| /freebsd/crypto/openssh/ |
| H A D | ed25519-openssl.c | 54 debug3_f("EVP_PKEY_CTX_new_id failed"); in crypto_sign_ed25519_keypair() 58 debug3_f("EVP_PKEY_keygen_init failed"); in crypto_sign_ed25519_keypair() 62 debug3_f("EVP_PKEY_keygen failed"); in crypto_sign_ed25519_keypair() 69 debug3_f("EVP_PKEY_get_raw_public_key failed"); in crypto_sign_ed25519_keypair() 73 debug3_f("public key length mismatch: %zu", pklen); in crypto_sign_ed25519_keypair() 80 debug3_f("EVP_PKEY_get_raw_private_key failed"); in crypto_sign_ed25519_keypair() 84 debug3_f("private key length mismatch: %zu", sklen); in crypto_sign_ed25519_keypair() 111 debug3_f("EVP_PKEY_new_raw_private_key failed"); in crypto_sign_ed25519() 117 debug3_f("EVP_MD_CTX_new failed"); in crypto_sign_ed25519() 121 debug3_f("EVP_DigestSignInit failed"); in crypto_sign_ed25519() [all …]
|
| H A D | monitor_wrap.c | 156 debug3_f("entering, type %d", type); in mm_request_send() 165 debug3_f("monitor fd closed"); in mm_request_send() 180 debug3_f("entering"); in mm_request_receive() 184 debug3_f("monitor fd closed"); in mm_request_receive() 211 debug3_f("entering, type %d", type); in mm_request_receive_expect() 238 debug3_f("waiting for MONITOR_ANS_MODULI"); in mm_choose_dh() 250 debug3_f("remaining %zu", sshbuf_len(m)); in mm_choose_dh() 263 debug3_f("entering"); in mm_sshkey_setcompat() 280 debug3_f("entering"); in mm_sshkey_sign() 291 debug3_f("waiting for MONITOR_ANS_SIGN"); in mm_sshkey_sign() [all …]
|
| H A D | ssh-pkcs11-client.c | 114 debug3_f("added %s key for provider %s, now has %zu keys", in helper_add_key() 129 debug3_f("terminating helper for %s; remaining %zu keys", in helper_terminate() 221 debug3_f("terminating %zu helpers", nhelpers); in pkcs11_terminate() 299 debug3_f("private key type %s cert type %s on provider %s", in pkcs11_make_cert() 320 debug3_f("provider %s: %zu remaining keys", in pkcs11_make_cert() 338 debug3_f("start helper for %s", path); in pkcs11_start_helper() 374 debug3_f("helper %zu for \"%s\" on fd %d pid %ld", nhelpers, in pkcs11_start_helper() 397 debug3_f("add %s", helper->path); in pkcs11_add_provider() 409 debug3_f("response %d", type); in pkcs11_add_provider() 413 debug3_f("helper return %u keys", nkeys); in pkcs11_add_provider() [all …]
|
| H A D | monitor.c | 313 debug3_f("method %s: partial", auth_method); in monitor_child_preauth() 397 debug3_f("preauth child %ld terminated successfully", in monitor_child_preauth() 543 debug3_f("checking request %d", type); in monitor_read() 672 debug3_f("done"); in mm_answer_state() 691 debug3_f("got parameters: %d %d %d", min, want, max); in mm_answer_moduli() 722 debug3_f("entering"); in mm_answer_setcompat() 744 debug3_f("entering"); in mm_answer_sign() 815 debug3_f("%s %s signature len=%zu", alg, in mm_answer_sign() 875 debug3_f("entering"); in mm_answer_pwnamallow() 954 debug3_f("sending MONITOR_ANS_PWNAM: %d", allowed); in mm_answer_pwnamallow() [all …]
|
| H A D | platform.c | 187 debug3_f("password matches locked string '%s'", in platform_locked_account() 195 debug3_f("password matches locked prefix '%s'", in platform_locked_account() 202 debug3_f("password matches locked substring '%s'", in platform_locked_account()
|
