Lines Matching refs:LOG_ERR

818 		ipseclog((LOG_ERR, "protocol family mismatched %d != %d\n.",  in key_gettunnel()
1028 ipseclog((LOG_ERR, "key_checkrequest: error %d returned " in key_checkrequest()
1496 ipseclog((LOG_ERR, "key_checksa_present: " in key_checksa_present()
1886 ipseclog((LOG_ERR, "key_msg2sp: Invalid msg length.\n")); in key_msg2sp()
1920 ipseclog((LOG_ERR, in key_msg2sp()
1931 ipseclog((LOG_ERR, "key_msg2sp: " in key_msg2sp()
1947 ipseclog((LOG_ERR, in key_msg2sp()
1962 ipseclog((LOG_ERR, in key_msg2sp()
1984 ipseclog((LOG_ERR, in key_msg2sp()
2009 ipseclog((LOG_ERR, "key_msg2sp: invalid level=%u\n", in key_msg2sp()
2022 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2031 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2044 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2053 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2065 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2076 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2086 ipseclog((LOG_ERR, "key_msg2sp: invalid request " in key_msg2sp()
2105 ipseclog((LOG_ERR, "key_msg2sp: becoming tlen < 0.\n")); in key_msg2sp()
2114 ipseclog((LOG_ERR, "key_msg2sp: invalid policy type.\n")); in key_msg2sp()
2187 ipseclog((LOG_ERR, "key_getspreqmsglen returned length %u\n", in key_sp2msg()
2377 ipseclog((LOG_ERR, "key_spdadd: invalid message is passed.\n")); in key_spdadd()
2387 ipseclog((LOG_ERR, "key_spdadd: invalid message is passed.\n")); in key_spdadd()
2393 ipseclog((LOG_ERR, "key_spdadd: invalid message is passed.\n")); in key_spdadd()
2401 ipseclog((LOG_ERR, "key_spdadd: invalid message is passed.\n")); in key_spdadd()
2447 ipseclog((LOG_ERR, "key_spdadd: Invalid SP direction.\n")); in key_spdadd()
2455 ipseclog((LOG_ERR, "key_spdadd: Invalid policy type.\n")); in key_spdadd()
2463 ipseclog((LOG_ERR, "key_spdadd: some policy requests part required.\n")); in key_spdadd()
2517 ipseclog((LOG_ERR, "key_spdadd: a SP entry exists already.\n")); in key_spdadd()
2603 ipseclog((LOG_ERR, "key_spdadd: invalid lifetime value %llu.\n", in key_spdadd()
2611 ipseclog((LOG_ERR, "key_spdadd: invalid use time value %llu.\n", in key_spdadd()
2755 ipseclog((LOG_ERR, "key_getnewspid: to allocate policy id is failed.\n")); in key_getnewspid()
2807 ipseclog((LOG_ERR, "key_spddelete: invalid message is passed.\n")); in key_spddelete()
2817 ipseclog((LOG_ERR, "key_spddelete: invalid message is passed.\n")); in key_spddelete()
2842 ipseclog((LOG_ERR, "key_spddelete: Invalid SP direction.\n")); in key_spddelete()
2876 ipseclog((LOG_ERR, "key_spddelete: no SP found.\n")); in key_spddelete()
2952 ipseclog((LOG_ERR, "key_spddelete2: invalid message is passed.\n")); in key_spddelete2()
2964 ipseclog((LOG_ERR, "key_spddelete2: no SP found id:%u.\n", id)); in key_spddelete2()
3048 ipseclog((LOG_ERR, "key_spdenable: invalid message is passed.\n")); in key_spdenable()
3060 ipseclog((LOG_ERR, "key_spdenable: no SP found id:%u.\n", id)); in key_spdenable()
3113 ipseclog((LOG_ERR, "key_spddisable: invalid message is passed.\n")); in key_spddisable()
3125 ipseclog((LOG_ERR, "key_spddisable: no SP found id:%u.\n", id)); in key_spddisable()
3191 ipseclog((LOG_ERR, "key_spdget: invalid message is passed.\n")); in key_spdget()
3201 ipseclog((LOG_ERR, "key_spdget: no SP found id:%u.\n", id)); in key_spdget()
