/titanic_41/usr/src/cmd/ssh/sshd/ |
H A D | auth2-pam.c | 92 debug2("Calling pam_authenticate()"); in do_pam_kbdint() 100 debug2("kbd-int: pam_authenticate() succeeded"); in do_pam_kbdint() 132 debug2("kbd-int: changing expired password"); in do_pam_kbdint() 173 debug2("kbd-int: success (pam->state == %x)", authctxt->pam->state); in do_pam_kbdint() 245 debug2("PAM echo on prompt: %s", in do_pam_conv_kbd_int() 250 debug2("PAM echo off prompt: %s", in do_pam_conv_kbd_int() 255 debug2("PAM text info prompt: %s", in do_pam_conv_kbd_int() 260 debug2("PAM error prompt: %s", in do_pam_conv_kbd_int() 318 debug2("Nesting dispatch_run loop"); in do_pam_conv_kbd_int() 320 debug2("Nested dispatch_run loop exited"); in do_pam_conv_kbd_int()
|
H A D | altprivsep.c | 262 debug2("Monitor pid %ld, unprivileged child pid %ld", in altprivsep_start_monitor() 282 debug2("Monitor started"); in altprivsep_start_monitor() 288 debug2("Monitor startup failure: could not fork unprivileged" in altprivsep_start_monitor() 300 debug2("Waiting for monitor"); in altprivsep_start_monitor() 302 debug2("Monitor signalled readiness"); in altprivsep_start_monitor() 331 debug2("Forwarding re-key packet (%d) to monitor", type); in altprivsep_rekey() 341 debug2("received SSH2_MSG_NEWKEYS packet - " in altprivsep_rekey() 361 debug2("reading from pipe to monitor (%d)", pipe_fd); in altprivsep_process_input() 374 debug2("Read packet type %d from pipe to monitor", (u_int)type); in altprivsep_process_input() 381 debug2("forwarding SSH2_MSG_NEWKEYS packet we got from monitor to " in altprivsep_process_input() [all …]
|
H A D | auth-bsdauth.c | 48 debug2("bsdauth_query: try reuse session"); in bsdauth_query() 57 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query() 64 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
|
H A D | auth2-hostbased.c | 149 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased() 172 debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s", in hostbased_key_allowed() 184 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed() 195 debug2("userauth_hostbased: access allowed by auth_rhosts2"); in hostbased_key_allowed()
|
H A D | auth2-pubkey.c | 73 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); in userauth_pubkey() 206 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() 275 debug2("user_key_allowed: check options: '%s'", cp); in user_key_allowed2() 287 debug2("user_key_allowed: advance: '%s'", cp); in user_key_allowed2() 308 debug2("key not found"); in user_key_allowed2()
|
H A D | gss-serv.c | 173 debug2("Zero length GSS context error token output"); in ssh_gssapi_accept_ctx() 368 debug2("__GSS_userok() failed"); in ssh_gssapi_userok() 479 debug2("Mapping initiator GSS-API principal to local username"); in ssh_gssapi_localname() 499 debug2("Mapped the initiator to: %s", pw->pw_name); in ssh_gssapi_localname()
|
H A D | sshd.c | 380 debug2("Error while trying to set up active contract" in contracts_pre_fork() 393 debug2("Error while trying to clear active contract template" in contracts_post_fork_child() 416 debug2("Error while clearing active contract template: %s", in contracts_post_fork_parent() 425 debug2("Error while getting latest contract: %s", in contracts_post_fork_parent() 431 debug2("Error while getting latest contract ID: %s", in contracts_post_fork_parent() 444 debug2("Error while opening the latest contract ctl file: %s", in contracts_post_fork_parent() 450 debug2("Error while opening the latest contract ctl file: %s", in contracts_post_fork_parent() 456 debug2("Error while abandoning latest contract: %s", in contracts_post_fork_parent() 1521 debug2("setsockopt SO_KEEPALIVE: %.100s", strerror(errno)); in main() 1645 debug2("Unprivileged server process dropping privileges"); in main()
|
H A D | auth2-gss.c | 89 debug2("MIC verification failed, GSSAPI userauth failed"); in userauth_gssapi_keyex() 167 debug2("No mechanism offered by the client is available"); in userauth_gssapi() 322 debug2("MIC verification failed, GSSAPI userauth failed"); in input_gssapi_mic()
|
H A D | auth2.c | 199 debug2("input_userauth_request: setting up authctxt for %s", user); in input_userauth_request() 234 debug2("input_userauth_request: try method %s", method); in input_userauth_request() 671 debug2("Unrecognized authentication method name: %s", in authmethod_lookup()
|
H A D | auth2-chall.c | 146 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device() 204 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
|
H A D | auth-pam.c | 170 debug2("Starting PAM service %s for method %s", svc, in new_start_pam() 313 debug2("PAM set PAM_USER to unknown user"); in finish_userauth_do_pam()
|
H A D | auth-rhosts.c | 174 debug2("auth_rhosts2: clientuser %s hostname %s ipaddr %s", in auth_rhosts2_raw()
