/freebsd/crypto/openssh/ |
H A D | nchan.c | 97 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], in chan_set_istate() 107 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], in chan_set_ostate() 115 debug2("channel %d: read failed", c->self); in chan_read_failed() 131 debug2("channel %d: ibuf empty", c->self); in chan_ibuf_empty() 153 debug2("channel %d: obuf empty", c->self); in chan_obuf_empty() 174 debug2("channel %d: rcvd eow", c->self); in chan_rcvd_eow() 188 debug2("channel %d: send eof", c->self); in chan_send_eof2() 211 debug2("channel %d: send_close2", c->self); in chan_send_close2() 221 debug2("channel %d: send close for remote id %u", c->self, in chan_send_close2() 236 debug2("channel %d: send eow", c->self); in chan_send_eow2() [all …]
|
H A D | moduli.c | 347 debug2("start point: 0x%s", BN_bn2hex(largebase)); in gen_candidates() 424 debug2("test q = largebase+%u", 2 * j); in gen_candidates() 608 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", in prime_test() 633 debug2("%10u: comment or short line", count_in); in prime_test() 648 debug2("%10u: known composite", count_in); in prime_test() 667 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); in prime_test() 684 debug2("%10u: (%u)", count_in, in_type); in prime_test() 693 debug2("Unknown prime type"); in prime_test() 702 debug2("%10u: bit size %u mismatch", count_in, in_size); in prime_test() 706 debug2("%10u: bit size %u too short", count_in, in_size); in prime_test() [all …]
|
H A D | auth-bsdauth.c | 63 debug2("bsdauth_query: try reuse session"); in bsdauth_query() 72 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
|
H A D | channels.c | 436 debug2("channel %d: rfd %d isatty", c->self, c->rfd); in channel_register_fds() 514 debug2("channel: expanding %d", sc->channels_alloc); in channel_new() 885 debug2("channel %d: big output buffer %zu > %u", in channel_not_very_much_buffered_data() 1121 debug2("channel %d: send open", id); in channel_send_open() 1140 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); in channel_request_start() 1275 debug2("channel %d: " in channel_pre_open() 1334 debug2("Initial X11 packet contains bad byte order byte: 0x%x", in x11_open_helper() 1347 debug2("X11 connection uses different authentication protocol."); in x11_open_helper() 1354 debug2("X11 auth data does not match fake data."); in x11_open_helper() 1413 debug2("X11 rejected %d i%d/o%d", in channel_pre_x11_open() [all …]
|
H A D | hostfile.c | 76 debug2("extract_salt: string too short"); in extract_salt() 80 debug2("extract_salt: invalid magic identifier"); in extract_salt() 86 debug2("extract_salt: missing salt termination character"); in extract_salt() 93 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 103 debug2("extract_salt: salt decode error"); in extract_salt() 107 debug2("extract_salt: expected salt len %zd, got %d", in extract_salt() 857 debug2("%s:%ld: truncated before key type", in hostkeys_foreach_file() 906 debug2("%s:%ld: truncated after key type", in hostkeys_foreach_file()
|
H A D | sftp-client.c | 498 debug2("Remote version: %u", ret->version); in sftp_init() 553 debug2("Server supports extension \"%s\" revision %s", in sftp_init() 556 debug2("Unrecognised server extension \"%s\"", name); in sftp_init() 870 debug2("Sending SSH2_FXP_REMOVE \"%s\"", path); in sftp_rm() 885 debug2("Sending SSH2_FXP_MKDIR \"%s\"", path); in sftp_mkdir() 903 debug2("Sending SSH2_FXP_RMDIR \"%s\"", path); in sftp_rmdir() 921 debug2("Sending SSH2_FXP_STAT \"%s\"", path); in sftp_stat() 957 debug2("Sending SSH2_FXP_FSTAT \"%s\""); in sftp_fstat() 972 debug2("Sending SSH2_FXP_SETSTAT \"%s\"", path); in sftp_setstat() 991 debug2("Sending SSH2_FXP_FSETSTAT"); in sftp_fsetstat() [all …]
|
H A D | kex.c | 202 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop() 212 debug2("first_kex_follows %d ", v); in kex_buf2prop() 213 debug2("reserved %u ", i); in kex_buf2prop() 910 debug2("proposal mismatch: my %s peer %s", in proposals_match() 915 debug2("proposals match"); in proposals_match() 936 debug2("local %s KEXINIT proposal", kex->server ? "server" : "client"); in kex_choose_conf() 939 debug2("peer %s KEXINIT proposal", kex->server ? "client" : "server"); in kex_choose_conf()
|
H A D | auth2-chall.c | 181 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device() 227 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
|
