/freebsd/contrib/ntp/scripts/monitoring/ |
H A D | ntptrap | 166 &debug(sprintf("hostname(%d.%d.%d.%d) = \"%s\"",unpack("C4",$addr),$name)) 169 &debug(sprintf("Failed to get name for %d.%d.%d.%d",unpack("C4",$addr))); 176 &debug(sprintf("%d request(s) scheduled",scalar(@Requests))); 177 grep(&debug(" - ".$_),keys(%Host)); 199 &debug(sprintf("Request: %s: %s(%d)",&hostname($addr), &ntp'cntrlop_name($op), $assoc)); #';)) 257 &debug("-Packet from ",&hostname($from)); 262 &debug(sprintf("%s uses auth_keyid %d",&hostname($from),$auth_keyid)) if defined($auth_keyid); 302 &debug(sprintf("Schedule timeout \"%s\" for %s", $id, $date)); 311 &debug("Clear timeout \"$id\""); 319 &debug(sprintf("Refreshing trap for %s", &hostname($addr))); [all …]
|
/freebsd/contrib/pam-krb5/pam-util/ |
H A D | logging.c | 85 char *msg; in format() local 87 if (vasprintf(&msg, fmt, args) < 0) { in format() 91 return msg; in format() 103 char *msg; in log_vplain() local 105 if (priority == LOG_DEBUG && (pargs == NULL || !pargs->debug)) in log_vplain() 108 msg = format(fmt, args); in log_vplain() 109 if (msg == NULL) in log_vplain() 111 pam_syslog(pargs->pamh, priority, "(user %s) %s", pargs->user, msg); in log_vplain() 112 free(msg); in log_vplain() 116 msg = format(fmt, args); in log_vplain() [all …]
|
/freebsd/sys/tools/ |
H A D | makeobjops.awk | 51 function warn (msg) 53 print "makeobjops.awk:", msg > "/dev/stderr"; 56 function warnsrc (msg) 58 warn(src ":" lineno ": " msg); 61 function debug (msg) function 64 warn(msg); 67 function die (msg) 69 warn(msg); 138 debug($0); 146 debug("Interface " intname); [all …]
|
/freebsd/contrib/netbsd-tests/net/fdpass/ |
H A D | fdpass.c | 44 static int debug; variable 49 struct msghdr msg; in send_fd() local 64 memset(&msg, 0, sizeof(msg)); in send_fd() 65 msg.msg_control = &cmsgbuf.buf; in send_fd() 66 msg.msg_controllen = CMSG_SPACE(sizeof(int)); in send_fd() 67 cmsg = CMSG_FIRSTHDR(&msg); in send_fd() 72 msg.msg_controllen = cmsg->cmsg_len; in send_fd() 76 msg.msg_iov = &vec; in send_fd() 77 msg.msg_iovlen = 1; in send_fd() 81 while ((n = sendmsg(sock, &msg, 0)) == -1 && in send_fd() [all …]
|
/freebsd/libexec/pppoed/ |
H A D | pppoed.c | 88 int cs, int ds, int debug, struct ngm_connect *ngc) in ConfigureNode() argument 133 if (debug) in ConfigureNode() 156 if (debug) in ConfigureNode() 171 if (debug) in ConfigureNode() 200 if (debug) in ConfigureNode() 234 if (debug) { in ConfigureNode() 255 int sz, int debug) in Spawn() argument 263 const char *msg; in Spawn() local 284 if (debug) in Spawn() 296 if (debug) in Spawn() [all …]
|
/freebsd/crypto/openssh/ |
H A D | auth-pam.c | 79 # define PAM_MSG_MEMBER(msg, n, member) ((*(msg))[(n)].member) argument 81 # define PAM_MSG_MEMBER(msg, n, member) ((msg)[(n)]->member) argument 370 debug("PAM: num PAM env strings %u", num_env); in import_environments() 392 sshpam_thread_conv(int n, sshpam_const struct pam_message **msg, in sshpam_thread_conv() argument 420 switch (PAM_MSG_MEMBER(msg, i, msg_style)) { in sshpam_thread_conv() 424 PAM_MSG_MEMBER(msg, i, msg))) != 0) in sshpam_thread_conv() 428 PAM_MSG_MEMBER(msg, i, msg_style), buffer) == -1) in sshpam_thread_conv() 446 PAM_MSG_MEMBER(msg, i, msg))) != 0) in sshpam_thread_conv() 450 PAM_MSG_MEMBER(msg, i, msg_style), buffer) == -1) in sshpam_thread_conv() 613 sshpam_null_conv(int n, sshpam_const struct pam_message **msg, in sshpam_null_conv() argument [all …]
|
