b!H J S T1L.text .data J@.bss V@ V@.loader$F@88`N @ mpm_get_my_id88`N @mpm_get_error_msg||+y`8!@X9>T8`@8<888PHA8~8H`8`h8!`}N D8`,H*UA,`~DAt88,H*m`8bs@H`8`!Dh8!`}a상K,cccc&H@`|y80bH8pA耢8c 8H`8y H.`8PyL8,@Tc#H'`c#HVuAc8eXH`c!Dh8!`}a상K|HV5Ac#88PH&`c#HVAc8eXH`c!Dh8!`}a상Kc`>8eHY`c!Dh8!`}a상Kԃ8`888R9? 8$HHɀA8\88cH`8`!Dh8!`}a상Kp Ampm_set_ctx_attribute|!,8H88fXA 8HQ`8`H8!@}N ALmpm_renew_identity|!H8`HTIAb88clH`8`H8!@}N AHmpm_release_identity|!H8`HCi`b88c4HU`8`H8!@}N AHmpm_release_buffer|,=la`8ls8!Ald|` |0@A<@@H```H8i``bc8cDH`cx8!p}N 8@`8P8H@$\HLPTH,`@<< `| @|(@\Ax8aH`@HH+``aLHReAbc8cDH`cx8!p}N aLHR-Abc8cDH`KȀaLHHuA,Aă8`"889?8 8uH-A888"H]`8`"x8!p}N 8`888Q9>08DHـA`8~cH`cx8!p}N 8`888Q9>8DH}A`8~cH`cx8!p}N @```H65`K̃8`888P9>8@HA`8~cH1`cx8!p}N Ampm_process_data|;,`8DH IA`8~cHu`ch8!`}K(8`888P9>8@H A`8~cH`ch8!`}N Ampm_prepare_data|b8!8cHHـAH`H8!@}N A8mpm_init|,,!A| @AHD8`88H A8~8H`8`H8!@}N 9`c8~8TP5PP׼PjH`8`H8!@}N @8`89?888PH A88HA`8`H8!@}N ADmpm_get_ctx_flags|!,8H88fDA 8H`8`H8!@}N ALmpm_get_ctx_lifetime||#y``8!A,8p88QDHA8~8H`8`X8!P}N ,AHA88`9>88R8|(@LH8HA8~ 8H5`8`X8!P}K|cHl}`8~8H `8`X8!P}K48`8|888aHeA8~88GH q`8`X8!P}KAKx@8`89>8d88PHA8~8H 1`8`X8!P}Kx A\mpm_get_client_name|,8!A,<`laA,8lsAd|@@`8d `pc8Q9*l@LD8`888XHA8c8j|H )`8`H8!@}N H3``bc8cH `cH8!@}N `8`888Q9?l8XDHqA8|8H `8`H8!@}N @8`89?X8L88PH%A8\8H U`8`H8!@}N Ampm_get_client_id|,(8888Q| @A@8`DHA8~8H`8`H8!@}N H `c88,H`cHB A8~<8H`8`H8!@}N 8`89>888P@HA8~t8HI`8`H8!@}N A<mpm_end|!8H88elH`8`H8!@}N A< mpm_cleanupA L| N `8b;Ÿ|!,,A@8~ ,A\cHA89 888~8889 cHAX8!P}N HaA89 888~8889 9^ HYAX8!P}N 8`HL8!PN Ampm__trace_set_ctx_attr,@ 8`N H 0 @mpm__trace_ctxtkn,@ 8`N H @mpm__trace_svctkn,@ 8`N H @mpm__trace_stream_data,@ 8`N H0 @mpm__trace_format_data,@ 8`N H @mpm__trace_buffer||y`!|8A,8`A,,A,AAX\8!`N ;cH A;cH A8c8<9A9|8a@8}X8c8c9 H Ah8!`}N 8b88c8cPH рAh8!`}N X\8!`N 8`X\8!`N ADmpm__trace_routine_end_arg4|8!8`H`dhl!pAt(A48`8b888cH -A8`H8!@}N 8!@N Ap mpm__dbmsg||y8`!lp8A,,A,AlAL8!PN ;ŸcH A889Ap9l8~H88c89 H AX8!P}N 8b88c8c@H AX8!P}N L8!PN Ampm__trace_routine_end_arg3||~y8`!l8A,,A,A`AH8!PN ;cHA89l8888c9 HAX8!P}N 8b88c8c0HAX8!P}N H8!PN Ampm__trace_routine_end|8b!8c(HHAH8!@}N A,mpm__trace_unregister_ct_mpm|8b8!888c HHiAH8!@}N A8mpm__trace_register_ct_mpm|8b$8!HHA8`H8!@}N A0mpm__trace_initialize`f8b!|`dc|+yX8A,,@@8`8!PN ,AH8`A 8!PN 8b88&88chHAX8!P}N 8b8@8888c`HYAX8!P}N @d,,AhKp Ampm__trace_buffer@AF18_6`f8b`!|H,,A88`A 8!@N 8b88cpHAH8!@}N 8`8!@N Ahmpm__trace_format_data@AF19_5`e8b!|H,,A88`A 8!@N 8b88cxHAH8!@}N 8`8!@N Admpm__trace_stream_data@AF20_4|`8<`ra8js!/|@@\,,AA;ŸA8`X\8!`N ,,@cAhcHA8c9_8`;`;@;cc|@A\c``!( V>AH+-A,u,@|PA;:``|@;9:@|@,|PAl@,8`x8!p}ЂԂ؂ܻN 8b88cK`8`x8!p}ЂԂ؂K8A<8b8cK`8`x8!p}ЂԂ؂KP8}KIA|ty88A88<H8`K-A8~x8K]`8`h8!`}N H&`8`h8!`}Kȁ@8`89>$8088PK孀A8~X8K`8`h8!`}N ALmpm__copy_in_out|``ac8!cd8a@H&`88aD8@(@H%`8D8aH8(@dH%`8 H8aL8H%`8L8aP8(,LF A H%`8P,P@`;⤔8`888S9?8́LKEA8`8Ku`8`a\x8!p}N cKA,;`|@`8`9=8888RHKрA8}8K`8`x8!p}a상N 8cH$`8}8K`8`x8!p}a상K;⤔8`888S9?8́LK!A8`8KQ`8`a\x8!p}N AXmpm__unpack_crypt_buffer|``aA`<!|@@dd8;@cK9A,;b@d88`89;88RHKA8{08KM`8`x8!p}a상N `z88D8DH"`8z88H8HH"`8zL8L8H"`8z 8@8H"`8zP8P8H"q`8zH"]`]8{8Ky`8`x8!p}Aa상N ;< |@@8d8c@cKŀA;b,@8`9;888K Ampm__pack_crypt_buffer|``aA!H!A,;`}A`z8H!ŀA`|cCKA`{cKA|P8cC|!KyA8c8K`8|KYA8c8K`cCK9A`eccH `8|KA`e8cH `cH A8`X8!P}Aa상N H8`89<8,88RK)A8|48KY`8`X8!P}N Ampm__split_target_name|``aA!8!8@@H!|}yA$ch8!`}N a@KрA`|cKA|8dKA`|@|{y;"`AK푀A`zcK큀A|c88K `cc@H``|cKIA,a@@,@H8ycK`ch8!`}!Aa상N H A8ycK`ch8!`}!Aa상Kc$ccH`cccH`a@,ATK8`8888RHK݀A8y8K `8`!Dh8!`}a상N A(mpm__get_network_name8`N @mpm__get_ccdbuf_size|;¤,``8!D@Ah,,AX<| /LZA@< A8c0| ``@8@HA,A h8!`}N c8@ccK`8a@H 8bc8c|K}`ch8!`}N `8`;⤔888P9?8 @KA808K!`8`h8!`}N 8c0``8@HA,@c8@ccKK0@8`89>`888PKeA8~ 8K`8`h8!`}N Ampm__prepare_data|;⤔,`h`8!TPLHA,,A`8@8H8P,LFA\KM,@<\@T< |(c|08h08HA8H@8Pt A`HA|yA(8aHH mcx8!p}N c8bPT8cK1`K8`c888n8KŀA;K8`888P9?8@KؕA88K`8aHH8`x8!p}N tA8H݀A|yAK 8aPHuc8b8cKe`K8`c888m8KA;K@8`89?L888PK̀A88K`8`x8!p}N Ahmpm__process_data|`}8`88!8aH8@KA`8@c8HHŀA,I8`A,(@$ x8!p}N HAbH8 8-;⤔8c@8K%`9?l8` 8888W\]KyA8` x8!p}N Ampm__set_inet_info8`;䓁`|8,!8aDAK`c8XX\dlt|HA,8aA,8P88T08|PT:,T| T8,`T&(@@гћӓ (08@HPX`hp`!|/8C 8aԳ8ЛTd:T88c88@@H A<0,A8`(A ,@0 8!}N 8` 888?8W8l\KـA8` 8!}KHA8888W#8` ?8`\K}A8` 8!}KP88H`KHA888#?8` 8W8T\K A8` 8!}K;⤔8` 88V8HXKŀA88 8K`8` 8!}N "Ampm__set_uds_info```;¤c |a,!AKᅀA;c8`9>t8888R|@P|HKɀA8~@88fK`8`X8!P}a상N cc|KeA8||yHA9>88d 809z K`88|8H9` cKA88|cH`ccceH`cHA8`X8!P}a상K4H8`89>888RKСA8~h88pKխ`8`X8!P}a상K؁8`8888aKEA8~X88\KQ`8`X8!P}N A<mpm__get_client_id8,@N H @ mpm__free_bufferԒ`uܓ!A;@; a;`;⤔`;|; 8!<,A```!b8|v.H`,A;{;9;Z|@A,A84,8ADK`8`x8!p}Ԃ؂܃!Aa컁N 8`&8D88pbKMA8`&x8!p}Ԃ؂܃K8D8`&888pbKA8`&x8!p}Ԃ؂܃K\|v.,A(,@H-A|}yA(; <;{;9;Z|@@K8`88888RHKqA8T8Kӡ`8`x8!p}Ԃ؂܃KcH рA c8|c.HA|}yAK\ A Xmpm__check_config!Aa쿁;|;; } !4(AdHA,@8`KyA 88f8Kݙ`8@8aDKI||y@aD@|@@8aP88K]`{( @h;{|@A؀aDH A} 84HyA8}cK5`cx8!p}!Aa컁N H A,APcd{;{;D( Ax```!H YA,A;{z;Z( AHK܈( A8(#@P;{( A cc;{( A ````!8c;{( @Kcc88PK`d8}(8HA,@;[(:AcC( |@A4```!;ZA 8c(:( A`|@@} HA88`888dKeA8`x8!p}!AaKp;z8z8L8H8:KE,A,A,8z;z8L8H8 K,@tLaH`,A <|@A(KMA8cKکA ,8@N @ strcattA L| N xA L| N |A L| N A L| N A L| N A L| N A L| N H @strcmpA L| N A L| N A L| N A L| N A L| N |!Aa쿁|y`!;Al,cA8@HA,|@A`|cAKɡA8c;||8@|@AdH}A,|@A`zcAK]A8;cc;:||@8A8HYA,|P@|Pc|P| @@0cHUA8,@c#HeA,8a@@0HyA|}yD@;!H88aH@H}Accc$HA,@,8!c}!Aa컁N 8 888`888zccKA;8!c}K88`888vKA;8!c}K`8 888`888zccK1A;8!c}KccHuA8!}K8`8888y9E8cKA;8!c}K8`8888y9E8cKuA;8!c}a상N 88`8888f9%89@KA;8!c}N 8`88888f9%89@KA;8!c}N Ampm__acl_id_matcher||y`aA;!A,cAl8@HA,|@A`|cAK}A8c;||8@|@AHYA,;CA|P|Pc|P| c@4HyA,;cC@8\HA,8a@@0HA|}yD@;AH8t8aH@HAcccDHA,@0c8!}Aa상N 8888`888zccK݀A;8!c}AK8h8`888vKA;8!c}AK\8`8888z888PccKIA;8!c}AKc;BcDHA,Acc8HA,8a@@0H A|}yD@;H88aH@tH AcccH%A,At8ā888`888zccKyA;8!c}AK888`888vK9A;8!c}AK8`8888y9E|8DcKA;8!c}a상N 88`8888f9%d889@KA;8!c}N 8`88888f9%L8,9@K5A;8!c}N AXmpm__acl_id_expander|``8b$8a!KA;b,,/@,AĀ|#yAt;; ,@\|d.,@ ;;|@@|d.,AKA; ;|@|d.,@K`KA|#yAd,@`KiA,@,@t,A |#yAP;;,@\|d.,@ ;;|@@|d.,AKA;; |@|d.,@K`KŀA~,@~,@l8b$8KmA,,/LOBBL1A8b8!8cTKAX8!P}a상N K=A8b$8KA,,/LOBBL1AKKA~,ALK~,@K,KـA,A(KKŀA,@KhKנּAK4,@K<|#y@ KOFBA8b8 8cLKA,AKP A mpm__idm_native_cleanup|ؒܓ!Aa``;8b$!``8`@KA8b,A,A T,A L;B,A ,A ,A |8cc8K `,@8z$K=A{,Ac8@HMA,A@`K!A(A,88`KmA,A`ycKA`~8KـAPcK1Ay,A`8cKM`8cyK%`; 8HbHA,@8HA,@tbKIA{,A {|@8b$8K!A8b,,AAx,A4a@8!}؂܃!Aa컁N 8@8zD888KAa@8!}؂܃K8z<8KՀAa@8!}؂܃K9: 88`&888jK̀A8@K8z`K-A9C9:H8T8`888hcKA8@KA8&@K9:d8l8`&888lcK=A8&@Kt8(bHA,@8HA,@dbKeA,{@ 8z8KYA`j9:8x8`888hcKA8@K@09:88`&888lcKuA8&@K84bH QA,@8aHH eAa@,@̀HL8aP8H iA8aP8KA`,@dbKiA,{@$8zHK]A`j9:88`888hcKA8@K9:88`&888lcK}A8&@K88`888vKMA8@K8KꡀA{,@\8KA9C9:88`888hcKA8@K$9:,8<8`888hc KA8@K9:808`888h9@K}A8@K8$8`888kcKIA8@K8z,KA9C9:88`888hcKA8@K8c88K`,A8zK5A|,A8@H EA,Ap:8cKA|,A 88` K]A,A`yKـA`xbKɀA~PbK!Ay,A@8bK=`8yK`< ,A 8`KՀA,|A KQA`y;8cKA,dA@|8ccK`| c%cK`|K K݀A9C9:8 8`888hcK5A8@Kl9:88`888h9@KA8@K49:88`888hbKŀA8@K9:88`888h9@KA8@KĀbKA9C9:h88`888hcKEA8@K|88`'888iKA8'@KL8zKuA9C9:L88`888hcK̀A8@K9:0888`888f9@KA8@Kȁ9:8a88`888f9@KUA8@K9:888`888f9@KA8@KP9:888`888f9@K݀A8@K;B88z K}AK A  mpm__idm_native_translator|8d`8b$`88!@@DKA8aH;8D;8Lc,,A,LF@8%8}tKA8aH8D8LcK`a@,A9=88`&888gKA8&88b$@K A,,A,AlA(a@8!}N 8@8}8'88KAa@8!}K8}8&K̀AK8}|8LcHAa@d @,@(8b$8K9A,,AL8DK=A`8~cKi`c8!}!Aa상N ;¼8`888Q9>|8DK̀A`8~cK`c8!}!Aa상N ;¼8`888Q9>48|DK]A`8~tcK`c8!}Aa상N ;¼8`888P9>8p@KA`8~LcK`c8!}Aa상N "A mpm_start_sec_context|,`| @<,c@,@AH}@Sy,Al`aA`cA (PAH!`|ybH80;¼8}8c A8K`8} K`8P}L8,A\KAc88PK]`cKрA8~tcKa`cX8!P}N cK`cK̉AK8Tc8`KE`8~tcK`cX8!P}N c88c4K`8`X8!P}N @9? 8`848KEA`~8cKq`cX8!P}N D9>8`8(88QKA`8~cK`cX8!P}N A\K;¼8`888Q9>8DKA`8~cK`cX8!P}N ;¼8`888P9>8@K)A`8~cKU`cX8!P}N Apmpm_complete_sec_context A L| N A L| N A L| N A L| N |``aA`|;Ĝf!`yAbH8l8088c pA,AK`pT8(A$BH8TA,808@,8z@AKQ`;{<t8,T| LBBAd88z 808K`cc88H=``ch8!`}Aa상N ,8z 808OBAK`aDK`88l|P@8z 80K}`8@c88<`@H A``9>8L8z ,80@cc9 K-`K488 8K`9>8`8` 888YdKmAh8!`}Aa상K9>8T8` 888YdK%Ah8!`}Aa상K;{8l88z@Km`<K bH808088c KI`9>8H8` 888YdKAh8!`}Aa상K,9>8<8`888P@KYAh8!`}a상N bHc80888c K`808`888SLKAh8!`}a상N Ampm__authenticate_provider|``aA`z`!;!8P8P| A@PK`,8@8a@8K1`8aH88K`cC8P8P8@cH%!`||yA,AXxc8!p}N 80bH8e8Ĝ@98 8c K `a@K`|8d;dKQA|yyA8 sC;Y@pADc>c~x8!p}!Aa상N cbH8Ĝ80@88<8c KQ`D@cCK`8a@K`>~cx8!p}K|8bH808Ĝ88c 8K`;pA`K8`88Ĝ88R9%8$HK)Ax8!p}!Aa상KAXx8!p}N 8Ĝ8` 888Y9%8dKAAXx8!p}N ;K1``{KmA,`y@8Ĝ8`89%8$88RHKMAx8!p}!Aa상K$ A\mpm__acquire_client_creds|!}&Aa쿁```8!`;`8a@88KQ`8aH88K=`8aP88K)`]@yÄ| @,AP;`pA(A;"HApA488x 808K)`<;Z~|` @ t@@ttAl8aH88K`8a@88Ky`ALK`8.|PHA8aP88KA`88cc8H8PcH``88x 80cKe`9988x 80c9KA`,@ `@4c8!|} !Aa컁N `(cc8PH`P,AaT,@,A88h8x 808ǐK`8~ K`~L,A KAc88PK`cKyAc8!|} K0KUAKp88x 808K`8~ K `~L,@8c8PK`K88x 80K`8(8`8 8HcH``88x 80cK`K899L8` 8P888YdK|A`8y0cK`c8!}!Aa컁N cc88H ]|y@.K8D8x@8 8K`9908D8` 888YdK|QA8!}!Aa컁N ;Z808T8x 8tK`<Kl;8` 888Y9>88dK{݀A`8~cK `c8!}Aa상N ;8`888S8,LK{uA`8~cK`c8!}Aa상N ;8`888S8 LK{ A`8~cK9`c8!}Aa상N C&mpm__authenticate_requestor_via_ctcasd|`8!y8a@8A؈,AKI`8Da@H8`|}y8~@KA||y8@A$K܅A8,AcaD,AK `,c@pKiAaDK]Aa@H=A,A,@8~@KA,A(ch8!`}N ;8`888R9>8HKy-A`8~8HKwA`8~cK}`ch8!`}K$88`888S8LKwUAh8!`}N ALmpm__login_as_user|`!H:yA,bH;At8 88$8c@K{A`9>ā8` 8l88Y8dKvA`8~dcK|`cX8!P}N 8~8KA,8`9>8x888R@(HKv!A`8~cK|M`K8`X8!P}N Ampm__login_as_client|``~a`8!p@DK`|8d;K-A||y8 8H88d ApAL8 880Ky}`8`X8!P}a상N 8880Ky5`8|K`8`X8!P}K`8`8888RHKt]A`8~\cKz`cX8!P}a상KTK`;8cKA||y8 H888d ApAK`8`888R8HKsA`8~\cKy`cX8!P}a상K A0mpm__create_cred_buffer`|aA`};8!P88@8Daőɑ͑ёՑّݑ  !%)-159=AEIMQUY]aeimquy}~ H5A8,aDA(~H0I`|zyH8A48~ K-`cCA8!}N 8} 809Ku`,@(cCA8!}N ~KA8@8`|8a8K1`8a8tA8aHKA8؀L|zyH8a@KA8a~KAA|8ccKqA8,~@t8~ K`8`8888RHKpmAcD8Kv`;@8!cC}Aa상N |cK`88} 880Kt`cC8!}AK8́8`cI888vKoŀA;@8~ K5`cD8lKu`cCA8!