/external/openssh/ |
D | nchan.c | 95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], in chan_set_istate() 104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], in chan_set_ostate() 116 debug2("channel %d: rcvd oclose", c->self); in chan_rcvd_oclose1() 140 debug2("channel %d: read failed", c->self); in chan_read_failed() 155 debug2("channel %d: ibuf empty", c->self); in chan_ibuf_empty() 181 debug2("channel %d: rcvd ieof", c->self); in chan_rcvd_ieof1() 198 debug2("channel %d: write failed", c->self); in chan_write_failed1() 219 debug2("channel %d: obuf empty", c->self); in chan_obuf_empty() 241 debug2("channel %d: send ieof", c->self); in chan_send_ieof1() 258 debug2("channel %d: send oclose", c->self); in chan_send_oclose1() [all …]
|
D | auth2-hostbased.c | 70 debug2("userauth_hostbased: disabled because of invalid user"); in userauth_hostbased() 147 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased() 175 debug2("%s: chost %s resolvedname %s ipaddr %s", __func__, in hostbased_key_allowed() 179 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed() 185 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed() 197 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed() 204 debug2("%s: access allowed by auth_rhosts2", __func__); in hostbased_key_allowed()
|
D | compat.c | 259 debug2("%s: original cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal() 262 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal() 273 debug2("%s: original public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal() 276 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal() 287 debug2("%s: original KEX proposal: %s", __func__, p); in compat_kex_proposal() 298 debug2("%s: compat KEX proposal: %s", __func__, p); in compat_kex_proposal()
|
D | moduli.c | 345 debug2("start point: 0x%s", BN_bn2hex(largebase)); in gen_candidates() 422 debug2("test q = largebase+%u", 2 * j); in gen_candidates() 606 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", in prime_test() 631 debug2("%10u: comment or short line", count_in); in prime_test() 646 debug2("%10u: known composite", count_in); in prime_test() 665 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); in prime_test() 682 debug2("%10u: (%u)", count_in, in_type); in prime_test() 691 debug2("Unknown prime type"); in prime_test() 700 debug2("%10u: bit size %u mismatch", count_in, in_size); in prime_test() 704 debug2("%10u: bit size %u too short", count_in, in_size); in prime_test() [all …]
|
D | channels.c | 283 debug2("channel %d: rfd %d isatty", c->self, c->rfd); in channel_register_fds() 335 debug2("channel: expanding %d", channels_alloc); in channel_new() 577 debug2("channel %d: big input buffer %d", in channel_not_very_much_buffered_data() 583 debug2("channel %d: big output buffer %u > %u", in channel_not_very_much_buffered_data() 757 debug2("channel %d: send open", id); in channel_send_open() 775 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); in channel_request_start() 923 debug2("channel %d: obuf_empty delayed efd %d/(%d)", in channel_pre_open() 953 debug2("channel %d: closing after input drain.", c->self); in channel_pre_input_draining() 1002 debug2("Initial X11 packet contains bad byte order byte: 0x%x", in x11_open_helper() 1015 debug2("X11 connection uses different authentication protocol."); in x11_open_helper() [all …]
|
D | auth-bsdauth.c | 65 debug2("bsdauth_query: try reuse session"); in bsdauth_query() 74 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query() 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
|
D | mux.c | 232 debug2("%s: channel %d: not open", __func__, sc->self); in mux_master_control_cleanup_cb() 290 debug2("%s: channel %d slave version %u", __func__, c->self, ver); in process_mux_master_hello() 302 debug2("Unrecognised slave extension \"%s\"", name); in process_mux_master_hello() 367 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, " in process_mux_new_session() 405 debug2("%s: session already open", __func__); in process_mux_new_session() 428 debug2("%s: session refused by user", __func__); in process_mux_new_session() 470 debug2("%s: channel_new: %d linked to control channel %d", in process_mux_new_session() 485 debug2("%s: channel %d: alive check", __func__, c->self); in process_mux_alive_check() 498 debug2("%s: channel %d: terminate request", __func__, c->self); in process_mux_terminate() 504 debug2("%s: termination refused by user", __func__); in process_mux_terminate() [all …]
|