H A D | ssh-pkcs11-helper.c | 104 debug("check %s %s %s", sshkey_type(ki->key), in lookup_key() 129 struct sshbuf *msg; in process_add() local 132 if ((msg = sshbuf_new()) == NULL) in process_add() 138 if ((r = sshbuf_put_u8(msg, in process_add() 140 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add() 147 if ((r = sshbuf_put_string(msg, blob, blen)) != 0 || in process_add() 148 (r = sshbuf_put_cstring(msg, labels[i])) != 0) in process_add() 154 } else if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0 || in process_add() 155 (r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add() 161 send_msg(msg); in process_add() [all …]
|
H A D | sftp-server.c | 551 struct sshbuf *msg; in send_status_errmsg() local 558 if ((msg = sshbuf_new()) == NULL) in send_status_errmsg() 560 if ((r = sshbuf_put_u8(msg, SSH2_FXP_STATUS)) != 0 || in send_status_errmsg() 561 (r = sshbuf_put_u32(msg, id)) != 0 || in send_status_errmsg() 562 (r = sshbuf_put_u32(msg, status)) != 0) in send_status_errmsg() 565 if ((r = sshbuf_put_cstring(msg, errmsg == NULL ? in send_status_errmsg() 567 (r = sshbuf_put_cstring(msg, "")) != 0) in send_status_errmsg() 570 send_msg(msg); in send_status_errmsg() 571 sshbuf_free(msg); in send_status_errmsg() 583 struct sshbuf *msg; in send_data_or_handle() local [all …]
|
H A D | auth.c | 517 debug("unable to get login class: %s", user); in getpwnamallow() 524 debug("Denied connection for %.200s from %.200s [%.200s].", in getpwnamallow() 531 debug("LOGIN %.200s REFUSED (TIME)", pw->pw_name); in getpwnamallow() 538 debug("Approval failure for %s", user); in getpwnamallow() 608 char *msg; in auth_debug_send() local 614 if ((r = sshbuf_get_cstring(auth_debug, &msg, NULL)) != 0) in auth_debug_send() 616 ssh_packet_send_debug(ssh, "%s", msg); in auth_debug_send() 617 free(msg); in auth_debug_send() 694 char msg[1024], buf[64]; in auth_log_authopts() local 698 snprintf(msg, sizeof(msg), "key options:%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s", in auth_log_authopts() [all …]
|
H A D | sshconnect.c | 131 debug("Executing proxy dialer command: %.500s", command_string); in ssh_proxy_fdpass_connect() 214 debug("Executing proxy command: %.500s", command_string); in ssh_proxy_connect() 465 debug("Trying again..."); in ssh_connect_direct() 493 debug("Connecting to %.200s [%.100s] port %s.", in ssh_connect_direct() 512 debug("connect to address %s port %s: %s", in ssh_connect_direct() 530 debug("Connection established."); in ssh_connect_direct() 578 const char *msg, *again = "Please type 'yes' or 'no': "; in confirm() local 585 for (msg = prompt;;msg = fingerprint ? again_fp : again) { in confirm() 586 cp = p = read_passphrase(msg, RP_ECHO); in confirm() 668 debug("using hostkeyalias: %s", *hostfile_hostname); in get_hostfile_hostname_ipaddr() [all …]
|
/freebsd/contrib/pam-krb5/tests/pam-util/ |
H A D | logging-t.c | 74 const char *msg; \ 79 msg = krb5_get_error_message(args->ctx, code); \ 80 basprintf(&expected, "%s: %s", "krb", msg); \ 86 krb5_free_error_message(args->ctx, msg); \ 114 args->debug = true; in main() 116 args->debug = false; in main() 124 args->debug = true; in main() 127 args->debug = false; in main() 135 args->debug = true; in main() 137 args->debug = false; in main()
|
/freebsd/contrib/netbsd-tests/net/mcast/ |
H A D | mcast.c | 61 #define ERRX(ev, msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 62 #define ERRX0(ev, msg) ATF_REQUIRE_MSG(0, msg) argument 64 #define SKIPX(ev, msg, ...) do { \ argument 65 atf_tc_skip(msg, __VA_ARGS__); \ 70 #define ERRX(ev, msg, ...) errx(ev, msg, __VA_ARGS__) argument 71 #define ERRX0(ev, msg) errx(ev, msg) argument 72 #define SKIPX(ev, msg, ...) errx(ev, msg, __VA_ARGS__) argument 75 static int debug; variable 180 show(const char *prefix, const struct message *msg) in show() argument 182 printf("%10.10s: %zu [%jd.%ld]\n", prefix, msg->seq, (intmax_t) in show() [all …]