}N H3UA,`z@,@8aX8dH'M`8X,8aP@8aK`K`KEA8T|zyP8aA888`888vcIKnA;@K 88`888wKnA;@KKA;@ #8` 88=8W8\KnyAKQA8tKt`cCA8!}N A mpm__auth_on_uds|`a8!8DD@Km`|~y8A0`d8eKs`c8!}N 8`RH/ـA`}cK~]A|{y8@8HA ceaDcHqc@|~y`@aD,AKŀA,@@`H0A`|@|@@ȐaDK]A,@8`8888R8`HKlAcc;KMAaDKAAc88eKr`c8!}a상N H0eA(cc`KAKdH0aA@,DA$_aDK}A,@K 8`$8888qc8TKkՀA;$ccKeAK8`8888[8HlKkA;ccK)AK8`8888[8<lKk]A;ccKAK88`888R80HKk!A;Kp Ampm__get_server_creds|!HH/-AH8!@}N A$ getpwnam_r|`aaA``!`8!8`(`TPLHK{A|yy8LHKg1A`8~,cKm]`c8!}!Aa상K< Ampm__acquire_auth_via_ctcasd|ܓ!A`a`;`~!p`8`(`LHTPKw9A,`wA? hb?au8aX88KwI`c8as8th8XcGcbcH`|~yA8bH Mc8!}܃!Aa컁N 8@b8P8H8H )`|~yb@H {LKA;L,@(@c9\bH8L809 8c@Ki`8@8` 888 ,Ke)A8aHK]`8` 8!}܃!AK,`}aLKUA;B||y@;cKmA(L;( +@cA@@`9bH8L809 8c@Ki`8@8` 888 ,KdaAK88cKA8`zcK̀A`xcKsA`ycCKsA|Pc!KsA`ycKsuA|Pcc)K `,AX; cKeAcKYA,@8aHK`c8!}܃!AKcCcKA,AK;8`888R9>84HKc9A`8~cKie`cl8!}Aa상N A mpm__auth_provider_via_ctcasd|ܓ!Aa``8!p`8`(``PTHL\XKs1A,;B`yA88(KsI`?hb>au8aH88Ks-`8880bHccg8c Kfi`c8as8thc8Hchc*cHA`|yA8c#H c8!}܃!Aa컁N 8@c#8D8P8XH`|yDc#@t@A`H8P8}08`,A8T<@048@HIA,@@}8XK8A`8~(cK?`ch8!`}Kxc8`889>8LDK8A`8~cK>`ch8!`}Kc8`889>8dDK81A`8~TcK>]`ch8!`}KD8@8`8K7A`8}cK> `ch8!`}Kh @9=8`84888PK7A`8}xcK=`ch8!`}N AXmpm_receive_sec_context|!@p@L88`D8K5A`8~cK;`cH8!@}N KY``cc8c\K;`cH8!@}N ;8`888Q9>@8DK4A`8~cK;%`cH8!@}N ;8`888P9>$8@K4A`8~cK:`cH8!@}N Ampm_login_as_service|!YA8b,,/A 818bOFBA8cDK>uA,<{A,8m_A,8@AT;@|@@KA||yAK<݀A(AK<ɀA`}8|KA|}y`{A88cEK>-`cc8Kn`KA|`48|T~ccH }A,@,@8b$8K=%A8b,,A0,AT@$8@838b888cTK<Aa@h8!`}Aa상N 828b8cLKl   7 % 6 " "< '< 1p z ݀ "l [  = I ! (@ # #  %X  ! , # H P t #4 & !L  " 0 0 - 1 + G8 ,D )T .P / ) 3 3 2H 5h - ( *, + ( 5 4 < ;@ 6l < ( a 4 x h  Z( S R4 b LL $ q0 ~ d |T L f sd $x '|  8 8D l V 9 +X 2 + 4t w h d _< UP C @ 4 P M o j @ H` B F &D  (  < h #h $     h x d       " ,THL file: %1$sTrace file: %1$sConfig. file: %1$sTrace levels: %1$sUDS file name: %1$s2649-170 %1$s: %2$s Reserved: DO NOT USE!Trace file size: %1$dPublic key file: %1$sPrivate key file: %1$sRequest queue size: %1$dSRC system %1$s is active. Trace file (env. var.): %1$sSRC system %1$s is starting. Request queue init time: %1$s2649-070 Authentication error.No. of requests serviced: %1$dTrace levels (env. var.): %1$sHBA CCDB's time-to-live: %1$dsHBA2 CCDB's time-to-live: %1$ds2649-042 Invalid mechanism code.2649-077 Invalid ACL entry type.2649-040 Unix Identity mismatch.2649-001 Informational message 1.Trace file size (env. var.): %1$d2649-004 Configuration file error.2649-008 The connection timed out.2649-127 Unix Identity mis-match. 2649-039 Unable to allocate memory.2649-044 A socket operation failed.2649-071 Network credentials error.2649-072 Delegated credentials error.2649-169 %1$s: Invalid option: %2$c. HBA2 security context lifetime: %1$ds2649-129 The credentials have expired.2649-002 ctcasd is not running as root.No. of worker threads: %1$d (%2$d idle)Max/min no. of worker threads: %1$d/%2$d2649-073 User information processing error.2649-020 Unable to find directory /var/ct/. SRC system %1$s is inactive or inoperative. 2649-043 Incorrect buffer or version number.2649-076 Empty ACL submitted for processing.2649-003 Memory allocation error (%1$s:%2$d).2649-010 The reading of data was interrupted.Client or server must continue data exchange.2649-078 Invalid privilege attributes buffer.SRC system %1$s is ready to receive requests. SRC system %1$s is ready to process requests. CAS client socket file clean up interval: %1$dsSRC system %1$s is already running on the host. 2649-069 A socket operation failed (errno = %d).2649-074 Unable to obtain host name or IP address.No. of current requests: %1$d active; %2$d pending2649-036 Caller provided incorrect arguments to %s.2649-037 Invalid security services or context token.2649-013 Service 0x%1$08x is not supported by ctcasd.2649-014 Error on thread operation (%1$s: rc = %2$d).2649-167 %1$s: Option provided more than once: %2$s. 2649-024 The server reported a 'server busy' condition2649-132 Environment Variable: %1$s value is in error.SRC system %1$s was started successfully (pid = %2$d). 2649-041 Buffer has incorrect identifier or is corrupt.2649-006 Error on socket operation (%1$s: errno = %2$d).2649-018 Error on signal operation (%1$s: errno = %2$d). 2649-075 Unable to determine service name for target: %s.Unable to allocate memory for full status, but I'm alive!2649-130 The credentials are either not valid or corrupted.2649-005 One of the arguments provided to %1$s is not valid.2649-012 Request 0x%1$08x not supported by service 0x%2$08x.SRC system %1$s was started but unable to receive requests. 2649-168 %1$s: Option %2$s provided with invalid value: %3$s. 2649-128 The system call to retrieve the local hostname failed.2649-019 Unable to create directory %1$s (mkdir(): errno = %2$d). 2649-035 An error occurred in the MPM layer: %08#x %08#x %08#x %s.2649-063 Verification of the signature failed in the routine %s. 2649-060 Invalid security context token or identity context token. 2649-011 %1$s: the buffer containing the marshaled data is not valid.2649-051 unix_mpm Failure: Invalid mapping entry in the mapping file 2649-054 unix_mpm Failure: The network identity (%1$s) has no mapping 2649-021 The server is not able to perform the authentication request. 2649-061 User represented by identity context (%s) is not authorized. 2649-015 Unable to queue request: queue size=%1$d pending requests=%2$d 2649-016 Unable to create the minimum number of worker threads configured. 2649-047 Unix mpm failure: Unable to determine service name for target: %s.2649-030 %1$s Failure: Incorrect mapping entry in the mapping file: %2$s 2649-032 %1$s Failure: The following network identity has no mapping %2$s 2649-062 One or more input buffers supplied to the routine %s are not valid. 2649-049 unix_mpm Failure: Error in routine %1$s while getting the mapped name 2649-022 An error occured during the server's attempt to get the client's identity. 2649-099 libct_cas Failure: Error on socket operation [%1$s:%2$d]. %3$s: errno = %4$d2649-009 Data communication failure (send(): message length = %1$d, bytes sent = %2$d.2649-059 Current process (%1$d) does not have permissions to set the user id to %2$d. 2649-045 Session Key expected but not received from CtCasd. Possible transmission error.2649-052 unix_mpm Failure: The number of tokens in rule and network identity does not match. 2649-023 Unable to set the current working directory to /var/ct/IW/run/ctcas (chdir(): %1$d). 2649-007 The file descriptor ready for reading or writing does not match the connecting socket.2649-017 Unable to set the appropriate permission on file/directory %1$s (chmod(): errno = %2$d). 2649-053 unix_mpm Failure: The network identity (%1$s) supplied to translator routine is not valid 2649-001 Unable to start DAE: dae_init() failed (rc = %1$d) file = %2$s version = %3$s line = %4$d 2649-038 Unix MPM Failure: The credentials acquired by the unix mpm is either not valid or corrupted. 2649-046 Unix mpm failure: Configuration error,Check the defaults/overrides file in /opt/rsct/lib/mpm/ 2649-134 libct_cas Status: The host identified in the credentials is not a trusted host on this system. 2649-131 The public key in %1$s does not match the public key for the host in the Trusted Host List %2$s. 2649-057 Unix MPM Failure: The network identity acquired by the Unix mpm is either not valid or corrupted. 2649-031 %1$s Failure: The following network identity supplied to translator routine is not valid: %2$s. 2649-056 unix_mpm Failure: Context token doesn't support the data privacy services requested by application 2649-055 unix_mpm Failure: Context token doesn't support the data integrity services requested by application 2649-065 unix_mpm Failure: unable to obtain the hostname of the current host. Detail: gethostname() returned -1. 2649-034 %1$s Failure: The number of tokens in the identity mapping rule and the network identity does not match. 2649-086 %1$s Failure: The context control data buffer acquired by the security mechanism are either invalid or corrupted. 2649-058 Unable to find mapping for predefined service name %1$s. Check the unix.map file in /var/ct/cfg/ or /opt/rsct/cfg/ .2649-064 unix_mpm Failure: unable to obtain the node id of the current host. Detail: cu_get_node_id() returned error code %1$d. 2649-068 unix_mpm Failure: The network identity (%1$s) and the ACLE identifier (%2$s) provided to the %3$s routine do not match. An error occurred when attempting to acquire status of SRC system %1$s. Make sure that the named SRC system is defined and has a valid definition. SRC system %1$s could not be started by the SRC master. Make sure that /opt/rsct/bin/ctcasd exists and is a valid program or that system resources are available to start the daemon. 2649-171 Failure: Unable to find a mapping for predefined service name %1$s. Please check the ctcas_hba2.map file in /var/ct/cfg/ or /opt/rsct/cfg/ and make sure such a mapping exists.2649-029 %1$s Failure: The following network identity, which was supplied to the internal translator routine, is not valid: network identity value: %2$s detected by subroutine: %3$s 2649-105 libct_cas Internal failure detected. Function name: %1$s Return code from function: %2$d Routine calling the function: %3$s Contact IBM Customer Support and report this incident. 