/freebsd-10.0-release/crypto/openssh/ |
H A D | nchan.c | 95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], 104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], 116 debug2("channel %d: rcvd oclose", c->self); 140 debug2("channel %d: read failed", c->self); 155 debug2("channel %d: ibuf empty", c->self); 181 debug2("channel %d: rcvd ieof", c->self); 198 debug2("channel %d: write failed", c->self); 219 debug2("channel %d: obuf empty", c->self); 241 debug2("channel %d: send ieof", c->self); 258 debug2("channe [all...] |
H A D | auth-bsdauth.c | 58 debug2("bsdauth_query: try reuse session"); 67 debug2("bsdauth_query: new bsd auth session"); 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
|
H A D | auth2-hostbased.c | 68 debug2("userauth_hostbased: disabled because of invalid user"); 132 debug2("userauth_hostbased: authenticated %d", authenticated); 159 debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s", 163 debug2("stripping trailing dot from chost %s", chost); 180 debug2("userauth_hostbased: access allowed by auth_rhosts2");
|
H A D | moduli.c | 342 debug2("start point: 0x%s", BN_bn2hex(largebase)); 419 debug2("test q = largebase+%u", 2 * j); 524 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", 535 debug2("process line %lu to line %lu", last_processed, end_lineno); 550 debug2("%10u: comment or short line", count_in); 565 debug2("%10u: known composite", count_in); 584 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); 601 debug2("%10u: (%u)", count_in, in_type); 610 debug2("Unknown prime type"); 619 debug2(" [all...] |
H A D | log.h | 69 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
|
H A D | channels.c | 256 debug2("channel %d: rfd %d isatty", c->self, c->rfd); 308 debug2("channel: expanding %d", channels_alloc); 507 debug2("channel %d: big input buffer %d", 513 debug2("channel %d: big output buffer %u > %u", 679 debug2("channel %d: send open", id); 697 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); 853 debug2("tcpwinsz: %d for connection: %d", tcpwinsz, sd); 880 debug2("channel %d: obuf_empty delayed efd %d/(%d)", 910 debug2("channel %d: closing after input drain.", c->self); 952 debug2("Initia [all...] |
H A D | mux.c | 224 debug2("%s: channel %d: not open", __func__, sc->self); 282 debug2("%s: channel %d slave version %u", __func__, c->self, ver); 294 debug2("Unrecognised slave extension \"%s\"", name); 359 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, " 397 debug2("%s: session already open", __func__); 420 debug2("%s: session refused by user", __func__); 462 debug2("%s: channel_new: %d linked to control channel %d", 477 debug2("%s: channel %d: alive check", __func__, c->self); 490 debug2("%s: channel %d: terminate request", __func__, c->self); 496 debug2(" [all...] |
H A D | hostfile.c | 74 debug2("extract_salt: string too short"); 78 debug2("extract_salt: invalid magic identifier"); 84 debug2("extract_salt: missing salt termination character"); 91 debug2("extract_salt: bad encoded salt length %u", b64len); 101 debug2("extract_salt: salt decode error"); 105 debug2("extract_salt: expected salt len %d, got %d",
|
H A D | compat.c | 245 debug2("Original cipher proposal: %s", cipher_prop); 246 debug2("Compat cipher proposal: %s", fix_ciphers);
|
H A D | auth2-pubkey.c | 85 debug2("userauth_pubkey: disabled because of invalid user"); 90 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); 184 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 337 debug2("user_key_allowed: check options: '%s'", cp); 349 debug2("user_key_allowed: advance: '%s'", cp); 413 debug2("key not found"); 433 debug2("%s: CA %s %s is not listed in %s", __func__,
|
H A D | kex.c | 181 debug2("kex_parse_kexinit: %s", proposal[i]); 187 debug2("kex_parse_kexinit: first_kex_follows %d ", i); 189 debug2("kex_parse_kexinit: reserved %u ", i); 441 debug2("proposal mismatch: my %s peer %s", 446 debug2("proposals match"); 542 debug2("skipping next packet (type %u)", type); 611 debug2("kex_derive_keys");
|
H A D | auth2.c | 253 debug2("input_userauth_request: setting up authctxt for %s", user); 319 debug2("input_userauth_request: try method %s", method); 484 debug2("Unrecognized authentication method name: %s", 645 debug2("authentication methods list %d complete", i);
|
H A D | sshconnect2.c | 397 debug2("service_accept: %s", reply); 400 debug2("buggy server: service_accept w/o service"); 488 debug2("we sent a %s packet, wait for reply", method->name); 491 debug2("we did not send a packet, disable method"); 599 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); 628 debug2("input_userauth_pk_ok: fp %s", fp); 943 debug2("input_userauth_passwd_changereq"); 1376 debug2("no passphrase given, try next key"); 1383 debug2("bad passphrase given, try again..."); 1486 debug2("ke [all...] |
H A D | auth2-chall.c | 180 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? 223 debug2("auth2_challenge_start: devices %s",
|
H A D | dh.c | 244 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p)); 279 debug2("dh_gen_key: priv key bits set: %d/%d",
|
H A D | mac.c | 144 debug2("mac_setup: found %s", name); 147 debug2("mac_setup: unknown %s", name);
|
H A D | auth-rhosts.c | 205 debug2("auth_rhosts2: clientuser %s hostname %s ipaddr %s",
|
H A D | addrmatch.c | 386 debug2("%s: couldn't parse address %.100s", __func__, addr); 446 debug2("%s: couldn't parse address %.100s", __func__, addr);
|
H A D | clientloop.c | 273 debug2("%s: cancel scheduled exit", __func__); 279 debug2("%s: schedule exit in %d seconds", __func__, 356 debug2("x11_get_proto: %s", cmd); 381 debug2("x11_get_proto: %s", cmd); 526 debug2("client_check_window_change: changed"); 791 debug2("%s request accepted on channel %d", 1882 debug2("buggy server: x11 request w/o originator_port"); 2110 debug2("%s: id %d", __func__, id);
|
H A D | sshconnect1.c | 269 debug2("no passphrase given, try next key"); 276 debug2("bad passphrase given, try again...");
|
H A D | ssh-keysign.c | 117 debug2("valid_request: check expect chost %s got %s", host, p);
|
H A D | session.c | 341 debug2("compression disabled"); 359 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag); 363 debug2("Buggy client: " 1900 debug2("%s: allocate (allocated %d max %d)", 2222 debug2("Ignoring env request %s: too many env vars", name); 2228 debug2("Setting env %d: %s=%s", s->num_env, name, val); 2237 debug2("Ignoring env request %s: disallowed name", name);
|
H A D | log.c | 218 debug2(const char *fmt,...) function 420 txt = "debug2";
|
/freebsd-10.0-release/crypto/openssh/openbsd-compat/ |
H A D | port-solaris.c | 86 debug2("%s: setting up process contract template on fd %d", 129 debug2("%s: clearing process contract template on fd %d", 148 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); 172 debug2("%s: abandoning contract id %ld", __func__, ctid);
|
H A D | getrrsetbyname-ldns.c | 147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); 155 debug2("ldns: trying to validate RRset"); 161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", 167 debug2("ldns: RRset is signed with a valid key"); 169 debug2("ldns: RRset validation failed: %s",
|