Home
last modified time | relevance | path

Searched refs:debug2 (Results 1 – 25 of 39) sorted by relevance

12

/titanic_44/usr/src/cmd/ssh/sshd/
H A Dauth2-pam.c92 debug2("Calling pam_authenticate()"); in do_pam_kbdint()
100 debug2("kbd-int: pam_authenticate() succeeded"); in do_pam_kbdint()
132 debug2("kbd-int: changing expired password"); in do_pam_kbdint()
173 debug2("kbd-int: success (pam->state == %x)", authctxt->pam->state); in do_pam_kbdint()
245 debug2("PAM echo on prompt: %s", in do_pam_conv_kbd_int()
250 debug2("PAM echo off prompt: %s", in do_pam_conv_kbd_int()
255 debug2("PAM text info prompt: %s", in do_pam_conv_kbd_int()
260 debug2("PAM error prompt: %s", in do_pam_conv_kbd_int()
318 debug2("Nesting dispatch_run loop"); in do_pam_conv_kbd_int()
320 debug2("Nested dispatch_run loop exited"); in do_pam_conv_kbd_int()
H A Daltprivsep.c262 debug2("Monitor pid %ld, unprivileged child pid %ld", in altprivsep_start_monitor()
282 debug2("Monitor started"); in altprivsep_start_monitor()
288 debug2("Monitor startup failure: could not fork unprivileged" in altprivsep_start_monitor()
300 debug2("Waiting for monitor"); in altprivsep_start_monitor()
302 debug2("Monitor signalled readiness"); in altprivsep_start_monitor()
331 debug2("Forwarding re-key packet (%d) to monitor", type); in altprivsep_rekey()
341 debug2("received SSH2_MSG_NEWKEYS packet - " in altprivsep_rekey()
361 debug2("reading from pipe to monitor (%d)", pipe_fd); in altprivsep_process_input()
374 debug2("Read packet type %d from pipe to monitor", (u_int)type); in altprivsep_process_input()
381 debug2("forwarding SSH2_MSG_NEWKEYS packet we got from monitor to " in altprivsep_process_input()
[all …]
H A Dauth-bsdauth.c48 debug2("bsdauth_query: try reuse session"); in bsdauth_query()
57 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query()
64 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
H A Dauth2-hostbased.c149 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased()
172 debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s", in hostbased_key_allowed()
184 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed()
195 debug2("userauth_hostbased: access allowed by auth_rhosts2"); in hostbased_key_allowed()
H A Dauth2-pubkey.c73 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); in userauth_pubkey()
206 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey()
275 debug2("user_key_allowed: check options: '%s'", cp); in user_key_allowed2()
287 debug2("user_key_allowed: advance: '%s'", cp); in user_key_allowed2()
308 debug2("key not found"); in user_key_allowed2()
H A Dgss-serv.c173 debug2("Zero length GSS context error token output"); in ssh_gssapi_accept_ctx()
368 debug2("__GSS_userok() failed"); in ssh_gssapi_userok()
479 debug2("Mapping initiator GSS-API principal to local username"); in ssh_gssapi_localname()
499 debug2("Mapped the initiator to: %s", pw->pw_name); in ssh_gssapi_localname()
H A Dsshd.c380 debug2("Error while trying to set up active contract" in contracts_pre_fork()
393 debug2("Error while trying to clear active contract template" in contracts_post_fork_child()
416 debug2("Error while clearing active contract template: %s", in contracts_post_fork_parent()
425 debug2("Error while getting latest contract: %s", in contracts_post_fork_parent()
431 debug2("Error while getting latest contract ID: %s", in contracts_post_fork_parent()
444 debug2("Error while opening the latest contract ctl file: %s", in contracts_post_fork_parent()
450 debug2("Error while opening the latest contract ctl file: %s", in contracts_post_fork_parent()
456 debug2("Error while abandoning latest contract: %s", in contracts_post_fork_parent()
1521 debug2("setsockopt SO_KEEPALIVE: %.100s", strerror(errno)); in main()
1645 debug2("Unprivileged server process dropping privileges"); in main()
H A Dauth2-gss.c89 debug2("MIC verification failed, GSSAPI userauth failed"); in userauth_gssapi_keyex()
167 debug2("No mechanism offered by the client is available"); in userauth_gssapi()
322 debug2("MIC verification failed, GSSAPI userauth failed"); in input_gssapi_mic()
H A Dauth2.c199 debug2("input_userauth_request: setting up authctxt for %s", user); in input_userauth_request()
234 debug2("input_userauth_request: try method %s", method); in input_userauth_request()
671 debug2("Unrecognized authentication method name: %s", in authmethod_lookup()
H A Dauth2-chall.c146 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device()
204 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
H A Dauth-pam.c170 debug2("Starting PAM service %s for method %s", svc, in new_start_pam()
313 debug2("PAM set PAM_USER to unknown user"); in finish_userauth_do_pam()
