Searched refs:pkiDebug (Results 1 - 7 of 7) sorted by relevance

/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_matching.c197 pkiDebug("%s: Missing or empty value for list keyword type %d\n",
208 pkiDebug("%s: Unknown list keyword type %d\n", __FUNCTION__, type);
231 pkiDebug("%s: Found value '%s', bitfield is now 0x%x\n",
241 pkiDebug("%s: Urecognized value '%s'\n", __FUNCTION__, value);
249 pkiDebug("%s: returning %d\n", __FUNCTION__, retval);
281 pkiDebug("%s: Missing or invalid keyword in rule '%s'\n",
287 pkiDebug("%s: found keyword '%s'\n", __FUNCTION__, kw->value);
326 pkiDebug("%s: Missing value for keyword '%s'\n",
340 pkiDebug("%s: found value '%s'\n", __FUNCTION__, value);
346 pkiDebug("
[all...]
H A Dpkinit_clnt.c103 pkiDebug("kdc_options = 0x%x till = %d\n",
107 pkiDebug("No request->client; aborting PKINIT\n");
114 pkiDebug("pkinit_get_kdc_cert returned %d\n", retval);
121 pkiDebug("encode_krb5_kdc_req_body returned %d\n", (int) retval);
130 pkiDebug("calculating checksum on buf size (%d)\n", der_req->length);
148 pkiDebug("error %d on pkinit_as_req_create; aborting PKINIT\n",
238 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type);
279 pkiDebug("as_req: unrecognized pa_type = %d\n",
287 pkiDebug("as_req: DH key transport algorithm\n");
290 pkiDebug("faile
[all...]
H A Dpkinit_srv.c77 pkiDebug("pkinit_create_edata: creating edata for error %d (%s)\n",
94 pkiDebug("no edata needed for error %d (%s)\n",
118 pkiDebug("pkinit_server_get_edata: entered!\n");
162 pkiDebug("%s: error from retrieve_certificate_sans()\n", __FUNCTION__);
170 pkiDebug("%s: call_san_checking_plugins() returned retval %d\n",
176 pkiDebug("%s: call_san_checking_plugins() returned decision %d\n",
187 pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__);
191 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n",
196 pkiDebug("%s: pkinit san match found\n", __FUNCTION__);
202 pkiDebug("
[all...]
H A Dpkinit_crypto_openssl.c429 pkiDebug("%s: initializing openssl crypto context at %p\n",
451 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx);
479 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
497 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, idctx);
523 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx);
534 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, req_cryptoctx);
558 pkiDebug("Error creating oid object for '%s'\n", oid); \
641 pkiDebug("failed to read certificate from %s\n", filename);
675 pkiDebug("failed to read private key from %s\n", filename);
900 pkiDebug("faile
[all...]
H A Dpkinit_identity.c378 pkiDebug("%s: cert_filename '%s' key_filename '%s'\n",
398 pkiDebug("%s: processing value '%s'\n",
421 pkiDebug("%s: Unsupported type while processing '%s'\n",
434 pkiDebug("%s: idtype is %s\n", __FUNCTION__, idtype2string(idopts->idtype));
488 pkiDebug("%s: processing catype %s, value '%s'\n",
492 pkiDebug("No type given for '%s'\n", value);
523 pkiDebug("%s: %p %p %p\n", __FUNCTION__, context, idopts, id_cryptoctx);
548 pkiDebug("%s: no user identity options specified\n", __FUNCTION__);
566 pkiDebug("%s: No matching certificate found\n", __FUNCTION__);
576 pkiDebug("
[all...]
H A Dpkinit.h106 /* Make pkiDebug(fmt,...) print, or not. */
108 #define pkiDebug printf macro
111 static inline void pkiDebug (const char *fmt, ...) { } function
115 /* #define pkiDebug (void) */
H A Dpkinit_lib.c436 pkiDebug("%02x ", buf[i]);
437 pkiDebug("\n");

Completed in 29 milliseconds