2649-025 libct_cas failure: the ctcas client library is unable to execute the /opt/rsct/bin/ctstrtcasd command. The following error was returned by the system() function call: errno = %1$d. 2649-067 unix_mpm Failure: The network identity (%1$s) provided to the %2$s routine is not a valid network identity. A valid network identity is of the following format: @. 2649-141 ctcasd Failure: The daemon was unable to initialize the CLiC runtime environment. The following message was returned by CLiC initialization routine: %1$s File name: %2$s Line number: %3$d 2649-066 unix_mpm Failure: This security mechanism does not support the use of the SEC_F_NO_RESOLVE flag with a host name. To use the SEC_F_NO_RESOLVE option, specify the target host as an address. 2649-139 libct_cas Failure: Unable to determine the permission of the client socket file. socket file name: %1$s stat() errno: %2$d Make sure that there is no other application that deleted the socket file. 2649-026 libct_cas failure: the ctcas client library is unable to start the ctcas SRC subsystem. Please make sure that the subsystem is registered with SRC and that /opt/rsct/bin/ctcasd exists on the system. 2649-118 ctcasd Daemon Internal failure detected. Function name: %1$s Return code from function: %2$d Routine calling the function: %3$s Contact the cluster software service provider and report this incident. 2649-173 ctcasd Failure : Unable to enqueue SRC request due to a time-out condition. Source file name: %1$s(%2$d) The most probable reason for this error is a server busy condition. Resubmit the SRC request at a later time. 2649-085 %1$s Failure: This security mechanism does not support the use of the SEC_F_NO_RESOLVE flag with a host name or with an incorrect host address. To use the SEC_F_NO_RESOLVE option, specify the target host as a valid address. 2649-119 ctcasd Daemon Internal Failure: incorrect parameters were provided to a daemon subroutine. Function name: %1$s Positional parameter number: %2$d Parameter value: 0x%3$x Contact the cluster software service provider and report this incident. 2649-175 ctcasd Failure : Unable to receive the SRC request. recvfrom() returned the following error: errno = %1$d Source file name: %2$s(%3$d) The most probable reason for this error is a communication problem. Resubmit the SRC request at a later time. 2649-084 %1$s Failure: A data buffer is not in a valid format. An incorrect data buffer may have been used, or the data may have been corrupted. Contact IBM Customer Support and report this failure. failing subroutine name: %2$s location: %3$d 2649-120 ctcasd Daemon Failure: the daemon detected that an unsupported key generation method was configured. The following unsupported key generation method was configured: 0x%1$x Repair the ctcasd daemon configuration information to specify a supported key generation method. 2649-176 ctcasd Failure : Unable to receive the SRC request. recvfrom() received a smaller amount of bytes than expected. Number of bytes returned: %1$d Source file name: %2$s(%3$d) The most probable reason for this error is a communication problem. Resubmit the SRC request at a later time. 2649-048 unix_mpm Failure: Incorrect parameters detected. Detecting function name: %1$s Positional parameter in error: %2$d Value of parameter: 0x%3$x Verify that the application is providing the correct parameters to this function, and correct the application to pass valid parameters. 2649-174 ctcasd Failure : Internal failure : pthread routine error. Name of failing routine: %1$s Return code of failing routine: %2$d Source file name: %3$s(%4$d) The most probable reason for this error is a programming error. Please contact IBM Customer Support Center and report this problem. 2649-140 libct_cas Failure: Unable to change the file permission of the client socket file to at least execute/read/write by owner. socket file name: %1$s chmod() errno: %2$d file permission: %3$o file's owner uid: %4$d effective uid of process: %5$d Make sure that there is no other application that modified the socket file in any way. 2649-106 libct_cas Failure: The security library is unable to initialize the data structures necessary to convert between the codeset used by this application and the UTF-8 data encoding format. This failure has occurred because resources needed by the cluster utilities are not available at this time. Try to run this application again at a later time. 2649-156 ctcasd Failure : Unable to fully resolve the target host name provided in the request. Target host name: %1$s cu_gethostbyname() rc: %2$d Source file name: %3$s(%4$d) The most probable reason for this error is the fact that the target host name does not have an entry with the DNS service. Update the DNS record to include the target host name specified. 2649-088 %1$s Failure: A response CCDB buffer was provided by the %2$s system service, but the %1$s was not expecting it. This failure forces the security infrastructure to not treat the client application as authentic. Note this failure information and contact the system administrator. System administrators should contact IBM Customer Support and report the problem. 2649-133 ctcasd Failure: the cipher contained in the CCDB has a length (%1$d) that is not multiple of the RSA modulus for the type of key used for decryption (%2$d). This condition may happen when the client and server hosts have different types of host keys. Please make sure that the client and server hosts has the same type of Host Based Authentication (HBA) keys. 2649-087 %1$s Failure: Unable to locate a fully resolved host name for the specified target host system. target host name: %2$s Ensure that the correct name was provided for the target host system. If the correct name was provided, contact the system administrator and have the system administrator verify that the host is registered with the domain name services for the network. 2649-154 ctcasd Failure: Credential timestamp/nonce already played. Credential owner: %1$s Credential nonce: %2$llx Source file name: %3$s(%4$d) The credentials provided for authentication contain a timestamp and nonce that were already played before. This symptom is indicative of a credential replay attack and the authentication of these credentials is purposedly terminated with a failure. 2649-152 ctcasd Failure : Failed to initialize any of the HBA2 replay protection-related pthread mutex locks. Source file name: %1$s(%2$d) The usual reason for this failure is a lack of system resources. Make sure that the system has sufficient pthread resources available. The failure to initialize any of the HBA2 protection pthread mutex locks renders the protection mechanism inoperational. 2649-083 %1$s Failure: The security context has expired. The application must end this security context and establish a new security context. If this condition persists, report this condition to the software service representatives for the application. The software service representatives should modify the application to establish a new security context when the existing security context expires. 2649-027 %1$s Failure: incorrect parameters provided. Function name: %2$s Positional parameter number: %3$d Parameter value: 0x%4$x If this failure is encountered during the execution of the Cluster software trusted services, contact IBM Customer Support and report this incident. If this failure is encountered during the execution of other software, verify that the software is using this function correctly. 2649-101 libct_cas Failure: incorrect parameters provided. Function name: %1$s Positional parameter number: %2$d Parameter value: 0x%3$x If this failure is encountered during the execution of the Cluster software trusted services, contact IBM Customer Support and report this incident. If this failure is encountered during the execution of other software, verify that the software is using this function correctly. 2649-151 ctcasd Failure : Failed to lock the replay log pthread mutex lock. pthread_mutex_lock() rc: %1$d Source file name: %2$s(%3$d) The logging of replay info is done in order to provide persistent tracking during daemon restarts. The failure to lock the pthread mutex lock associated with the replay logging may be indicative of a system-wide problem. Please contact the IBM Customer Support and report this incident. 2649-137 Unix Identity mis-match. The party asking for credential authentication (%1$s) is not the intended target of the credentials. This condition may happen if the service name used by the client does not map to the same user id on both the client's and the server's host. Please check whether the process presenting the credential for authentication to the ctcasd security daemon is running under the correct identity. 2649-111 ctcasd Daemon Failure: The stat system call reported a failure in obtaining kernel memory resources. This may indicate that the operating system is not configured properly, or that additional resources need to be dedicated to the operating system kernel. Consult the problem determination documentation and procedures for the operating system in use on the system and perform any corrective actions recommended by those sources. 2649-082 %1$s Failure: A data buffer provided to the security mechanism subroutine is not large enough to store the requested data. subroutine name: %2$s size of data buffer provided: %3$d bytes size of data buffer needed: %4$d bytes Report this information to the software service representatives for the application. The application service representatives should modify the application to provide a buffer with sufficient memory space. 