LOG_CRYPTO
LOG_DBG ((LOG_CRYPTO, 50,
LOG_DBG ((LOG_CRYPTO, 50,
LOG_DBG((LOG_CRYPTO, 10, "crypto_init: invalid key length %d",
LOG_DBG_BUF((LOG_CRYPTO, 40, "crypto_init: key", key, len));
LOG_DBG((LOG_CRYPTO, 30, "crypto_init: weak key found for %s",
LOG_DBG_BUF((LOG_CRYPTO, 50, "crypto_update_iv: updated IV", ks->riv,
LOG_DBG_BUF((LOG_CRYPTO, 50, "crypto_init_iv: initialized IV", ks->riv,
LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_encrypt: before encryption", buf,
LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_encrypt: after encryption", buf,
LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_decrypt: before decryption", buf,
LOG_DBG_BUF((LOG_CRYPTO, 70, "crypto_decrypt: after decryption", buf,
LOG_DBG((LOG_CRYPTO, 60, "hash_get: requested algorithm %d",
LOG_DBG((LOG_CRYPTO, 50, "rsa_sig_decode_hash:"
LOG_DBG((LOG_CRYPTO, 40,
LOG_DBG_BUF((LOG_CRYPTO, 80, "ipsec_get_keystate: final phase 1 IV",
LOG_DBG_BUF((LOG_CRYPTO, 80, "ipsec_get_keystate: message ID",
LOG_DBG_BUF((LOG_CRYPTO, 80, "ipsec_get_keystate: phase 2 IV",
LOG_DBG((LOG_CRYPTO, 60, "x509_cert_obtain: "
LOG_DBG_BUF((LOG_CRYPTO, 70, "cert_cmp", id, len));
LOG_DBG_BUF((LOG_CRYPTO, 70, "cert_cmp", cid[i],
LOG_DBG((LOG_CRYPTO, 70, "x509_hash_find: return X509 %p",
LOG_DBG((LOG_CRYPTO, 70,
LOG_DBG((LOG_CRYPTO, 70,
LOG_DBG((LOG_CRYPTO, 40, "x509_read_from_dir: reading certs from %s",
LOG_DBG((LOG_CRYPTO, 10,
LOG_DBG((LOG_CRYPTO, 60,
LOG_DBG((LOG_CRYPTO, 50,
LOG_DBG((LOG_CRYPTO, 40, "x509_read_crls_from_dir: reading CRLs "
LOG_DBG((LOG_CRYPTO, 10, "x509_read_crls_from_dir: opendir "
LOG_DBG((LOG_CRYPTO, 60, "x509_read_crls_from_dir: reading "
LOG_DBG((LOG_CRYPTO, 50, "x509_read_crls_from_dir: "