug("%s: looking for SANs in cert = %s\n", __FUNCTION__, buf);
2028 pkiDebug("%s: found no subject alt name extensions\n",
2034 pkiDebug("%s: found %d subject alt name extension(s)\n",
2077 pkiDebug("%s: failed decoding pkinit san value\n",
2088 pkiDebug("%s: failed parsing ms-upn san value\n",
2095 pkiDebug("%s: unrecognized othername oid in SAN\n",
2103 pkiDebug("%s: found dns name = %s\n",
2108 pkiDebug("%s: failed to duplicate dns name\n",
2117 pkiDebug("%s: SAN type = %d expecting %d\n",
2166 pkiDebug("%s: No certificate!\n", __FUNCTION__);
2200 pkiDebug("%s: looking for EKUs in cert = %s\n", __FUNCTION__, buf);
2209 pkiDebug("%s: found eku info in the cert\n", __FUNCTION__);
2214 pkiDebug("%s: checking eku %d of %d, allow_secondary = %d\n",
2234 pkiDebug("%s: found acceptable EKU, checking for digitalSignature\n", __FUNCTION__);
2242 pkiDebug("%s: found digitalSignature KU\n",
2246 pkiDebug("%s: didn't find digitalSignature KU\n",
2254 pkiDebug("%s: returning retval %d, valid_eku %d\n",
2356 pkiDebug("client uses 1024 DH keys\n");
2360 pkiDebug("client uses 2048 DH keys\n");
2365 pkiDebug("client uses 4096 DH keys\n");
2382 pkiDebug("Warning: dh_check failed with %d\n", dh_err);
2384 pkiDebug("p value is not prime\n");
2386 pkiDebug("p value is not a safe prime\n");
2388 pkiDebug("unable to check the generator value\n");
2390 pkiDebug("the g value is not a generator\n");
2400 pkiDebug("dh_check_pub_key failed with %d\n", dh_err);
2474 pkiDebug("failed to decode subjectPublicKey\n");
2495 pkiDebug("client secret key (%d)= ", *client_key_len);
2539 pkiDebug("failed to decode dhparams\n");
2546 pkiDebug("client sent dh params with %d bits, we require %d\n",
2634 pkiDebug("server secret key=");
2820 pkiDebug("create_krb5_trustedCertifiers failed\n");
2828 pkiDebug("create_krb5_invalidCertificates failed\n");
2839 pkiDebug("encode_krb5_td_trusted_certifiers failed\n");
2863 pkiDebug("encode_krb5_typed_data failed\n");
3072 pkiDebug("encode_krb5_typed_data failed\n");
3140 pkiDebug("found kdcPkId in AS REQ\n");
3175 pkiDebug("good %d dhparams\n", BN_num_bits(p1));
3178 pkiDebug("bad group 2 q dhparameter\n");
3181 pkiDebug("bad g dhparameter\n");
3184 pkiDebug("p is not well-known group 2 dhparameter\n");
3201 pkiDebug("dh parameters\n");
3219 pkiDebug("client sent %d DH bits server prefers %d DH bits\n",
3249 pkiDebug("DH parameters provided by server are unacceptable\n");
3287 pkiDebug("cert = %s\n", buf);
3288 pkiDebug("callback function: %d (%s)\n", ctx->error,
3328 pkiDebug("%s: Creating shadow instance of pkcs7-data oid\n",
3362 pkiDebug("%s: This is the Longhorn version and is_longhorn_server = %d\n",
3410 pkiDebug("%s: This is the Longhorn version and is_longhorn_server = %d\n",
3532 pkiDebug("loading module \"%s\"... ", modname);
3536 pkiDebug("not found\n");
3542 pkiDebug("failed\n");
3545 pkiDebug("ok\n");
3653 pkiDebug("pkinit_login: id_cryptoctx->prompter is NULL\n");
3691 pkiDebug("C_Login: %s\n", pkinit_pkcs11_code_to_text(r));
3812 pkiDebug("pkinit_choose_tokens: buffer overflow num_used: %d,"
3843 pkiDebug("pkinit_choose_tokens: buffer overflow num_used: %d,"
3960 pkiDebug("C_FindObjectsInit: %s\n", pkinit_pkcs11_code_to_text(r));
3996 pkiDebug("C_GetAttributeValue: %s\n", pkinit_pkcs11_code_to_text(r));
4024 pkiDebug("C_GetAttributeValue: %s\n", pkinit_pkcs11_code_to_text(r));
4032 pkiDebug("cert %d size %d id %d idlen %d\n", i,
4136 pkiDebug("C_Initialize: %s\n", pkinit_pkcs11_code_to_text(r));
4161 pkiDebug("C_GetSlotList: %s\n", pkinit_pkcs11_code_to_text(r));
4174 pkiDebug("pkinit_open_session: no slots, count: %d\n", count);
4189 pkiDebug("C_GetSlotList: %s\n", pkinit_pkcs11_code_to_text(r));
4203 pkiDebug("open_session: no matching slot found for slotID %d\n",
4212 pkiDebug("C_GetSlotList: %s\n", pkinit_pkcs11_code_to_text(r));
4231 pkiDebug("open_session: prompt for token/smart card failed\n");
4243 pkiDebug("pkinit_open_session: no token, already prompted\n");
4265 pkiDebug("C_GetSlotList: %s\n", pkinit_pkcs11_code_to_text(r));
4291 pkiDebug("C_OpenSession: %s\n", pkinit_pkcs11_code_to_text(r));
4301 pkiDebug("C_GetTokenInfo: %s\n", pkinit_pkcs11_code_to_text(r));
4347 pkiDebug("open_session: slotid %d token found: \"%s\", "