2649-143 ctcasd Failure : Unable to stat() the HBA2 service mapping file. Name of the HBA2 service mapping file: %1$s stat() errno: %2$d Source file name: %3$s(%4$d) Most often, this failure occurs when the file or a directory in the file path does not exist. This files is installed by default by RSCT and the fact that it does not exist may signal other problems with RSCT. If the file does not exist, contact the IBM Customer Support and report this incident. 2649-155 ctcasd Failure : The HBA2 security mechanism does not support the use of the SEC_F_NO_RESOLVE flag with a host name. To use the SEC_F_NO_RESOLVE option, specify the target host as an address. Target host name: %1$s Source file name: %2$s(%3$d) The target host identifier is provided in a format that is incompatible with the SEC_F_NO_RESOLVE flag. If the SEC_F_NO_RESOLVE flags is provided, then the target host identifier must be provided as an IP address instead of a host name. 2649-161 ctcasd Failure: The server credentials provided for authentication do not contain a valid session key. Source file name: %1$s(%2$d) The most probable cause for this failure is a corrupted credentials due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-164 ctcasd Failure: The HBA2 request is not valid. The request does not contain a valid CCDB that can be authenticated. Source file name: %1$s(%2$d) The most probable cause for this failure is a corrupted request due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-080 %1$s Attention: A match between a network identity and an access control list entry was not found. Network identity: %2$s Acess control list entry identity: %3$s Comparison subroutine name: %4$s This may be the expected result of this comparison. This result occurred because an application was performing an access control verification step. The application is responsible for determining whether this result is the expected result, or if the result indicates a failure condition. 2649-090 %1$s Failure: A session key was provided by the %2$s system service for a security context that already has a session key established for it. This condition causes the security subsystem to not consider the client application authentic. Contact the system administrator and report this incident. System administrators should examine the %2$s system service for possible failure information and perform any necessary troubleshooting procedures and repairs. If the condition persists, contact IBM Customer Support. 2649-172 ctcasd Failure : Unable to verify the credentials provided for authentication by client. Failed to find any public key for the host identifiers included in the credentials that can verify the credential. Client name: %1$s Source file name: %2$s(%3$d) The most probable reason for this error is an incomplete setup of the THL file on the local host. Please make sure that there is a public key for at least one of the host identifiers provided in the credential and that it matches the private key of the host it represents. 2649-089 %1$s Failure: Unable to extract a session key from the data provided by the %2$s system service. A security context cannot be established without a session key. This failure causes the security subsystem to not consider the client application authentic. Contact the system administrator and report this incident. System administrators should examine the %2$s system service for possible failure information and perform any necessary troubleshooting procedures and repairs. If the condition persists, contact IBM Customer Support. 2649-158 ctcasd Failure: Unix Identity mis-match. The party asking for credential authentication is not the intended target of the credentials. Client asking for credential authenticatoin: %1$s Identity for which credential was intended: %2$s Source file name: %3$s(%4$d) This condition may happen if the service name used by the client does not map to the same user id on both the client's and the server's host. Please check whether the process presenting the credential for authentication to the ctcasd security daemon is running under the correct identity. 2649-165 ctcasd Failure: The HBA2 time-to-live value is not valid. Its value contains charaters that are not numeric. TTL value string: %1$s Source file name: %2$s(%3$d) The HBA2 time-to-live value is specified by the HBA2_CRED_TIMETOLIVE configuration parameter. Make sure that its value in the ctcad configuration file (either the default /opt/rsct/cfg/ctcasd.cfg or the overriding copy /var/ct/cfg/ctcasd.cfg) is a number between 0 and 600. If its value already is a number between 0 and 600, please contact the IBM Customer Support and report this incident. 2649-103 libct_cas Failure: The marshaled data provided to this routine is either incorrect or corrupted. It is possible that the application has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the application is providing the correct address for the marshaled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-079 %1$s Failure: A network identity is not in a valid format. The format expected is: @. Network identity in error: %2$s Detected in subroutine: %3$s This failure was detected as part of an access control verification step. Determine which application was performing this verification and contact the software support service for this application. Software support should verify that the proper access control data structures are being provided to the verification interfaces, and that this data has not somehow become corrupted. 2649-135 ctcasd Failure: Unable to construct a credential for the requesting client. Failing routine: %1$s Return code from failing routine: %2$d This failure may occur when the ctcasd daemon is unable to allocate memory. Verify that the system has sufficient virtual memory available. Administrators might consider extending the virtual memory size of the system or terminating applications using excessive virtual memory. If this condition persists or occurs frequently, contact the cluster software security service provider and report this condition. 2649-162 ctcasd Failure: The HBA2 request is not valid. The request is either intended for a different service or has an unsupported version. Request magic: %1$08x Request version: %2$d Source file name: %3$s(%4$d) The most probable cause for this failure is a corrupted request due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-159 ctcasd Failure: The credentials provided for authentication are not valid. The credential flags indicate they are both client's and server's credentials. Credentials flags: 0x%1$08x Source file name: %2$s(%3$d) The most probable cause for this failure is a corrupted credentials due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-166 ctcasd Failure: The HBA2 time-to-live value is not valid. Unable to convert its string representation to a numerical representation. strtol() errno: %1$d TTL value string: %2$s Source file name: %3$s(%4$d) The HBA2 time-to-live value is specified by the HBA2_CRED_TIMETOLIVE configuration parameter. Make sure that its value in the ctcad configuration file (either the default /opt/rsct/cfg/ctcasd.cfg or the overriding copy /var/ct/cfg/ctcasd.cfg) is a number between 0 and 600. If its value already is a number between 0 and 600, please contact the IBM Customer Support and report this incident. 2649-163 ctcasd Failure: The HBA2 request is not valid. The request does not contain a valid target user/service name or a valid target registry name. Request target name: %1$s Request target user/service name: %2$s Source file name: %3$s(%4$d) The most probable cause for this failure is a corrupted request due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-033 %1$s Failure: unable to obtain the Reliable Scalable Cluster Technology (RSCT) Node Identifier of the current host. This condition can occur when the RSCT software has not been configured, when the RSCT software configuration has been removed, or when the RSCT configuration files on the local system have been corrupted. Contact the system administrator and report this problem. System administrators should verify that the RSCT software configuration has been properly established. If the RSCT configuration is correct, contact IBM Customer Support. Detail: cu_get_node_id() returned error code %2$d. 2649-157 ctcasd Failure : Unable to verify the credentials provided for authentication by client. Failed to find a public key for the host identifiers included in the credentials that can verify the credential. Client name: %1$s Source file name: %2$s(%3$d) The most probable reason for this error is an incomplete setup of the THL file on the local host. Another reason for this error may be an unsanctioned change in the HBA key setup on the remote host. Please make sure that there is a public key for at least one of the host identifiers provided in the credential and that it matches the private key of the host it represents. 2649-104 libct_cas Failure: The marshaled data provided to this routine does not contain a required data field. It is possible that the application has provided an incorrect address for the marshaled data, or has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the application is providing the correct address for the marshaled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-148 ctcasd Failure : Failed to open the HBA2 service mapping file. Name of the HBA2 service mapping file: %1$s open() errno: 0x%2$08x Source file name: %3$s(%4$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file is valid. Otherwise, please contact the IBM Customer Support and report this incident. 