| /freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
| H A D | kex_fuzz.cc | 57 debug_f("%zu%s", len, clobber ? " ignore" : ""); in do_send_and_receive() 100 debug_f("S:"); in run_kex() 106 debug_f("C:"); in run_kex() 113 debug_f("kex stalled"); in run_kex() 138 debug_f("store %s at %d", sshkey_ssh_name(pubkey), pubkey->type); in store_key() 197 debug_f("%s %s clobber client %zu", kex, keyname, in do_kex_with_key() 200 debug_f("%s %s clobber server %zu", kex, keyname, in do_kex_with_key() 203 debug_f("%s %s noclobber", kex, keyname); in do_kex_with_key() 351 debug_f("%s", path); in main() 362 debug_f("%s", path); in main() [all …]
|
| /freebsd/crypto/openssh/ |
| H A D | misc-agent.c | 114 debug_f("trying path \"%s\"", path); in unix_listener_tmp() 237 debug_f("path for \"%s\" too long for sockaddr_un", path); in socket_is_stale() 247 debug_f("connect \"%s\": %s", path, strerror(errno)); in socket_is_stale() 252 debug_f("getsockopt: %s", strerror(errno)); in socket_is_stale() 257 debug_f("socket error on %s: %s", path, strerror(errno)); in socket_is_stale() 262 debug_f("socket %s seems still active", path); in socket_is_stale() 344 debug_f("cleanup stale socket %s", path); in agent_cleanup_stale()
|
| H A D | serverloop.c | 442 debug_f("originator %s port %u, target %s port %u", in server_request_direct_tcpip() 487 debug_f("originator %s port %d, target %s", in server_request_direct_streamlocal() 535 debug_f("invalid tun"); in server_request_tun() 624 debug_f("ctype %s rchan %u win %u max %u", in server_input_channel_open() 637 debug_f("confirm %s", ctype); in server_input_channel_open() 654 debug_f("failure %s", ctype); in server_input_channel_open() 772 debug_f("rtype %s want_reply %d", rtype, want_reply); in server_input_global_request() 779 debug_f("tcpip-forward listen %s port %u", in server_input_global_request() 806 debug_f("cancel-tcpip-forward addr %s port %d", in server_input_global_request() 815 debug_f("streamlocal-forward listen path %s", in server_input_global_request() [all …]
|
| H A D | ssh-pkcs11.c | 113 debug_f("provider \"%s\" refcount %d valid %d", in pkcs11_provider_finalize() 137 debug_f("provider \"%s\" refcount %d", p->name, p->refcount); in pkcs11_provider_unref() 242 debug_f("no pin specified"); in pkcs11_login_slot() 316 debug_f("provider \"%s\" slot %lu object %lu: attrib %lu = %d", in pkcs11_check_obj_bool_attrib() 386 debug_f("always-auth key"); in pkcs11_get_key() 407 debug_f("%s key: provider %s slot %lu keyid %s", in pkcs11_record_key() 420 debug_f("Already seen this key at " in pkcs11_record_key() 1486 debug_f("failed to fetch key"); in pkcs11_fetch_certs() 1613 debug_f("failed to fetch key"); in pkcs11_fetch_keys() 1873 debug_f("provider already registered: %s", provider_id); in pkcs11_register_provider() [all …]
|
| H A D | ssh-agent.c | 317 debug_f("user %s hostname %s is_ca %d nkeys %u", in dump_dest_constraint_hop() 327 debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys, in dump_dest_constraint_hop() 344 debug_f("%s: %zu constraints", context, ndcs); in dump_dest_constraints() 346 debug_f("constraint %zu / %zu: from: ", i, ndcs); in dump_dest_constraints() 348 debug_f("constraint %zu / %zu: to: ", i, ndcs); in dump_dest_constraints() 351 debug_f("done for %s", context); in dump_dest_constraints() 415 debug_f("cert %s / hostname %s rejected: %s", in match_key_hop() 653 debug_f("key %u / %u: %s %s", i++, idtab->nentries, in process_request_identities() 827 debug_f("signed data matches public key userauth request"); in check_websafe_message_contents() 831 debug_f("signed data matches SSHSIG signature request"); in check_websafe_message_contents() [all …]
|
| H A D | compat.c | 131 debug_f("match: %s pat %s compat 0x%08x", in compat_banner() 137 debug_f("no match: %s", version); in compat_banner()