4402 pkiDebug("open_session: prompt for token/smart card failed\n");
4412 pkiDebug("open_session: no matching token found\n");
4420 pkiDebug("pkinit_open_session: pkinit_choose_tokens failed: %d\n", r);
4450 pkiDebug("pkinit_open_session: pkinit_choose_tokens failed: %d\n", r);
4482 pkiDebug("open_session: slotid %d (%d of %d)\n", (int) cctx->slotid,
4592 pkiDebug("krb5_pkinit_sign_data: C_FindObjectsInit: %s\n",
4599 pkiDebug("found %d private keys (%s)\n", (int) count, pkinit_pkcs11_code_to_text(r));
4619 pkiDebug("Failed to extract pub key from cert\n");
4652 pkiDebug("zero-byte key modulus\n");
4665 pkiDebug("krb5_pkinit_sign_data: C_FindObjectsInit: %s\n",
4672 pkiDebug("found %d private keys (%s)\n", (int) count, pkinit_pkcs11_code_to_text(r));
4694 pkiDebug("failed to decode data\n");
4714 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen);
4763 pkiDebug("C_DecryptInit: 0x%x\n", (int) r);
4766 pkiDebug("data_len = %d\n", data_len);
4772 pkiDebug("session %x edata %x edata_len %d data %x datalen @%x %d\n",
4781 pkiDebug("C_Decrypt: %s\n", pkinit_pkcs11_code_to_text(r));
4783 pkiDebug("decrypt %d needs %d\n", (int) data_len, (int) len);
4786 pkiDebug("decrypt %d -> %d\n", (int) data_len, (int) len);
4827 pkiDebug("failed to create the signature\n");
4877 pkiDebug("C_SignInit: %s\n", pkinit_pkcs11_code_to_text(r));
4894 pkiDebug("C_Sign realloc %d\n", (int) len);
4900 pkiDebug("C_Sign: %s\n", pkinit_pkcs11_code_to_text(r));
4903 pkiDebug("sign %d -> %d\n", (int) data_len, (int) len);
4949 pkiDebug("private key does not match certificate\n");
4964 pkiDebug("unable to decrypt received data (len=%d)\n", data_len);
5044 pkiDebug("%s: failed to get user's cert location\n", __FUNCTION__);
5052 pkiDebug("%s: failed to get user's private key location\n", __FUNCTION__);
5062 pkiDebug("Failed to open PKCS12 file '%s', error %d\n",
5073 pkiDebug("Failed to decode PKCS12 file '%s' contents\n",
5092 pkiDebug("Initial PKCS12_parse with no password failed\n");
5106 pkiDebug("Prompt string, '%s %s', is too long!\n",
5128 pkiDebug("Seconde PKCS12_parse with password failed\n");
5175 pkiDebug("failed to load user's certificate from '%s'\n", certname);
5184 pkiDebug("failed to load user's private key from '%s'\n", keyname);
5225 pkiDebug("%s: failed to get user's cert location\n", __FUNCTION__);
5230 pkiDebug("%s: failed to get user's private key location\n",
5265 pkiDebug("%s: failed to get user's certificate directory location\n",
5301 pkiDebug("%s: Path too long -- directory '%s' and file '%s'\n",
5315 pkiDebug("%s: Successfully loaded cert (and key) for %s\n",
5328 pkiDebug("%s: No cert/key pairs found in directory '%s'\n",
5419 pkiDebug("C_GetMechanismList: %s\n", pkinit_pkcs11_code_to_text(r));
5437 pkiDebug("mech %x flags %x\n", (int) mechp[i], (int) info.flags);
5439 pkiDebug(" this mech is good for sign & decrypt\n");
5449 pkiDebug("got %d mechs from card\n", (int) count);
5687 pkiDebug("%s: EKUs not requested, not checking\n", __FUNCTION__);
5713 pkiDebug("%s: returning eku 0x%08x\n", __FUNCTION__, eku_bits);
5721 pkiDebug("%s: KUs not requested, not checking\n", __FUNCTION__);
5735 pkiDebug("%s: returning ku 0x%08x\n", __FUNCTION__, ku_bits);
5950 pkiDebug("%s: crypto_cert_get_count error %d, %s\n",
5961 pkiDebug("%s: ERROR: There are %d certs to choose from, "
6045 pkiDebug("%s: error opening file '%s': %s\n", __FUNCTION__,
6052 pkiDebug("%s: error reading file '%s'\n", __FUNCTION__, filename);
6108 pkiDebug("no anchors in file, %s\n", filename);
6118 pkiDebug("no intermediates in file, %s\n", filename);
6128 pkiDebug("no crls in file, %s\n", filename);
6176 pkiDebug("%s: Path too long -- directory '%s' and file '%s'\n",
6215 pkiDebug("%s: called with idtype %s and catype %s\n",
6258 pkiDebug("#%d cert= %s\n", i, buf);
6463 pkiDebug("#%d cert= %s\n", i, buf);
6569 pkiDebug("wrong pkcs7 content type\n");
6574 pkiDebug("unable to decrypt pkcs7 object\n");
6610 pkiDebug("received trusted certifiers\n");
6612 pkiDebug("received invalid certificate\n");
6624 pkiDebug("#%d cert = %s is trusted by kdc\n", i, buf);
6626 pkiDebug("#%d cert = %s is invalid\n", i, buf);
6638 pkiDebug("#%d issuer = %s serial = %ld is trusted bu kdc\n", i,
6641 pkiDebug("#%d issuer = %s serial = %ld is invalid\n", i, buf,