| /freebsd/crypto/openssh/ |
| H A D | nchan.c | 95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], in chan_set_istate() 105 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], in chan_set_ostate() 113 debug2("channel %d: read failed", c->self); in chan_read_failed() 129 debug2("channel %d: ibuf empty", c->self); in chan_ibuf_empty() 151 debug2("channel %d: obuf empty", c->self); in chan_obuf_empty() 172 debug2("channel %d: rcvd eow", c->self); in chan_rcvd_eow() 186 debug2("channel %d: send eof", c->self); in chan_send_eof2() 209 debug2("channel %d: send_close2", c->self); in chan_send_close2() 219 debug2("channel %d: send close for remote id %u", c->self, in chan_send_close2() 234 debug2("channel %d: send eow", c->self); in chan_send_eow2() [all …]
|
| H A D | moduli.c | 302 debug2("start point: 0x%s", BN_bn2hex(largebase)); in gen_candidates() 379 debug2("test q = largebase+%u", 2 * j); in gen_candidates() 563 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", in prime_test() 588 debug2("%10u: comment or short line", count_in); in prime_test() 603 debug2("%10u: known composite", count_in); in prime_test() 622 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); in prime_test() 639 debug2("%10u: (%u)", count_in, in_type); in prime_test() 648 debug2("Unknown prime type"); in prime_test() 657 debug2("%10u: bit size %u mismatch", count_in, in_size); in prime_test() 661 debug2("%10u: bit size %u too short", count_in, in_size); in prime_test() [all …]
|
| H A D | auth-bsdauth.c | 63 debug2("bsdauth_query: try reuse session"); in bsdauth_query() 72 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query() 79 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
|
| H A D | channels.c | 454 debug2("channel %d: rfd %d isatty", c->self, c->rfd); in channel_register_fds() 533 debug2("channel: expanding %d", sc->channels_alloc); in channel_new() 933 debug2("channel %d: big output buffer %zu > %u", in channel_not_very_much_buffered_data() 1186 debug2("channel %d: send open", id); in channel_send_open() 1206 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); in channel_request_start() 1341 debug2("channel %d: " in channel_pre_open() 1400 debug2("Initial X11 packet contains bad byte order byte: 0x%x", in x11_open_helper() 1413 debug2("X11 connection uses different authentication protocol."); in x11_open_helper() 1420 debug2("X11 auth data does not match fake data."); in x11_open_helper() 1479 debug2("X11 rejected %d i%d/o%d", in channel_pre_x11_open() [all …]
|
| H A D | hostfile.c | 76 debug2("extract_salt: string too short"); in extract_salt() 80 debug2("extract_salt: invalid magic identifier"); in extract_salt() 86 debug2("extract_salt: missing salt termination character"); in extract_salt() 93 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 103 debug2("extract_salt: salt decode error"); in extract_salt() 107 debug2("extract_salt: expected salt len %zd, got %d", in extract_salt() 893 debug2("%s:%ld: truncated before key type", in hostkeys_foreach_file() 942 debug2("%s:%ld: truncated after key type", in hostkeys_foreach_file()
|
| H A D | sftp-client.c | 486 debug2("Remote version: %u", ret->version); in sftp_init() 541 debug2("Server supports extension \"%s\" revision %s", in sftp_init() 544 debug2("Unrecognised server extension \"%s\"", name); in sftp_init() 855 debug2("Sending SSH2_FXP_REMOVE \"%s\"", path); in sftp_rm() 870 debug2("Sending SSH2_FXP_MKDIR \"%s\"", path); in sftp_mkdir() 888 debug2("Sending SSH2_FXP_RMDIR \"%s\"", path); in sftp_rmdir() 906 debug2("Sending SSH2_FXP_STAT \"%s\"", path); in sftp_stat() 942 debug2("Sending SSH2_FXP_FSTAT \"%s\""); in sftp_fstat() 957 debug2("Sending SSH2_FXP_SETSTAT \"%s\"", path); in sftp_setstat() 976 debug2("Sending SSH2_FXP_FSETSTAT"); in sftp_fsetstat() [all …]
|
| H A D | kex.c | 198 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop() 208 debug2("first_kex_follows %d ", v); in kex_buf2prop() 209 debug2("reserved %u ", i); in kex_buf2prop() 915 debug2("proposal mismatch: my %s peer %s", in proposals_match() 920 debug2("proposals match"); in proposals_match() 941 debug2("local %s KEXINIT proposal", kex->server ? "server" : "client"); in kex_choose_conf() 944 debug2("peer %s KEXINIT proposal", kex->server ? "client" : "server"); in kex_choose_conf()
|
| H A D | auth2-chall.c | 185 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device() 231 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
