/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 57 debug_f("%zu%s", len, clobber ? " ignore" : ""); in do_send_and_receive() 100 debug_f("S:"); in run_kex() 106 debug_f("C:"); in run_kex() 113 debug_f("kex stalled"); in run_kex() 138 debug_f("store %s at %d", sshkey_ssh_name(pubkey), pubkey->type); in store_key() 197 debug_f("%s %s clobber client %zu", kex, keyname, in do_kex_with_key() 200 debug_f("%s %s clobber server %zu", kex, keyname, in do_kex_with_key() 203 debug_f("%s %s noclobber", kex, keyname); in do_kex_with_key() 351 debug_f("%s", path); in main() 362 debug_f("%s", path); in main() [all …]
|
/freebsd/crypto/openssh/ |
H A D | serverloop.c | 417 debug_f("originator %s port %u, target %s port %u", in server_request_direct_tcpip() 462 debug_f("originator %s port %d, target %s", in server_request_direct_streamlocal() 510 debug_f("invalid tun"); in server_request_tun() 599 debug_f("ctype %s rchan %u win %u max %u", in server_input_channel_open() 612 debug_f("confirm %s", ctype); in server_input_channel_open() 629 debug_f("failure %s", ctype); in server_input_channel_open() 746 debug_f("rtype %s want_reply %d", rtype, want_reply); in server_input_global_request() 753 debug_f("tcpip-forward listen %s port %u", in server_input_global_request() 780 debug_f("cancel-tcpip-forward addr %s port %d", in server_input_global_request() 789 debug_f("streamlocal-forward listen path %s", in server_input_global_request() [all …]
|
H A D | ssh-agent.c | 322 debug_f("user %s hostname %s is_ca %d nkeys %u", in dump_dest_constraint_hop() 332 debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys, in dump_dest_constraint_hop() 349 debug_f("%s: %zu constraints", context, ndcs); in dump_dest_constraints() 351 debug_f("constraint %zu / %zu: from: ", i, ndcs); in dump_dest_constraints() 353 debug_f("constraint %zu / %zu: to: ", i, ndcs); in dump_dest_constraints() 356 debug_f("done for %s", context); in dump_dest_constraints() 420 debug_f("cert %s / hostname %s rejected: %s", in match_key_hop() 652 debug_f("key %u / %u: %s %s", i++, idtab->nentries, in process_request_identities() 827 debug_f("signed data matches public key userauth request"); in check_websafe_message_contents() 831 debug_f("signed data matches SSHSIG signature request"); in check_websafe_message_contents() [all …]
|
H A D | ssh-pkcs11.c | 114 debug_f("provider \"%s\" refcount %d valid %d", in pkcs11_provider_finalize() 138 debug_f("provider \"%s\" refcount %d", p->name, p->refcount); in pkcs11_provider_unref() 205 debug_f("parent %p ptr %p idx %d", parent, ptr, idx); in pkcs11_k11_free() 266 debug_f("no pin specified"); in pkcs11_login_slot() 340 debug_f("provider \"%s\" slot %lu object %lu: attrib %lu = %d", in pkcs11_check_obj_bool_attrib() 410 debug_f("always-auth key"); in pkcs11_get_key() 1564 debug_f("provider already registered: %s", provider_id); in pkcs11_register_provider() 1613 debug_f("provider %s returned no slots", provider_id); in pkcs11_register_provider() 1717 debug_f("provider %s returned no keys", provider_id); in pkcs11_add_provider() 1738 debug_f("provider \"%s\" available", provider_id); in pkcs11_gakp() [all …]
|
H A D | compat.c | 131 debug_f("match: %s pat %s compat 0x%08x", in compat_banner() 137 debug_f("no match: %s", version); in compat_banner()
|
H A D | ssh-sk-helper.c | 119 debug_f("ready to sign with key %s, provider %s: " in process_sign() 250 debug_f("key %zu %s %s uidlen %zu", i, in process_load_resident() 318 debug_f("received message len %zu", sshbuf_len(req)); in main() 349 debug_f("reply len %zu", sshbuf_len(resp)); in main()
|
H A D | readpass.c | 145 debug_f("requested to askpass"); in read_passphrase() 150 debug_f("stdin is not a tty"); in read_passphrase() 166 debug_f("can't open %s: %s", _PATH_TTY, in read_passphrase()
|