2649-153 ctcasd Failure : Credential time skew too great. Credential owner: %1$s Time skew value in seconds: %2$d Source file name: %3$s(%4$d) The credentials provided for authentication are too old or too far into the future. It is possible that the time difference between the credential initiator's host and the credential authenticator's host is greater than the time skew value. It is also possible that the network latency is too great. Another possibility is that these credentials are replayed. Please make sure that the time between the initiator's and the authenticator's hosts is synchronized and that there is no noticeable network latency. 2649-144 ctcasd Failure : The ctcasd's HBA2 service mapping file is a directory. Name of the HBA2 service mapping file: %1$s File mode bits as returned by stat(): 0x%2$08x Source file name: %3$s(%4$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. Such an error with the HBA2 service mapping file may be generated by other problems within RSCT or the base operating system. Contact the IBM Customer Support and report this incident. 2649-145 ctcasd Failure : The HBA2 service mapping file has no contents. Name of the HBA2 service mapping file: %1$s Size of the file as returned by stat(): %2$d Source file name: %3$s(%4$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file has a valid contents. Otherwise, please contact the IBM Customer Support and report this incident. 2649-146 ctcasd Failure : The HBA2 service mapping file is not owned by root. Name of the HBA2 service mapping file: %1$s Owner of the file as returned by stat(): %2$d Source file name: %3$s(%4$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file is owned by root. Otherwise, please contact the IBM Customer Support and report this incident. 2649-160 ctcasd Failure: The credentials provided for authentication are not valid. Either there is no registry list; or the credentials are server credentials and there are more than one registry in the registry list. Credentials flags: 0x%1$08x Number of registries in list: %2$d Source file name: %3$s(%4$d) The most probable cause for this failure is a corrupted credentials due to a hacking attack or a communication problem between the application client and server. Make sure the application client and server are free of memory violation problems. If this happens in relation to an RSCT trusted service, please contact the IBM Customer Support and report this incident. 2649-100 libct_cas Failure: The marshaled data provided to this routine is either invalid or corrupted. Name of the routine: %1$s Source file name: %2$s(%3$d) The routine detected a repeated data field within the marshalled data. It is possible that the application has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the application is providing the correct address for the marshalled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-149 ctcasd Failure : Failed to read the content of the HBA2 service mapping file. Name of the HBA2 service mapping file: %1$s read() errno: %2$d Number of bytes requested to read: %3$d Source file name: %4$s(%5$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file is valid. Otherwise, please contact the IBM Customer Support and report this incident. 2649-109 libct_cas Failure: The marshaled data provided to this routine is either incorrect or corrupted. The marshaled data interpretation functions of the security library detected a repeated data field within the marshaled data. It is possible that the application has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the application is providing the correct address for the marshaled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-150 ctcasd Failure : Failed to read the content of the HBA2 service mapping file. Name of the HBA2 service mapping file: %1$s Number of bytes requested to read: %2$d Number of bytes read: %3$d Source file name: %4$s(%5$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file is valid. Otherwise, please contact the IBM Customer Support and report this incident. 2649-107 libct_cas Failure: The security library is unable to translate a character string between the application codeset and the UTF-8 data encoding format. The character string contains bytes that are non-valid in the application codeset. This failure can occur when codesets that do not fully support UTF-8 conversion are used by the execution environment. This failure can also occur if the character string memory is overwritten. Verify that the application uses a locale with a codeset that does support UTF-8 conversion, or contact the system administrator to have the default execution environment set to use such a locale. Also verify that the application is not accidentally overwriting the character string data. 2649-108 libct_cas Failure: The marshaled data provided to this routine is either incorrect or corrupted. The marshaled data interpretation functions of the security library detected more substitutional arguments than indicated in the marshaled data's argument count. It is possible that the application has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the application is providing the correct address for the marshaled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-147 ctcasd Failure : The file permission bits of the HBA2 service mapping file allow the file to be writable by other than the owner itself. Name of the HBA2 service mapping file: %1$s File mode bits as returned by stat(): 0x%2$08x Source file name: %3$s(%4$d) The ctcasd's HBA2 service mapping file provides the mapping between service names and the user names used by the service's process during their execution. The HBA2 service mapping file is installed by default by RSCT and system administrators can customize it to fit their needs. If the problem occurs with the overriding copy of the HBA2 service file , please make sure that the file is writable by root only. Otherwise, please contact the IBM Customer Support and report this incident. 2649-125 ctcasd Daemon Failure: The daemon was unable to create an initial trusted host list file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate systems within the cluster. The daemon attempted to create the initial trusted host list file in the following directory: %1$s The file system containing this directory does not have sufficient space to create the initial trusted host list file. Contact the system administrator and report this problem. System administrators should examine the file system containing this directory for obsolete files that can be removed or trimmed. The system administrator can also correct this problem by extending he size of the file system containing this directory. 2649-115 ctcasd Daemon Failure: The daemon was unable to create an initial public key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial public key file in the following directory: %1$s The file system containing this directory does not have sufficient space to create the initial public key file. Contact the system administrator and report this problem. System administrators should examine the file system containing this directory for obsolete files that can be removed or trimmed. The system administrator can also correct this problem by extending the size of the file system containing this directory. 2649-114 ctcasd Daemon Failure: The daemon was unable to create an initial private key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial private key file in the following directory: %1$s The file system containing this directory does not have sufficient space to create the initial private key file. Contact the system administrator and report this problem. System administrators should examine the file system containing this directory for obsolete files that can be removed or trimmed. The system administrator can also correct this problem by extending the size of the file system containing this directory. 2649-124 ctcasd Daemon Failure: The daemon was unable to create an initial trusted host list file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate systems within the cluster. The daemon attempted to create the initial trusted host list file in the following directory: %1$s A component directory in the above path name may be missing, or the access permissions for one of these components may have been modified to forbid access. Verify that the directory listed above exists, and that the permissions on that directory permit processes running with root access to access the directory and create files within the directory. If this condition persists, contact the cluster software service provider and report this incident. 2649-113 ctcasd Daemon Failure: The daemon was unable to create an initial public key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial public key file in the following directory: %1$s A component directory in the above path name may be missing, or the access permissions for one of these components may have been modified to forbid access. Verify that the directory listed above exists, and that the permissions on that directory permit processes running with root access to access the directory and create files within the directory. If this condition persists, contact the cluster software service provider and report this incident. 