|
| H A D | ssh-sk-helper.c | 136 debug_f("ready to sign with key %s, provider %s: " in process_sign() 267 debug_f("key %zu %s %s uidlen %zu", i, in process_load_resident() 335 debug_f("received message len %zu", sshbuf_len(req)); in main() 366 debug_f("reply len %zu", sshbuf_len(resp)); in main()
|
| H A D | readpass.c | 142 debug_f("requested to askpass"); in read_passphrase() 147 debug_f("stdin is not a tty"); in read_passphrase() 163 debug_f("can't open %s: %s", _PATH_TTY, in read_passphrase()
|
| H A D | ssh-sk.c | 148 debug_f("provider %s implements version 0x%08lx", ret->path, in sshsk_open() 491 debug_f("provider \"%s\", device \"%s\", application \"%s\", " in sshsk_enroll() 529 debug_f("using random challenge"); in sshsk_enroll() 550 debug_f("provider \"%s\" failure %d", provider_path, r); in sshsk_enroll() 661 debug_f("provider \"%s\", key %s, flags 0x%02x%s", in sshsk_sign() 701 debug_f("sk_sign failed with code %d", r); in sshsk_sign() 812 debug_f("provider \"%s\"%s", provider_path, in sshsk_load_resident()
|
| H A D | dns.c | 264 debug_f("matched SSHFP type %d fptype %d", in verify_host_key_dns() 268 debug_f("failed SSHFP type %d fptype %d", in verify_host_key_dns()
|
| H A D | clientloop.c | 1731 debug_f("listen %s port %d, originator %s port %d", in client_request_forwarded_tcpip() 1787 debug_f("request: %s", listen_path); in client_request_forwarded_streamlocal() 1857 debug_f("bound agent to hostkey"); in client_request_agent() 2020 debug_f("no sink for exit-status on channel %d", in client_input_channel_req() 2241 debug_f("hostkeys file %s does not exist", in check_old_keys_othernames() 2336 debug_f("known hosts file %s does not " in update_known_hosts() 2416 debug_f("server used untrusted RSA signature algorithm " in client_global_hostkeys_prove_confirm() 2530 debug_f("server sent no hostkeys"); in client_input_hostkeys() 2547 debug_f("searching %s for %s / %s", in client_input_hostkeys() 2554 debug_f("hostkeys file %s does not exist", in client_input_hostkeys() [all …]
|
| H A D | session.c | 2135 debug_f("signal %s, killpg(%ld, %d)", signame, (long)s->pid, sig); in session_signal_req() 2163 debug_f("agent forwarding disabled"); in session_auth_agent_req() 2183 debug_f("session %d req %s", s->self, rtype); in session_input_channel_req() 2249 debug_f("session %d release %s", s->self, s->tty); in session_pty_cleanup2() 2305 debug_f("x11 channel %d missing", id); in session_close_x11() 2308 debug_f("detach x11 channel %d", id); in session_close_x11() 2326 debug_f("session %d: closing channel %d", in session_close_single_x11() 2382 debug_f("session %d channel %d pid %ld %s", s->self, s->chanid, in session_exit_message() 2387 debug_f("release channel %d", s->chanid); in session_exit_message() 2442 debug_f("no session for pid %ld", (long)pid); in session_close_by_pid() [all …]
|
| H A D | kex.c | 378 debug_f("Sending SSH2_MSG_EXT_INFO"); in kex_server_update_ext_info() 416 debug_f("%s=<%s>", name, val); in kex_ext_info_check_ver() 420 debug_f("unsupported version of %s extension", name); in kex_ext_info_check_ver() 437 debug_f("%s=<%s>", name, value); in kex_ext_info_client_parse() 459 debug_f("%s (unrecognised)", name); in kex_ext_info_client_parse() 476 debug_f("%s (unrecognised)", name); in kex_ext_info_server_parse() 1271 debug_f("write: %.100s", strerror(errno)); in kex_exchange_identification() 1369 debug_f("banner line %zu: %s", n, cp); in kex_exchange_identification()
|
| H A D | auth.c | 455 debug_f("key for %s found at %s:%ld", in check_key_in_hostfiles() 458 debug_f("key for host %s not found", host); in check_key_in_hostfiles() 765 debug_f("setting new authentication options"); in auth_activate_options() 780 debug_f("restricting session"); in auth_restrict_session()
