Home
last modified time | relevance | path

Searched refs:debug_f (Results 1 – 25 of 42) sorted by relevance

12

/freebsd/crypto/openssh/regress/misc/fuzz-harness/
H A Dkex_fuzz.cc57 debug_f("%zu%s", len, clobber ? " ignore" : ""); in do_send_and_receive()
100 debug_f("S:"); in run_kex()
106 debug_f("C:"); in run_kex()
113 debug_f("kex stalled"); in run_kex()
138 debug_f("store %s at %d", sshkey_ssh_name(pubkey), pubkey->type); in store_key()
197 debug_f("%s %s clobber client %zu", kex, keyname, in do_kex_with_key()
200 debug_f("%s %s clobber server %zu", kex, keyname, in do_kex_with_key()
203 debug_f("%s %s noclobber", kex, keyname); in do_kex_with_key()
351 debug_f("%s", path); in main()
362 debug_f("%s", path); in main()
[all …]
/freebsd/crypto/openssh/
H A Dserverloop.c417 debug_f("originator %s port %u, target %s port %u", in server_request_direct_tcpip()
462 debug_f("originator %s port %d, target %s", in server_request_direct_streamlocal()
510 debug_f("invalid tun"); in server_request_tun()
599 debug_f("ctype %s rchan %u win %u max %u", in server_input_channel_open()
612 debug_f("confirm %s", ctype); in server_input_channel_open()
629 debug_f("failure %s", ctype); in server_input_channel_open()
746 debug_f("rtype %s want_reply %d", rtype, want_reply); in server_input_global_request()
753 debug_f("tcpip-forward listen %s port %u", in server_input_global_request()
780 debug_f("cancel-tcpip-forward addr %s port %d", in server_input_global_request()
789 debug_f("streamlocal-forward listen path %s", in server_input_global_request()
[all …]
H A Dssh-agent.c322 debug_f("user %s hostname %s is_ca %d nkeys %u", in dump_dest_constraint_hop()
332 debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys, in dump_dest_constraint_hop()
349 debug_f("%s: %zu constraints", context, ndcs); in dump_dest_constraints()
351 debug_f("constraint %zu / %zu: from: ", i, ndcs); in dump_dest_constraints()
353 debug_f("constraint %zu / %zu: to: ", i, ndcs); in dump_dest_constraints()
356 debug_f("done for %s", context); in dump_dest_constraints()
420 debug_f("cert %s / hostname %s rejected: %s", in match_key_hop()
652 debug_f("key %u / %u: %s %s", i++, idtab->nentries, in process_request_identities()
827 debug_f("signed data matches public key userauth request"); in check_websafe_message_contents()
831 debug_f("signed data matches SSHSIG signature request"); in check_websafe_message_contents()
[all …]
H A Dssh-pkcs11.c114 debug_f("provider \"%s\" refcount %d valid %d", in pkcs11_provider_finalize()
138 debug_f("provider \"%s\" refcount %d", p->name, p->refcount); in pkcs11_provider_unref()
205 debug_f("parent %p ptr %p idx %d", parent, ptr, idx); in pkcs11_k11_free()
266 debug_f("no pin specified"); in pkcs11_login_slot()
340 debug_f("provider \"%s\" slot %lu object %lu: attrib %lu = %d", in pkcs11_check_obj_bool_attrib()
410 debug_f("always-auth key"); in pkcs11_get_key()
1564 debug_f("provider already registered: %s", provider_id); in pkcs11_register_provider()
1613 debug_f("provider %s returned no slots", provider_id); in pkcs11_register_provider()
1717 debug_f("provider %s returned no keys", provider_id); in pkcs11_add_provider()
1738 debug_f("provider \"%s\" available", provider_id); in pkcs11_gakp()
[all …]
H A Dcompat.c131 debug_f("match: %s pat %s compat 0x%08x", in compat_banner()
137 debug_f("no match: %s", version); in compat_banner()
H A Dssh-sk-helper.c119 debug_f("ready to sign with key %s, provider %s: " in process_sign()
250 debug_f("key %zu %s %s uidlen %zu", i, in process_load_resident()
318 debug_f("received message len %zu", sshbuf_len(req)); in main()
349 debug_f("reply len %zu", sshbuf_len(resp)); in main()
H A Dreadpass.c145 debug_f("requested to askpass"); in read_passphrase()
150 debug_f("stdin is not a tty"); in read_passphrase()
166 debug_f("can't open %s: %s", _PATH_TTY, in read_passphrase()
