Symbol: skdebug
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
104
skdebug(__func__, "couldn't get key parameters");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
110
skdebug(__func__, "bad pubkey length %zu",
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
115
skdebug(__func__, "malloc pubkey failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
120
skdebug(__func__, "EC_POINT_point2oct failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
125
skdebug(__func__, "PEM_write_bio_ECPrivateKey failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
129
skdebug(__func__, "BIO_get_mem_data failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
133
skdebug(__func__, "malloc key_handle failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
178
skdebug(__func__, "malloc pubkey failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
185
skdebug(__func__, "malloc key_handle failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
205
skdebug(__func__, "requested unsupported option %s",
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
208
skdebug(__func__, "unknown required option");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
226
skdebug(__func__, "enroll_response == NULL");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
233
skdebug(__func__, "calloc response failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
247
skdebug(__func__, "unsupported key type %d", alg);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
252
skdebug(__func__, "calloc signature failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
309
skdebug(__func__, "BIO setup failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
313
skdebug(__func__, "PEM_read_bio_PrivateKey failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
317
skdebug(__func__, "Not an EC key: %d", EVP_PKEY_base_id(pk));
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
321
skdebug(__func__, "EVP_PKEY_get1_EC_KEY failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
326
skdebug(__func__, "bad message len %zu", message_len);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
350
skdebug(__func__, "ECDSA_do_sign failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
358
skdebug(__func__, "calloc signature failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
397
skdebug(__func__, "bad key handle length %zu", key_handle_len);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
402
skdebug(__func__, "bad message len %zu", message_len);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
422
skdebug(__func__, "bad sign buf len %zu, expected %zu",
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
431
skdebug(__func__, "crypto_sign_ed25519 failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
435
skdebug(__func__, "bad sign smlen %llu, expected min %zu",
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
441
skdebug(__func__, "calloc signature failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
471
skdebug(__func__, "sign_response == NULL");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
478
skdebug(__func__, "calloc response failed");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
50
static void skdebug(const char *func, const char *fmt, ...)
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
500
skdebug(__func__, "unsupported key type %d", alg);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