|
H A D | session.c | 304 debug2("compression disabled"); in do_authenticated1() 322 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag); in do_authenticated1() 326 debug2("Buggy client: " in do_authenticated1() 1981 debug2("Received request for environment variable %s=%s", var, val); in session_env_req() 1985 debug2("Rejecting request for environment variable %s", var); in session_env_req() 2562 debug2("session_do_pam_conv: text info " in session_do_pam_conv() 2574 debug2("session_do_pam_conv: error " in session_do_pam_conv()
|
/titanic_41/usr/src/cmd/ssh/libssh/common/ |
H A D | hostfile.c | 72 debug2("extract_salt: string too short"); in extract_salt() 76 debug2("extract_salt: invalid magic identifier"); in extract_salt() 82 debug2("extract_salt: missing salt termination character"); in extract_salt() 89 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 99 debug2("extract_salt: salt decode error"); in extract_salt() 103 debug2("extract_salt: expected salt len %d, got %d", in extract_salt()
|
H A D | kex.c | 103 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop() 109 debug2("kex_parse_kexinit: first_kex_follows %d ", i); in kex_buf2prop() 111 debug2("kex_parse_kexinit: reserved %d ", i); in kex_buf2prop() 452 debug2("proposal mismatch: my %s peer %s", in proposals_match() 457 debug2("proposals match"); in proposals_match() 525 debug2("skipping next packet (type %u)", type); in kex_choose_conf() 674 debug2("kex_derive_keys"); in kex_derive_keys()
|
H A D | channels.c | 242 debug2("channel: expanding %d", channels_alloc); in channel_new() 735 debug2("channel %d: obuf_empty delayed efd %d/(%d)", in channel_pre_open() 907 debug2("channel %d: decode socks4", c->self); in channel_decode_socks4() 935 debug2("channel %d: decode socks4: user %s/%d", c->self, p, len); in channel_decode_socks4() 988 debug2("channel %d: decode socks5", c->self); in channel_decode_socks5() 1019 debug2("channel %d: socks5 auth done", c->self); in channel_decode_socks5() 1022 debug2("channel %d: socks5 post auth", c->self); in channel_decode_socks5() 1068 debug2("channel %d: dynamic request: socks5 host %s port %u command %u", in channel_decode_socks5() 1093 debug2("channel %d: pre_dynamic: have %d", c->self, have); in channel_pre_dynamic() 1119 debug2("channel %d: pre_dynamic: need more", c->self); in channel_pre_dynamic() [all …]
|
H A D | mac.c | 83 debug2("mac_setup: found %s", name); in mac_setup() 87 debug2("mac_setup: unknown %s", name); in mac_setup()
|
H A D | compat.c | 254 debug2("Original cipher proposal: %s", cipher_prop); in compat_cipher_proposal() 255 debug2("Compat cipher proposal: %s", fix_ciphers); in compat_cipher_proposal()
|
H A D | nchan.c | 305 debug2("channel %d: rcvd eow", c->self); in chan_rcvd_eow() 376 debug2("channel %d: send eow", c->self); in chan_send_eow2() 443 debug2("channel %d: active efd: %d len %d", in chan_is_dead()
|
H A D | misc.c | 64 debug2("fd %d is O_NONBLOCK", fd); in set_nonblock() 85 debug2("fd %d is not O_NONBLOCK", fd); in unset_nonblock() 108 debug2("fd %d is TCP_NODELAY", fd); in set_nodelay()
|
H A D | g11n.c | 938 debug2("Server is expected to use UTF-8 locale"); in g11n_test_langtag() 944 debug2("Enforcing no code conversion: %s", lang); in g11n_test_langtag()
|
/titanic_41/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect2.c | 330 debug2("service_accept: %s", reply); in ssh_userauth2() 333 debug2("buggy server: service_accept w/o service"); in ssh_userauth2() 391 debug2("we sent a %s packet, wait for reply", method->name); in userauth() 394 debug2("we did not send a packet, disable method"); in userauth() 483 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); in input_userauth_pk_ok() 519 debug2("input_userauth_pk_ok: fp %s", fp); in input_userauth_pk_ok() 852 debug2("Authenticating with GSS-API context from key exchange (w/ MIC)"); in userauth_gssapi_keyex() 888 debug2("Authentication with deprecated \"external-keyx\"" in userauth_gssapi_keyex() 970 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq() 1193 debug2("no passphrase given, try next key"); in load_identity_file() [all …]
|
H A D | clientloop.c | 250 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto() 268 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto() 437 debug2("client_check_window_change: changed"); in client_check_window_change() 1411 debug2("buggy server: x11 request w/o originator_port"); in client_request_x11()
|
/titanic_41/usr/src/cmd/ssh/include/ |
H A D | log.h | 77 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
|
/titanic_41/usr/src/cmd/ssh/ssh-keysign/ |
H A D | ssh-keysign.c | 119 debug2("valid_request: check expect chost %s got %s", host, p); in valid_request()
|