2649-112 ctcasd Daemon Failure: The daemon was unable to create an initial private key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial private key file in the following directory: %1$s A component directory in the above path name may be missing, or the access permissions for one of these components may have been modified to forbid access. Verify that the directory listed above exists, and that the permissions on that directory permit processes running with root access to access the directory and create files within the directory. If this condition persists, contact the cluster software service provider and report this incident. 2649-123 ctcasd Daemon Failure: The daemon was unable to locate or access the trusted host list file to be used for host-based authentication. Without this list, the daemon will be unable to authenticate systems within the cluster. The daemon expected to find this file in the following directory: %1$s The trusted host list file may be missing, the permissions on the file may have been modified to forbid any process from accessing the file, or a component of the directory name may have been modified to forbid access. Verify that the trusted host list file exists, and that the permissions on the file and the directory are set to permit processes running with root permission to access and modify the directory and the file. If this condition persists, contact the cluster software service provider and report this incident. 2649-110 ctcasd Daemon Failure: The daemon was unable to locate or access the key files to be used for host-based authentication. Without these files, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon expected to find these key files in the following directory: %1$s The key files may be missing, the permissions on the files may have been modified to forbid any process from accessing the files, or a component of the directory name may have been modified to forbid access. Verify that the public and private key files exist, and that the permissions on the files and the directory are set to permit processes running with root permission to access the directory and the files. If this condition persists, contact the cluster software service provider and report this incident. 2649-142 ctcasd Failure : Memory allocation failure. Attempted allocation: %1$d bytes Source file name: %2$s(%3$d) Most often, this failure occurs when a process exceeds its memory allocation limit. In rare cases, this failure occurs when a number of processes allocate huge amounts of memory and utilize all available memory on the system. Verify that the allocation itself is not exceeding ctcasd's own limit. If it does not, contact IBM Customer Support and report this incident. If another software application is exceeding its limit, examine the software for memory management problems and memory leaks. If the application is not exceeding its memory allocation limits, contact the system administrator and report this incident. System administrators should identify processes using excessive memory and consider terminating these processes. 2649-126 ctcasd Daemon Failure: The daemon was unable to create an initial trusted host list file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate systems within the cluster. The daemon attempted to create the initial trusted host list file in the following directory: %1$s This directory may reside in a read-only file system, one of the component directories in this path name may be missing, the directory name may contain more symbolic links than the operating system can support, or the path name may not reference a directory. Contact the system administrator and report this problem. System administrators should verify that the above directory name is specified and constructed properly. If this condition persists, contact the cluster software service provider and report this incident. 2649-117 ctcasd Daemon Failure: The daemon was unable to create an initial public key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial public key file in the following directory: %1$s This directory may reside in a read-only file system, one of the component directories in this path name may be missing, the directory name may contain more symbolic links than the operating system can support, or the path name may not reference a directory. Contact the system administrator and report this problem. System administrators should verify that the above directory name is specified and constructed properly. If this condition persists, contact the cluster software service provider and report this incident. 2649-116 ctcasd Daemon Failure: The daemon was unable to create an initial private key file to be used for host-based authentication. Without this file, the daemon will be unable to authenticate the local system to other systems in the cluster. The daemon attempted to create the initial private key file in the following directory: %1$s This directory may reside in a read-only file system, one of the component directories in this path name may be missing, the directory name may contain more symbolic links than the operating system can support, or the path name may not reference a directory. Contact the system administrator and report this problem. System administrators should verify that the above directory name is specified and constructed properly. If this condition persists, contact the cluster software service provider and report this incident. 2649-102 libct_cas Memory allocation failure. Function name: %1$s Attempted allocation: %2$d bytes Most often, this failure occurs when a process exceeds its memory allocation limit. In rare cases, this failure occurs when a number of processes allocate huge amounts of memory and utilize all available memory on the system. Verify that the allocation itself is not exceeding its own limit. If a Cluster software trusted service is exceeding its limit, contact IBM Customer Support and report this incident. If another software application is exceeding its limit, examine the software for memory management problems and memory leaks. If the application is not exceeding its memory allocation limits, contact the system administrator and report this incident. System administrators should identify processes using excessive memory and consider terminating these processes. 2649-050 unix_mpm : Memory allocation failure. Function name: %1$s Attempted allocation: %2$d bytes Most often, this failure occurs when a process exceeds its memory allocation limit. In rare cases, this failure occurs when a number of processes allocate huge amounts of memory and utilize all available memory on the system. Verify that the allocation itself is not exceeding its own limit. If a Cluster software trusted service is exceeding its limit, contact IBM Customer Support and report this incident. If another software application is exceeding its limit, examine the software for memory management problems and memory leaks. If the application is not exceeding its memory allocation limits, contact the system administrator and report this incident. System administrators should identify processes using excessive memory and consider terminating these processes. 2649-136 libct_cas Failure: The marshaled data provided to this routine is either not valid or corrupted. The most probable cause of this problem is that the public key of the source host in the target's host THL file does not match the private key of the source host. Another possible cause is that the application has inadvertently overwritten the variable containing the address of the data, or the application may have inadvertently overwritten the memory used to store the data. Verify that the public keys in the THL files match their corresponding private keys from the host listed in the THL records. Also verify that the application is providing the correct address for the marshaled input data to this routine. Perform memory leak and memory use verification tests on the application to ensure that the application is not inadvertently modifying this memory. 2649-028 %1$s Failure: Memory allocation failure. Function name: %2$s Attempted allocation: %3$d bytes Most often, this failure occurs when a process exceeds its memory allocation limit. In rare cases, this failure occurs when a number of processes allocate huge amounts of memory and utilize all available memory on the system. Verify that the allocation itself is not exceeding its own limit. If a Cluster software trusted service is exceeding its limit, contact IBM Customer Support and report this incident. If another software application is exceeding its limit, examine the software for memory management problems and memory leaks. If the application is not exceeding its memory allocation limits, contact the system administrator and report this incident. System administrators should identify processes using excessive memory and consider terminating these processes. 