H A D | ssh-sk.c | 150 debug_f("provider %s implements version 0x%08lx", ret->path, in sshsk_open() 493 debug_f("provider \"%s\", device \"%s\", application \"%s\", " in sshsk_enroll() 531 debug_f("using random challenge"); in sshsk_enroll() 552 debug_f("provider \"%s\" failure %d", provider_path, r); in sshsk_enroll() 663 debug_f("provider \"%s\", key %s, flags 0x%02x%s", in sshsk_sign() 703 debug_f("sk_sign failed with code %d", r); in sshsk_sign() 814 debug_f("provider \"%s\"%s", provider_path, in sshsk_load_resident()
|
H A D | dns.c | 271 debug_f("matched SSHFP type %d fptype %d", in verify_host_key_dns() 275 debug_f("failed SSHFP type %d fptype %d", in verify_host_key_dns()
|
H A D | clientloop.c | 1704 debug_f("listen %s port %d, originator %s port %d", in client_request_forwarded_tcpip() 1760 debug_f("request: %s", listen_path); in client_request_forwarded_streamlocal() 1830 debug_f("bound agent to hostkey"); in client_request_agent() 1992 debug_f("no sink for exit-status on channel %d", in client_input_channel_req() 2213 debug_f("hostkeys file %s does not exist", in check_old_keys_othernames() 2308 debug_f("known hosts file %s does not " in update_known_hosts() 2388 debug_f("server used untrusted RSA signature algorithm " in client_global_hostkeys_prove_confirm() 2501 debug_f("server sent no hostkeys"); in client_input_hostkeys() 2518 debug_f("searching %s for %s / %s", in client_input_hostkeys() 2525 debug_f("hostkeys file %s does not exist", in client_input_hostkeys() [all …]
|
H A D | session.c | 2171 debug_f("signal %s, killpg(%ld, %d)", signame, (long)s->pid, sig); in session_signal_req() 2198 debug_f("agent forwarding disabled"); in session_auth_agent_req() 2219 debug_f("session %d req %s", s->self, rtype); in session_input_channel_req() 2283 debug_f("session %d release %s", s->self, s->tty); in session_pty_cleanup2() 2339 debug_f("x11 channel %d missing", id); in session_close_x11() 2342 debug_f("detach x11 channel %d", id); in session_close_x11() 2360 debug_f("session %d: closing channel %d", in session_close_single_x11() 2416 debug_f("session %d channel %d pid %ld %s", s->self, s->chanid, in session_exit_message() 2421 debug_f("release channel %d", s->chanid); in session_exit_message() 2476 debug_f("no session for pid %ld", (long)pid); in session_close_by_pid() [all …]
|
H A D | kex.c | 380 debug_f("Sending SSH2_MSG_EXT_INFO"); in kex_server_update_ext_info() 418 debug_f("%s=<%s>", name, val); in kex_ext_info_check_ver() 422 debug_f("unsupported version of %s extension", name); in kex_ext_info_check_ver() 439 debug_f("%s=<%s>", name, value); in kex_ext_info_client_parse() 455 debug_f("%s (unrecognised)", name); in kex_ext_info_client_parse() 472 debug_f("%s (unrecognised)", name); in kex_ext_info_server_parse() 1266 debug_f("write: %.100s", strerror(errno)); in kex_exchange_identification() 1364 debug_f("banner line %zu: %s", n, cp); in kex_exchange_identification()
|
H A D | auth.c | 455 debug_f("key for %s found at %s:%ld", in check_key_in_hostfiles() 458 debug_f("key for host %s not found", host); in check_key_in_hostfiles() 761 debug_f("setting new authentication options"); in auth_activate_options() 775 debug_f("restricting session"); in auth_restrict_session()
|
H A D | ssh-sk-client.c | 95 debug_f("starting %s %s", helper, in start_helper() 193 debug_f("helper returned error -%u", rerr); in client_converse() 457 debug_f("srks[%zu]: %s %s uidlen %zu", nsrks, in sshsk_load_resident()
|
H A D | sshsig.c | 311 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify() 352 debug_f("expected namespace \"%s\" received \"%s\"", in sshsig_wrap_verify() 359 debug_f("expected algorithm \"%s\" received \"%s\"", in sshsig_wrap_verify() 484 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verifyb() 612 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verify_fd() 775 debug_f("%s:%lu: matched principal \"%s\"", in parse_principals_key_and_options()
|
