/dragonfly/crypto/openssh/ |
H A D | serverloop.c | 453 debug_f("originator %s port %u, target %s port %u", in server_request_direct_tcpip() 498 debug_f("originator %s port %d, target %s", in server_request_direct_streamlocal() 546 debug_f("invalid tun"); in server_request_tun() 635 debug_f("ctype %s rchan %u win %u max %u", in server_input_channel_open() 648 debug_f("confirm %s", ctype); in server_input_channel_open() 665 debug_f("failure %s", ctype); in server_input_channel_open() 782 debug_f("rtype %s want_reply %d", rtype, want_reply); in server_input_global_request() 789 debug_f("tcpip-forward listen %s port %u", in server_input_global_request() 818 debug_f("cancel-tcpip-forward addr %s port %d", in server_input_global_request() 827 debug_f("streamlocal-forward listen path %s", in server_input_global_request() [all …]
|
H A D | ssh-agent.c | 306 debug_f("cert %s / hostname %s rejected: %s", in match_key_hop() 736 debug_f("entering"); in process_sign_request2() 768 debug_f("user=%s", user); in process_sign_request2() 849 debug_f("good signature"); in process_sign_request2() 890 debug_f("key not found"); in process_remove_identity() 1073 debug_f("constraint ext %s", ext_name); in parse_key_constraint_extension() 1231 debug_f("internal provider"); in process_add_identity() 1406 debug_f("add %.100s", canonical_provider); in process_add_smartcard_key() 1468 debug_f("remove %.100s", canonical_provider); in process_remove_smartcard_key() 1585 debug_f("unsupported extension \"%s\"", name); in process_extension() [all …]
|
H A D | compat.c | 150 debug_f("match: %s pat %s compat 0x%08x", in compat_banner() 156 debug_f("no match: %s", version); in compat_banner()
|
H A D | readpass.c | 144 debug_f("requested to askpass"); in read_passphrase() 149 debug_f("stdin is not a tty"); in read_passphrase() 165 debug_f("can't open %s: %s", _PATH_TTY, in read_passphrase()
|
H A D | clientloop.c | 1478 debug_f("listen %s port %d, originator %s port %d", in client_request_forwarded_tcpip() 1534 debug_f("request: %s", listen_path); in client_request_forwarded_streamlocal() 1604 debug_f("bound agent to hostkey"); in client_request_agent() 1766 debug_f("no sink for exit-status on channel %d", in client_input_channel_req() 1987 debug_f("hostkeys file %s does not exist", in check_old_keys_othernames() 2082 debug_f("known hosts file %s does not " in update_known_hosts() 2294 debug_f("server sent no hostkeys"); in client_input_hostkeys() 2311 debug_f("searching %s for %s / %s", in client_input_hostkeys() 2318 debug_f("hostkeys file %s does not exist", in client_input_hostkeys() 2344 debug_f("no new or deprecated keys from server"); in client_input_hostkeys() [all …]
|
H A D | dns.c | 270 debug_f("matched SSHFP type %d fptype %d", in verify_host_key_dns() 274 debug_f("failed SSHFP type %d fptype %d", in verify_host_key_dns()
|
H A D | session.c | 2186 debug_f("agent forwarding disabled"); in session_auth_agent_req() 2207 debug_f("session %d req %s", s->self, rtype); in session_input_channel_req() 2271 debug_f("session %d release %s", s->self, s->tty); in session_pty_cleanup2() 2327 debug_f("x11 channel %d missing", id); in session_close_x11() 2330 debug_f("detach x11 channel %d", id); in session_close_x11() 2348 debug_f("session %d: closing channel %d", in session_close_single_x11() 2377 debug_f("session %d channel %d pid %ld", in session_exit_message() 2402 debug_f("release channel %d", s->chanid); in session_exit_message() 2457 debug_f("no session for pid %ld", (long)pid); in session_close_by_pid() 2478 debug_f("no session for id %d", id); in session_close_by_channel() [all …]
|
H A D | auth.c | 453 debug_f("key for %s found at %s:%ld", in check_key_in_hostfiles() 456 debug_f("key for host %s not found", host); in check_key_in_hostfiles() 833 debug_f("setting new authentication options"); in auth_activate_options() 847 debug_f("restricting session"); in auth_restrict_session()
|
H A D | ssh-sk-client.c | 95 debug_f("starting %s %s", helper, in start_helper() 193 debug_f("helper returned error -%u", rerr); in client_converse() 455 debug_f("srks[%zu]: %s %s uidlen %zu", nsrks, in sshsk_load_resident()
|
H A D | sshsig.c | 300 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify() 341 debug_f("expected namespace \"%s\" received \"%s\"", in sshsig_wrap_verify() 348 debug_f("expected algorithm \"%s\" received \"%s\"", in sshsig_wrap_verify() 473 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verifyb() 601 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verify_fd() 764 debug_f("%s:%lu: matched principal \"%s\"", in parse_principals_key_and_options()
|
