skdebug
skdebug(__func__, "EC_KEY_new_by_curve_name");
skdebug(__func__, "EC_KEY_generate_key");
skdebug(__func__, "couldn't get key parameters");
skdebug(__func__, "bad pubkey length %zu",
skdebug(__func__, "malloc pubkey failed");
skdebug(__func__, "EC_POINT_point2oct failed");
skdebug(__func__, "PEM_write_bio_ECPrivateKey failed");
skdebug(__func__, "BIO_get_mem_data failed");
skdebug(__func__, "malloc key_handle failed");
skdebug(__func__, "malloc pubkey failed");
skdebug(__func__, "malloc key_handle failed");
skdebug(__func__, "requested unsupported option %s",
skdebug(__func__, "unknown required option");
skdebug(__func__, "enroll_response == NULL");
skdebug(__func__, "calloc response failed");
skdebug(__func__, "unsupported key type %d", alg);
skdebug(__func__, "calloc signature failed");
skdebug(__func__, "BIO setup failed");
skdebug(__func__, "PEM_read_bio_PrivateKey failed");
skdebug(__func__, "Not an EC key: %d", EVP_PKEY_base_id(pk));
skdebug(__func__, "EVP_PKEY_get1_EC_KEY failed");
skdebug(__func__, "bad message len %zu", message_len);
skdebug(__func__, "ECDSA_do_sign failed");
skdebug(__func__, "calloc signature failed");
skdebug(__func__, "bad key handle length %zu", key_handle_len);
skdebug(__func__, "bad message len %zu", message_len);
skdebug(__func__, "bad sign buf len %zu, expected %zu",
skdebug(__func__, "crypto_sign_ed25519 failed");
skdebug(__func__, "bad sign smlen %llu, expected min %zu",
skdebug(__func__, "calloc signature failed");
skdebug(__func__, "sign_response == NULL");
skdebug(__func__, "calloc response failed");
skdebug(__func__, "unsupported key type %d", alg);
static void skdebug(const char *func, const char *fmt, ...)
skdebug(__func__, "attestation cert len=%zu", len);
skdebug(__func__, "calloc attestation cert failed");
skdebug(__func__, "authdata len=%zu", len);
skdebug(__func__, "calloc authdata failed");
skdebug(__func__, "d2i_ECDSA_SIG failed");
skdebug(__func__, "calloc signature failed");
skdebug(__func__, "bad length %zu", len);
skdebug(__func__, "calloc signature failed");
skdebug(__func__, "strdup device failed");
skdebug(__func__, "requested device %s", *devicep);
skdebug(__func__, "requested unsupported option %s",
skdebug(__func__, "unknown required option");
skdebug(__func__, "sign_response == NULL");
skdebug(__func__, "failed to find sk");
skdebug(__func__, "fido_assert_new failed");
skdebug(__func__, "fido_assert_set_clientdata: %s",
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_set_uv: %s", fido_strerr(r));
skdebug(__func__, "check_sk_options uv");
skdebug(__func__, "fido_assert_set_uv: %s",
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
skdebug(__func__, "calloc response failed");
skdebug(__func__, "pack_sig failed");
skdebug(__func__, "no PIN specified");
skdebug(__func__, "alloc failed");
skdebug(__func__, "check_sk_options failed");
skdebug(__func__, "device %s does not support "
skdebug(__func__, "get metadata for %s failed: %s",
skdebug(__func__, "existing %llu, remaining %llu",
skdebug(__func__, "alloc rp failed");
skdebug(__func__, "get RPs for %s failed: %s",
skdebug(__func__, "Device %s has resident keys for %zu RPs",
skdebug(__func__, "rp %zu: name=\"%s\" id=\"%s\" hashlen=%zu",
skdebug(__func__, "alloc rk failed");
skdebug(__func__, "get RKs for %s slot %zu failed: %s",
skdebug(__func__, "RP \"%s\" has %zu resident keys",
skdebug(__func__, "no RK in slot %zu", j);
skdebug(__func__, "Device %s RP \"%s\" user \"%s\" "
skdebug(__func__, "alloc sk_resident_key");
static void skdebug(const char *func, const char *fmt, ...)