H A Dauth-rhosts.c174 debug2("auth_rhosts2: clientuser %s hostname %s ipaddr %s", in auth_rhosts2_raw()
H A Dsession.c304 debug2("compression disabled"); in do_authenticated1()
322 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag); in do_authenticated1()
326 debug2("Buggy client: " in do_authenticated1()
1981 debug2("Received request for environment variable %s=%s", var, val); in session_env_req()
1985 debug2("Rejecting request for environment variable %s", var); in session_env_req()
2562 debug2("session_do_pam_conv: text info " in session_do_pam_conv()
2574 debug2("session_do_pam_conv: error " in session_do_pam_conv()
/titanic_44/usr/src/cmd/ssh/libssh/common/
H A Dhostfile.c72 debug2("extract_salt: string too short"); in extract_salt()
76 debug2("extract_salt: invalid magic identifier"); in extract_salt()
82 debug2("extract_salt: missing salt termination character"); in extract_salt()
89 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt()
99 debug2("extract_salt: salt decode error"); in extract_salt()
103 debug2("extract_salt: expected salt len %d, got %d", in extract_salt()
H A Dkex.c103 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop()
109 debug2("kex_parse_kexinit: first_kex_follows %d ", i); in kex_buf2prop()
111 debug2("kex_parse_kexinit: reserved %d ", i); in kex_buf2prop()
452 debug2("proposal mismatch: my %s peer %s", in proposals_match()
457 debug2("proposals match"); in proposals_match()
525 debug2("skipping next packet (type %u)", type); in kex_choose_conf()
674 debug2("kex_derive_keys"); in kex_derive_keys()
H A Dchannels.c242 debug2("channel: expanding %d", channels_alloc); in channel_new()
735 debug2("channel %d: obuf_empty delayed efd %d/(%d)", in channel_pre_open()
907 debug2("channel %d: decode socks4", c->self); in channel_decode_socks4()
935 debug2("channel %d: decode socks4: user %s/%d", c->self, p, len); in channel_decode_socks4()
988 debug2("channel %d: decode socks5", c->self); in channel_decode_socks5()
1019 debug2("channel %d: socks5 auth done", c->self); in channel_decode_socks5()
1022 debug2("channel %d: socks5 post auth", c->self); in channel_decode_socks5()
1068 debug2("channel %d: dynamic request: socks5 host %s port %u command %u", in channel_decode_socks5()
1093 debug2("channel %d: pre_dynamic: have %d", c->self, have); in channel_pre_dynamic()
1119 debug2("channel %d: pre_dynamic: need more", c->self); in channel_pre_dynamic()
[all …]
H A Dmac.c83 debug2("mac_setup: found %s", name); in mac_setup()
87 debug2("mac_setup: unknown %s", name); in mac_setup()
H A Dcompat.c254 debug2("Original cipher proposal: %s", cipher_prop); in compat_cipher_proposal()
255 debug2("Compat cipher proposal: %s", fix_ciphers); in compat_cipher_proposal()
H A Dnchan.c305 debug2("channel %d: rcvd eow", c->self); in chan_rcvd_eow()
376 debug2("channel %d: send eow", c->self); in chan_send_eow2()
443 debug2("channel %d: active efd: %d len %d", in chan_is_dead()
H A Dmisc.c64 debug2("fd %d is O_NONBLOCK", fd); in set_nonblock()
85 debug2("fd %d is not O_NONBLOCK", fd); in unset_nonblock()
108 debug2("fd %d is TCP_NODELAY", fd); in set_nodelay()
H A Dg11n.c938 debug2("Server is expected to use UTF-8 locale"); in g11n_test_langtag()
944 debug2("Enforcing no code conversion: %s", lang); in g11n_test_langtag()
/titanic_44/usr/src/cmd/ssh/ssh/
H A Dsshconnect2.c330 debug2("service_accept: %s", reply); in ssh_userauth2()
333 debug2("buggy server: service_accept w/o service"); in ssh_userauth2()
391 debug2("we sent a %s packet, wait for reply", method->name); in userauth()
394 debug2("we did not send a packet, disable method"); in userauth()
483 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); in input_userauth_pk_ok()
519 debug2("input_userauth_pk_ok: fp %s", fp); in input_userauth_pk_ok()
852 debug2("Authenticating with GSS-API context from key exchange (w/ MIC)"); in userauth_gssapi_keyex()
888 debug2("Authentication with deprecated \"external-keyx\"" in userauth_gssapi_keyex()
970 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq()
1193 debug2("no passphrase given, try next key"); in load_identity_file()
[all …]
H A Dclientloop.c250 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto()
268 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto()
437 debug2("client_check_window_change: changed"); in client_check_window_change()
1411 debug2("buggy server: x11 request w/o originator_port"); in client_request_x11()
/titanic_44/usr/src/cmd/ssh/include/
H A Dlog.h77 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
/titanic_44/usr/src/cmd/ssh/ssh-keysign/
H A Dssh-keysign.c119 debug2("valid_request: check expect chost %s got %s", host, p); in valid_request()

12