3345 ipseclog((LOG_ERR, "key_spdflush: No more memory.\n")); in key_spdflush()
3396 …ipseclog((LOG_ERR, "key_spddump: bufcount overflow, ipsec policy count %u.\n", ipsec_policy_count)… in key_spddump()
3402 ipseclog((LOG_ERR, "key_spddump: No more memory.\n")); in key_spddump()
3551 ipseclog((LOG_ERR, "key_setdumpsp: packet header length > UINT16_MAX\n")); in key_setdumpsp()
3745 ipseclog((LOG_ERR, "key_setdumpsp: packet header length > UINT16_MAX\n")); in key_spdexpire()
3948 ipseclog((LOG_ERR, "key_newsa: invalid message is passed.\n")); in key_newsav()
4005 ipseclog((LOG_ERR, "key_newsa: invalid hard lifetime ext len.\n")); in key_newsav()
4212 ipseclog((LOG_ERR, "key_checkspidup: address family mismatched.\n")); in key_checkspidup()
4324 ipseclog((LOG_ERR, "key_setsaval: invalid message size.\n")); in key_setsaval()
4339 ipseclog((LOG_ERR, "key_setsaval: natt port not set.\n")); in key_setsaval()
4346 ipseclog((LOG_ERR, "key_setsaval: natt port not set.\n")); in key_setsaval()
4401 ipseclog((LOG_ERR, "key_setsaval: invalid auth key ext len. len = %d\n", len)); in key_setsaval()
4418 ipseclog((LOG_ERR, "key_setsaval: invalid key_auth values.\n")); in key_setsaval()
4440 ipseclog((LOG_ERR, "key_setsaval: invalid encryption key ext len. len = %d\n", len)); in key_setsaval()
4448 ipseclog((LOG_ERR, "key_setsaval: invalid ESP algorithm.\n")); in key_setsaval()
4461 ipseclog((LOG_ERR, "key_setsaval: invalid key_enc value.\n")); in key_setsaval()
4486 ipseclog((LOG_ERR, "key_setsaval: No more memory.\n")); in key_setsaval()
4502 ipseclog((LOG_ERR, "key_setsaval: invalid SA type.\n")); in key_setsaval()
4536 ipseclog((LOG_ERR, "key_setsaval: invalid hard lifetime ext len.\n")); in key_setsaval()
4545 ipseclog((LOG_ERR, "key_setsaval: invalid hard lifetime value %llu.\n", in key_setsaval()
4556 ipseclog((LOG_ERR, "key_setsaval: invalid soft lifetime ext len.\n")); in key_setsaval()
4565 ipseclog((LOG_ERR, "key_setsaval: invalid soft lifetime value %llu.\n", in key_setsaval()
4604 ipseclog((LOG_ERR, in key_mature()
4618 ipseclog((LOG_ERR, "key_mature: " in key_mature()
4632 ipseclog((LOG_ERR, "key_mature: " in key_mature()
4637 ipseclog((LOG_ERR, "key_mature: " in key_mature()
4645 ipseclog((LOG_ERR, "key_mature: Invalid satype.\n")); in key_mature()
4656 ipseclog((LOG_ERR, "key_mature: " in key_mature()
4668 ipseclog((LOG_ERR, in key_mature()
4685 ipseclog((LOG_ERR, "key_mature: no satisfy algorithm for AH\n")); in key_mature()
4698 ipseclog((LOG_ERR, "key_mature: unknown encryption algorithm.\n")); in key_mature()
4709 ipseclog((LOG_ERR, in key_mature()
4726 ipseclog((LOG_ERR, "key_mature: no satisfy algorithm for ESP\n")); in key_mature()
4730 ipseclog((LOG_ERR, "key_mature: ESP not supported in this configuration\n")); in key_mature()
5047 ipseclog((LOG_ERR, "key_setsadbaddr: bad prefix length %zu", prefixlen)); in key_setsadbaddr()
5072 ipseclog((LOG_ERR, "key_getsaddbaddr: mhp is NULL\n")); in key_getsaddbaddr()
5079 ipseclog((LOG_ERR, "key_getsaddbaddr: ext_len(%zu) < sizeof(struct sadb_address) " in key_getsaddbaddr()
5087 ipseclog((LOG_ERR, "key_getsaddbaddr: ext_len(%zu) < sizeof(struct sadb_address) " in key_getsaddbaddr()
5185 ipseclog((LOG_ERR, "key_setsadbsastat: length is too big: %zu\n", len)); in key_setsadbsastat()
6546 ipseclog((LOG_ERR, "key_getspi: invalid message is passed.\n")); in key_getspi()
