/macosx-10.10/OpenSSH-189/openssh/ |
H A D | nchan.c | 95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], 104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], 116 debug2("channel %d: rcvd oclose", c->self); 140 debug2("channel %d: read failed", c->self); 155 debug2("channel %d: ibuf empty", c->self); 181 debug2("channel %d: rcvd ieof", c->self); 198 debug2("channel %d: write failed", c->self); 219 debug2("channel %d: obuf empty", c->self); 241 debug2("channel %d: send ieof", c->self); 258 debug2("channe [all...] |
H A D | auth-bsdauth.c | 58 debug2("bsdauth_query: try reuse session"); 67 debug2("bsdauth_query: new bsd auth session"); 74 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty");
|
H A D | auth2-hostbased.c | 68 debug2("userauth_hostbased: disabled because of invalid user"); 128 debug2("userauth_hostbased: authenticated %d", authenticated); 155 debug2("userauth_hostbased: chost %s resolvedname %s ipaddr %s", 159 debug2("stripping trailing dot from chost %s", chost); 176 debug2("userauth_hostbased: access allowed by auth_rhosts2");
|
H A D | moduli.c | 347 debug2("start point: 0x%s", BN_bn2hex(largebase)); 424 debug2("test q = largebase+%u", 2 * j); 529 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", 540 debug2("process line %lu to line %lu", last_processed, end_lineno); 555 debug2("%10u: comment or short line", count_in); 570 debug2("%10u: known composite", count_in); 589 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); 606 debug2("%10u: (%u)", count_in, in_type); 615 debug2("Unknown prime type"); 624 debug2(" [all...] |
H A D | log.h | 68 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
|
H A D | channels.c | 249 debug2("channel %d: rfd %d isatty", c->self, c->rfd); 298 debug2("channel: expanding %d", channels_alloc); 502 debug2("channel %d: big input buffer %d", 508 debug2("channel %d: big output buffer %u > %u", 671 debug2("channel %d: send open", id); 689 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); 837 debug2("channel %d: obuf_empty delayed efd %d/(%d)", 867 debug2("channel %d: closing after input drain.", c->self); 909 debug2("Initial X11 packet contains bad byte order byte: 0x%x", 922 debug2("X1 [all...] |
H A D | mux.c | 223 debug2("%s: channel %d: not open", __func__, sc->self); 281 debug2("%s: channel %d slave version %u", __func__, c->self, ver); 293 debug2("Unrecognised slave extension \"%s\"", name); 362 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, " 401 debug2("%s: session already open", __func__); 424 debug2("%s: session refused by user", __func__); 466 debug2("%s: channel_new: %d linked to control channel %d", 481 debug2("%s: channel %d: alive check", __func__, c->self); 494 debug2("%s: channel %d: terminate request", __func__, c->self); 500 debug2(" [all...] |
H A D | hostfile.c | 79 debug2("extract_salt: string too short"); 83 debug2("extract_salt: invalid magic identifier"); 89 debug2("extract_salt: missing salt termination character"); 96 debug2("extract_salt: bad encoded salt length %u", b64len); 106 debug2("extract_salt: salt decode error"); 110 debug2("extract_salt: expected salt len %d, got %d",
|
H A D | compat.c | 234 debug2("Original cipher proposal: %s", cipher_prop); 235 debug2("Compat cipher proposal: %s", fix_ciphers);
|
H A D | auth2-pubkey.c | 85 debug2("userauth_pubkey: disabled because of invalid user"); 90 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); 178 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 295 debug2("user_key_allowed: check options: '%s'", cp); 307 debug2("user_key_allowed: advance: '%s'", cp); 372 debug2("key not found"); 392 debug2("%s: CA %s %s is not listed in %s", __func__,
|
H A D | kex.c | 138 debug2("kex_parse_kexinit: %s", proposal[i]); 144 debug2("kex_parse_kexinit: first_kex_follows %d ", i); 146 debug2("kex_parse_kexinit: reserved %u ", i); 425 debug2("proposal mismatch: my %s peer %s", 430 debug2("proposals match"); 508 debug2("skipping next packet (type %u)", type); 577 debug2("kex_derive_keys");
|
H A D | auth2.c | 243 debug2("input_userauth_request: setting up authctxt for %s", user); 288 debug2("input_userauth_request: try method %s", method); 449 debug2("Unrecognized authentication method name: %s", 584 debug2("authentication methods list %d complete", i);
|