H A Dssh-sk.c150 debug_f("provider %s implements version 0x%08lx", ret->path, in sshsk_open()
493 debug_f("provider \"%s\", device \"%s\", application \"%s\", " in sshsk_enroll()
531 debug_f("using random challenge"); in sshsk_enroll()
552 debug_f("provider \"%s\" failure %d", provider_path, r); in sshsk_enroll()
663 debug_f("provider \"%s\", key %s, flags 0x%02x%s", in sshsk_sign()
703 debug_f("sk_sign failed with code %d", r); in sshsk_sign()
814 debug_f("provider \"%s\"%s", provider_path, in sshsk_load_resident()
H A Ddns.c271 debug_f("matched SSHFP type %d fptype %d", in verify_host_key_dns()
275 debug_f("failed SSHFP type %d fptype %d", in verify_host_key_dns()
H A Dclientloop.c1704 debug_f("listen %s port %d, originator %s port %d", in client_request_forwarded_tcpip()
1760 debug_f("request: %s", listen_path); in client_request_forwarded_streamlocal()
1830 debug_f("bound agent to hostkey"); in client_request_agent()
1992 debug_f("no sink for exit-status on channel %d", in client_input_channel_req()
2213 debug_f("hostkeys file %s does not exist", in check_old_keys_othernames()
2308 debug_f("known hosts file %s does not " in update_known_hosts()
2388 debug_f("server used untrusted RSA signature algorithm " in client_global_hostkeys_prove_confirm()
2501 debug_f("server sent no hostkeys"); in client_input_hostkeys()
2518 debug_f("searching %s for %s / %s", in client_input_hostkeys()
2525 debug_f("hostkeys file %s does not exist", in client_input_hostkeys()
[all …]
H A Dsession.c2171 debug_f("signal %s, killpg(%ld, %d)", signame, (long)s->pid, sig); in session_signal_req()
2198 debug_f("agent forwarding disabled"); in session_auth_agent_req()
2219 debug_f("session %d req %s", s->self, rtype); in session_input_channel_req()
2283 debug_f("session %d release %s", s->self, s->tty); in session_pty_cleanup2()
2339 debug_f("x11 channel %d missing", id); in session_close_x11()
2342 debug_f("detach x11 channel %d", id); in session_close_x11()
2360 debug_f("session %d: closing channel %d", in session_close_single_x11()
2416 debug_f("session %d channel %d pid %ld %s", s->self, s->chanid, in session_exit_message()
2421 debug_f("release channel %d", s->chanid); in session_exit_message()
2476 debug_f("no session for pid %ld", (long)pid); in session_close_by_pid()
[all …]
H A Dkex.c380 debug_f("Sending SSH2_MSG_EXT_INFO"); in kex_server_update_ext_info()
418 debug_f("%s=<%s>", name, val); in kex_ext_info_check_ver()
422 debug_f("unsupported version of %s extension", name); in kex_ext_info_check_ver()
439 debug_f("%s=<%s>", name, value); in kex_ext_info_client_parse()
455 debug_f("%s (unrecognised)", name); in kex_ext_info_client_parse()
472 debug_f("%s (unrecognised)", name); in kex_ext_info_server_parse()
1266 debug_f("write: %.100s", strerror(errno)); in kex_exchange_identification()
1364 debug_f("banner line %zu: %s", n, cp); in kex_exchange_identification()
H A Dauth.c455 debug_f("key for %s found at %s:%ld", in check_key_in_hostfiles()
458 debug_f("key for host %s not found", host); in check_key_in_hostfiles()
761 debug_f("setting new authentication options"); in auth_activate_options()
775 debug_f("restricting session"); in auth_restrict_session()
H A Dssh-sk-client.c95 debug_f("starting %s %s", helper, in start_helper()
193 debug_f("helper returned error -%u", rerr); in client_converse()
457 debug_f("srks[%zu]: %s %s uidlen %zu", nsrks, in sshsk_load_resident()
H A Dsshsig.c311 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify()
352 debug_f("expected namespace \"%s\" received \"%s\"", in sshsig_wrap_verify()
359 debug_f("expected algorithm \"%s\" received \"%s\"", in sshsig_wrap_verify()
484 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verifyb()
612 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verify_fd()
775 debug_f("%s:%lu: matched principal \"%s\"", in parse_principals_key_and_options()
H A Dssh.c356 debug_f("getaddrinfo %.100s returned no addresses", name); in resolve_addr()