H A D | ssh.c | 356 debug_f("getaddrinfo %.100s returned no addresses", name); in resolve_addr() 360 debug_f("getaddrinfo %.100s returned multiple addresses", name); in resolve_addr() 365 debug_f("Could not format address for name %.100s: %s", in resolve_addr() 454 debug_f("hostname %.100s is an unrecognised address", *hostp); in resolve_canonicalize() 1829 debug_f("backgrounding master process"); in control_persist_detach() 1885 debug_f("all expected forwarding replies received"); in forwarding_success() 1980 debug_f("tunnel forward established, id=%d", id); in ssh_tun_confirm() 2115 debug_f("expecting replies for %d forwards", in ssh_init_forwarding() 2420 debug_f("key %s type %s is not a certificate", in load_public_identity_files() 2453 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
|
H A D | sshconnect2.c | 701 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok() 1375 debug_f("no separate private key for certificate " in sign_and_send_pubkey() 1492 debug_f("no mutual signature algorithm"); in send_pubkey_test() 1644 debug_f("bound agent to hostkey"); in get_agent_identities() 1656 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities() 1689 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1694 debug_f("ignoring authenticator-hosted key %s as no " in pubkey_prepare() 1712 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1717 debug_f("ignoring authenticator-hosted key " in pubkey_prepare() 2191 debug_f("trying hostkey %s %s using sigalg %s", in userauth_hostbased()
|
H A D | sshconnect.c | 422 debug_f("bound to %s", ntop); in ssh_create_socket() 760 debug_f("found matching key in %s:%lu", path, l->linenum); in hostkeys_find_by_key_cb() 781 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile() 1000 debug_f("invalid hostname \"%s\"; will not record: %s", in check_host_key() 1432 debug_f("hostkey not known or explicitly trusted: " in check_host_key()
|
H A D | sshd.c | 316 debug_f("enter%s", force_final ? " (forcing)" : ""); in child_close() 394 debug_f("preauth child %ld for %s exited " in child_reap() 401 debug_f("preauth child %ld for %s prohibited by" in child_reap() 408 debug_f("preauth child %ld for %s exited " in child_reap() 568 debug_f("p %d, r %d", p, r); in should_drop_connection()
|
H A D | auth2-pubkey.c | 233 debug_f("sk_counter = %u, sk_flags = 0x%02x", in userauth_pubkey() 267 debug_f("%s test pkalg %s pkblob %s%s%s", method, pkalg, key_s, in userauth_pubkey() 298 debug_f("key options inconsistent with existing"); in userauth_pubkey()
|
H A D | mux.c | 619 debug_f("%s for: listen %d, connect %s:%d", in mux_confirm_remote_forward() 1106 debug_f("channel %d: stop listening", c->self); in mux_master_process_stop_listening() 1138 debug_f("channel %d: proxy request", c->self); in mux_master_process_proxy() 1611 debug_f("write packet: %s", strerror(errno)); in mux_client_hello_exchange() 1619 debug_f("read packet failed"); in mux_client_hello_exchange() 1971 debug_f("master session id: %u", sid); in mux_client_request_session() 2176 debug_f("master session id: %u", sid); in mux_client_request_stdio_fwd()
|
H A D | ttymodes.c | 290 debug_f("no fd or tio"); in ssh_tty_make_modes()
|
H A D | packet.c | 561 debug_f("getpeername failed: %.100s", strerror(errno)); in ssh_remote_hostname() 981 debug_f("rekeying %s, input %llu bytes %llu blocks, " in ssh_set_newkeys() 1004 DBG(debug_f("cipher_init: %s", dir)); in ssh_set_newkeys() 1317 debug_f("resetting send seqnr %u", state->p_send.seqnr); in ssh_packet_send2_wrapped() 1786 debug_f("resetting read seqnr %u", state->p_read.seqnr); in ssh_packet_read_poll2() 2263 debug_f("setting to %d", s); in ssh_packet_set_maxsize() 2336 debug_f("called"); in ssh_packet_set_postauth()
|
H A D | auth2-hostbased.c | 78 debug_f("cuser %s chost %s pkalg %s slen %zu", in userauth_hostbased()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-linux.c | 239 debug_f("selabel_open failed"); in ssh_selinux_setfscreatecon() 377 debug_f("socket \"%s\" notified %s", path, s); in ssh_systemd_notify()
|