|
/freebsd/contrib/netbsd-tests/lib/libpthread/ |
H A D | t_condwait.c | 48 static const int debug = 1; variable 71 if (debug) in run() 82 if (debug) { in run() 116 cond_wait(clockid_t clck, const char *msg) { in cond_wait() argument 119 if (debug) in cond_wait() 120 printf( "**** %s clock wait starting\n", msg); in cond_wait() 123 if (debug) in cond_wait() 124 printf( "**** %s clock wait ended\n", msg); in cond_wait()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-aix.c | 179 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; in sys_auth_passwd() local 205 expired = passwdexpired(name, &msg); in sys_auth_passwd() 206 if (msg && *msg) { in sys_auth_passwd() 208 msg, strlen(msg))) != 0) in sys_auth_passwd() 211 aix_remove_embedded_newlines(msg); in sys_auth_passwd() 213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 223 name, msg); in sys_auth_passwd() 224 free(msg); in sys_auth_passwd() 243 char *msg = NULL; in sys_auth_allowed_user() local 257 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); in sys_auth_allowed_user() [all …]
|
H A D | port-prngd.c | 63 u_char msg[2]; in get_random_bytes_prngd() local 116 msg[0] = 0x02; in get_random_bytes_prngd() 117 msg[1] = len; in get_random_bytes_prngd() 119 if (atomicio(vwrite, fd, msg, sizeof(msg)) != sizeof(msg)) { in get_random_bytes_prngd() 154 debug("trying egd/prngd port %d", PRNGD_PORT); in seed_from_prngd() 159 debug("trying egd/prngd socket %s", PRNGD_SOCKET); in seed_from_prngd()
|
/freebsd/contrib/netbsd-tests/lib/libc/db/ |
H A D | t_db_hash_seq.c | 69 #define DO_ERR(msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 70 #define DO_WARNX(msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 89 static int debug = 0; variable 139 if (debug > 1) { in state_del() 170 if (debug > 1) 196 if (debug > 1) { in state_put() 226 if (debug > 1) in state_iterate() 230 if (debug > 1) in state_iterate() 265 if (debug > 1) in testdb()
|
/freebsd/contrib/openbsm/bin/auditd/ |
H A D | auditd_darwin.c | 93 auditd_openlog(int debug, gid_t gid) in auditd_openlog() argument 98 if (debug) in auditd_openlog() 122 if (debug) in auditd_openlog() 239 launch_data_t msg, msd, ld, cdict, to; in lookup_machport() local 242 msg = launch_data_new_string(LAUNCH_KEY_CHECKIN); in lookup_machport() 244 cdict = launch_msg(msg); in lookup_machport() 474 mach_msg_empty_send_t msg; in auditd_relay_signal() local 476 msg.header.msgh_id = signal; in auditd_relay_signal() 477 msg.header.msgh_remote_port = signal_port; in auditd_relay_signal() 478 msg.header.msgh_local_port = MACH_PORT_NULL; in auditd_relay_signal() [all …]
|
/freebsd/lib/libpam/modules/pam_krb5/ |
H A D | pam_krb5.c | 119 int debug; in pam_sm_authenticate() local 167 debug = openpam_get_option(pamh, PAM_OPT_DEBUG) ? 1 : 0; in pam_sm_authenticate() 168 krbret = verify_krb_v5_tgt_begin(krbctx, srvdup, debug, in pam_sm_authenticate() 330 debug, in pam_sm_authenticate() 385 verify_krb_v5_tgt_cleanup(krbctx, debug, in pam_sm_authenticate() 883 verify_krb_v5_tgt_begin(krb5_context context, char *pam_service, int debug, in verify_krb_v5_tgt_begin() argument 893 if (debug) in verify_krb_v5_tgt_begin() 914 if (debug) { in verify_krb_v5_tgt_begin() 915 const char *msg = krb5_get_error_message( in verify_krb_v5_tgt_begin() local 919 "krb5_sname_to_principal()", msg); in verify_krb_v5_tgt_begin() [all …]
