/freebsd/crypto/openssh/ |
H A D | auth2-hostbased.c | 123 debug2_f("disabled because of invalid user"); in userauth_hostbased() 158 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 184 debug2_f("chost %s resolvedname %s ipaddr %s", in hostbased_key_allowed() 194 debug2_f("auth_rhosts2 refused user \"%.100s\" " in hostbased_key_allowed() 205 debug2_f("auth_rhosts2 refused " in hostbased_key_allowed() 212 debug2_f("access allowed by auth_rhosts2"); in hostbased_key_allowed()
|
H A D | addrmatch.c | 57 debug2_f("couldn't parse address %.100s", addr); in addr_match_list() 73 debug2_f("inconsistent mask length for " in addr_match_list() 117 debug2_f("couldn't parse address %.100s", addr); in addr_match_cidr_list()
|
H A D | mux.c | 229 debug2_f("channel %d: not open", sc->self); in mux_master_control_cleanup_cb() 289 debug2_f("channel %d client version %u", c->self, ver); in mux_master_process_hello() 301 debug2_f("Unrecognised extension \"%s\" length %zu", in mux_master_process_hello() 387 debug2_f("channel %d: request tty %d, X %d, agent %d, subsys %d, " in mux_master_process_new_session() 422 debug2_f("session already open"); in mux_master_process_new_session() 443 debug2_f("session refused by user"); in mux_master_process_new_session() 476 debug2_f("channel_new: %d linked to control channel %d", in mux_master_process_new_session() 495 debug2_f("channel %d: alive check", c->self); in mux_master_process_alive_check() 510 debug2_f("channel %d: terminate request", c->self); in mux_master_process_terminate() 516 debug2_f("termination refused by user"); in mux_master_process_terminate() [all …]
|
H A D | compat.c | 148 debug2_f("original KEX proposal: %s", p); in compat_kex_proposal() 163 debug2_f("compat KEX proposal: %s", cp); in compat_kex_proposal()
|
H A D | nchan.c | 383 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", in chan_shutdown_write() 388 debug2_f("channel %d: shutdown() failed for " in chan_shutdown_write() 406 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", in chan_shutdown_read()
|
H A D | ssh-agent.c | 443 debug2_f("constraint %zu %s%s%s (%u keys) > %s%s%s (%u keys)", in permitted_by_dest_constraints() 471 debug2_f("allowed for hostname %s", in permitted_by_dest_constraints() 476 debug2_f("%s identity \"%s\" not permitted for this destination", in permitted_by_dest_constraints() 644 debug2_f("entering"); in process_request_identities() 668 debug2_f("replying with %u allowed of %u available keys", in process_request_identities() 1017 debug2_f("entering"); in process_remove_identity() 1046 debug2_f("entering"); in process_remove_all_identities() 1169 debug2_f("parsed %s (%u keys) > %s%s%s (%u keys)", in parse_dest_constraint() 1382 debug2_f("entering"); in process_add_identity() 1493 debug2_f("entering"); in process_lock_agent() [all …]
|
H A D | auth2-pubkey.c | 131 debug2_f("%s user %s %s public key %s %s", in userauth_pubkey() 200 debug2_f("disabled because of invalid user"); in userauth_pubkey() 274 debug2_f("disabled because of invalid user"); in userauth_pubkey() 301 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey()
|
H A D | auth2-pubkeyfile.c | 253 debug2_f("%s: processed %lu/%lu lines", file, nonblank, linenum); in auth_process_principals() 437 debug2_f("%s: processed %lu/%lu lines", file, nonblank, linenum); in auth_check_authkeys_file()
|
H A D | auth-rhosts.c | 200 debug2_f("clientuser %s hostname %s ipaddr %s", in auth_rhosts2()
|
H A D | ssh-add.c | 725 debug2_f("looking up host keys for \"%s\" in %s", host, path); in parse_dest_constraint_hop() 780 debug2_f("constraint %zu: %s%s%s (%u keys) > %s%s%s (%u keys)", *ndcp, in parse_dest_constraint() 1000 debug2_f("loaded %zu certificates", ncerts); in main()