| H A D | sandbox-darwin.c | 52 debug3_f("preparing Darwin sandbox"); in ssh_sandbox_init() 63 debug3_f("starting Darwin sandbox"); in ssh_sandbox_child()
|
| H A D | auth2.c | 241 debug3_f("user specific delay %0.3lfms", delay*1000); in user_specific_delay() 252 debug3_f("elapsed %0.3lfms exceeded the max delay " in ensure_minimum_time_since() 263 debug3_f("elapsed %0.3lfms, delaying %0.3lfms (requested %0.3lfms)", in ensure_minimum_time_since() 454 debug3_f("failure partial=%d next methods=\"%s\"", in userauth_finish() 545 debug3_f("method %s not enabled", name); in authmethod_lookup() 549 debug3_f("method %s not allowed " in authmethod_lookup() 578 debug3_f("checking methods"); in auth2_setup_methods_lists() 666 debug3_f("updating methods list after \"%s\"", method); in auth2_update_methods_lists() 756 debug3_f("key already used: %s %s", in auth2_key_already_used()
|
| H A D | mux.c | 186 debug3_f("entering for channel %d", cid); in mux_master_session_cleanup_cb() 207 debug3_f("entering for channel %d", cid); in mux_master_control_cleanup_cb() 412 debug3_f("got fds stdin %d, stdout %d, stderr %d", in mux_master_process_new_session() 1038 debug3_f("got fds stdin %d, stdout %d", new_fd[0], new_fd[1]); in mux_master_process_stdio_fwd() 1110 debug3_f("sending failure reply"); in mux_stdio_confirm() 1117 debug3_f("sending success reply"); in mux_stdio_confirm() 1222 debug3_f("channel %d: hello sent", c->self); in mux_master_read_cb() 1236 debug3_f("channel %d packet type 0x%08x len %zu", c->self, in mux_master_read_cb() 1280 debug3_f("channel %d: exit message, exitval %d", c->self, exitval); in mux_exit_message() 1303 debug3_f("channel %d: TTY alloc failed", c->self); in mux_tty_alloc_failed() [all …]
|
| H A D | sftp-usergroup.c | 117 debug3_f("uid %u not resolved", uids[i]); in lookup_and_record() 120 debug3_f("record uid %u => \"%s\"", uids[i], usernames[i]); in lookup_and_record() 125 debug3_f("gid %u not resolved", gids[i]); in lookup_and_record() 128 debug3_f("record gid %u => \"%s\"", gids[i], groupnames[i]); in lookup_and_record()
|
| H A D | msg.c | 47 debug3_f("type %u len %zu", (unsigned int)type & 0xff, sshbuf_len(m)); in ssh_msg_send() 59 debug3_f("done"); in ssh_msg_send()
|
| H A D | auth-rhosts.c | 229 debug3_f("no hosts access files exist"); in auth_rhosts2() 238 debug3_f("root user, ignoring system hosts files"); in auth_rhosts2() 284 debug3_f("stat %s: %s", path, strerror(errno)); in auth_rhosts2()
|
| H A D | auth-pam.c | 287 debug3_f("reqd=%d", reqd); in sshpam_password_change_required() 316 debug3_f("entering"); in import_environments() 382 debug3_f("PAM: entering, %d messages", n); in sshpam_thread_conv() 615 debug3_f("entering"); in sshpam_thread_cleanup() 630 debug3_f("PAM: entering, %d messages", n); in sshpam_null_conv() 643 debug3_f("PAM: called with %d messages", n); in sshpam_store_conv() 814 debug3_f("entering"); in sshpam_init_ctx() 863 debug3_f("entering"); in sshpam_query() 1011 debug3_f("entering"); in sshpam_free_ctx() 1205 debug3_f("PAM: called with %d messages", n); in sshpam_passwd_conv()
|