6551 ipseclog((LOG_ERR, "key_getspi: invalid message is passed.\n")); in key_getspi()
6570 ipseclog((LOG_ERR, "key_getspi: invalid satype is passed.\n")); in key_getspi()
6634 ipseclog((LOG_ERR, "key_getspi: No more memory.\n")); in key_getspi()
6650 ipseclog((LOG_ERR, "key_getspi: custom ipsec exists\n")); in key_getspi()
6669 ipseclog((LOG_ERR, "key_getspi: security association head is dead\n")); in key_getspi()
6795 ipseclog((LOG_ERR, "key_do_getnewspi: SPI %u exists already.\n", keymin)); in key_do_getnewspi()
6820 ipseclog((LOG_ERR, "key_do_getnewspi: to allocate spi is failed.\n")); in key_do_getnewspi()
6871 ipseclog((LOG_ERR, "key_update: invalid satype is passed.\n")); in key_update()
6887 ipseclog((LOG_ERR, "key_update: invalid message is passed.\n")); in key_update()
6894 ipseclog((LOG_ERR, "key_update: invalid message is passed.\n")); in key_update()
6932 ipseclog((LOG_ERR, "key_update: no SA index found.\n")); in key_update()
6941 ipseclog((LOG_ERR, in key_update()
6953 ipseclog((LOG_ERR, in key_update()
6961 ipseclog((LOG_ERR, in key_update()
6980 ipseclog((LOG_ERR, in key_update()
7011 ipseclog((LOG_ERR, "key_update: No more memory.\n")); in key_update()
7061 ipseclog((LOG_ERR, "key_migrate: invalid satype is passed.\n")); in key_migrate()
7070 ipseclog((LOG_ERR, "key_migrate: invalid message is passed.\n")); in key_migrate()
7079 ipseclog((LOG_ERR, "key_migrate: invalid message is passed.\n")); in key_migrate()
7122 ipseclog((LOG_ERR, "key_migrate: no mature SAH found.\n")); in key_migrate()
7131 ipseclog((LOG_ERR, "key_migrate: no SA found.\n")); in key_migrate()
7144 ipseclog((LOG_ERR, "key_migrate: No more memory.\n")); in key_migrate()
7156 ipseclog((LOG_ERR, "key_migrate: custom ipsec exists\n")); in key_migrate()
7163 ipseclog((LOG_ERR, "key_migrate: Failed to migrate SA to new SAH.\n")); in key_migrate()
7259 ipseclog((LOG_ERR, "key_add: invalid satype is passed.\n")); in key_add()
7275 ipseclog((LOG_ERR, "key_add: invalid message is passed.\n")); in key_add()
7283 ipseclog((LOG_ERR, "key_add: invalid message is passed.\n")); in key_add()
7312 ipseclog((LOG_ERR, "key_add: No more memory.\n")); in key_add()
7327 ipseclog((LOG_ERR, "key_add: custom ipsec exists\n")); in key_add()
7335 ipseclog((LOG_ERR, "key_add: SA already exists.\n")); in key_add()
7345 ipseclog((LOG_ERR, "key_add: security association head is dead\n")); in key_add()
7381 ipseclog((LOG_ERR, "key_update: No more memory.\n")); in key_add()
7486 ipseclog((LOG_ERR, "key_delete: invalid satype is passed.\n")); in key_delete()
7492 ipseclog((LOG_ERR, "key_delete: invalid message is passed.\n")); in key_delete()
7498 ipseclog((LOG_ERR, "key_delete: invalid message is passed.\n")); in key_delete()
7510 ipseclog((LOG_ERR, "key_delete: doing delete all.\n")); in key_delete()
7515 ipseclog((LOG_ERR, "key_delete: invalid message is passed.\n")); in key_delete()
7552 ipseclog((LOG_ERR, "key_delete: no SA found.\n")); in key_delete()
7644 ipseclog((LOG_ERR, "key_delete_all: " in key_delete_all()
7721 ipseclog((LOG_ERR, "key_get: invalid satype is passed.\n")); in key_get()
7728 ipseclog((LOG_ERR, "key_get: invalid message is passed.\n")); in key_get()
7734 ipseclog((LOG_ERR, "key_get: invalid message is passed.\n")); in key_get()
7772 ipseclog((LOG_ERR, "key_get: no SA found.\n")); in key_get()