|
| H A D | dispatch.c | 108 debug2("skipped packet (type %u)", type); in ssh_dispatch_run()
|
| H A D | auth2-pubkeyfile.c | 291 debug2("%s: check options: '%s'", loc, cp); in auth_check_authkey_line() 300 debug2("%s: advance: '%s'", loc, cp); in auth_check_authkey_line()
|
| H A D | sshconnect2.c | 501 debug2("service_accept: %s", reply); in input_userauth_service_accept() 504 debug2("buggy server: service_accept w/o service"); in input_userauth_service_accept() 553 debug2("we sent a %s packet, wait for reply", method->name); in userauth() 556 debug2("we did not send a packet, disable method"); in userauth() 1085 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq() 1548 debug2("no passphrase given, try next key"); in load_identity_file() 1563 debug2("bad passphrase given, try again..."); in load_identity_file() 1930 debug2("userauth_kbdint"); in userauth_kbdint() 2303 debug2("Unrecognized authentication method name: %s", name ? name : "NULL"); in authmethod_lookup()
|
| H A D | auth2-hostbased.c | 189 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed()
|
| H A D | log.h | 110 #define debug2(...) sshlog(__FILE__, __func__, __LINE__, 0, SYSLOG_LEVEL_DEBUG2, NULL, __VA_ARGS__) macro
|
| H A D | auth2.c | 345 debug2("input_userauth_request: try method %s", method); in input_userauth_request() 673 debug2("authentication methods list %d complete", i); in auth2_update_methods_lists()
|
| H A D | dh.c | 269 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh_p)); in dh_pub_is_valid()
|
| H A D | ssh.c | 1661 debug2("resolved SecurityKeyProvider %s => %s", in main() 1684 debug2("resolving \"%s\" port %d", host, options.port); in main() 1743 debug2("hostbased pubkey \"%s\" in slot %d", p, o); \ in main() 1753 debug2("hostbased cert \"%s\" in slot %d", p, o); \ in main()
|
| H A D | session.c | 1935 debug2("subsystem request for %.100s by user %s", s->subsys, in session_subsystem_req() 2063 debug2("Ignoring env request %s: too many env vars", name); in session_env_req() 2069 debug2("Setting env %d: %s=%s", s->num_env, name, val); in session_env_req() 2078 debug2("Ignoring env request %s: disallowed name", name); in session_env_req()
|
| H A D | mux.c | 1695 debug2("Unrecognised master extension \"%s\"", name); in mux_client_hello_exchange() 2160 debug2("Exiting on signal: %s", strsignal(muxclient_terminate)); in mux_client_request_session() 2163 debug2("Control master terminated unexpectedly"); in mux_client_request_session() 2166 debug2("Received exit status from master %d", exitval); in mux_client_request_session()
|
| H A D | misc.c | 166 debug2("fd %d setting O_NONBLOCK", fd); in set_nonblock() 221 debug2("fd %d is TCP_NODELAY", fd); in set_nodelay() 225 debug2("fd %d setting TCP_NODELAY", fd); in set_nodelay()
|
| H A D | servconf.c | 2293 debug2("%s line %d: ignoring duplicate env " in process_server_config_line_depth() 2378 debug2("%s line %d: new include %s", in process_server_config_line_depth() 2389 debug2("%s line %d: no match for %s", in process_server_config_line_depth() 2399 debug2("%s line %d: including %s", in process_server_config_line_depth()
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | getrrsetbyname-ldns.c | 147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname() 155 debug2("ldns: trying to validate RRset"); in getrrsetbyname() 161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", in getrrsetbyname() 167 debug2("ldns: RRset is signed with a valid key"); in getrrsetbyname() 169 debug2("ldns: RRset validation failed: %s", in getrrsetbyname()
|
| H A D | port-solaris.c | 83 debug2("%s: setting up process contract template on fd %d", in solaris_contract_pre_fork() 126 debug2("%s: clearing process contract template on fd %d", in solaris_contract_post_fork_child() 145 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); in solaris_contract_post_fork_parent() 169 debug2("%s: abandoning contract id %ld", __func__, ctid); in solaris_contract_post_fork_parent()
|
| /freebsd/sys/contrib/device-tree/src/arm/ti/keystone/ |
| H A D | keystone-k2hk-evm.dts | 42 label = "keystone:blue:debug2";
|
| /freebsd/crypto/openssh/regress/misc/ssh-verify-attestation/ |
| H A D | ssh-verify-attestation.c | 380 debug2("key %s: %s %s", argv[2], sshkey_type(k), fp); in main()
|
| /freebsd/sys/contrib/device-tree/src/arm64/qcom/ |
| H A D | apq8016-schneider-hmibsc.dts | 512 &debug2 { status = "okay"; };
|