Searched refs:logMsg (Results 1 - 25 of 29) sorted by relevance

12

/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/src/tpm_mgmt/
H A Dtpm_nvinfo.c76 logMsg("PCR %sselection:\n", type);
81 logMsg(" PCRs : ");
83 logMsg(", ");
90 logMsg("\n");
94 logMsg(" Localities : ALL\n");
96 logMsg(" Localities : 0x%01x\n", tpis->localityAtRelease);
101 logMsg(" Hash : ");
103 logMsg("%02x", tpis->digestAtRelease.digest[i]);
104 logMsg("\n");
115 logMsg("NVRA
[all...]
H A Dtpm_version.c72 logMsg(_(" TPM 1.2 Version Info:\n"));
73 logMsg(_(" Chip Version: %hhu.%hhu.%hhu.%hhu\n"),
76 logMsg(_(" Spec Level: %hu\n"), versionInfo.specLevel);
77 logMsg(_(" Errata Revision: %hhu\n"), versionInfo.errataRev);
78 logMsg(_(" TPM Vendor ID: %c%c%c%c\n"),
83 logMsg(_(" Vendor Specific data: "));
95 logMsg(_(" TPM Version: "));
103 logMsg(_(" Manufacturer Info: "));
H A Dtpm_present.c190 logMsg(_("Failed to get password\n"));
215 logMsg
220 logMsg(_("Current State:\n"));
221 logMsg("\t%s: %s\n", _(flags[cmdEnable].name), logBool(mapTssBool(bCmd)));
222 logMsg("\t%s: %s\n", _(flags[hwdEnable].name), logBool(mapTssBool(bHwd)));
223 logMsg
226 logMsg
232 logMsg
237 logMsg
307 logMsg(
[all...]
H A Dtpm_activate.c127 logMsg(_("Failed to get password\n"));
143 logMsg(_("Persistent Deactivated Status: %s\n"),
149 logMsg(_("Volatile Deactivated Status: %s\n"),
155 logMsg(_("Action requires a reboot to take effect\n"));
160 logMsg(_("Action requires a reboot to take effect\n"));
H A Dtpm_getpubek.c91 logMsg(_("Failed to get password\n"));
109 logMsg(_("Public Endorsement Key:\n"));
H A Dtpm_clearable.c135 logMsg(_("Failed to get password\n"));
152 logMsg("%s Disabled: %s\n", _(flags[i].name),
171 logMsg(_("Failed to get password\n"));
H A Dtpm_enable.c126 logMsg(_("Failed to get password\n"));
141 logMsg(_("Disabled status: %s\n"), logBool(mapTssBool(bValue)));
151 logMsg(_("Failed to get password\n"));
H A Dtpm_clear.c105 logMsg(_("Failed to get password\n"));
125 logMsg( _("TPM Successfuly Cleared. You need to reboot to complete this operation. After reboot the TPM will be in the default state: unowned, disabled and inactive.\n") );
H A Dtpm_ownable.c117 logMsg(_("Failed to get password\n"));
133 logMsg(_("Ownable status: %s\n"), logBool(mapTssBool(bValue)));
H A Dtpm_restrictpubek.c103 logMsg(_("Failed to get password\n"));
119 logMsg(_("Public Endorsement Key readable by: %s\n"),
H A Dtpm_restrictsrk.c115 logMsg(_("Failed to get password\n"));
132 logMsg(_("Storage Root Key readable with: %s\n"),
H A Dtpm_selftest.c70 logMsg(_(" TPM Test Results: "));
H A Dtpm_revokeek.c86 logMsg(_("WARNING: Using only the first %d bytes of file %s for secret data\n"),
H A Dtpm_nvrelease.c163 logMsg(_("Successfully released NVRAM area at index 0x%x (%d).\n"),
H A Dtpm_nvcommon.c100 logMsg("%sThe following strings are available:\n", indent);
102 logMsg("%s%15s : %s\n", indent, svals[i].name, svals[i].desc);
H A Dtpm_nvdefine.c276 logMsg(_("Successfully created NVRAM area at index 0x%x (%u).\n"),
H A Dtpm_createek.c113 logMsg(_("WARNING: Using only the first %d bytes of file %s for secret data\n"),
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/lib/
H A Dtpm_log.c35 logMsg("\n\t");
38 logMsg(" ");
43 logMsg("%02x", iByte);
46 logMsg("\n");
51 int logMsg(const char *a_szFormat, ...) function
131 logMsg("\t%s\n\t\t%s\n", aOption, aDescr);
166 logMsg(_("Usage: %s [options]\n"), aCmd);
174 logMsg(_("Usage: %s [options]"), aCmd);
176 logMsg(" %s", aArgs[i]);
177 logMsg("\
[all...]
H A Dtpm_pkcs11.c603 logMsg( "%s%s'", pszPre, a_pszLabel );
608 logMsg( "(null)" );
610 logMsg( "'%s", pszPost );
716 logMsg( _("Certificate Object\n") );
719 logMsg( _("\tX509 Certificate\n") );
723 logMsg( _("\tX509 Attribute Certificate\n") );
727 logMsg( _("\tUnknown Certificate Type (%08x)\n"), tType );
730 logMsg( _("\tToken Object: %s\n"), bToken ? _("true") : _("false") );
732 logMsg( _("\tPrivate Object: %s\n"), bPrivate ? _("true") : _("false") );
734 logMsg(
[all...]
H A Dtpm_utils.c89 logMsg( _("%s version: %s\n"), a_pszArgs[0], CMD_VERSION );
107 logMsg( _("Valid log levels are: %s, %s, %s, %s\n"),
188 logMsg( _("Passwords didn't match\n") );
236 logMsg( "%s", a_pszPrompt );
H A Dtpm_tspi.c189 logMsg(_(" Version: "));
197 logMsg(_(" Usage: 0x%04x (%s)\n"), uiAttr, displayKeyUsageMap(uiAttr));
204 logMsg(_(" Flags: 0x%08x (%s)\n"), uiAttr, displayKeyFlagsMap(uiAttr));
211 logMsg(_(" AuthUsage: 0x%02x (%s)\n"), uiAttr, displayAuthUsageMap(uiAttr));
218 logMsg(_(" Algorithm: 0x%08x (%s)\n"), uiAlg, displayAlgorithmMap(uiAlg));
225 logMsg(_(" Encryption Scheme: 0x%08x (%s)\n"), uiAttr, displayEncSchemeMap(uiAttr));
232 logMsg(_(" Signature Scheme: 0x%08x (%s)\n"), uiAttr, displaySigSchemeMap(uiAttr));
241 logMsg(_(" Key Size: %d bits\n"), uiAttr);
250 logMsg(_(" Public Key:"));
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/src/data_mgmt/
H A Ddata_object.c135 logMsg( TOKEN_NOT_INIT_ERROR );
168 logMsg( NO_TOKEN_OBJECTS );
H A Ddata_protect.c143 logMsg( TOKEN_INPUT_FILE_ERROR );
149 logMsg( TOKEN_OUTPUT_FILE_ERROR );
442 logMsg( TOKEN_NOT_INIT_ERROR );
H A Ddata_passwd.c134 logMsg( TOKEN_NOT_INIT_ERROR );
/netbsd-6-1-5-RELEASE/crypto/external/cpl/tpm-tools/dist/include/
H A Dtpm_utils.h98 int logMsg( const char *a_pszFormat, ... );

Completed in 203 milliseconds

12