7783 ipseclog((LOG_ERR, "key_get: there was invalid proto in SAD.\n")); in key_get()
8444 ipseclog((LOG_ERR, "key_acquire2: invalid satype is passed.\n")); in key_acquire2()
8453 ipseclog((LOG_ERR, "key_acquire2: invalid message is passed.\n")); in key_acquire2()
8461 ipseclog((LOG_ERR, "key_acquire2: invalid message is passed.\n")); in key_acquire2()
8491 ipseclog((LOG_ERR, "key_acquire2: a SA exists already.\n")); in key_acquire2()
8497 ipseclog((LOG_ERR, "key_acquire2: error %d returned " in key_acquire2()
8549 ipseclog((LOG_ERR, "key_register: socket exists already.\n")); in key_register()
8923 ipseclog((LOG_ERR, "key_flush: invalid satype is passed.\n")); in key_flush()
8960 ipseclog((LOG_ERR, "key_flush: No more memory.\n")); in key_flush()
9021 ipseclog((LOG_ERR, "key_dump: invalid satype is passed.\n")); in key_dump()
9031 ipseclog((LOG_ERR, "key_dump: bufcount overflow, ipsec sa count %u.\n", ipsec_sav_count)); in key_dump()
9037 ipseclog((LOG_ERR, "key_dump: No more memory.\n")); in key_dump()
9054 ipseclog((LOG_ERR, "key_dump: there was invalid proto in SAD.\n")); in key_dump()
9288 ipseclog((LOG_ERR, "key_parse: upper layer protocol mismatched.\n")); in key_validate_address_ext_pair()
9295 ipseclog((LOG_ERR, "key_parse: address family mismatched.\n")); in key_validate_address_ext_pair()
9300 ipseclog((LOG_ERR, in key_validate_address_ext_pair()
9320 ipseclog((LOG_ERR, in key_validate_address_ext_pair()
9341 ipseclog((LOG_ERR, in key_validate_address_ext_pair()
9402 ipseclog((LOG_ERR, "key_parse: invalid message length.\n")); in key_parse()
9409 ipseclog((LOG_ERR, in key_parse()
9418 ipseclog((LOG_ERR, "key_parse: invalid type %u is passed.\n", in key_parse()
9480 ipseclog((LOG_ERR, "key_parse: must specify satype " in key_parse()
9500 ipseclog((LOG_ERR, "key_parse: illegal satype=%u\n", in key_parse()
9511 ipseclog((LOG_ERR, "key_parse: type %u isn't supported.\n", in key_parse()
9522 ipseclog((LOG_ERR, "key_parse: invalid type %u is passed.\n", in key_parse()
9694 ipseclog((LOG_ERR, in key_align()
9704 ipseclog((LOG_ERR, in key_align()
9715 ipseclog((LOG_ERR, in key_align()
10055 ipseclog((LOG_ERR, "key_setdumpsastats: length too nbug: %u", result->m_pkthdr.len)); in key_setdumpsastats()
10317 ipseclog((LOG_ERR, "key_send_delsp: length too big: %d", result->m_pkthdr.len)); in key_send_delsp()
10443 ipseclog((LOG_ERR, "register custom ipsec: invalid address\n")); in key_reserve_custom_ipsec()
10448 ipseclog((LOG_ERR, "register custom ipsec: address family mismatched\n")); in key_reserve_custom_ipsec()
10453 ipseclog((LOG_ERR, "register custom ipsec: address struct size mismatched\n")); in key_reserve_custom_ipsec()
10458 ipseclog((LOG_ERR, "register custom ipsec: invalid ipsec token\n")); in key_reserve_custom_ipsec()
10465 ipseclog((LOG_ERR, "register custom esp: invalid address length\n")); in key_reserve_custom_ipsec()
10471 ipseclog((LOG_ERR, "register custom esp: invalid address length\n")); in key_reserve_custom_ipsec()
10476 ipseclog((LOG_ERR, "register custom esp: invalid address length\n")); in key_reserve_custom_ipsec()
10481 ipseclog((LOG_ERR, "register custom esp: invalid proto %u\n", proto)); in key_reserve_custom_ipsec()
10493 ipseclog((LOG_ERR, "register custom esp: SA exists\n")); in key_reserve_custom_ipsec()
10499 ipseclog((LOG_ERR, "register custom esp: No more memory.\n")); in key_reserve_custom_ipsec()