/freebsd/crypto/openssh/ |
H A D | monitor_wrap.c | 161 debug3_f("entering, type %d", type); in mm_request_send() 170 debug3_f("monitor fd closed"); in mm_request_send() 185 debug3_f("entering"); in mm_request_receive() 189 debug3_f("monitor fd closed"); in mm_request_receive() 216 debug3_f("entering, type %d", type); in mm_request_receive_expect() 243 debug3_f("waiting for MONITOR_ANS_MODULI"); in mm_choose_dh() 255 debug3_f("remaining %zu", sshbuf_len(m)); in mm_choose_dh() 272 debug3_f("entering"); in mm_sshkey_sign() 283 debug3_f("waiting for MONITOR_ANS_SIGN"); in mm_sshkey_sign() 354 debug3_f("entering"); in mm_getpwnamallow() [all …]
|
H A D | ssh-pkcs11-client.c | 135 debug3_f("free helper for provider %s", helper->path); in helper_free() 164 debug3_f("already terminated"); in helper_terminate() 166 debug3_f("terminating helper for %s; " in helper_terminate() 247 debug3_f("terminating %zu helpers", nhelpers); in pkcs11_terminate() 264 debug3_f("signing with PKCS11 provider %s", helper->path); in rsa_encrypt() 315 debug3_f("free PKCS11 RSA key for provider %s", helper->path); in rsa_finish() 321 debug3_f("provider %s remaining keys: %zu RSA %zu ECDSA", in rsa_finish() 344 debug3_f("signing with PKCS11 provider %s", helper->path); in ecdsa_do_sign() 398 debug3_f("free PKCS11 ECDSA key for provider %s", helper->path); in ecdsa_do_finish() 404 debug3_f("provider %s remaining keys: %zu RSA %zu ECDSA", in ecdsa_do_finish() [all …]
|
H A D | monitor.c | 310 debug3_f("method %s: partial", auth_method); in monitor_child_preauth() 512 debug3_f("checking request %d", type); in monitor_read() 585 debug3_f("got parameters: %d %d %d", min, want, max); in mm_answer_moduli() 625 debug3_f("entering"); in mm_answer_sign() 689 debug3_f("%s %s signature len=%zu", alg, in mm_answer_sign() 749 debug3_f("entering"); in mm_answer_pwnamallow() 823 debug3_f("sending MONITOR_ANS_PWNAM: %d", allowed); in mm_answer_pwnamallow() 863 debug3_f("service=%s, style=%s", authctxt->service, authctxt->style); in mm_answer_authserv() 928 debug3_f("sending result %d", authenticated); in mm_answer_authpassword() 963 debug3_f("sending challenge success: %u", success); in mm_answer_bsdauthquery() [all …]
|
H A D | sandbox-pledge.c | 49 debug3_f("preparing pledge sandbox"); in ssh_sandbox_init() 67 debug3_f("finished"); in ssh_sandbox_parent_finish()
|
H A D | mux.c | 196 debug3_f("entering for channel %d", cid); in mux_master_session_cleanup_cb() 217 debug3_f("entering for channel %d", cid); in mux_master_control_cleanup_cb() 417 debug3_f("got fds stdin %d, stdout %d, stderr %d", in mux_master_process_new_session() 1003 debug3_f("got fds stdin %d, stdout %d", new_fd[0], new_fd[1]); in mux_master_process_stdio_fwd() 1075 debug3_f("sending failure reply"); in mux_stdio_confirm() 1082 debug3_f("sending success reply"); in mux_stdio_confirm() 1174 debug3_f("channel %d: hello sent", c->self); in mux_master_read_cb() 1188 debug3_f("channel %d packet type 0x%08x len %zu", c->self, in mux_master_read_cb() 1232 debug3_f("channel %d: exit message, exitval %d", c->self, exitval); in mux_exit_message() 1255 debug3_f("channel %d: TTY alloc failed", c->self); in mux_tty_alloc_failed() [all …]
|
