Lines Matching refs:__func__
178 skdebug(__func__, "path == NULL"); in sk_open()
182 skdebug(__func__, "calloc sk failed"); in sk_open()
186 skdebug(__func__, "strdup path failed"); in sk_open()
191 skdebug(__func__, "fido_dev_new failed"); in sk_open()
197 skdebug(__func__, "fido_dev_open %s failed: %s", sk->path, in sk_open()
228 skdebug(__func__, "calloc skv failed"); in sk_openv()
233 skdebug(__func__, "fido_dev_info_ptr failed"); in sk_openv()
235 skdebug(__func__, "sk_open failed"); in sk_openv()
267 skdebug(__func__, "fido_dev_get_touch_begin %s failed:" in sk_touch_begin()
289 skdebug(__func__, "polling %s", skv[i]->path); in sk_touch_poll()
292 skdebug(__func__, "fido_dev_get_touch_status %s: %s", in sk_touch_poll()
297 skdebug(__func__, "no device left to poll"); in sk_touch_poll()
344 skdebug(__func__, "hash challenge failed"); in fido_cred_set_clientdata()
350 skdebug(__func__, "fido_cred_set_clientdata_hash failed: %s", in fido_cred_set_clientdata()
365 skdebug(__func__, "hash challenge failed"); in fido_assert_set_clientdata()
371 skdebug(__func__, "fido_assert_set_clientdata_hash failed: %s", in fido_assert_set_clientdata()
397 skdebug(__func__, "fido_assert_new failed"); in sk_try()
403 skdebug(__func__, "fido_assert_set_clientdata: %s", in sk_try()
408 skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r)); in sk_try()
413 skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r)); in sk_try()
417 skdebug(__func__, "fido_assert_up: %s", fido_strerr(r)); in sk_try()
421 skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r)); in sk_try()
444 skdebug(__func__, "device is not fido2"); in check_sk_options()
448 skdebug(__func__, "fido_cbor_info_new failed"); in check_sk_options()
452 skdebug(__func__, "fido_dev_get_cbor_info: %s", fido_strerr(r)); in check_sk_options()
467 skdebug(__func__, "option %s is unknown", opt); in check_sk_options()
469 skdebug(__func__, "option %s is %s", opt, *ret ? "on" : "off"); in check_sk_options()
483 skdebug(__func__, "sk_openv failed"); in sk_select_by_cred()
498 skdebug(__func__, "found key in %s", sk->path); in sk_select_by_cred()
516 skdebug(__func__, "sk_openv failed"); in sk_select_by_touch()
529 …skdebug(__func__, "libfido2 version does not support a feature needed for multiple tokens. Please … in sk_select_by_touch()
534 skdebug(__func__, "sk_touch_begin failed"); in sk_select_by_touch()
540 skdebug(__func__, "sk_touch_poll failed"); in sk_select_by_touch()
553 skdebug(__func__, "timeout"); in sk_select_by_touch()
573 skdebug(__func__, "fido_dev_info_new failed"); in sk_probe()
578 skdebug(__func__, "fido_dev_info_manifest failed: %s", in sk_probe()
583 skdebug(__func__, "%zu device(s) detected", ndevs); in sk_probe()
587 skdebug(__func__, "selecting sk by cred"); in sk_probe()
591 skdebug(__func__, "selecting sk by touch"); in sk_probe()
620 skdebug(__func__, "libcrypto setup failed"); in pack_public_key_ecdsa()
624 skdebug(__func__, "fido_cred_pubkey_ptr failed"); in pack_public_key_ecdsa()
628 skdebug(__func__, "bad fido_cred_pubkey_len %zu", in pack_public_key_ecdsa()
635 skdebug(__func__, "BN_bin2bn failed"); in pack_public_key_ecdsa()
639 skdebug(__func__, "EC_POINT_set_affine_coordinates_GFp failed"); in pack_public_key_ecdsa()
645 skdebug(__func__, "bad pubkey length %zu", in pack_public_key_ecdsa()
650 skdebug(__func__, "malloc pubkey failed"); in pack_public_key_ecdsa()
655 skdebug(__func__, "EC_POINT_point2oct failed"); in pack_public_key_ecdsa()
686 skdebug(__func__, "bad fido_cred_pubkey_len len %zu", len); in pack_public_key_ed25519()
690 skdebug(__func__, "fido_cred_pubkey_ptr failed"); in pack_public_key_ed25519()
695 skdebug(__func__, "malloc pubkey failed"); in pack_public_key_ed25519()
749 skdebug(__func__, "strdup device failed"); in check_enroll_options()
752 skdebug(__func__, "requested device %s", *devicep); in check_enroll_options()
756 skdebug(__func__, "user too long"); in check_enroll_options()
759 skdebug(__func__, "requested user %s", in check_enroll_options()
762 skdebug(__func__, "requested unsupported option %s", in check_enroll_options()
765 skdebug(__func__, "unknown required option"); in check_enroll_options()
785 skdebug(__func__, "fido_assert_new failed"); in key_lookup()
791 skdebug(__func__, "fido_assert_set_clientdata: %s", in key_lookup()
796 skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r)); in key_lookup()
800 skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r)); in key_lookup()
808 skdebug(__func__, "fido_assert_set_uv: %s", fido_strerr(r)); in key_lookup()
812 skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r)); in key_lookup()
816 skdebug(__func__, "%zu signatures returned", fido_assert_count(assert)); in key_lookup()
821 skdebug(__func__, "credential exists"); in key_lookup()
852 skdebug(__func__, "enroll_response == NULL"); in sk_enroll()
