/dragonfly/crypto/openssh/ |
H A D | monitor_wrap.c | 147 debug3_f("entering"); in mm_request_receive() 226 debug3_f("entering"); in mm_sshkey_sign() 267 debug3_f("entering"); in mm_getpwnamallow() 356 debug3_f("entering"); in mm_auth2_read_banner() 385 debug3_f("entering"); in mm_inform_authserv() 408 debug3_f("entering"); in mm_auth_password() 459 debug3_f("entering"); in mm_key_allowed() 512 debug3_f("entering"); in mm_sshkey_verify() 830 debug3_f("entering"); in mm_bsdauth_query() 841 debug3_f("no challenge"); in mm_bsdauth_query() [all …]
|
H A D | monitor.c | 505 debug3_f("checking request %d", type); in monitor_read() 618 debug3_f("entering"); in mm_answer_sign() 682 debug3_f("%s %s signature len=%zu", alg, in mm_answer_sign() 716 debug3_f("entering"); in mm_answer_pwnamallow() 1155 debug3_f("entering"); in mm_answer_keyallowed() 1552 debug3_f("entering"); in mm_answer_pty() 1622 debug3_f("entering"); in mm_answer_pty_cleanup() 1639 debug3_f("tearing down sessions"); in mm_answer_term() 1721 debug3_f("packet_set_state"); in monitor_apply_keystate() 1761 debug3_f("Waiting for new keys"); in mm_get_keystate() [all …]
|
H A D | mux.c | 1061 debug3_f("sending failure reply"); in mux_stdio_confirm() 1068 debug3_f("sending success reply"); in mux_stdio_confirm() 1396 debug3_f("sending success reply"); in mux_session_confirm() 1644 debug3_f("entering"); in mux_client_request_alive() 1680 debug3_f("done pid = %u", pid); in mux_client_request_alive() 1695 debug3_f("entering"); in mux_client_request_terminate() 1873 debug3_f("entering"); in mux_client_request_session() 1930 debug3_f("session request sent"); in mux_client_request_session() 2083 debug3_f("done"); in mux_client_proxy() 2096 debug3_f("entering"); in mux_client_request_stdio_fwd() [all …]
|
H A D | sftp-usergroup.c | 116 debug3_f("uid %u not resolved", uids[i]); in lookup_and_record() 119 debug3_f("record uid %u => \"%s\"", uids[i], usernames[i]); in lookup_and_record() 124 debug3_f("gid %u not resolved", gids[i]); in lookup_and_record() 127 debug3_f("record gid %u => \"%s\"", gids[i], groupnames[i]); in lookup_and_record()
|
H A D | sandbox-rlimit.c | 52 debug3_f("preparing rlimit sandbox"); in ssh_sandbox_init() 87 debug3_f("finished"); in ssh_sandbox_parent_finish()
|
H A D | auth2.c | 238 debug3_f("user specific delay %0.3lfms", delay/1000); in user_specific_delay() 254 debug3_f("elapsed %0.3lfms, delaying %0.3lfms (requested %0.3lfms)", in ensure_minimum_time_since() 446 debug3_f("failure partial=%d next methods=\"%s\"", in userauth_finish() 537 debug3_f("method %s not enabled", name); in authmethod_lookup() 541 debug3_f("method %s not allowed " in authmethod_lookup() 617 debug3_f("checking methods"); in auth2_setup_methods_lists() 705 debug3_f("updating methods list after \"%s\"", method); in auth2_update_methods_lists() 795 debug3_f("key already used: %s %s", in auth2_key_already_used()
|
H A D | ssh_api.c | 471 debug3_f("need %d", type); in _ssh_host_public_key() 473 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_public_key() 486 debug3_f("need %d", type); in _ssh_host_private_key() 488 debug3_f("check %s", sshkey_type(k->key)); in _ssh_host_private_key() 501 debug3_f("need %s", sshkey_type(hostkey)); in _ssh_verify_host_key() 503 debug3_f("check %s", sshkey_type(k->key)); in _ssh_verify_host_key()
|
H A D | clientloop.c | 696 debug3_f("channel %d: mux request: %s", c->self, in client_status_confirm() 1875 debug3_f("found %s key under different " in hostkeys_find() 1898 debug3_f("found address %s against different hostname " in hostkeys_find() 1924 debug3_f("found %s key at %s:%ld", in hostkeys_find() 1958 debug3_f("found deprecated %s key at %s:%ld as %s", in hostkeys_check_old() 1980 debug3_f("searching %s for %s / %s", in check_old_keys_othernames() 2171 debug3_f("verify %s key %zu using sigalg %s", in client_global_hostkeys_private_confirm() 2261 debug3_f("received %s key %s", sshkey_type(key), fp); in client_input_hostkeys() 2265 debug3_f("%s key not permitted by " in client_input_hostkeys() 2271 debug3_f("%s key is a certificate; skipping", in client_input_hostkeys() [all …]
|
H A D | monitor_fdpass.c | 92 debug3_f("sendmsg(%d): %s", fd, strerror(errno)); in mm_send_fd() 147 debug3_f("recvmsg: %s", strerror(errno)); in mm_receive_fd()
|
H A D | auth-rhosts.c | 231 debug3_f("no hosts access files exist"); in auth_rhosts2() 240 debug3_f("root user, ignoring system hosts files"); in auth_rhosts2()
|
H A D | readpass.c | 261 debug3_f("cannot notify: no askpass"); in notify_start() 267 debug3_f("cannot notify: no display"); in notify_start()
