Searched refs:pkiDebug (Results 1 - 8 of 8) sorted by relevance
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_matching.c | 208 pkiDebug("%s: Missing or empty value for list keyword type %d\n", 219 pkiDebug("%s: Unknown list keyword type %d\n", __FUNCTION__, type); 242 pkiDebug("%s: Found value '%s', bitfield is now 0x%x\n", 252 pkiDebug("%s: Urecognized value '%s'\n", __FUNCTION__, value); 260 pkiDebug("%s: returning %d\n", __FUNCTION__, retval); 292 pkiDebug("%s: Missing or invalid keyword in rule '%s'\n", 298 pkiDebug("%s: found keyword '%s'\n", __FUNCTION__, kw->value); 337 pkiDebug("%s: Missing value for keyword '%s'\n", 351 pkiDebug("%s: found value '%s'\n", __FUNCTION__, value); 357 pkiDebug(" [all...] |
H A D | pkinit_clnt.c | 147 pkiDebug("kdc_options = 0x%x till = %d\n", 151 pkiDebug("No request->client; aborting PKINIT\n"); 158 pkiDebug("pkinit_get_kdc_cert returned %d\n", retval); 165 pkiDebug("encode_krb5_kdc_req_body returned %d\n", (int) retval); 174 pkiDebug("calculating checksum on buf size (%d)\n", der_req->length); 192 pkiDebug("error %d on pkinit_as_req_create; aborting PKINIT\n", 290 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type); 331 pkiDebug("as_req: unrecognized pa_type = %d\n", 339 pkiDebug("as_req: DH key transport algorithm\n"); 342 pkiDebug("faile [all...] |
H A D | pkinit_srv.c | 110 pkiDebug("pkinit_create_edata: creating edata for error %d (%s)\n", 127 pkiDebug("no edata needed for error %d (%s)\n", 151 pkiDebug("pkinit_server_get_edata: entered!\n"); 186 pkiDebug("%s: error from retrieve_certificate_sans()\n", __FUNCTION__); 194 pkiDebug("%s: call_san_checking_plugins() returned retval %d\n", 200 pkiDebug("%s: call_san_checking_plugins() returned decision %d\n", 211 pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__); 215 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n", 220 pkiDebug("%s: pkinit san match found\n", __FUNCTION__); 226 pkiDebug(" [all...] |
H A D | pkinit_crypto_openssl.c | 393 pkiDebug("%s: initializing openssl crypto context at %p\n", 415 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx); 443 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx); 461 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, idctx); 487 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx); 498 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, req_cryptoctx); 522 pkiDebug("Error creating oid object for '%s'\n", oid); \ 605 pkiDebug("failed to read certificate from %s\n", filename); 639 pkiDebug("failed to read private key from %s\n", filename); 900 pkiDebug("onl [all...] |
H A D | pkinit_identity.c | 404 pkiDebug("%s: cert_filename '%s' key_filename '%s'\n", 424 pkiDebug("%s: processing value '%s'\n", 447 pkiDebug("%s: Unsupported type while processing '%s'\n", 460 pkiDebug("%s: idtype is %s\n", __FUNCTION__, idtype2string(idopts->idtype)); 514 pkiDebug("%s: processing catype %s, value '%s'\n", 518 pkiDebug("No type given for '%s'\n", value); 594 pkiDebug("%s: %p %p %p\n", __FUNCTION__, context, idopts, id_cryptoctx); 620 pkiDebug("%s: no user identity options specified\n", __FUNCTION__); 635 pkiDebug("%s: No matching certificate found\n", __FUNCTION__); 645 pkiDebug(" [all...] |
H A D | pkinit.h | 82 /* Make pkiDebug(fmt,...) print, or not. */ 84 #define pkiDebug printf macro 88 static void pkiDebug (const char *fmt, ...) { } function 92 /* #define pkiDebug (void) */
|
H A D | pkinit_lib.c | 458 pkiDebug("%02x ", buf[i]); 459 pkiDebug("\n");
|
H A D | pkinit_profile.c | 167 pkiDebug(error_message(ENOMEM));
|
Completed in 91 milliseconds