871 skdebug(__func__, "unsupported key type %d", alg); in sk_enroll()
880 skdebug(__func__, "failed to find sk"); in sk_enroll()
883 skdebug(__func__, "using device %s", sk->path); in sk_enroll()
890 skdebug(__func__, "key_lookup failed"); in sk_enroll()
893 skdebug(__func__, "key exists"); in sk_enroll()
898 skdebug(__func__, "fido_cred_new failed"); in sk_enroll()
902 skdebug(__func__, "fido_cred_set_type: %s", fido_strerr(r)); in sk_enroll()
907 skdebug(__func__, "fido_cred_set_clientdata: %s", in sk_enroll()
913 skdebug(__func__, "fido_cred_set_rk: %s", fido_strerr(r)); in sk_enroll()
918 skdebug(__func__, "fido_cred_set_user: %s", fido_strerr(r)); in sk_enroll()
922 skdebug(__func__, "fido_cred_set_rp: %s", fido_strerr(r)); in sk_enroll()
928 …skdebug(__func__, "libfido2 version does not support a feature required for this operation. Please… in sk_enroll()
934 skdebug(__func__, "%s does not support credprot, " in sk_enroll()
946 skdebug(__func__, "fido_cred_set_prot: %s", in sk_enroll()
953 skdebug(__func__, "fido_dev_make_cred: %s", fido_strerr(r)); in sk_enroll()
959 skdebug(__func__, "fido_cred_verify: %s", in sk_enroll()
964 skdebug(__func__, "self-attested credential"); in sk_enroll()
966 skdebug(__func__, "fido_cred_verify_self: %s", in sk_enroll()
972 skdebug(__func__, "calloc response failed"); in sk_enroll()
977 skdebug(__func__, "pack_public_key failed"); in sk_enroll()
983 skdebug(__func__, "calloc key handle failed"); in sk_enroll()
992 skdebug(__func__, "calloc signature failed"); in sk_enroll()
1000 skdebug(__func__, "attestation cert len=%zu", len); in sk_enroll()
1002 skdebug(__func__, "calloc attestation cert failed"); in sk_enroll()
1010 skdebug(__func__, "authdata len=%zu", len); in sk_enroll()
1012 skdebug(__func__, "calloc authdata failed"); in sk_enroll()
1049 skdebug(__func__, "d2i_ECDSA_SIG failed"); in pack_sig_ecdsa()
1057 skdebug(__func__, "calloc signature failed"); in pack_sig_ecdsa()
1085 skdebug(__func__, "bad length %zu", len); in pack_sig_ed25519()
1090 skdebug(__func__, "calloc signature failed"); in pack_sig_ed25519()
1130 skdebug(__func__, "strdup device failed"); in check_sign_load_resident_options()
1133 skdebug(__func__, "requested device %s", *devicep); in check_sign_load_resident_options()
1135 skdebug(__func__, "requested unsupported option %s", in check_sign_load_resident_options()
1138 skdebug(__func__, "unknown required option"); in check_sign_load_resident_options()
1163 skdebug(__func__, "sign_response == NULL"); in sk_sign()
1177 skdebug(__func__, "failed to find sk"); in sk_sign()
1181 skdebug(__func__, "fido_assert_new failed"); in sk_sign()
1186 skdebug(__func__, "fido_assert_set_clientdata: %s", in sk_sign()
1191 skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r)); in sk_sign()
1196 skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r)); in sk_sign()
1202 skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r)); in sk_sign()
1211 skdebug(__func__, "fido_assert_set_uv: %s", fido_strerr(r)); in sk_sign()
1216 skdebug(__func__, "check_sk_options uv"); in sk_sign()
1222 skdebug(__func__, "fido_assert_set_uv: %s", in sk_sign()
1229 skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r)); in sk_sign()
1234 skdebug(__func__, "calloc response failed"); in sk_sign()
1240 skdebug(__func__, "pack_sig failed"); in sk_sign()
1273 skdebug(__func__, "no PIN specified"); in read_rks()
1278 skdebug(__func__, "alloc failed"); in read_rks()
1282 skdebug(__func__, "check_sk_options failed"); in read_rks()
1288 skdebug(__func__, "device %s does not support " in read_rks()
1293 skdebug(__func__, "get metadata for %s failed: %s", in read_rks()
1298 skdebug(__func__, "existing %llu, remaining %llu", in read_rks()
1302 skdebug(__func__, "alloc rp failed"); in read_rks()
1306 skdebug(__func__, "get RPs for %s failed: %s", in read_rks()
1311 skdebug(__func__, "Device %s has resident keys for %zu RPs", in read_rks()
1318 skdebug(__func__, "rp %zu: name=\"%s\" id=\"%s\" hashlen=%zu", in read_rks()
1330 skdebug(__func__, "alloc rk failed"); in read_rks()
1335 skdebug(__func__, "get RKs for %s slot %zu failed: %s", in read_rks()
1340 skdebug(__func__, "RP \"%s\" has %zu resident keys", in read_rks()
1346 skdebug(__func__, "no RK in slot %zu", j); in read_rks()
1353 skdebug(__func__, "Device %s RP \"%s\" user \"%s\" " in read_rks()
1366 skdebug(__func__, "alloc sk_resident_key"); in read_rks()
1385 skdebug(__func__, "unsupported key type %d", in read_rks()
1396 skdebug(__func__, "pack public key failed"); in read_rks()
1402 skdebug(__func__, "alloc rksp"); in read_rks()
1449 skdebug(__func__, "failed to find sk"); in sk_load_resident_keys()
1452 skdebug(__func__, "trying %s", sk->path); in sk_load_resident_keys()
1454 skdebug(__func__, "read_rks failed for %s", sk->path); in sk_load_resident_keys()