|
H A D | channels.c | 316 debug2_f("global channel timeout %d seconds", timeout_secs); in channel_add_timeout() 320 debug2_f("channel type \"%s\" timeout %d seconds", in channel_add_timeout() 376 debug2_f("labeled channel %d as %s (inactive timeout %u)", id, xctype, in channel_set_xtype() 3320 debug2_f("channel %u: unsupported type %u", c->self, type); in channel_proxy_upstream() 3591 debug2_f("channel %d: callback start", c->self); in channel_input_open_confirmation() 3593 debug2_f("channel %d: callback done", c->self); in channel_input_open_confirmation() 3645 debug2_f("channel %d: callback start", c->self); in channel_input_open_failure() 3647 debug2_f("channel %d: callback done", c->self); in channel_input_open_failure() 3694 debug2_f("type %d id %d", type, id); in channel_input_status_confirm() 4034 debug2_f("close channel %d", i); in channel_cancel_rport_listener_tcpip() [all …]
|
H A D | ssh_api.c | 566 debug2_f("orig/%d %s", ssh->kex->server, orig); in _ssh_order_hostkeyalgs() 567 debug2_f("replace/%d %s", ssh->kex->server, replace); in _ssh_order_hostkeyalgs()
|
H A D | ssh-ed25519-sk.c | 228 debug2_f("crypto_sign_ed25519_open failed: %d", ret); in ssh_ed25519_sk_verify()
|
H A D | ssh.c | 351 debug2_f("could not resolve name %.100s as address: %s", in resolve_addr() 438 debug2_f("hostname %.100s is address", *hostp); in resolve_canonicalize() 440 debug2_f("canonicalised address \"%s\" => \"%s\"", in resolve_canonicalize() 520 debug2_f("host %s not found in any suffix", *hostp); in resolve_canonicalize() 1846 debug2_f("background process is %ld", (long)pid); in control_persist_detach() 1889 debug2_f("%d expected forwarding replies remaining", in forwarding_success()
|
H A D | log.h | 97 #define debug2_f(...) sshlog(__FILE__, __func__, __LINE__, 1, SYSLOG_LEVEL_DEBUG2, NULL, __VA_ARGS… macro
|
H A D | clientloop.c | 254 debug2_f("cancel scheduled exit"); in set_control_persist_exit_time() 260 debug2_f("schedule exit in %d seconds", in set_control_persist_exit_time() 376 debug2_f("xauth command: %s", cmd); in client_x11_get_proto() 465 debug2_f("changed"); in client_check_window_change() 2204 debug2_f("checking for %zu deprecated keys", ctx->nold); in check_old_keys_othernames() 2688 debug2_f("id %d", id); in client_session2_setup()
|
H A D | ssh-ed25519.c | 256 debug2_f("crypto_sign_ed25519_open failed: %d", ret); in ssh_ed25519_verify()
|
H A D | ssh-keysign.c | 134 debug2_f("check expect chost %s got %s", host, p); in valid_request()
|
H A D | sshd-session.c | 712 debug2_f("privkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 721 debug2_f("pubkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 730 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
H A D | auth2-gss.c | 115 debug2_f("disabled because of invalid user"); in userauth_gssapi()
|
H A D | hostfile.c | 820 debug2_f("%s:%ld: bad host hash \"%.32s\"", in hostkeys_foreach_file() 833 debug2_f("%s:%ld: bad ip hash " in hostkeys_foreach_file()
|
H A D | krl.c | 1058 debug2_f("bad KRL magic header"); in ssh_krl_from_blob() 1263 debug2_f("checking CA key"); in ssh_krl_check_key() 1286 debug2_f("checking KRL %s", path); in ssh_krl_file_contains_key()
|
H A D | ssh-xmss.c | 332 debug2_f("xmss_sign_open failed: %d", ret); in ssh_xmss_verify()
|
H A D | sshconnect2.c | 1371 debug2_f("using private key \"%s\"%s for " in sign_and_send_pubkey() 1826 debug2_f("done"); in pubkey_prepare() 1952 debug2_f("entering"); in input_userauth_info_req() 1980 debug2_f("num_prompts %d", num_prompts); in input_userauth_info_req() 2203 debug2_f("chost %s", chost); in userauth_hostbased()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-pselect.c | 132 debug2_f("reading"); in pselect_notify_done()
|