H A D | auth2.c | 242 debug3_f("user specific delay %0.3lfms", delay/1000); in user_specific_delay() 253 debug3_f("elapsed %0.3lfms exceeded the max delay " in ensure_minimum_time_since() 264 debug3_f("elapsed %0.3lfms, delaying %0.3lfms (requested %0.3lfms)", in ensure_minimum_time_since() 457 debug3_f("failure partial=%d next methods=\"%s\"", in userauth_finish() 548 debug3_f("method %s not enabled", name); in authmethod_lookup() 552 debug3_f("method %s not allowed " in authmethod_lookup() 581 debug3_f("checking methods"); in auth2_setup_methods_lists() 669 debug3_f("updating methods list after \"%s\"", method); in auth2_update_methods_lists() 759 debug3_f("key already used: %s %s", in auth2_key_already_used()
|
H A D | sandbox-rlimit.c | 52 debug3_f("preparing rlimit sandbox"); in ssh_sandbox_init() 87 debug3_f("finished"); in ssh_sandbox_parent_finish()
|
H A D | sftp-usergroup.c | 116 debug3_f("uid %u not resolved", uids[i]); in lookup_and_record() 119 debug3_f("record uid %u => \"%s\"", uids[i], usernames[i]); in lookup_and_record() 124 debug3_f("gid %u not resolved", gids[i]); in lookup_and_record() 127 debug3_f("record gid %u => \"%s\"", gids[i], groupnames[i]); in lookup_and_record()
|
H A D | msg.c | 50 debug3_f("type %u len %zu", (unsigned int)type & 0xff, sshbuf_len(m)); in ssh_msg_send() 62 debug3_f("done"); in ssh_msg_send()
|
H A D | auth-rhosts.c | 231 debug3_f("no hosts access files exist"); in auth_rhosts2() 240 debug3_f("root user, ignoring system hosts files"); in auth_rhosts2() 286 debug3_f("stat %s: %s", path, strerror(errno)); in auth_rhosts2()
|
H A D | ssh_api.c | 488 debug3_f("need %d", type); in _ssh_host_public_key() 490 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_public_key() 503 debug3_f("need %d", type); in _ssh_host_private_key() 505 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_private_key() 518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key() 520 debug3_f("check %s", sshkey_type(k->key)); in _ssh_verify_host_key()
|
H A D | clientloop.c | 620 debug3_f("stopping: %s (%llu chaff packets sent)", in obfuscate_keystroke_timing() 635 debug3_f("starting: interval ~%dms", in obfuscate_keystroke_timing() 853 debug3_f("channel %d: mux request: %s", c->self, in client_status_confirm() 937 debug3_f("enter"); in client_repledge() 2101 debug3_f("found %s key under different " in hostkeys_find() 2113 debug3_f("hostkeys file %s:%ld has CA/revocation marker", in hostkeys_find() 2124 debug3_f("found address %s against different hostname " in hostkeys_find() 2130 debug3_f("found hostname %s against different address " in hostkeys_find() 2140 debug3_f("hostkeys file %s:%ld complex host specification", in hostkeys_find() 2150 debug3_f("found %s key at %s:%ld", in hostkeys_find() [all …]
|
H A D | monitor_fdpass.c | 92 debug3_f("sendmsg(%d): %s", fd, strerror(errno)); in mm_send_fd() 147 debug3_f("recvmsg: %s", strerror(errno)); in mm_receive_fd()
|
H A D | srclimit.c | 78 debug3_f("%s: invalid mask %d bits", __func__, bits); in srclimit_mask_addr() 325 debug3_f("%s overflow, remove %s", t, s); in srclimit_early_expire_penalties_from_tree() 364 debug3_f("address %s is exempt", addrnetmask); in srclimit_penalise()
|
H A D | readpass.c | 262 debug3_f("cannot notify: no askpass"); in notify_start() 268 debug3_f("cannot notify: no display"); in notify_start()
|
H A D | auth-shadow.c | 101 debug3_f("today %lld sp_lstchg %lld sp_max %lld", (long long)today, in auth_shadow_pwexpired()
|
H A D | hostfile.c | 244 debug3_f("found %skey type %s in file %s:%lu", in record_hostkey() 282 debug3_f("loaded %lu keys from %s", ctx.num_loaded, host); in load_hostkeys_file() 569 debug3_f("%s key already at %s:%ld", in host_delete() 939 debug3_f("reading file \"%s\"", path); in hostkeys_foreach()
|
