Searched refs:pkiDebug (Results 1 - 8 of 8) sorted by relevance

/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_matching.c208 pkiDebug("%s: Missing or empty value for list keyword type %d\n",
219 pkiDebug("%s: Unknown list keyword type %d\n", __FUNCTION__, type);
242 pkiDebug("%s: Found value '%s', bitfield is now 0x%x\n",
252 pkiDebug("%s: Urecognized value '%s'\n", __FUNCTION__, value);
260 pkiDebug("%s: returning %d\n", __FUNCTION__, retval);
292 pkiDebug("%s: Missing or invalid keyword in rule '%s'\n",
298 pkiDebug("%s: found keyword '%s'\n", __FUNCTION__, kw->value);
337 pkiDebug("%s: Missing value for keyword '%s'\n",
351 pkiDebug("%s: found value '%s'\n", __FUNCTION__, value);
357 pkiDebug("
[all...]
H A Dpkinit_clnt.c147 pkiDebug("kdc_options = 0x%x till = %d\n",
151 pkiDebug("No request->client; aborting PKINIT\n");
158 pkiDebug("pkinit_get_kdc_cert returned %d\n", retval);
165 pkiDebug("encode_krb5_kdc_req_body returned %d\n", (int) retval);
174 pkiDebug("calculating checksum on buf size (%d)\n", der_req->length);
192 pkiDebug("error %d on pkinit_as_req_create; aborting PKINIT\n",
290 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type);
331 pkiDebug("as_req: unrecognized pa_type = %d\n",
339 pkiDebug("as_req: DH key transport algorithm\n");
342 pkiDebug("faile
[all...]
H A Dpkinit_srv.c110 pkiDebug("pkinit_create_edata: creating edata for error %d (%s)\n",
127 pkiDebug("no edata needed for error %d (%s)\n",
151 pkiDebug("pkinit_server_get_edata: entered!\n");
186 pkiDebug("%s: error from retrieve_certificate_sans()\n", __FUNCTION__);
194 pkiDebug("%s: call_san_checking_plugins() returned retval %d\n",
200 pkiDebug("%s: call_san_checking_plugins() returned decision %d\n",
211 pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__);
215 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n",
220 pkiDebug("%s: pkinit san match found\n", __FUNCTION__);
226 pkiDebug("
[all...]
H A Dpkinit_crypto_openssl.c393 pkiDebug("%s: initializing openssl crypto context at %p\n",
415 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx);
443 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
461 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, idctx);
487 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
498 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, req_cryptoctx);
522 pkiDebug("Error creating oid object for '%s'\n", oid); \
605 pkiDebug("failed to read certificate from %s\n", filename);
639 pkiDebug("failed to read private key from %s\n", filename);
900 pkiDebug("onl
[all...]
H A Dpkinit_identity.c404 pkiDebug("%s: cert_filename '%s' key_filename '%s'\n",
424 pkiDebug("%s: processing value '%s'\n",
447 pkiDebug("%s: Unsupported type while processing '%s'\n",
460 pkiDebug("%s: idtype is %s\n", __FUNCTION__, idtype2string(idopts->idtype));
514 pkiDebug("%s: processing catype %s, value '%s'\n",
518 pkiDebug("No type given for '%s'\n", value);
594 pkiDebug("%s: %p %p %p\n", __FUNCTION__, context, idopts, id_cryptoctx);
620 pkiDebug("%s: no user identity options specified\n", __FUNCTION__);
635 pkiDebug("%s: No matching certificate found\n", __FUNCTION__);
645 pkiDebug("
[all...]
H A Dpkinit.h82 /* Make pkiDebug(fmt,...) print, or not. */
84 #define pkiDebug printf macro
88 static void pkiDebug (const char *fmt, ...) { } function
92 /* #define pkiDebug (void) */
H A Dpkinit_lib.c458 pkiDebug("%02x ", buf[i]);
459 pkiDebug("\n");
H A Dpkinit_profile.c167 pkiDebug(error_message(ENOMEM));

Completed in 91 milliseconds