Searched refs:debug2 (Results 1 - 25 of 40) sorted by relevance

12

/freebsd-10.0-release/crypto/openssh/
H A Dnchan.c95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate],
104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate],
116 debug2("channel %d: rcvd oclose", c->self);
140 debug2("channel %d: read failed", c->self);
155 debug2("channel %d: ibuf empty", c->self);
181 debug2("channel %d: rcvd ieof", c->self);
198 debug2("channel %d: write failed", c->self);
219 debug2("channel %d: obuf empty", c->self);
241 debug2("channel %d: send ieof", c->self);
258 debug2("channe
[all...]
H A Dauth-bsdauth.c58 debug2("bsdauth_query: try reuse session");
67 debug2("bsdauth_query: new bsd auth session");
74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
H A Dauth2-hostbased.c68 debug2("userauth_hostbased: disabled because of invalid user");
132 debug2("userauth_hostbased: authenticated %d", authenticated);
159 debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s",
163 debug2("stripping trailing dot from chost %s", chost);
180 debug2("userauth_hostbased: access allowed by auth_rhosts2");
H A Dmoduli.c342 debug2("start point: 0x%s", BN_bn2hex(largebase));
419 debug2("test q = largebase+%u", 2 * j);
524 debug2("%.24s Final %u Miller-Rabin trials (%x generator)",
535 debug2("process line %lu to line %lu", last_processed, end_lineno);
550 debug2("%10u: comment or short line", count_in);
565 debug2("%10u: known composite", count_in);
584 debug2("%10u: (%u) Sophie-Germain", count_in, in_type);
601 debug2("%10u: (%u)", count_in, in_type);
610 debug2("Unknown prime type");
619 debug2("
[all...]
H A Dlog.h69 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
H A Dchannels.c256 debug2("channel %d: rfd %d isatty", c->self, c->rfd);
308 debug2("channel: expanding %d", channels_alloc);
507 debug2("channel %d: big input buffer %d",
513 debug2("channel %d: big output buffer %u > %u",
679 debug2("channel %d: send open", id);
697 debug2("channel %d: request %s confirm %d", id, service, wantconfirm);
853 debug2("tcpwinsz: %d for connection: %d", tcpwinsz, sd);
880 debug2("channel %d: obuf_empty delayed efd %d/(%d)",
910 debug2("channel %d: closing after input drain.", c->self);
952 debug2("Initia
[all...]
H A Dmux.c224 debug2("%s: channel %d: not open", __func__, sc->self);
282 debug2("%s: channel %d slave version %u", __func__, c->self, ver);
294 debug2("Unrecognised slave extension \"%s\"", name);
359 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, "
397 debug2("%s: session already open", __func__);
420 debug2("%s: session refused by user", __func__);
462 debug2("%s: channel_new: %d linked to control channel %d",
477 debug2("%s: channel %d: alive check", __func__, c->self);
490 debug2("%s: channel %d: terminate request", __func__, c->self);
496 debug2("
[all...]
H A Dhostfile.c74 debug2("extract_salt: string too short");
78 debug2("extract_salt: invalid magic identifier");
84 debug2("extract_salt: missing salt termination character");
91 debug2("extract_salt: bad encoded salt length %u", b64len);
101 debug2("extract_salt: salt decode error");
105 debug2("extract_salt: expected salt len %d, got %d",
H A Dcompat.c245 debug2("Original cipher proposal: %s", cipher_prop);
246 debug2("Compat cipher proposal: %s", fix_ciphers);
H A Dauth2-pubkey.c85 debug2("userauth_pubkey: disabled because of invalid user");
90 debug2("userauth_pubkey: SSH_BUG_PKAUTH");
184 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg);
337 debug2("user_key_allowed: check options: '%s'", cp);
349 debug2("user_key_allowed: advance: '%s'", cp);
413 debug2("key not found");
433 debug2("%s: CA %s %s is not listed in %s", __func__,
H A Dkex.c181 debug2("kex_parse_kexinit: %s", proposal[i]);
187 debug2("kex_parse_kexinit: first_kex_follows %d ", i);
189 debug2("kex_parse_kexinit: reserved %u ", i);
441 debug2("proposal mismatch: my %s peer %s",
446 debug2("proposals match");
542 debug2("skipping next packet (type %u)", type);
611 debug2("kex_derive_keys");
H A Dauth2.c253 debug2("input_userauth_request: setting up authctxt for %s", user);
319 debug2("input_userauth_request: try method %s", method);
484 debug2("Unrecognized authentication method name: %s",
645 debug2("authentication methods list %d complete", i);
H A Dsshconnect2.c397 debug2("service_accept: %s", reply);
400 debug2("buggy server: service_accept w/o service");
488 debug2("we sent a %s packet, wait for reply", method->name);
491 debug2("we did not send a packet, disable method");
599 debug2("input_userauth_pk_ok: SSH_BUG_PKOK");
628 debug2("input_userauth_pk_ok: fp %s", fp);
943 debug2("input_userauth_passwd_changereq");
1376 debug2("no passphrase given, try next key");
1383 debug2("bad passphrase given, try again...");
1486 debug2("ke
[all...]
H A Dauth2-chall.c180 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ?
223 debug2("auth2_challenge_start: devices %s",
H A Ddh.c244 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p));
279 debug2("dh_gen_key: priv key bits set: %d/%d",
H A Dmac.c144 debug2("mac_setup: found %s", name);
147 debug2("mac_setup: unknown %s", name);
H A Dauth-rhosts.c205 debug2("auth_rhosts2: clientuser %s hostname %s ipaddr %s",
H A Daddrmatch.c386 debug2("%s: couldn't parse address %.100s", __func__, addr);
446 debug2("%s: couldn't parse address %.100s", __func__, addr);
H A Dclientloop.c273 debug2("%s: cancel scheduled exit", __func__);
279 debug2("%s: schedule exit in %d seconds", __func__,
356 debug2("x11_get_proto: %s", cmd);
381 debug2("x11_get_proto: %s", cmd);
526 debug2("client_check_window_change: changed");
791 debug2("%s request accepted on channel %d",
1882 debug2("buggy server: x11 request w/o originator_port");
2110 debug2("%s: id %d", __func__, id);
H A Dsshconnect1.c269 debug2("no passphrase given, try next key");
276 debug2("bad passphrase given, try again...");
H A Dssh-keysign.c117 debug2("valid_request: check expect chost %s got %s", host, p);
H A Dsession.c341 debug2("compression disabled");
359 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag);
363 debug2("Buggy client: "
1900 debug2("%s: allocate (allocated %d max %d)",
2222 debug2("Ignoring env request %s: too many env vars", name);
2228 debug2("Setting env %d: %s=%s", s->num_env, name, val);
2237 debug2("Ignoring env request %s: disallowed name", name);
H A Dlog.c218 debug2(const char *fmt,...) function
420 txt = "debug2";
/freebsd-10.0-release/crypto/openssh/openbsd-compat/
H A Dport-solaris.c86 debug2("%s: setting up process contract template on fd %d",
129 debug2("%s: clearing process contract template on fd %d",
148 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd);
172 debug2("%s: abandoning contract id %ld", __func__, ctid);
H A Dgetrrsetbyname-ldns.c147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas);
155 debug2("ldns: trying to validate RRset");
161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS",
167 debug2("ldns: RRset is signed with a valid key");
169 debug2("ldns: RRset validation failed: %s",

Completed in 240 milliseconds

12