2649-121 ctcasd Daemon Failure: the daemon detected a private key file on the local system, but was unable to locate the associated public key file on the local system. The daemon has concluded that the private and public key configuration of the local system has been corrupted. The daemon expected to find public key file in the following location: %1$s Inform the system administrator of this failure. System administrators should recreate the public and private key files on the system. If cluster security based keys are in use, these keys can be recreated using the 'ctskeygen' command. If secured remote shell keys are in use, consult the documentation and procedures for configuring secured remote shell public and private keys. System administrators should also consider monitoring the status of the public and private key files, in case an application is accidentally or intentionally removing these files. 2649-138 ctcasd Daemon Failure: the daemon detected a public key file on the local system, but was unable to locate the associated private key file on the local system. The daemon has concluded that the private and public key configuration of the local system has been corrupted. The daemon expected to find the private key file in the following location: %1$s Inform the system administrator of this failure. System administrators should recreate the public and private key files on the system. If cluster security based keys are in use, these keys can be recreated using the 'ctskeygen' command. If secured remote shell keys are in use, consult the documentation and procedures for configuring secured remote shell public and private keys. System administrators should also consider monitoring the status of the public and private key files, in case an application is accidentally or intentionally removing these files. 2649-122 ctcasd Daemon Failure: the daemon detected a public key file on the local system, but was unable to locate the associated private key file on the local system. The daemon has concluded that the private and public key configuration of the local system has been corrupted. The daemon expected to find both the public and the private key files in the following directory: %1$s Inform the system administrator of this failure. System administrators should recreate the public and private key files on the system. If cluster security based keys are in use, these keys can be recreated using the 'ctskeygen' command. If secured remote shell keys are in use, consult the documentation and procedures for configuring secured remote shell public and private keys. System administrators should also consider monitoring the status of the public and private key files, in case an application is accidentally or intentionally removing these files. 2649-081 %1$s Failure: Unable to acquire credentials for a service application. The application provided a service name that is not recognized as a trusted service. Service Name: %2$s Verify that the proper service name was used. Contact the system administrator to verify that the application name is listed as a trusted service. Administrators should check the contents of this file to ensure that the service name shown above is listed: /var/ct/cfg/hba2.map If this file does not exist, administrators should check the default file: /opt/rsct/cfg/hba2.mpm If the service name is not listed in this file, the security subsystem will be unable to acquire credentials for this application. To add the service name to this list, modify the file /var/ct/cfg/hba2.mpm. Do not modify the default file /opt/rsct/cfg/hba2.mpm. To create /var/ct/cfg/hba2.mpm, copy the contents of the default file /opt/rsct/cfg/hba2.mpm to this location. If the problem persists after making these modifications, contact IBM Customer Support and report this incident. API pInfo_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEUErrorsBufferSvcTknCtxTkn@(#)89 1.6 src/rsct/security/MPM/unix_mpm/lib/unix_trace.c, ctsec, rsct_rady, rady2035a 11/15/07 14:21:10 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### P   X ` h@@ 0unixunixunixSERVICEcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catmpm__get_config()mpm__copy_in_out()mpm__copy_in_out()mpm__copy_in_out()mpm__copy_in_out()mpm_get_client_id()mpm_get_client_id()mpm__prepare_data()mpm__prepare_data()/var/ct/cfg/unix.map/var/ct/cfg/unix.mapmpm_get_client_name()mpm_get_client_name()mpm_get_config_info()/opt/rsct/cfg/unix.mapmpm_set_ctx_attribute()mpm_set_ctx_attribute()mpm__unpack_crypt_buffermpm__pack_crypt_buffer()mpm__split_target_name()mpm__unpack_crypt_buffer()mpm__pack_data(): SEC_S_SUCCESmpm__get_config: SEC_S_SUCCESSmpm__check_config: SEC_S_SUCCESSmpm__copy_in_out(): SEC_S_ARGS_ERRmpm__prepare_data(): SEC_S_SUCCESSTHE UID IS %d AND NAME IS %s %d %s mpm__get_network_name: SEC_S_SUCCESmpm__process_data(): SEC_S_ARGS_ERRmpm__prepare_data(): SEC_S_ARGS_ERRmpm__prepare_data(): SEC_S_ARGS_ERRmpm__check_config: SEC_S_MEMORY_ERRmpm__copy_in_out(): SEC_S_MEMORY_ERRmpm__read_config_file: SEC_S_SUCCESSmpm__assign_overrides: SEC_S_SUCCESSmpm__set_uds_info(): SEC_S_SOCKET_ERRmpm__process_data(): SEC_S_BUFFER_ERRmpm__get_client_id(): SEC_S_MEMORY_ERRmpm__get_client_id(): SEC_S_MEMORY_ERRmpm__extract_attr_value: SEC_S_SUCCESSmpm__initialize(): Initialized Unix MPMmpm__unpack_crypt_buffer: SEC_S_SUCCESSmpm__process_data (priv): SEC_S_SUCCESSmpm__pac_crypt_data(): SEC_S_MEMORY_ERRmpm__get_client_id(): SEC_S_INTERNAL_ERRmpm__process_data (integ): SEC_S_SUCCESSmpm_set_ctx_attribute(): SEC_S_SOCKET_ERRmpm__get_network_name(): SEC_S_MEMORY_ERRmpm__unpack_crypt_buffer: SEC_S_MEMORY_ERRmpm__split_target_name(): SEC_S_MEMORY_ERRmpm__unpack_crypt_buffer(): SEC_S_BUFFER_ERRmpm__set_inet_info() bad socket fd err #%d at line %d ../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_support.c@(#)88 1.18.1.4 src/rsct/security/MPM/unix_mpm/lib/unix_support.c, ctsec, rsct_rady, rady2035a 5/22/17 21:51:30 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### *0x  @_SEUunixunixunixunix_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEUunix_SEU_SEUcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.cat0x%016llxcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catLOCALHOSTcthba.cat0x%016llxcthba.catLOCALHOSTcthba.cat0x%016llxcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catLOCALHOSTcthba.cat0x%016llxcthba.catmpm_get_mapped_namempm_get_mapped_namempm_get_mapped_namempm_get_mapped_namempm_get_client_namempm__acl_id_matchermpm__acl_id_matchermpm__acl_id_matchermpm__acl_id_matchermpm__acl_id_matchermpm__acl_id_matchersec_idm_map_identitympm__acl_id_expandermpm__acl_id_expandermpm__acl_id_expandermpm__acl_id_expandermpm__acl_id_expandermpm__acl_id_expandermpm_idm_native_translatormpm_idm_native_translatormpm_idm_native_translatormpm_idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translatormpm__idm_native_translator@(#)68 1.18 src/rsct/security/MPM/unix_mpm/lib/unix_map.c, ctsec, rsct_rady, rady2035a 5/6/14 14:54:39 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### @ Dcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catmpm_complete()mpm_complete()mpm_complete()mpm_complete()mpm_start_sec_context()mpm_start_sec_context()mpm_start_sec_context()mpm_start_sec_context()mpm_start_sec_context()mpm_start_sec_context()mpm_start_sec_context()FREE_CTX_TOKEN at line %dFREE_CTX_TOKEN at line %dFREE_CTX_TOKEN at line %dFREE_CTX_TOKEN at line %dmpm_complete_ctx: SEC_S_SUCCESSAuthentication succeeded %d %d mpm_complete_ctx: SEC_S_SUCCESSmpm_complete_ctx: SEC_S_ARGS_ERRmpm_complete_ctx: SEC_S_ARGS_ERRmpm_complete_ctx: SEC_S_TOKEN_ERRmpm_complete_ctx: SEC_S_TOKEN_ERRmpm_start_sec_context(): SEC_S_SUCCESSmpm_start_sec_context(), SEC_S_ARGS_ERRmpm_start_sec_context(), SEC_S_TOKEN_ERRmpm_start_sec_context(), SEC_S_TOKEN_ERRmpm_start_sec_context(), SEC_S_TOKEN_ERRmpm_start_sec_context(), SEC_S_TOKEN_ERR@(#)85 1.8.1.7 src/rsct/security/MPM/unix_mpm/lib/unix_requestor.c, ctsec, rsct_rady, rady2035a 5/7/14 18:07:28 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### nonenonecthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcas_scd.length %d mpm_start_sec_context()mpm_start_sec_context()mpm_complete_sec_context()mpm_complete_sec_context()mpm_complete_sec_context()mpm_complete_sec_context()mpm__acquire_creds() cred len = %d %d %s mpm__auth_provider_via_ctcasd rc = %d id = %s %d %s mpm__authenticate_provider() buffer error at line %d mpm__authenticate_provider() Severe error! at line %d mpm__acquire_client_creds() clnt needs mutual auth line %d mpm__authenticate_provider() not UDS/INET info! at line %d mpm__authenticate_provider() MPM_F_UNIX_UDS_DATA at line %d mpm__authenticate_provider() calling auth on uds at line %d mpm__authenticate_provider() MPM_F_UNIX_INET_DATA at line %d mpm__authenticate_provider() calling auth on inet at line %d mpm__authenticate_provider() recvd unix mutual data at line %d ../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_rsupport.