H A D | sshconnect2.c | 450 debug2("service_accept: %s", reply); 453 debug2("buggy server: service_accept w/o service"); 521 debug2("we sent a %s packet, wait for reply", method->name); 524 debug2("we did not send a packet, disable method"); 632 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); 661 debug2("input_userauth_pk_ok: fp %s", fp); 1031 debug2("input_userauth_passwd_changereq"); 1465 debug2("no passphrase given, try next key"); 1472 debug2("bad passphrase given, try again..."); 1575 debug2("ke [all...] |
H A D | auth2-chall.c | 178 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? 221 debug2("auth2_challenge_start: devices %s",
|
H A D | dh.c | 229 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p)); 264 debug2("dh_gen_key: priv key bits set: %d/%d",
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | port-solaris.c | 86 debug2("%s: setting up process contract template on fd %d", 129 debug2("%s: clearing process contract template on fd %d", 148 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); 172 debug2("%s: abandoning contract id %ld", __func__, ctid);
|
H A D | getrrsetbyname-ldns.c | 148 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); 156 debug2("ldns: trying to validate RRset"); 162 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", 168 debug2("ldns: RRset is signed with a valid key"); 170 debug2("ldns: RRset validation failed: %s",
|
/macosx-10.10/screen-22/screen/ |
H A D | screen.h | 59 # define debug2(x,a,b) debugf((dfp,x,a,b)) macro 66 # define debug2(x,a,b) debugf(x) macro 76 # define ASSERT(lousy_cpp) do {if (!(lousy_cpp)) {if (!dfp) opendebug(0, 1);debug2("ASSERT("#lousy_cpp") failed file %s line %d\n", __FILE__, __LINE__);abort();}} while (0) 78 # define ASSERT(lousy_cpp) do {if (!(lousy_cpp)) {if (!dfp) opendebug(0, 1);debug2("ASSERT(lousy_cpp) failed file %s line %d\n", __FILE__, __LINE__);abort();}} while (0)
|
H A D | logfile.c | 94 debug2("logfile_reopen: %d = %s\n", wantfd, name); 149 debug2("s->st_size %d, o.st_size %d\n", (int)s->st_size, (int)o.st_size); 150 debug2("s->st_mtime %d, o.st_mtime %d\n", 152 debug2("s->st_ctime %d, o.st_ctime %d\n",
|
H A D | sched.c | 146 debug2(" timeout %d secs %d usecs", timeout.tv_sec, timeout.tv_usec); 162 debug2(" - cond ev fd %d type %d failed\n", ev->fd, ev->type); 231 debug2(" + hit ev fd %d type %d!\n", ev->fd, ev->type); 243 debug2("event %x new timeout %d ms\n", ev, timo);
|
H A D | acls.c | 138 debug2("FindUserPtr %s %sfound\n", name, (*u)?"":"not "); 196 debug2("UserAdd %s id %d\n", name, (*up)->u_id); 203 debug2("growing all bitfields %d += %d\n", maxusercount, USER_CHUNK); 568 debug2("syslog(LOG_NOTICE, \"screen %s: \"su %s\" ", SockPath, name); 569 debug2("%s for \"%s\"\n", sorry ? "failed" : "succeded", (*up)->u_name); 606 debug2("NewWindowAcl %s's umask_w_bits for window %d\n", 753 debug2("%s lost writelock on win %d\n", u->u_name, win->w_number); 872 debug2("UserAcl: user '%s', password '%s':", argv[0], argv[1]); 880 debug2("UserAcl: user '%s', password '%s'\n", argv[0], argv[1]); 900 debug2("UserAclCop [all...] |
H A D | teln.c | 409 debug2("[WONT %c %d]\n", TO_S[opt], opt); 411 debug2("[WILL %c %d]\n", TO_S[opt], opt); 413 debug2("[DONT %c %d]\n", TO_S[opt], opt); 415 debug2("[DO %c %d]\n", TO_S[opt], opt); 510 debug2("TelWindowSize %d %d\n", p->w_width, p->w_height);
|
H A D | socket.c | 182 debug2("uid = %d, gid = %d\n", getuid(), getgid()); 183 debug2("euid = %d, egid = %d\n", geteuid(), getegid()); 206 debug2("st.st_uid = %d, real_uid = %d\n", st.st_uid, real_uid); 243 debug2(" MakeClientSocket failed, unreachable? %d %d\n", 274 debug2(" connecting: mode=%03o, rflag=%d, ", mode, rflag); 275 debug2("xflag=%d, dflag=%d ?\n", xflag, dflag); 474 debug2("MakeClientSocket() open %s failed (%d)\n", SockPath, errno); 575 debug2("MakeClientSocket: access(%s): %d.\n", SockPath, errno); 855 debug2("*** RecMsg: type %d tty %s\n", m.type, m.m_tty); 859 debug2("displa [all...] |
H A D | tty.sh | 183 debug2("%s TIOCEXCL errno %d\n", line, errno); 216 debug2("'%s' CONNECT fd=%d.\n", line, f); 783 debug2("brktty: ioctl(devtty=%d, TIOCNOTTY, 0) = %d\n", devtty, errno); 874 debug2("tcsendbreak(fd=%d, %d)\n", fd, n); 889 debug2("%d * tcsendbreak(fd=%d, 0)\n", n, fd); 916 debug2("%d * TCSBRK fd=%d\n", n, fd); 1519 debug2("c_cc[%d] = %#x\n", i, m->tio.c_cc[i]); 1538 debug2("c_cc[%d] = %04o\n", i, m->tio.c_cc[i]);
|
/macosx-10.10/CPANInternal-159.1/Log-Log4perl-1.40/t/ |
H A D | 025CustLevels.t | 142 # check debug2 level 143 my $debug2 = Log::Log4perl->get_logger("debug2test"); 144 $debug2->debug2("this is a debug2 message"); 150 my $result4 = "DEBUG2 - this is a debug2 message\n";
|