|
H A D | msg.c | 50 debug3_f("type %u", (unsigned int)type & 0xff); in ssh_msg_send()
|
H A D | hostfile.c | 244 debug3_f("found %skey type %s in file %s:%lu", in record_hostkey() 282 debug3_f("loaded %lu keys from %s", ctx.num_loaded, host); in load_hostkeys_file() 560 debug3_f("%s key already at %s:%ld", in host_delete() 930 debug3_f("reading file \"%s\"", path); in hostkeys_foreach()
|
H A D | ssh-agent.c | 276 debug3_f("%s: entering hostname %s, requested key %s %s, %u keys avail", in match_key_hop() 286 debug3_f("%s: key %u: %s%s %s", tag, i, in match_key_hop() 384 debug3_f("entering: key %s comment \"%s\", %zu socket bindings, " in identity_permitted() 408 debug3_f("socketentry fd=%d, entry %zu %s, " in identity_permitted() 460 debug3_f("key permitted at host but not after"); in identity_permitted() 627 debug3_f("well formed userauth"); in parse_userauth_request() 994 debug3_f("%s%s%s: adding %skey %s %s", in parse_dest_constraint_hop() 1018 debug3_f("entering"); in parse_dest_constraint()
|
H A D | sshd.c | 599 debug3_f("%s key not permitted by HostkeyAlgorithms", s); 784 debug3_f("key %d: %s %s", i, sshkey_ssh_name(key), fp); 804 debug3_f("sent %u hostkeys", nkeys); 918 debug3_f("entering fd = %d config len %zu", fd, 954 debug3_f("done"); 966 debug3_f("entering fd = %d", fd); 1001 debug3_f("done");
|
H A D | sshconnect2.c | 157 debug3_f("have matching best-preference key type %s, " in order_hostkeyalgs() 206 debug3_f("prefer hostkeyalgs: %s", first); in order_hostkeyalgs() 208 debug3_f("no algorithms matched; accept original"); in order_hostkeyalgs() 602 debug3_f("entering"); in input_userauth_banner() 1368 debug3_f("using %s with %s %s", method, sshkey_type(id->key), fp); in sign_and_send_pubkey() 1431 debug3_f("signing using %s %s", alg, fp); in sign_and_send_pubkey() 1532 debug3_f("cannot handle key"); in send_pubkey_test() 2095 debug3_f("[child] pid=%ld, exec %s", in ssh_keysign() 2184 debug3_f("trying key type %s", authctxt->active_ktype); in userauth_hostbased()
|
H A D | ssh-sk-client.c | 104 debug3_f("started pid=%ld", (long)pid); in start_helper() 116 debug3_f("pid=%ld", (long)pid); in reap_helper()
|
H A D | ssh.c | 262 debug3_f("lookup %s:%d", name, port); in resolve_host() 398 debug3_f("check \"%s\" CNAME \"%s\"", *namep, cname); in check_follow_cname() 467 debug3_f("name is fully qualified"); in resolve_canonicalize() 483 debug3_f("not canonicalizing hostname \"%s\" (max dots %d)", in resolve_canonicalize() 493 debug3_f("attempting \"%s\" => \"%s\"", *hostp, fullhost); in resolve_canonicalize() 1880 debug3_f("%s:%d", options.stdio_forward_host, in ssh_init_stdio_forwarding() 2098 debug3_f("channel_new: %d", c->self); in ssh_session2_open()
|
H A D | krl.c | 47 # define KRL_DBG(x) debug3_f x 410 debug3_f("revoke type %s", sshkey_type(key)); in ssh_krl_revoke_key_explicit() 436 debug3_f("revoke by sha1"); in ssh_krl_revoke_key_sha1() 445 debug3_f("revoke by sha256"); in ssh_krl_revoke_key_sha256() 998 debug3_f("not a KRL"); in ssh_krl_from_blob()
|
H A D | sshconnect.c | 457 debug3_f("entering"); in ssh_connect_direct() 746 debug3_f("trying %s hostfile \"%s\"", which, file); in hostkeys_find_by_key_hostfile() 1058 debug3_f("certificate host key in use; " in check_host_key() 1070 debug3_f("host key found in GlobalKnownHostsFile; " in check_host_key() 1075 debug3_f("host key found via KnownHostsCommand; " in check_host_key()
|
H A D | dns.c | 254 debug3_f("checking SSHFP type %d fptype %d", dnskey_algorithm, in verify_host_key_dns()
|
H A D | scp.c | 1037 debug3_f("origin in %d out %d pid %ld", in toremote() 1054 debug3_f("destination in %d out %d pid %ld", in toremote() 1308 debug3_f("copying local %s to remote %s", src, abs_dst); in source_sftp() 1507 debug3_f("copying remote %s to local %s", abs_src, dst); in sink_sftp() 1924 debug3_f("copying remote %s to remote %s", abs_src, target);
|
H A D | packet.c | 1010 debug3_f("rekex triggered"); in ssh_packet_check_rekey() 1143 DBG(debug3_f("adding %d (len %d padlen %d extra_pad %d)", in ssh_packet_send2_wrapped() 1259 debug3_f("rekex triggered"); in ssh_packet_send2() 1301 debug3_f("queued packet triggered rekex"); in ssh_packet_send2() 1471 debug3_f("type %u", *typep); in ssh_packet_read_poll2_mux() 2447 debug3_f("done"); in ssh_packet_set_state() 2638 debug3_f("type %u", type); in ssh_packet_send_mux()
|
H A D | ttymodes.c | 320 debug3_f("SSH_BUG_UTF8TTYMODE"); \ in ssh_tty_make_modes()
|
H A D | log.h | 100 #define debug3_f(...) sshlog(__FILE__, __func__, __LINE__, 1, SYSLOG_LEVEL_DEBUG3, NULL, __VA_ARGS… macro
|