skdebug(__func__, "unsupported key type %d",
skdebug(__func__, "pack public key failed");
skdebug(__func__, "alloc rksp");
skdebug(__func__, "failed to find sk");
skdebug(__func__, "trying %s", sk->path);
skdebug(__func__, "read_rks failed for %s", sk->path);
skdebug(__func__, "path == NULL");
skdebug(__func__, "calloc sk failed");
skdebug(__func__, "strdup path failed");
skdebug(__func__, "fido_dev_new failed");
skdebug(__func__, "fido_dev_open %s failed: %s", sk->path,
skdebug(__func__, "calloc skv failed");
skdebug(__func__, "fido_dev_info_ptr failed");
skdebug(__func__, "sk_open failed");
skdebug(__func__, "fido_dev_get_touch_begin %s failed:"
skdebug(__func__, "polling %s", skv[i]->path);
skdebug(__func__, "fido_dev_get_touch_status %s: %s",
skdebug(__func__, "no device left to poll");
skdebug(__func__, "hash challenge failed");
skdebug(__func__, "fido_cred_set_clientdata_hash failed: %s",
skdebug(__func__, "hash challenge failed");
skdebug(__func__, "fido_assert_set_clientdata_hash failed: %s",
skdebug(__func__, "fido_assert_new failed");
skdebug(__func__, "fido_assert_set_clientdata: %s",
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_up: %s", fido_strerr(r));
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
skdebug(__func__, "device is not fido2");
skdebug(__func__, "fido_cbor_info_new failed");
skdebug(__func__, "fido_dev_get_cbor_info: %s", fido_strerr(r));
skdebug(__func__, "option %s is unknown", opt);
skdebug(__func__, "option %s is %s", opt, *ret ? "on" : "off");
skdebug(__func__, "sk_openv failed");
skdebug(__func__, "found key in %s", sk->path);
skdebug(__func__, "sk_openv failed");
skdebug(__func__, "libfido2 version does not support a feature needed for multiple tokens. Please upgrade to >=1.5.0");
skdebug(__func__, "sk_touch_begin failed");
skdebug(__func__, "sk_touch_poll failed");
skdebug(__func__, "timeout");
skdebug(__func__, "fido_dev_info_new failed");
skdebug(__func__, "fido_dev_info_manifest failed: %s",
skdebug(__func__, "%zu device(s) detected", ndevs);
skdebug(__func__, "selecting sk by cred");
skdebug(__func__, "selecting sk by touch");
skdebug(__func__, "libcrypto setup failed");
skdebug(__func__, "fido_cred_pubkey_ptr failed");
skdebug(__func__, "bad fido_cred_pubkey_len %zu",
skdebug(__func__, "BN_bin2bn failed");
skdebug(__func__, "EC_POINT_set_affine_coordinates_GFp failed");
skdebug(__func__, "bad pubkey length %zu",
skdebug(__func__, "malloc pubkey failed");
skdebug(__func__, "EC_POINT_point2oct failed");
skdebug(__func__, "bad fido_cred_pubkey_len len %zu", len);
skdebug(__func__, "fido_cred_pubkey_ptr failed");
skdebug(__func__, "malloc pubkey failed");
skdebug(__func__, "strdup device failed");
skdebug(__func__, "requested device %s", *devicep);
skdebug(__func__, "user too long");
skdebug(__func__, "requested user %s",
skdebug(__func__, "requested unsupported option %s",
skdebug(__func__, "unknown required option");
skdebug(__func__, "fido_assert_new failed");
skdebug(__func__, "fido_assert_set_clientdata: %s",
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r));
skdebug(__func__, "fido_assert_set_uv: %s", fido_strerr(r));
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
skdebug(__func__, "%zu signatures returned", fido_assert_count(assert));
skdebug(__func__, "credential exists");
skdebug(__func__, "enroll_response == NULL");
skdebug(__func__, "unsupported key type %d", alg);
skdebug(__func__, "failed to find sk");
skdebug(__func__, "using device %s", sk->path);
skdebug(__func__, "key_lookup failed");
skdebug(__func__, "key exists");
skdebug(__func__, "fido_cred_new failed");
skdebug(__func__, "fido_cred_set_type: %s", fido_strerr(r));
skdebug(__func__, "fido_cred_set_clientdata: %s",
skdebug(__func__, "fido_cred_set_rk: %s", fido_strerr(r));
skdebug(__func__, "fido_cred_set_user: %s", fido_strerr(r));
skdebug(__func__, "fido_cred_set_rp: %s", fido_strerr(r));
skdebug(__func__, "libfido2 version does not support a feature required for this operation. Please upgrade to >=1.5.0");
skdebug(__func__, "%s does not support credprot, "
skdebug(__func__, "fido_cred_set_prot: %s",
skdebug(__func__, "fido_dev_make_cred: %s", fido_strerr(r));
skdebug(__func__, "fido_cred_verify: %s",
skdebug(__func__, "self-attested credential");
skdebug(__func__, "fido_cred_verify_self: %s",
skdebug(__func__, "no attestation data");
skdebug(__func__, "calloc response failed");
skdebug(__func__, "pack_public_key failed");
skdebug(__func__, "calloc key handle failed");
skdebug(__func__, "calloc signature failed");