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_rsupport.cmpm__acquire_creds() acqd INET creds len = %d at line %d @(#)87 1.2.3.2 src/rsct/security/MPM/unix_mpm/lib/unix_rsupport.c, ctsec, rsct_rady, rady2035a 9/1/09 11:01:42 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### )rootnonenonenonenonecthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.cat0x%016llxcthba.catcthba.cat0x%016llxcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catpac: %s id: %s mpm__auth_on_udslen of creds is %d mpm__login_as_user()mpm__get_server_credsmpm__login_as_client()mpm_receive_sec_context()mpm_receive_sec_context()mpm_auth_req_via_ctcasd()mpm_receive_sec_context()mpm_receive_sec_context()FREE_CTX_TOKEN at line %dFREE_CTX_TOKEN at line %dmpm__auth_on_uds: SEC_S_MEMORY_ERRmpm__login_as_user: SEC_S_MEMORY_ERRmpm__login_as_user: SEC_S_USERDB_ERRmpm__login_as_user: SEC_S_USERDB_ERRmpm__login_as_user: SEC_S_MEMORY_ERRmpm__login_as_client: SEC_S_CREDS_ERRrc from acquire_auth_via_ctcasd = %d mpm__login_as_client: SEC_S_MEMORY_ERRrc frm auth_requestor_via_ctcasd = %d mpm_auth_req_via_ctcasd: SEC_S_CREDS_ERRmpm_auth_req_via_ctcasd: SEC_S_CREDS_ERRmpm__create_cred_buffer: SEC_S_MEMORY_ERRmpm_auth_req_via_ctcasd: SEC_S_BUFFER_ERRmpm__auth_on_uds() qual name = %s at line %d mpm__create_cred_buffer: MPM_F_UNIX_UDS_DATA mpm__create_cred_buffer: MPM_F_UNIX_INET_DATAmpm__auth_requestor() Severe Error at line %d mpm__auth_on_uds: SEC_S_SOCKET_ERR (getpeereid)mpm__auth_provider_via_ctcasd rc = %d id = %s %d %s mpm__authenticate_requestor_via_ctcasd: SEC_S_BUFFER_ERRmpm__auth_on_uds() user id is %d & name is %s at line %d mpm_auth_req_via_ctcasd() MPM_F_UNIX_UDS_DATA at line %d ../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_psupport.cmpm__auth_requestor() MPM_F_UNIX_INET_DATA at line %d mpm__login_as_client() Service is not running as root at line %d @(#)82 1.18.1.1 src/rsct/security/MPM/unix_mpm/lib/unix_psupport.c, ctsec, rsct_rady, rady2035a 10/9/08 13:05:57 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### 1cthba.catcthba.catcthba.catcthba.catcthba.catAuthent client Authent server Created req obj Marshalled creds Unmarsh completed Unmarshalling the reply Rcv creds len = %d %d %s Freeing req_obj.req_uname Rcv creds len = %d (%d %s) Entered mpm__auth_via_ctcasd HBA rc = %d creds length = %d mpm__create_casd_request_packetmpm__create_casd_request_packetError in unmarshalling rc = %d Error in unmarshalling rc = %d Error in unmarshalling rc = %d mpm__auth_via_ctcasd id len = %d Entered mpm__acquire_via_ctcasd cas_send_request_uds_bind rc = %d CtCasd header returned an error = %d CtCasd header returned an error = %d CtCasd header returned an error = %d Entered mpm__auth_acquire_via_ctcasd Entered mpm__create_casd_request_packet cas_send_request_uds_bind error rc = %d cas_send_request_uds_bind error rc = %d mpm__auth_via_ctcasd id len = %d (%d %s) ../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_csupport.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_csupport.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_csupport.c@(#)49 1.7.1.4 src/rsct/security/MPM/unix_mpm/lib/unix_csupport.c, ctsec, rsct_rady, rady2035a 5/22/17 21:51:29 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### @@ 9cthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catUnix id is %d %d %s Attempting strdup %s %d %s mpm__acquire_auth_via_ctcasdmpm__auth_provider_via_ctcasdmpm__auth_requestor_via_ctcasdmpm__acquire_auth_via_ctcasd: mpm__acquire_auth_via_ctcasd: mpm__auth_requestorvia: %d %s %s mpm__auth_requestor_creds_via_ctcasd: mpm__auth_requestor_creds_via_ctcasd: mpm__acquire_requestor_creds_via_ctcasdmpm__acquire_requestor_creds_via_ctcasd: mpm__acquire_requestor_creds_via_ctcasd: mpm__acquire_auth_via_ctcasd: SEC_S_MEMORY_ERRmpm__acquire_auth_via_ctcasd: SEC_S_MEMORY_ERRmpm__auth_provider_via_ctcasd: SEC_S_MEMORY_ERRmpm__auth_requestor_via_ctcasd: SEC_S_MEMORY_ERRmpm__auth_requestor_via_ctcasd: SEC_S_MEMORY_ERRmpm__acquire_requestor_creds_via_ctcasd: SEC_S_SUCCESS../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_ctcasd.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_ctcasd.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_ctcasd.c../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_ctcasd.c@(#)48 1.1.1.11 src/rsct/security/MPM/unix_mpm/lib/unix_ctcasd.c, ctsec, rsct_rady, rady2035a 4/11/14 14:11:02ERROR: mpm__auth_provider_via_ctcasd(): Initial target name different from returned target name! Initial target name: %s Returned target name: %s File name: %s Line no.: %d ERROR: mpm__auth_provider_via_ctcasd(): Unable to allocate memory for comparing target name with returned server name! Target name: %s Returned server name: %s File name: %s Line no.: %d ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### ?cthba.catcthba.catcthba.catcthba.catcthba.cat@(#)83 1.16 src/rsct/security/MPM/unix_mpm/lib/unix_utils.c, ctsec, rsct_rady, rady2035a 4/24/14 18:32:44 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### Fcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catmpm_login_as_user()mpm_login_as_user()mpm_receive_sec_context()mpm_receive_sec_context()mpm_receive_sec_context()mpm_receive_sec_context()mpm_receive_sec_context()mpm_acquire_server_creds()mpm_acquire_server_creds()mpm_acquire_server_creds()mpm_receive_sec_context(), SEC_S_ARGS_ERRmpm_acquire_server_creds(), SEC_S_ARGS_ERRmpm_receive_sec_context(), SEC_S_TOKEN_ERRmpm_receive_sec_context(), SEC_S_TOKEN_ERRmpm_receive_sec_context(), SEC_S_TOKEN_ERRmpm_receive_sec_context(), SEC_S_TOKEN_ERRmpm_acquire_server_creds(), SEC_S_TOKEN_ERR../../../../../../../src/rsct/security/MPM/unix_mpm/lib/unix_provider.cProvider successfully authenticated the client, sending creds len = %d at line %d f %s @(#)86 1.8 src/rsct/security/MPM/unix_mpm/lib/unix_provider.c, ctsec, rsct_rady, rady2035a 1/5/04 15:29:25 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # ####################################################################### O _SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEU_SEUcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catcthba.catmpm_user_validmpm_user_validmpm_user_validmpm_user_validmpm_sign_data_vmpm_sign_data_vmpm_sign_data_vmpm_sign_data_vmpm_sign_data_vmpm_sign_data_v()mpm_sign_data_v()mpm_sign_data_v()mpm_sign_data_v()mpm_verify_data_vmpm_verify_data_vmpm_verify_data_vmpm_verify_data_vmpm_verify_data_vmpm_sign_data_v()mpm_verify_data_v()mpm_verify_data_v()mpm_verify_data_v()mpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_contextmpm_create_id_context()@(#)74 1.4 src/rsct/security/MPM/unix_mpm/lib/unix_rauthz.c, ctsec, rsct_rady, rady2035a 1/5/04 15:29:31 ####################################################################### # Licensed Materials - Property of IBM # # # # 5765-F07 # # # # (C) COPYRIGHT International Business Machines Corp. 1996,2001 # # All Rights Reserved # # # # US Government Users Restricted Rights - Use, duplication or # # disclosure restricted by GSA ADP Schedule Contract with IBM Corp. # # # #######################################################################  T#@ Tm Ti Te Ta TW T T T@ T T@ T T T` T T` T T T` T T TҀ T T T T T Tz` T T` T@ T T  P S x S  S$ S0 S< SH  ( ! - 5p T T ?P Cp Jp 0@ @ %@ 6@ I@ f@ y@ @ @ @ @ @ close@ seteuid@ setuid@ unlink@ @ @ @ -@E@Q@]@___fill@j@_iob@malloc@ realloc@ free@ _Errno@ strlen@ open@ strchr@ geteuid@ sprintf@ getpid@ fstat@ read@ strncmp@ strrchr@ isspace@ v@ @ strdup@ stat64@ strstr@ memcmp@ @ @ @ sysconf@ @ ruserok@ @ @ @ @ ,@ H@ ^@ w@ @ @ @ @ @ @  @ "@ 8@ P@ j@ }@ @ @ @ @ @ @ @ /@ M@ e@ @ @ @ @ mpm_init S1  ST  S`  Sl  Sx . S C S V S i S } S  S  S  S mpm_end S  S  S  T   T, + T8 ? TD V TP l T\  Th  Tt  T                                   $ ( , 0 4 8 < @ D H L P T X \ ` d h l p t x |                                            $ ( , 0 4 8 < @ D H L P T X \ ` d h l p t x |                                            $ ( , 0 4 8 < @ D H L P T X \ ` d h l p t x |                       T d t    (   , , ! - 5| ?P Cp J S S S  S S S S$ S( S0 S4 S< S@ SH SL ST SX S` Sd Sl Sp Sx S| S S S S S S S S S S S S S S S S S S S S S T T T  T T T  T$ T, T0 T8 T< TD TH TP TT T\ T` Th Tl Tt Tx T T T T T T T T! T? T= T9 T< T T; T T TC T> T: T T T T/ T" T( T T T+ T  T. T0 UN UJ UO U K U U  U U' U  U$E U(@ U,) U0 U4D U8 U<# U@ UD  UH  UL UP UT% UX  U\* U`U UdT UhR Ul UpS Ut UxV U| U1 U UF U U U U6 U U  U8 U U U UW UX U U UY UH UI UG U UP UQ U5 U4 U3 U UA UB U U V2 V, V V $ V V V V& V  V$- V( V, V0 V4M V87 V<L/usr/lib:/liblibct_cu.ashr.olibc_r.ashr.olibct_tr.ashr.olibpthreads.ashr_xpg5.olibct_mss.ashr.olibct_idm.ashr.olibct_acl.ashr.olibct_cas.ashr.ocu_set_error_1cu_pset_error_1cu_rel_error_1cu_get_node_id_1cu_8bit_strcasecmp_posix_1cu_getnameinfo_1cu_getaddrinfo_1cu_strcasecmp_posix_1cu_strncasecmp_posix_1cu_8bit_strncasecmp_posix_1cu_toupper_posix_1cu_ipaddr_ntop_1 ngetsockname getpeereid gethostname_system_configuration ___strcmp ___memset ___memmove ___strcpy_posix_getpwuid_r_posix_getpwnam_r_posix_getgrgid_r endgrent_r getgrent_r inet_pton freeaddrinfotr_record_vfmt_string_1tr_record_id_1tr_register_component_1tr_unregister_component_1tr_record_strings_1tr_record_fmt_string_1tr_record_data_1pthread_mutex_unlockpthread_cleanup_pushpthread_cleanup_pop pthread_oncepthread_mutex_initpthread_mutex_trylocksec_release_typed_keysec_check_typed_keysec_marshal_typed_keysec_unmarshal_typed_keysec_sign_messagesec_verify_messagesec_sign_message_vsec_verify_message_vsec_encrypt_messagesec_decrypt_messagesec_get_locid_listsec_release_locid_listsec_idm_map_identitysec_idm_register_translatorsec_is_in_any_clustersec_is_in_active_clustersec__register_id_handlercas_send_request_udshba_unmarshal_replyhba_marshal_request mpm_startmpm_set_ctx_attributempm_renew_identitympm_release_identitympm_release_buffermpm_process_datampm_prepare_datampm_get_ctx_flagsmpm_get_ctx_lifetimempm_get_client_namempm_get_client_idmpm_end_context mpm_cleanupmpm_start_sec_contextmpm_complete_sec_contextmpm_receive_sec_contextmpm_login_as_usermpm_login_as_servicempm_get_mapped_namempm_verify_data_vmpm_user_validmpm_sign_data_vmpm_create_id_context