| H A D | ssh_api.c | 488 debug3_f("need %d", type); in _ssh_host_public_key() 490 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_public_key() 503 debug3_f("need %d", type); in _ssh_host_private_key() 505 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_private_key() 518 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key() 520 debug3_f("check %s", sshkey_type(k->key)); in _ssh_verify_host_key()
|
| H A D | srclimit.c | 78 debug3_f("%s: invalid mask %d bits", __func__, bits); in srclimit_mask_addr() 157 debug3_f("addr ntop failed"); in srclimit_check_allow() 164 debug3_f("no free slot"); in srclimit_check_allow() 325 debug3_f("%s overflow, remove %s", t, s); in srclimit_early_expire_penalties_from_tree() 365 debug3_f("address %s is exempt", addrnetmask); in srclimit_penalise()
|
| H A D | clientloop.c | 616 debug3_f("stopping: %s (%llu chaff packets sent)", in obfuscate_keystroke_timing() 631 debug3_f("starting: interval ~%dms", in obfuscate_keystroke_timing() 850 debug3_f("channel %d: mux request: %s", c->self, in client_status_confirm() 934 debug3_f("enter"); in client_repledge() 2129 debug3_f("found %s key under different " in hostkeys_find() 2141 debug3_f("hostkeys file %s:%ld has CA/revocation marker", in hostkeys_find() 2152 debug3_f("found address %s against different hostname " in hostkeys_find() 2158 debug3_f("found hostname %s against different address " in hostkeys_find() 2168 debug3_f("hostkeys file %s:%ld complex host specification", in hostkeys_find() 2178 debug3_f("found %s key at %s:%ld", in hostkeys_find() [all …]
|
| H A D | monitor_fdpass.c | 83 debug3_f("sendmsg(%d): %s", fd, strerror(errno)); in mm_send_fd() 138 debug3_f("recvmsg: %s", strerror(errno)); in mm_receive_fd()
|
| H A D | misc-agent.c | 147 debug3_f("listening on unix socket \"%s\" as fd=%d", in unix_listener_tmp() 333 debug3_f("Ignoring recent socket \"%s/%s\"", in agent_cleanup_stale() 339 debug3_f("Ignoring socket \"%s/%s\" " in agent_cleanup_stale()
|
| H A D | sandbox-seccomp-filter.c | 495 debug3_f("preparing seccomp filter sandbox"); in ssh_sandbox_init() 522 debug3_f("installing SIGSYS handler"); in ssh_sandbox_child_debugging() 563 debug3_f("setting PR_SET_NO_NEW_PRIVS"); in ssh_sandbox_child() 569 debug3_f("attaching seccomp filter program"); in ssh_sandbox_child()
|
| H A D | sandbox-rlimit.c | 52 debug3_f("preparing rlimit sandbox"); in ssh_sandbox_init()
|
| H A D | ssh-pkcs11-helper.c | 76 debug3_f("add %s", providername); in process_add() 87 debug3_f("%s: %s \"%s\"", providername, in process_add()
|
| H A D | readpass.c | 259 debug3_f("cannot notify: no askpass"); in notify_start() 265 debug3_f("cannot notify: no display"); in notify_start()
|
| H A D | sandbox-capsicum.c | 57 debug3_f("preparing capsicum sandbox"); in ssh_sandbox_init()
|
| H A D | auth-shadow.c | 101 debug3_f("today %lld sp_lstchg %lld sp_max %lld", (long long)today, in auth_shadow_pwexpired()
|
| H A D | sshd-auth.c | 224 debug3_f("%s key not permitted by HostkeyAlgorithms", s); in append_hostkey_type() 421 debug3_f("begin"); in recv_privsep_state() 429 debug3_f("done"); in recv_privsep_state()
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | bsd-pselect.c | 82 debug3_f("pipe0 %d pipe1 %d", notify_pipe[0], notify_pipe[1]); in pselect_notify_setup() 155 debug3_f("installed signal handler for" in pselect() 189 debug3_f("restored signal handler for " in pselect()
|