/openbsd/usr.bin/ssh/ |
H A D | auth2-hostbased.c | 122 debug2_f("disabled because of invalid user"); in userauth_hostbased() 157 debug2_f("authenticated %d", authenticated); in userauth_hostbased() 183 debug2_f("chost %s resolvedname %s ipaddr %s", in hostbased_key_allowed() 193 debug2_f("auth_rhosts2 refused user \"%.100s\" " in hostbased_key_allowed() 204 debug2_f("auth_rhosts2 refused " in hostbased_key_allowed() 211 debug2_f("access allowed by auth_rhosts2"); in hostbased_key_allowed()
|
H A D | addrmatch.c | 55 debug2_f("couldn't parse address %.100s", addr); in addr_match_list() 71 debug2_f("inconsistent mask length for " in addr_match_list() 115 debug2_f("couldn't parse address %.100s", addr); in addr_match_cidr_list()
|
H A D | compat.c | 146 debug2_f("original KEX proposal: %s", p); in compat_kex_proposal() 161 debug2_f("compat KEX proposal: %s", cp); in compat_kex_proposal()
|
H A D | mux.c | 408 debug2_f("session already open"); in mux_master_process_new_session() 429 debug2_f("session refused by user"); in mux_master_process_new_session() 502 debug2_f("termination refused by user"); in mux_master_process_terminate() 714 debug2_f("channel %d: request %s", c->self, in mux_master_process_open_fwd() 758 debug2_f("found existing forwarding"); in mux_master_process_open_fwd() 770 debug2_f("found allocated port"); in mux_master_process_open_fwd() 785 debug2_f("forwarding refused by user"); in mux_master_process_open_fwd() 993 debug2_f("session already open"); in mux_master_process_stdio_fwd() 1012 debug2_f("stdio fwd refused by user"); in mux_master_process_stdio_fwd() 1098 debug2_f("stop listen refused by user"); in mux_master_process_stop_listening() [all …]
|
H A D | auth2-pubkey.c | 129 debug2_f("%s user %s %s public key %s %s", in userauth_pubkey() 198 debug2_f("disabled because of invalid user"); in userauth_pubkey() 272 debug2_f("disabled because of invalid user"); in userauth_pubkey() 299 debug2_f("authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() 339 debug2_f("glob \"%s\" returned %zu matches", file, in match_principals_file() 828 debug2_f("glob \"%s\" returned %zu matches", file, in user_key_allowed()
|
H A D | nchan.c | 381 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", in chan_shutdown_write() 386 debug2_f("channel %d: shutdown() failed for " in chan_shutdown_write() 404 debug2_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])", in chan_shutdown_read()
|
H A D | ssh-agent.c | 445 debug2_f("allowed for hostname %s", in permitted_by_dest_constraints() 618 debug2_f("entering"); in process_request_identities() 992 debug2_f("entering"); in process_remove_identity() 1021 debug2_f("entering"); in remove_all_identities() 1150 debug2_f("parsed %s (%u keys) > %s%s%s (%u keys)", in parse_dest_constraint() 1359 debug2_f("entering"); in process_add_identity() 1470 debug2_f("entering"); in process_lock_agent() 1569 debug2_f("entering"); in process_add_smartcard_key() 1650 debug2_f("entering"); in process_remove_smartcard_key() 1696 debug2_f("entering"); in process_ext_session_bind() [all …]
|
H A D | auth2-pubkeyfile.c | 252 debug2_f("%s: processed %lu/%lu lines", file, nonblank, linenum); in auth_process_principals() 436 debug2_f("%s: processed %lu/%lu lines", file, nonblank, linenum); in auth_check_authkeys_file()
|
H A D | auth-rhosts.c | 196 debug2_f("clientuser %s hostname %s ipaddr %s", in auth_rhosts2()
|
H A D | ssh-add.c | 718 debug2_f("looking up host keys for \"%s\" in %s", host, path); in parse_dest_constraint_hop() 773 debug2_f("constraint %zu: %s%s%s (%u keys) > %s%s%s (%u keys)", *ndcp, in parse_dest_constraint() 990 debug2_f("loaded %zu certificates", ncerts); in main()
|