93
skdebug(__func__, "EC_KEY_new_by_curve_name");
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
97
skdebug(__func__, "EC_KEY_generate_key");
sys/dev/pci/if_sk.c
1460
if (skdebug >= 2) {
sys/dev/pci/if_sk.c
1664
if (skdebug >= 2)
sys/dev/pci/if_sk.c
172
#define DPRINTF(x) if (skdebug) printf x
sys/dev/pci/if_sk.c
173
#define DPRINTFN(n,x) if (skdebug >= (n)) printf x
sys/dev/pci/if_sk.c
174
int skdebug = 0;
usr.bin/ssh/sk-usbhid.c
1001
skdebug(__func__, "requested device %s", *devicep);
usr.bin/ssh/sk-usbhid.c
1003
skdebug(__func__, "requested unsupported option %s",
usr.bin/ssh/sk-usbhid.c
1006
skdebug(__func__, "unknown required option");
usr.bin/ssh/sk-usbhid.c
1031
skdebug(__func__, "sign_response == NULL");
usr.bin/ssh/sk-usbhid.c
1045
skdebug(__func__, "failed to find sk");
usr.bin/ssh/sk-usbhid.c
1049
skdebug(__func__, "fido_assert_new failed");
usr.bin/ssh/sk-usbhid.c
1054
skdebug(__func__, "fido_assert_set_clientdata: %s",
usr.bin/ssh/sk-usbhid.c
1059
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
1064
skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
1070
skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
1076
skdebug(__func__, "check_sk_options uv");
usr.bin/ssh/sk-usbhid.c
1082
skdebug(__func__, "fido_assert_set_uv: %s",
usr.bin/ssh/sk-usbhid.c
1089
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
1094
skdebug(__func__, "calloc response failed");
usr.bin/ssh/sk-usbhid.c
1100
skdebug(__func__, "pack_sig failed");
usr.bin/ssh/sk-usbhid.c
1133
skdebug(__func__, "no PIN specified");
usr.bin/ssh/sk-usbhid.c
1138
skdebug(__func__, "alloc failed");
usr.bin/ssh/sk-usbhid.c
1142
skdebug(__func__, "check_sk_options failed");
usr.bin/ssh/sk-usbhid.c
1148
skdebug(__func__, "device %s does not support "
usr.bin/ssh/sk-usbhid.c
1153
skdebug(__func__, "get metadata for %s failed: %s",
usr.bin/ssh/sk-usbhid.c
1158
skdebug(__func__, "existing %llu, remaining %llu",
usr.bin/ssh/sk-usbhid.c
1162
skdebug(__func__, "alloc rp failed");
usr.bin/ssh/sk-usbhid.c
1166
skdebug(__func__, "get RPs for %s failed: %s",
usr.bin/ssh/sk-usbhid.c
1171
skdebug(__func__, "Device %s has resident keys for %zu RPs",
usr.bin/ssh/sk-usbhid.c
1178
skdebug(__func__, "rp %zu: name=\"%s\" id=\"%s\" hashlen=%zu",
usr.bin/ssh/sk-usbhid.c
1190
skdebug(__func__, "alloc rk failed");
usr.bin/ssh/sk-usbhid.c
1195
skdebug(__func__, "get RKs for %s slot %zu failed: %s",
usr.bin/ssh/sk-usbhid.c
1200
skdebug(__func__, "RP \"%s\" has %zu resident keys",
usr.bin/ssh/sk-usbhid.c
1206
skdebug(__func__, "no RK in slot %zu", j);
usr.bin/ssh/sk-usbhid.c
1213
skdebug(__func__, "Device %s RP \"%s\" user \"%s\" "
usr.bin/ssh/sk-usbhid.c
1226
skdebug(__func__, "alloc sk_resident_key");
usr.bin/ssh/sk-usbhid.c
1245
skdebug(__func__, "unsupported key type %d",
usr.bin/ssh/sk-usbhid.c
1256
skdebug(__func__, "pack public key failed");
usr.bin/ssh/sk-usbhid.c
1262
skdebug(__func__, "alloc rksp");
usr.bin/ssh/sk-usbhid.c
1309
skdebug(__func__, "failed to find sk");
usr.bin/ssh/sk-usbhid.c
1312
skdebug(__func__, "trying %s", sk->path);
usr.bin/ssh/sk-usbhid.c
1314
skdebug(__func__, "read_rks failed for %s", sk->path);
usr.bin/ssh/sk-usbhid.c
137
skdebug(__func__, "path == NULL");
usr.bin/ssh/sk-usbhid.c
141
skdebug(__func__, "calloc sk failed");
usr.bin/ssh/sk-usbhid.c
145
skdebug(__func__, "strdup path failed");
usr.bin/ssh/sk-usbhid.c
150
skdebug(__func__, "fido_dev_new failed");