360 debug_f("getaddrinfo %.100s returned multiple addresses", name); in resolve_addr()
365 debug_f("Could not format address for name %.100s: %s", in resolve_addr()
454 debug_f("hostname %.100s is an unrecognised address", *hostp); in resolve_canonicalize()
1829 debug_f("backgrounding master process"); in control_persist_detach()
1885 debug_f("all expected forwarding replies received"); in forwarding_success()
1980 debug_f("tunnel forward established, id=%d", id); in ssh_tun_confirm()
2115 debug_f("expecting replies for %d forwards", in ssh_init_forwarding()
2420 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
2453 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
H A Dsshconnect2.c701 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok()
1375 debug_f("no separate private key for certificate " in sign_and_send_pubkey()
1492 debug_f("no mutual signature algorithm"); in send_pubkey_test()
1644 debug_f("bound agent to hostkey"); in get_agent_identities()
1656 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities()
1689 debug_f("ignoring certificate %s: not a user " in pubkey_prepare()
1694 debug_f("ignoring authenticator-hosted key %s as no " in pubkey_prepare()
1712 debug_f("ignoring certificate %s: not a user " in pubkey_prepare()
1717 debug_f("ignoring authenticator-hosted key " in pubkey_prepare()
2191 debug_f("trying hostkey %s %s using sigalg %s", in userauth_hostbased()
H A Dsshconnect.c422 debug_f("bound to %s", ntop); in ssh_create_socket()
760 debug_f("found matching key in %s:%lu", path, l->linenum); in hostkeys_find_by_key_cb()
781 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile()
1000 debug_f("invalid hostname \"%s\"; will not record: %s", in check_host_key()
1432 debug_f("hostkey not known or explicitly trusted: " in check_host_key()
H A Dsshd.c316 debug_f("enter%s", force_final ? " (forcing)" : ""); in child_close()
394 debug_f("preauth child %ld for %s exited " in child_reap()
401 debug_f("preauth child %ld for %s prohibited by" in child_reap()
408 debug_f("preauth child %ld for %s exited " in child_reap()
568 debug_f("p %d, r %d", p, r); in should_drop_connection()
H A Dauth2-pubkey.c233 debug_f("sk_counter = %u, sk_flags = 0x%02x", in userauth_pubkey()
267 debug_f("%s test pkalg %s pkblob %s%s%s", method, pkalg, key_s, in userauth_pubkey()
298 debug_f("key options inconsistent with existing"); in userauth_pubkey()
H A Dmux.c619 debug_f("%s for: listen %d, connect %s:%d", in mux_confirm_remote_forward()
1106 debug_f("channel %d: stop listening", c->self); in mux_master_process_stop_listening()
1138 debug_f("channel %d: proxy request", c->self); in mux_master_process_proxy()
1611 debug_f("write packet: %s", strerror(errno)); in mux_client_hello_exchange()
1619 debug_f("read packet failed"); in mux_client_hello_exchange()
1971 debug_f("master session id: %u", sid); in mux_client_request_session()
2176 debug_f("master session id: %u", sid); in mux_client_request_stdio_fwd()
H A Dttymodes.c290 debug_f("no fd or tio"); in ssh_tty_make_modes()
H A Dpacket.c561 debug_f("getpeername failed: %.100s", strerror(errno)); in ssh_remote_hostname()
981 debug_f("rekeying %s, input %llu bytes %llu blocks, " in ssh_set_newkeys()
1004 DBG(debug_f("cipher_init: %s", dir)); in ssh_set_newkeys()
1317 debug_f("resetting send seqnr %u", state->p_send.seqnr); in ssh_packet_send2_wrapped()
1786 debug_f("resetting read seqnr %u", state->p_read.seqnr); in ssh_packet_read_poll2()
2263 debug_f("setting to %d", s); in ssh_packet_set_maxsize()
2336 debug_f("called"); in ssh_packet_set_postauth()
H A Dauth2-hostbased.c78 debug_f("cuser %s chost %s pkalg %s slen %zu", in userauth_hostbased()
/freebsd/crypto/openssh/openbsd-compat/
H A Dport-linux.c239 debug_f("selabel_open failed"); in ssh_selinux_setfscreatecon()
377 debug_f("socket \"%s\" notified %s", path, s); in ssh_systemd_notify()

12