H A D | ssh.c | 350 debug_f("getaddrinfo %.100s returned no addresses", name); in resolve_addr() 354 debug_f("getaddrinfo %.100s returned multiple addresses", name); in resolve_addr() 359 debug_f("Could not format address for name %.100s: %s", in resolve_addr() 448 debug_f("hostname %.100s is an unrecognised address", *hostp); in resolve_canonicalize() 1720 debug_f("backgrounding master process"); in control_persist_detach() 1772 debug_f("all expected forwarding replies received"); in forwarding_success() 1867 debug_f("tunnel forward established, id=%d", id); in ssh_tun_confirm() 2002 debug_f("expecting replies for %d forwards", in ssh_init_forwarding() 2304 debug_f("key %s type %s is not a certificate", in load_public_identity_files() 2337 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
|
H A D | kex.c | 501 debug_f("%s=<%s>", name, val); in kex_input_ext_info() 512 debug_f("%s=<%s>", name, val); in kex_input_ext_info() 516 debug_f("unsupported version of %s extension", in kex_input_ext_info() 520 debug_f("%s (unrecognised)", name); in kex_input_ext_info() 1245 debug_f("write: %.100s", strerror(errno)); in kex_exchange_identification() 1343 debug_f("banner line %zu: %s", n, cp); in kex_exchange_identification()
|
H A D | sshconnect2.c | 730 debug_f("server sent unknown pkalg %s", pkalg); in input_userauth_pk_ok() 1409 debug_f("no separate private key for certificate " in sign_and_send_pubkey() 1526 debug_f("no mutual signature algorithm"); in send_pubkey_test() 1678 debug_f("bound agent to hostkey"); in get_agent_identities() 1690 debug_f("agent returned %zu keys", idlist->nkeys); in get_agent_identities() 1723 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1728 debug_f("ignoring authenticator-hosted key %s as no " in pubkey_prepare() 1746 debug_f("ignoring certificate %s: not a user " in pubkey_prepare() 1751 debug_f("ignoring authenticator-hosted key " in pubkey_prepare() 2220 debug_f("trying hostkey %s %s using sigalg %s", in userauth_hostbased()
|
H A D | auth2-pubkey.c | 238 debug_f("sk_counter = %u, sk_flags = 0x%02x", in userauth_pubkey() 272 debug_f("%s test pkalg %s pkblob %s%s%s", method, pkalg, key_s, in userauth_pubkey() 303 debug_f("key options inconsistent with existing"); in userauth_pubkey()
|
H A D | mux.c | 619 debug_f("%s for: listen %d, connect %s:%d", in mux_confirm_remote_forward() 1092 debug_f("channel %d: stop listening", c->self); in mux_master_process_stop_listening() 1124 debug_f("channel %d: proxy request", c->self); in mux_master_process_proxy() 1591 debug_f("write packet: %s", strerror(errno)); in mux_client_hello_exchange() 1599 debug_f("read packet failed"); in mux_client_hello_exchange() 1951 debug_f("master session id: %u", sid); in mux_client_request_session() 2150 debug_f("master session id: %u", sid); in mux_client_request_stdio_fwd()
|
H A D | ttymodes.c | 290 debug_f("no fd or tio"); in ssh_tty_make_modes()
|
H A D | sshconnect.c | 422 debug_f("bound to %s", ntop); in ssh_create_socket() 729 debug_f("found matching key in %s:%lu", path, l->linenum); in hostkeys_find_by_key_cb() 750 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile() 1381 debug_f("hostkey not known or explicitly trusted: " in check_host_key()
|
H A D | auth2-hostbased.c | 78 debug_f("cuser %s chost %s pkalg %s slen %zu", in userauth_hostbased()
|
H A D | log.h | 102 #define debug_f(...) sshlog(__FILE__, __func__, __LINE__, 1, SYSLOG_LEVEL_DEBUG1, NULL, __VA_ARGS_… macro
|
H A D | misc.c | 1417 debug_f("invalid tunnel %u", tun); in tun_open() 1422 debug_f("%s open: %s", name, strerror(errno)); in tun_open() 1426 debug_f("%s mode %d fd %d", name, mode, fd); in tun_open() 1434 debug_f("get interface %s flags: %s", ifr.ifr_name, in tun_open() 1442 debug_f("activate interface %s: %s", ifr.ifr_name, in tun_open()
|
H A D | nchan.c | 435 debug_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", in chan_shutdown_extended_read()
|
H A D | channels.c | 1525 debug_f("%s:%d", host_to_connect, port_to_connect); in channel_connect_stdio_fwd() 2685 debug_f("pfd[%u].fd %d rev 0x%04x", in channel_after_poll() 4214 debug_f("requested forward not found"); in channel_request_rforward_cancel_tcpip() 4250 debug_f("requested forward not found"); in channel_request_rforward_cancel_streamlocal() 4354 debug_f("index out of range: %d num_permitted_user %d", in channel_update_permission() 4413 debug_f("start for host %.100s ([%.100s]:%s)", in connect_next() 4427 debug_f("host %.100s ([%.100s]:%s): %.100s", in connect_next() 4436 debug_f("connect host %.100s ([%.100s]:%s) in progress, fd=%d", in connect_next() 4777 debug_f("requested forward not permitted"); in rdynamic_connect_finish()
|
H A D | packet.c | 888 debug_f("rekeying %s, input %llu bytes %llu blocks, " in ssh_set_newkeys() 911 DBG(debug_f("cipher_init: %s", dir)); in ssh_set_newkeys() 2119 debug_f("setting to %d", s); in ssh_packet_set_maxsize() 2192 debug_f("called"); in ssh_packet_set_postauth()
|
H A D | sshd.c | 662 debug_f("%s", ret); 836 debug_f("p %d, r %d", p, r); 1481 debug_f("set routing domain %d (was %d)", rtable, ortable);
|
H A D | monitor.c | 355 debug_f("user %s authenticated by privileged process", authctxt->user); in monitor_child_preauth() 432 debug_f("child log fd closed"); in monitor_read_log() 793 debug_f("no valid authentication method lists"); in mm_answer_pwnamallow()
|