Searched refs:pkiDebug (Results 1 - 7 of 7) sorted by relevance
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_matching.c | 197 pkiDebug("%s: Missing or empty value for list keyword type %d\n", 208 pkiDebug("%s: Unknown list keyword type %d\n", __FUNCTION__, type); 231 pkiDebug("%s: Found value '%s', bitfield is now 0x%x\n", 241 pkiDebug("%s: Urecognized value '%s'\n", __FUNCTION__, value); 249 pkiDebug("%s: returning %d\n", __FUNCTION__, retval); 281 pkiDebug("%s: Missing or invalid keyword in rule '%s'\n", 287 pkiDebug("%s: found keyword '%s'\n", __FUNCTION__, kw->value); 326 pkiDebug("%s: Missing value for keyword '%s'\n", 340 pkiDebug("%s: found value '%s'\n", __FUNCTION__, value); 346 pkiDebug(" [all...] |
H A D | pkinit_clnt.c | 103 pkiDebug("kdc_options = 0x%x till = %d\n", 107 pkiDebug("No request->client; aborting PKINIT\n"); 114 pkiDebug("pkinit_get_kdc_cert returned %d\n", retval); 121 pkiDebug("encode_krb5_kdc_req_body returned %d\n", (int) retval); 130 pkiDebug("calculating checksum on buf size (%d)\n", der_req->length); 148 pkiDebug("error %d on pkinit_as_req_create; aborting PKINIT\n", 238 pkiDebug("pkinit_as_req_create pa_type = %d\n", reqctx->pa_type); 279 pkiDebug("as_req: unrecognized pa_type = %d\n", 287 pkiDebug("as_req: DH key transport algorithm\n"); 290 pkiDebug("faile [all...] |
H A D | pkinit_srv.c | 77 pkiDebug("pkinit_create_edata: creating edata for error %d (%s)\n", 94 pkiDebug("no edata needed for error %d (%s)\n", 118 pkiDebug("pkinit_server_get_edata: entered!\n"); 162 pkiDebug("%s: error from retrieve_certificate_sans()\n", __FUNCTION__); 170 pkiDebug("%s: call_san_checking_plugins() returned retval %d\n", 176 pkiDebug("%s: call_san_checking_plugins() returned decision %d\n", 187 pkiDebug("%s: Checking pkinit sans\n", __FUNCTION__); 191 pkiDebug("%s: Comparing client '%s' to pkinit san value '%s'\n", 196 pkiDebug("%s: pkinit san match found\n", __FUNCTION__); 202 pkiDebug(" [all...] |
H A D | pkinit_crypto_openssl.c | 429 pkiDebug("%s: initializing openssl crypto context at %p\n", 451 pkiDebug("%s: freeing context at %p\n", __FUNCTION__, cryptoctx); 479 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx); 497 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, idctx); 523 pkiDebug("%s: returning ctx at %p\n", __FUNCTION__, ctx); 534 pkiDebug("%s: freeing ctx at %p\n", __FUNCTION__, req_cryptoctx); 558 pkiDebug("Error creating oid object for '%s'\n", oid); \ 641 pkiDebug("failed to read certificate from %s\n", filename); 675 pkiDebug("failed to read private key from %s\n", filename); 900 pkiDebug("faile [all...] |
H A D | pkinit_identity.c | 378 pkiDebug("%s: cert_filename '%s' key_filename '%s'\n", 398 pkiDebug("%s: processing value '%s'\n", 421 pkiDebug("%s: Unsupported type while processing '%s'\n", 434 pkiDebug("%s: idtype is %s\n", __FUNCTION__, idtype2string(idopts->idtype)); 488 pkiDebug("%s: processing catype %s, value '%s'\n", 492 pkiDebug("No type given for '%s'\n", value); 523 pkiDebug("%s: %p %p %p\n", __FUNCTION__, context, idopts, id_cryptoctx); 548 pkiDebug("%s: no user identity options specified\n", __FUNCTION__); 566 pkiDebug("%s: No matching certificate found\n", __FUNCTION__); 576 pkiDebug(" [all...] |
H A D | pkinit.h | 106 /* Make pkiDebug(fmt,...) print, or not. */ 108 #define pkiDebug printf macro 111 static inline void pkiDebug (const char *fmt, ...) { } function 115 /* #define pkiDebug (void) */
|
H A D | pkinit_lib.c | 436 pkiDebug("%02x ", buf[i]); 437 pkiDebug("\n");
|
Completed in 29 milliseconds