|
/freebsd/sbin/fsck_ffs/ |
H A D | pass5.c | 356 if (bkgrdflag != 0 || usedsoftdep || debug) in pass5() 369 if (debug) { in pass5() 401 if (debug) in pass5() 411 if (debug) in pass5() 422 if (debug) in pass5() 433 if (debug) in pass5() 445 if (debug) in pass5() 506 void (*msg)(const char *fmt, ...); in check_maps() local 509 msg = pfatal; in check_maps() 511 msg = pwarn; in check_maps() [all …]
|
/freebsd/crypto/krb5/src/lib/krb5/ccache/ |
H A D | t_cc.c | 41 int debug=0; variable 185 #define CHECK(kret,msg) \ argument 187 com_err(msg, kret, ""); \ 190 } else if(debug) printf("%s went ok\n", msg); 192 #define CHECK_STR(str,msg) \ argument 194 com_err(msg, kret, ""); \ 196 } else if(debug) printf("%s went ok\n", msg); 198 #define CHECK_BOOL(expr,errstr,msg) \ argument 200 fprintf(stderr, "%s %s\n", msg, errstr); \ 202 } else if(debug) printf("%s went ok\n", msg); [all …]
|
/freebsd/usr.sbin/bsdconfig/share/ |
H A D | common.subr | 78 # disable truncating the debug file when initializing). To get child processes 89 # d Sets $debug to 1 125 # Sensible debug function. Override in ~/.bsdconfigrc if desired. 128 # If $debug is set and non-NULL, prints DEBUG info using printf(1) syntax: 135 [ "$debug" ] || return $SUCCESS 161 d) debug=1 ;; 166 f_dprintf "f_debug_init: debug=[%s] debugFile=[%s]" \ 167 "$debug" "$debugFile" 172 [ "$debugFile" ] && { [ "${debug+set}" ] || debug=1; } 177 [ "$debug" ] && export debug [all …]
|
/freebsd/contrib/sqlite3/autosetup/ |
H A D | autosetup | 12 set autosetup(debug) [expr {"--autosetup-debug" in $argv}] 101 autosetup-debug => "display debugging output as autosetup runs" 135 incr autosetup(debug) [opt-bool autosetup-debug] 137 incr autosetup(msg-quiet) [opt-bool quiet] 138 incr autosetup(msg-timing) [opt-bool timing] 223 if {$autosetup(debug)} { 224 msg-result "Writing all defines to config.log" 989 puts $::autosetup(logfh) $msg 999 puts -nonewline $msg 1011 puts $msg [all …]
|
/freebsd/sys/netgraph/bluetooth/l2cap/ |
H A D | ng_l2cap_main.c | 120 l2cap->debug = NG_L2CAP_WARN_LEVEL; in ng_l2cap_constructor() 259 struct ng_mesg *msg = NGI_MSG(item); /* item still has message */ in ng_l2cap_lower_rcvmsg() local 262 switch (msg->header.typecookie) { in ng_l2cap_lower_rcvmsg() 264 switch (msg->header.cmd) { in ng_l2cap_lower_rcvmsg() 269 if (msg->header.arglen != sizeof(*ep)) in ng_l2cap_lower_rcvmsg() 272 ep = (ng_hci_node_up_ep *)(msg->data); in ng_l2cap_lower_rcvmsg() 299 if (msg->header.arglen != sizeof(*ep)) in ng_l2cap_lower_rcvmsg() 302 ep = (ng_hci_sync_con_queue_ep *)(msg->data); in ng_l2cap_lower_rcvmsg() 332 error = ng_l2cap_lp_con_cfm(l2cap, msg); in ng_l2cap_lower_rcvmsg() 337 error = ng_l2cap_lp_con_ind(l2cap, msg); in ng_l2cap_lower_rcvmsg() [all …]
|
/freebsd/lib/libdpv/ |
H A D | dprompt.c | 72 static char msg[PROMPT_MAX + 1]; variable 118 if (use_libdialog && !debug) { in dprompt_init() 142 if (debug) in dprompt_init() 190 if (debug) in dprompt_init() 236 if (debug) in dprompt_init() 322 if (debug) in dprompt_init() 518 if (fp->msg != NULL) in dprompt_add_files() 602 snprintf(msg, PROMPT_MAX + 1, "%s", fp->msg); in dprompt_add_files() 603 if (pbar_size < (mesg_size = strlen(msg))) { in dprompt_add_files() 605 *(msg + pbar_size) = '\0'; in dprompt_add_files() [all …]
|
/freebsd/libexec/rtld-elf/ |
H A D | debug.h | 42 extern int debug; 51 (msg(_BASENAME_RTLD ": assert failed: " __FILE__ ":" \ 53 #define msg(s) rtld_putstr(s) macro 54 #define trace() msg(_BASENAME_RTLD ": " __XSTRING(__LINE__) "\n")
|