H A D | sshd-session.c | 607 debug2_f("privkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 616 debug2_f("pubkey %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 625 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
H A D | channels.c | 314 debug2_f("channel type \"%s\" timeout %d seconds", in channel_add_timeout() 3551 debug2_f("channel %d: callback start", c->self); in channel_input_open_confirmation() 3553 debug2_f("channel %d: callback done", c->self); in channel_input_open_confirmation() 3605 debug2_f("channel %d: callback start", c->self); in channel_input_open_failure() 3607 debug2_f("channel %d: callback done", c->self); in channel_input_open_failure() 3654 debug2_f("type %d id %d", type, id); in channel_input_status_confirm() 3987 debug2_f("close channel %d", i); in channel_cancel_rport_listener_tcpip() 4009 debug2_f("close channel %d", i); in channel_cancel_rport_listener_streamlocal() 4057 debug2_f("close channel %d", i); in channel_cancel_lport_listener_tcpip() 4084 debug2_f("close channel %d", i); in channel_cancel_lport_listener_streamlocal() [all …]
|
H A D | ssh_api.c | 565 debug2_f("orig/%d %s", ssh->kex->server, orig); in _ssh_order_hostkeyalgs() 566 debug2_f("replace/%d %s", ssh->kex->server, replace); in _ssh_order_hostkeyalgs()
|
H A D | sshd-auth.c | 391 debug2_f("key %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys() 400 debug2_f("cert %u: %s", num_keys, sshkey_ssh_name(k)); in parse_hostkeys()
|
H A D | ssh-ed25519-sk.c | 226 debug2_f("crypto_sign_ed25519_open failed: %d", ret); in ssh_ed25519_sk_verify()
|
H A D | ssh.c | 335 debug2_f("could not resolve name %.100s as address: %s", in resolve_addr() 422 debug2_f("hostname %.100s is address", *hostp); in resolve_canonicalize() 424 debug2_f("canonicalised address \"%s\" => \"%s\"", in resolve_canonicalize() 504 debug2_f("host %s not found in any suffix", *hostp); in resolve_canonicalize() 1812 debug2_f("background process is %ld", (long)pid); in control_persist_detach() 1855 debug2_f("%d expected forwarding replies remaining", in forwarding_success()
|
H A D | ssh-ed25519.c | 253 debug2_f("crypto_sign_ed25519_open failed: %d", ret); in ssh_ed25519_verify()
|
H A D | ssh-keysign.c | 129 debug2_f("check expect chost %s got %s", host, p); in valid_request()
|
H A D | log.h | 118 #define debug2_f(...) sshlog(__FILE__, __func__, __LINE__, 1, SYSLOG_LEVEL_DEBUG2, NULL, __VA_ARGS… macro
|
H A D | clientloop.c | 245 debug2_f("cancel scheduled exit"); in set_control_persist_exit_time() 251 debug2_f("schedule exit in %d seconds", in set_control_persist_exit_time() 367 debug2_f("xauth command: %s", cmd); in client_x11_get_proto() 456 debug2_f("changed"); in client_check_window_change() 2190 debug2_f("checking for %zu deprecated keys", ctx->nold); in check_old_keys_othernames() 2674 debug2_f("id %d", id); in client_session2_setup()
|
H A D | auth2-gss.c | 110 debug2_f("disabled because of invalid user"); in userauth_gssapi()
|
H A D | sshconnect2.c | 1361 debug2_f("using private key \"%s\"%s for " in sign_and_send_pubkey() 1816 debug2_f("done"); in pubkey_prepare() 1940 debug2_f("entering"); in input_userauth_info_req() 1968 debug2_f("num_prompts %d", num_prompts); in input_userauth_info_req() 2191 debug2_f("chost %s", chost); in userauth_hostbased()
|
H A D | hostfile.c | 813 debug2_f("%s:%ld: bad host hash \"%.32s\"", in hostkeys_foreach_file() 826 debug2_f("%s:%ld: bad ip hash " in hostkeys_foreach_file()
|
H A D | ssh-xmss.c | 327 debug2_f("xmss_sign_open failed: %d", ret); in ssh_xmss_verify()
|
H A D | krl.c | 1055 debug2_f("bad KRL magic header"); in ssh_krl_from_blob() 1259 debug2_f("checking CA key"); in ssh_krl_check_key() 1282 debug2_f("checking KRL %s", path); in ssh_krl_file_contains_key()
|