pr_dbf_msg
pr_dbf_msg("VCB Header:");
pr_dbf_msg("vcb_input_length: %d", b->vcb_hdr.vcb_input_length);
pr_dbf_msg("first_vc_index: %d", b->vcb_hdr.first_vc_index);
pr_dbf_msg("last_vc_index: %d", b->vcb_hdr.last_vc_index);
pr_dbf_msg("cs_token: %d", b->vcb_hdr.cs_token);
pr_dbf_msg("vcb_output_length: %d", b->vcb_hdr.vcb_output_length);
pr_dbf_msg("version: %d", b->vcb_hdr.version);
pr_dbf_msg("stored_vc_count: %d", b->vcb_hdr.stored_vc_count);
pr_dbf_msg("remaining_vc_count: %d", b->vcb_hdr.remaining_vc_count);
pr_dbf_msg("VCE Header:");
pr_dbf_msg("vce_hdr.vce_length: %d", e->vce_hdr.vce_length);
pr_dbf_msg("vce_hdr.flags: %d", e->vce_hdr.flags);
pr_dbf_msg("vce_hdr.key_type: %d", e->vce_hdr.key_type);
pr_dbf_msg("vce_hdr.vc_index: %d", e->vce_hdr.vc_index);
pr_dbf_msg("vce_hdr.vc_format: %d", e->vce_hdr.vc_format);
pr_dbf_msg("vce_hdr.key_id_length: %d", e->vce_hdr.key_id_length);
pr_dbf_msg("vce_hdr.vc_hash_type: %d", e->vce_hdr.vc_hash_type);
pr_dbf_msg("vce_hdr.vc_hash_length: %d", e->vce_hdr.vc_hash_length);
pr_dbf_msg("vce_hdr.vc_hash_offset: %d", e->vce_hdr.vc_hash_offset);
pr_dbf_msg("vce_hdr.vc_length: %d", e->vce_hdr.vc_length);
pr_dbf_msg("vce_hdr.vc_offset: %d", e->vce_hdr.vc_offset);
pr_dbf_msg("VCSSB:");
pr_dbf_msg("vcssb_length: %u", s->vcssb_length);
pr_dbf_msg("version: %u", s->version);
pr_dbf_msg("cs_token: %u", s->cs_token);
pr_dbf_msg("total_vc_index_count: %u", s->total_vc_index_count);
pr_dbf_msg("max_vc_index_count: %u", s->max_vc_index_count);
pr_dbf_msg("max_vce_length: %u", s->max_vce_length);
pr_dbf_msg("max_vcxe_length: %u", s->max_vce_length);
pr_dbf_msg("max_single_vcb_length: %u", s->max_single_vcb_length);
pr_dbf_msg("total_vcb_length: %u", s->total_vcb_length);
pr_dbf_msg("max_single_vcxb_length: %u", s->max_single_vcxb_length);
pr_dbf_msg("total_vcxb_length: %u", s->total_vcxb_length);
pr_dbf_msg("SHA256 hash of received certificate does not match");
pr_dbf_msg("Certificate entry is invalid");
pr_dbf_msg("Certificate format is not supported");
pr_dbf_msg("Hash type is not supported");
pr_dbf_msg("Couldn't get user session keyring: %ld",
pr_dbf_msg("Couldn't read keyring payload");
pr_dbf_msg("Invalidating key %08x", current_key->serial);
pr_dbf_msg("Couldn't unlink key %08x: %d", current_key->serial, rc);
pr_dbf_msg("Found cert_store keyring. Purging...");
pr_dbf_msg("Can't allocate cert_store keyring");
pr_dbf_msg("Successfully allocated cert_store keyring: %08x", cs_keyring->serial);
pr_dbf_msg("Couldn't create a key from Certificate Entry (%d)", rc);
pr_dbf_msg("Diag 320 Subcode 1 returned bad RC: %04x", diag320_rc);
pr_dbf_msg("No certificates available for current configuration");
pr_dbf_msg("Diag 320 Subcode2 RC %2x", diag320_rc);
pr_dbf_msg("No certificate entry for index %u", index);
pr_dbf_msg("Couldn't get all requested certificates");
pr_dbf_msg("Certificate Store token mismatch");
pr_dbf_msg("Diag 320 Subcode2 returned bad rc (0x%4x)", diag320_rc);
pr_dbf_msg("Successfully created key from Certificate Entry %d", index);
pr_dbf_msg("Creating key from VCE %u", index);
pr_dbf_msg("Creating key from VCE %u failed (%d)", index, rc);
pr_dbf_msg("Processed %d entries. No keys created", count);
pr_dbf_msg("Failed to set restriction to cert_store keyring (%d)", rc);
pr_dbf_msg("DIAG320 subcode query returned %04x", rc);
pr_dbf_msg("Not all required DIAG320 subcodes are installed");
pr_dbf_msg("Certificate Store is not supported");
pr_dbf_msg("Refresh certificate store information requested");
pr_dbf_msg("Failed to refresh certificate store information (%d)", rc);