H A D | sshconnect2.c | 154 debug3_f("have matching best-preference key type %s, " in order_hostkeyalgs() 203 debug3_f("prefer hostkeyalgs: %s", first); in order_hostkeyalgs() 205 debug3_f("no algorithms matched; accept original"); in order_hostkeyalgs() 575 debug3_f("entering"); in input_userauth_banner() 1334 debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1397 debug3_f("signing using %s %s", alg, fp); in sign_and_send_pubkey() 1498 debug3_f("cannot handle key"); in send_pubkey_test() 2063 debug3_f("fcntl F_SETFD: %s", strerror(errno)); in ssh_keysign() 2066 debug3_f("[child] pid=%ld, exec %s", in ssh_keysign() 2155 debug3_f("trying key type %s", authctxt->active_ktype); in userauth_hostbased()
|
H A D | sshd-session.c | 455 debug3_f("%s key not permitted by HostkeyAlgorithms", s); in append_hostkey_type() 640 debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp); in notify_hostkeys() 660 debug3_f("sent %u hostkeys", nkeys); in notify_hostkeys() 745 debug3_f("entering fd = %d", fd); in recv_rexec_state() 782 debug3_f("done"); in recv_rexec_state()
|
H A D | ssh-sk-client.c | 104 debug3_f("started pid=%ld", (long)pid); in start_helper() 116 debug3_f("pid=%ld", (long)pid); in reap_helper()
|
H A D | ssh-agent.c | 390 debug3_f("%s: entering hostname %s, requested key %s %s, %u keys avail", in match_key_hop() 400 debug3_f("%s: key %u: %s%s %s", tag, i, in match_key_hop() 498 debug3_f("entering: key %s comment \"%s\", %zu socket bindings, " in identity_permitted() 526 debug3_f("socketentry fd=%d, entry %zu %s, " in identity_permitted() 578 debug3_f("key permitted at host but not after"); in identity_permitted() 760 debug3_f("well formed userauth"); in parse_userauth_request() 1127 debug3_f("%s%s%s: adding %skey %s %s", in parse_dest_constraint_hop() 1151 debug3_f("entering"); in parse_dest_constraint()
|
H A D | sshconnect.c | 457 debug3_f("entering"); in ssh_connect_direct() 777 debug3_f("trying %s hostfile \"%s\"", which, file); in hostkeys_find_by_key_hostfile() 1106 debug3_f("certificate host key in use; " in check_host_key() 1118 debug3_f("host key found in GlobalKnownHostsFile; " in check_host_key() 1123 debug3_f("host key found via KnownHostsCommand; " in check_host_key()
|
H A D | ssh.c | 265 debug3_f("lookup %s:%d", name, port); in resolve_host() 404 debug3_f("check \"%s\" CNAME \"%s\"", *namep, cname); in check_follow_cname() 473 debug3_f("name is fully qualified"); in resolve_canonicalize() 489 debug3_f("not canonicalizing hostname \"%s\" (max dots %d)", in resolve_canonicalize() 499 debug3_f("attempting \"%s\" => \"%s\"", *hostp, fullhost); in resolve_canonicalize() 1993 debug3_f("%s:%d", options.stdio_forward_host, in ssh_init_stdio_forwarding() 2211 debug3_f("channel_new: %d", c->self); in ssh_session2_open()
|
H A D | scp.c | 1097 debug3_f("origin in %d out %d pid %ld", in toremote() 1114 debug3_f("destination in %d out %d pid %ld", in toremote() 1373 debug3_f("copying local %s to remote %s", src, abs_dst); in source_sftp() 1572 debug3_f("copying remote %s to local %s", abs_src, dst); in sink_sftp() 1823 debug3_f("expected pattern %zu: \"%s\"", 2013 debug3_f("copying remote %s to remote %s", abs_src, target);
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-pselect.c | 86 debug3_f("initializing"); in pselect_notify_setup() 88 debug3_f("pid changed, reinitializing"); in pselect_notify_setup() 105 debug3_f("pid %d saved %d pipe0 %d pipe1 %d", getpid(), in pselect_notify_setup() 181 debug3_f("installing signal handler for %s, " in pselect()
|