|
| H A D | sshsig.c | 316 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify() 357 debug_f("expected namespace \"%s\" received \"%s\"", in sshsig_wrap_verify() 364 debug_f("expected algorithm \"%s\" received \"%s\"", in sshsig_wrap_verify() 489 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verifyb() 617 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verify_fd() 780 debug_f("%s:%lu: matched principal \"%s\"", in parse_principals_key_and_options()
|
| H A D | audit-linux.c | 122 debug_f("unhandled event %d", event); in audit_event()
|
| H A D | ssh-sk-client.c | 102 debug_f("starting %s %s", helper, in start_helper() 211 debug_f("helper returned error -%u", rerr); in client_converse() 475 debug_f("srks[%zu]: %s %s uidlen %zu", nsrks, in sshsk_load_resident()
|
| H A D | srclimit.c | 139 debug_f("sock %d id %d limit %d", sock, id, max_persource); in srclimit_check_allow() 188 debug_f("id %d", id); in srclimit_done() 448 debug_f("%s penalty for %s %s already exists, %lld seconds remaining", in srclimit_penalise()
|
| H A D | ssh.c | 344 debug_f("getaddrinfo %.100s returned no addresses", name); in resolve_addr() 348 debug_f("getaddrinfo %.100s returned multiple addresses", name); in resolve_addr() 353 debug_f("Could not format address for name %.100s: %s", in resolve_addr() 442 debug_f("hostname %.100s is an unrecognised address", *hostp); in resolve_canonicalize() 1877 debug_f("backgrounding master process"); in control_persist_detach() 1933 debug_f("all expected forwarding replies received"); in forwarding_success() 2028 debug_f("tunnel forward established, id=%d", id); in ssh_tun_confirm() 2163 debug_f("expecting replies for %d forwards", in ssh_init_forwarding() 2449 debug_f("key %s type %s is not a certificate", in load_public_identity_files() 2481 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
|
| H A D | sshconnect2.c | 702 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok() 1380 debug_f("no separate private key for certificate " in sign_and_send_pubkey() 1497 debug_f("no mutual signature algorithm"); in send_pubkey_test() 1652 debug_f("bound agent to hostkey"); in get_agent_identities() 1664 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities() 1697 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1702 debug_f("ignoring authenticator-hosted key %s as no " in pubkey_prepare() 1720 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1725 debug_f("ignoring authenticator-hosted key " in pubkey_prepare() 2202 debug_f("trying hostkey %s %s using sigalg %s", in userauth_hostbased()
|
| H A D | ed25519-openssl.c | 171 debug_f("message bad length: %llu", *mlen); in crypto_sign_ed25519_open()
|
| H A D | sshd.c | 318 debug_f("enter%s", force_final ? " (forcing)" : ""); in child_close() 406 debug_f("preauth child %ld for %s exited " in child_reap() 412 debug_f("preauth child %ld for %s exited " in child_reap() 418 debug_f("preauth child %ld for %s prohibited by" in child_reap() 424 debug_f("preauth child %ld for %s exited " in child_reap() 591 debug_f("p %d, r %d", p, r); in should_drop_connection()
|
| H A D | sshpty.c | 172 debug_f("no tty group"); in pty_setowner()
|
| H A D | sshconnect.c | 408 debug_f("bound to %s", ntop); in ssh_create_socket() 755 debug_f("found matching key in %s:%lu", path, l->linenum); in hostkeys_find_by_key_cb() 776 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile() 995 debug_f("invalid hostname \"%s\"; will not record: %s", in check_host_key() 1427 debug_f("hostkey not known or explicitly trusted: " in check_host_key()
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-linux.c | 239 debug_f("selabel_open failed"); in ssh_selinux_setfscreatecon() 390 debug_f("socket \"%s\" notified %s", path, s); in ssh_systemd_notify()
|