H A D | dispatch.c | 108 debug2("skipped packet (type %u)", type); in ssh_dispatch_run()
|
H A D | auth2-pubkeyfile.c | 287 debug2("%s: check options: '%s'", loc, cp); in auth_check_authkey_line() 296 debug2("%s: advance: '%s'", loc, cp); in auth_check_authkey_line()
|
H A D | sshconnect2.c | 500 debug2("service_accept: %s", reply); in input_userauth_service_accept() 503 debug2("buggy server: service_accept w/o service"); in input_userauth_service_accept() 552 debug2("we sent a %s packet, wait for reply", method->name); in userauth() 555 debug2("we did not send a packet, disable method"); in userauth() 1083 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq() 1543 debug2("no passphrase given, try next key"); in load_identity_file() 1558 debug2("bad passphrase given, try again..."); in load_identity_file() 1924 debug2("userauth_kbdint"); in userauth_kbdint() 2292 debug2("Unrecognized authentication method name: %s", name ? name : "NULL"); in authmethod_lookup()
|
H A D | auth2-hostbased.c | 188 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed()
|
H A D | log.h | 86 #define debug2(...) sshlog(__FILE__, __func__, __LINE__, 0, SYSLOG_LEVEL_DEBUG2, NULL, __VA_ARGS__) macro
|
H A D | auth2.c | 346 debug2("input_userauth_request: try method %s", method); in input_userauth_request() 676 debug2("authentication methods list %d complete", i); in auth2_update_methods_lists()
|
H A D | dh.c | 270 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh_p)); in dh_pub_is_valid()
|
H A D | ssh.c | 1605 debug2("resolved SecurityKeyProvider %s => %s", in main() 1628 debug2("resolving \"%s\" port %d", host, options.port); in main() 1689 debug2("hostbased key %d: %s key from \"%s\"", o, \ in main() 1700 debug2("hostbased key %d: %s cert from \"%s\"", o, \ in main()
|
H A D | session.c | 1967 debug2("subsystem request for %.100s by user %s", s->subsys, in session_subsystem_req() 2095 debug2("Ignoring env request %s: too many env vars", name); in session_env_req() 2101 debug2("Setting env %d: %s=%s", s->num_env, name, val); in session_env_req() 2110 debug2("Ignoring env request %s: disallowed name", name); in session_env_req()
|
H A D | mux.c | 1646 debug2("Unrecognised master extension \"%s\"", name); in mux_client_hello_exchange() 2059 debug2("Exiting on signal: %s", strsignal(muxclient_terminate)); in mux_client_request_session() 2062 debug2("Control master terminated unexpectedly"); in mux_client_request_session() 2065 debug2("Received exit status from master %d", exitval); in mux_client_request_session()
|
H A D | auth-pam.c | 794 debug2("%s: auth information in SSH_AUTH_INFO_0", caller); in expose_authinfo() 992 debug2("PAM: %s entering, %u responses", __func__, num); in sshpam_respond()
|
H A D | misc.c | 146 debug2("fd %d setting O_NONBLOCK", fd); in set_nonblock() 201 debug2("fd %d is TCP_NODELAY", fd); in set_nodelay() 205 debug2("fd %d setting TCP_NODELAY", fd); in set_nodelay()
|
H A D | servconf.c | 2257 debug2("%s line %d: ignoring duplicate env " in process_server_config_line_depth() 2342 debug2("%s line %d: new include %s", in process_server_config_line_depth() 2353 debug2("%s line %d: no match for %s", in process_server_config_line_depth() 2363 debug2("%s line %d: including %s", in process_server_config_line_depth()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | getrrsetbyname-ldns.c | 147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname() 155 debug2("ldns: trying to validate RRset"); in getrrsetbyname() 161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", in getrrsetbyname() 167 debug2("ldns: RRset is signed with a valid key"); in getrrsetbyname() 169 debug2("ldns: RRset validation failed: %s", in getrrsetbyname()
|
H A D | port-solaris.c | 83 debug2("%s: setting up process contract template on fd %d", in solaris_contract_pre_fork() 126 debug2("%s: clearing process contract template on fd %d", in solaris_contract_post_fork_child() 145 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); in solaris_contract_post_fork_parent() 169 debug2("%s: abandoning contract id %ld", __func__, ctid); in solaris_contract_post_fork_parent()
|
/freebsd/sys/contrib/device-tree/src/arm/ti/keystone/ |
H A D | keystone-k2hk-evm.dts | 42 label = "keystone:blue:debug2";
|
/freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
H A D | apq8016-schneider-hmibsc.dts | 479 &debug2 { status = "okay"; };
|