usr.bin/ssh/sk-usbhid.c
156
skdebug(__func__, "fido_dev_open %s failed: %s", sk->path,
usr.bin/ssh/sk-usbhid.c
187
skdebug(__func__, "calloc skv failed");
usr.bin/ssh/sk-usbhid.c
192
skdebug(__func__, "fido_dev_info_ptr failed");
usr.bin/ssh/sk-usbhid.c
194
skdebug(__func__, "sk_open failed");
usr.bin/ssh/sk-usbhid.c
226
skdebug(__func__, "fido_dev_get_touch_begin %s failed:"
usr.bin/ssh/sk-usbhid.c
248
skdebug(__func__, "polling %s", skv[i]->path);
usr.bin/ssh/sk-usbhid.c
251
skdebug(__func__, "fido_dev_get_touch_status %s: %s",
usr.bin/ssh/sk-usbhid.c
256
skdebug(__func__, "no device left to poll");
usr.bin/ssh/sk-usbhid.c
279
skdebug(__func__, "fido_assert_new failed");
usr.bin/ssh/sk-usbhid.c
285
skdebug(__func__, "fido_assert_set_clientdata: %s",
usr.bin/ssh/sk-usbhid.c
290
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
295
skdebug(__func__, "fido_assert_allow_cred: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
299
skdebug(__func__, "fido_assert_up: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
303
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
326
skdebug(__func__, "device is not fido2");
usr.bin/ssh/sk-usbhid.c
330
skdebug(__func__, "fido_cbor_info_new failed");
usr.bin/ssh/sk-usbhid.c
334
skdebug(__func__, "fido_dev_get_cbor_info: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
349
skdebug(__func__, "option %s is unknown", opt);
usr.bin/ssh/sk-usbhid.c
351
skdebug(__func__, "option %s is %s", opt, *ret ? "on" : "off");
usr.bin/ssh/sk-usbhid.c
365
skdebug(__func__, "sk_openv failed");
usr.bin/ssh/sk-usbhid.c
380
skdebug(__func__, "found key in %s", sk->path);
usr.bin/ssh/sk-usbhid.c
398
skdebug(__func__, "sk_openv failed");
usr.bin/ssh/sk-usbhid.c
411
skdebug(__func__, "sk_touch_begin failed");
usr.bin/ssh/sk-usbhid.c
417
skdebug(__func__, "sk_touch_poll failed");
usr.bin/ssh/sk-usbhid.c
430
skdebug(__func__, "timeout");
usr.bin/ssh/sk-usbhid.c
446
skdebug(__func__, "fido_dev_info_new failed");
usr.bin/ssh/sk-usbhid.c
451
skdebug(__func__, "fido_dev_info_manifest failed: %s",
usr.bin/ssh/sk-usbhid.c
456
skdebug(__func__, "%zu device(s) detected", ndevs);
usr.bin/ssh/sk-usbhid.c
460
skdebug(__func__, "selecting sk by cred");
usr.bin/ssh/sk-usbhid.c
464
skdebug(__func__, "selecting sk by touch");
usr.bin/ssh/sk-usbhid.c
493
skdebug(__func__, "libcrypto setup failed");
usr.bin/ssh/sk-usbhid.c
497
skdebug(__func__, "fido_cred_pubkey_ptr failed");
usr.bin/ssh/sk-usbhid.c
501
skdebug(__func__, "bad fido_cred_pubkey_len %zu",
usr.bin/ssh/sk-usbhid.c
508
skdebug(__func__, "BN_bin2bn failed");
usr.bin/ssh/sk-usbhid.c
512
skdebug(__func__, "EC_POINT_set_affine_coordinates failed");
usr.bin/ssh/sk-usbhid.c
518
skdebug(__func__, "bad pubkey length %zu",
usr.bin/ssh/sk-usbhid.c
523
skdebug(__func__, "malloc pubkey failed");
usr.bin/ssh/sk-usbhid.c
528
skdebug(__func__, "EC_POINT_point2oct failed");
usr.bin/ssh/sk-usbhid.c
559
skdebug(__func__, "bad fido_cred_pubkey_len len %zu", len);
usr.bin/ssh/sk-usbhid.c
563
skdebug(__func__, "fido_cred_pubkey_ptr failed");
usr.bin/ssh/sk-usbhid.c
568
skdebug(__func__, "malloc pubkey failed");
usr.bin/ssh/sk-usbhid.c
622
skdebug(__func__, "strdup device failed");
usr.bin/ssh/sk-usbhid.c
625
skdebug(__func__, "requested device %s", *devicep);
usr.bin/ssh/sk-usbhid.c
629
skdebug(__func__, "user too long");
usr.bin/ssh/sk-usbhid.c
632
skdebug(__func__, "requested user %s",
usr.bin/ssh/sk-usbhid.c
635
skdebug(__func__, "requested unsupported option %s",
usr.bin/ssh/sk-usbhid.c
638
skdebug(__func__, "unknown required option");
usr.bin/ssh/sk-usbhid.c
658
skdebug(__func__, "fido_assert_new failed");
usr.bin/ssh/sk-usbhid.c
664
skdebug(__func__, "fido_assert_set_clientdata: %s",
usr.bin/ssh/sk-usbhid.c
669
skdebug(__func__, "fido_assert_set_rp: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
673
skdebug(__func__, "fido_assert_set_up: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
681
skdebug(__func__, "fido_assert_set_uv: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
685
skdebug(__func__, "fido_dev_get_assert: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
689
skdebug(__func__, "%zu signatures returned", fido_assert_count(assert));
usr.bin/ssh/sk-usbhid.c
694
skdebug(__func__, "credential exists");
usr.bin/ssh/sk-usbhid.c
725
skdebug(__func__, "enroll_response == NULL");
usr.bin/ssh/sk-usbhid.c
744
skdebug(__func__, "unsupported key type %d", alg);
usr.bin/ssh/sk-usbhid.c
753
skdebug(__func__, "failed to find sk");
usr.bin/ssh/sk-usbhid.c
756
skdebug(__func__, "using device %s", sk->path);
usr.bin/ssh/sk-usbhid.c
763
skdebug(__func__, "key_lookup failed");
usr.bin/ssh/sk-usbhid.c
766
skdebug(__func__, "key exists");
usr.bin/ssh/sk-usbhid.c
771
skdebug(__func__, "fido_cred_new failed");
usr.bin/ssh/sk-usbhid.c
775
skdebug(__func__, "fido_cred_set_type: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
780
skdebug(__func__, "fido_cred_set_clientdata: %s",
usr.bin/ssh/sk-usbhid.c
786
skdebug(__func__, "fido_cred_set_rk: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
791
skdebug(__func__, "fido_cred_set_user: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
795
skdebug(__func__, "fido_cred_set_rp: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
800
skdebug(__func__, "%s does not support credprot, "
usr.bin/ssh/sk-usbhid.c
812
skdebug(__func__, "fido_cred_set_prot: %s",
usr.bin/ssh/sk-usbhid.c
819
skdebug(__func__, "fido_dev_make_cred: %s", fido_strerr(r));
usr.bin/ssh/sk-usbhid.c
825
skdebug(__func__, "fido_cred_verify: %s",
usr.bin/ssh/sk-usbhid.c
830
skdebug(__func__, "self-attested credential");
usr.bin/ssh/sk-usbhid.c
832
skdebug(__func__, "fido_cred_verify_self: %s",
usr.bin/ssh/sk-usbhid.c
837
skdebug(__func__, "no attestation data");
usr.bin/ssh/sk-usbhid.c
840
skdebug(__func__, "calloc response failed");
usr.bin/ssh/sk-usbhid.c
845
skdebug(__func__, "pack_public_key failed");
usr.bin/ssh/sk-usbhid.c
851
skdebug(__func__, "calloc key handle failed");
usr.bin/ssh/sk-usbhid.c
860
skdebug(__func__, "calloc signature failed");
usr.bin/ssh/sk-usbhid.c
868
skdebug(__func__, "attestation cert len=%zu", len);
usr.bin/ssh/sk-usbhid.c
870
skdebug(__func__, "calloc attestation cert failed");
usr.bin/ssh/sk-usbhid.c
878
skdebug(__func__, "authdata len=%zu", len);
usr.bin/ssh/sk-usbhid.c
880
skdebug(__func__, "calloc authdata failed");
usr.bin/ssh/sk-usbhid.c
917
skdebug(__func__, "d2i_ECDSA_SIG failed");
usr.bin/ssh/sk-usbhid.c
925
skdebug(__func__, "calloc signature failed");
usr.bin/ssh/sk-usbhid.c
95
static void skdebug(const char *func, const char *fmt, ...)
usr.bin/ssh/sk-usbhid.c
953
skdebug(__func__, "bad length %zu", len);
usr.bin/ssh/sk-usbhid.c
958
skdebug(__func__, "calloc signature failed");
usr.bin/ssh/sk-usbhid.c
998
skdebug(__func__, "strdup device failed");