D | hostfile.c | 80 debug2("extract_salt: string too short"); in extract_salt() 84 debug2("extract_salt: invalid magic identifier"); in extract_salt() 90 debug2("extract_salt: missing salt termination character"); in extract_salt() 97 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 107 debug2("extract_salt: salt decode error"); in extract_salt() 111 debug2("extract_salt: expected salt len %zd, got %d", in extract_salt() 737 debug2("%s: %s:%ld: bad host hash \"%.32s\"", in hostkeys_foreach() 750 debug2("%s: %s:%ld: bad ip hash " in hostkeys_foreach() 774 debug2("%s:%ld: truncated before key type", in hostkeys_foreach() 836 debug2("%s:%ld: truncated after key type", in hostkeys_foreach()
|
D | sshconnect2.c | 426 debug2("service_accept: %s", reply); in input_userauth_service_accept() 429 debug2("buggy server: service_accept w/o service"); in input_userauth_service_accept() 480 debug2("we sent a %s packet, wait for reply", method->name); in userauth() 483 debug2("we did not send a packet, disable method"); in userauth() 589 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); in input_userauth_pk_ok() 620 debug2("input_userauth_pk_ok: fp %s", fp); in input_userauth_pk_ok() 939 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq() 1144 debug2("%s: using private key \"%s\"%s for " in sign_and_send_pubkey() 1249 debug2("no passphrase given, try next key"); in load_identity_file() 1264 debug2("bad passphrase given, try again..."); in load_identity_file() [all …]
|
D | auth2.c | 239 debug2("%s: setting up authctxt for %s", in input_userauth_request() 284 debug2("input_userauth_request: try method %s", method); in input_userauth_request() 452 debug2("Unrecognized authentication method name: %s", in authmethod_lookup() 613 debug2("authentication methods list %d complete", i); in auth2_update_methods_lists()
|
D | addrmatch.c | 385 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_list() 401 debug2("%s: inconsistent mask length for " in addr_match_list() 445 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_cidr_list()
|
D | auth2-pubkey.c | 89 debug2("%s: disabled because of invalid user", __func__); in userauth_pubkey() 94 debug2("%s: SSH_BUG_PKAUTH", __func__); in userauth_pubkey() 213 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey() 795 debug2("user_key_allowed: check options: '%s'", cp); in check_authkeys_file() 807 debug2("user_key_allowed: advance: '%s'", cp); in check_authkeys_file() 873 debug2("key not found"); in check_authkeys_file() 894 debug2("%s: CA %s %s is not listed in %s", __func__, in user_cert_trusted_ca()
|
D | kex.c | 293 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop() 301 debug2("first_kex_follows %d ", v); in kex_buf2prop() 302 debug2("reserved %u ", i); in kex_buf2prop() 761 debug2("proposal mismatch: my %s peer %s", in proposals_match() 766 debug2("proposals match"); in proposals_match() 781 debug2("local %s KEXINIT proposal", kex->server ? "server" : "client"); in kex_choose_conf() 784 debug2("peer %s KEXINIT proposal", kex->server ? "client" : "server"); in kex_choose_conf()
|
D | auth2-chall.c | 186 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device() 229 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
|
D | log.h | 71 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
|
D | dispatch.c | 114 debug2("skipped packet (type %u)", type); in ssh_dispatch_run()
|
D | clientloop.c | 272 debug2("%s: cancel scheduled exit", __func__); in set_control_persist_exit_time() 278 debug2("%s: schedule exit in %d seconds", __func__, in set_control_persist_exit_time() 385 debug2("%s: %s", __func__, cmd); in client_x11_get_proto() 410 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto() 559 debug2("client_check_window_change: changed"); in client_check_window_change() 825 debug2("%s request accepted on channel %d", in client_status_confirm() 1980 debug2("buggy server: x11 request w/o originator_port"); in client_request_x11() 2598 debug2("%s: id %d", __func__, id); in client_session2_setup()
|
/external/openssh/openbsd-compat/ |
D | getrrsetbyname-ldns.c | 147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname() 155 debug2("ldns: trying to validate RRset"); in getrrsetbyname() 161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", in getrrsetbyname() 167 debug2("ldns: RRset is signed with a valid key"); in getrrsetbyname() 169 debug2("ldns: RRset validation failed: %s", in getrrsetbyname()
|
D | port-solaris.c | 84 debug2("%s: setting up process contract template on fd %d", in solaris_contract_pre_fork() 127 debug2("%s: clearing process contract template on fd %d", in solaris_contract_post_fork_child() 146 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); in solaris_contract_post_fork_parent() 170 debug2("%s: abandoning contract id %ld", __func__, ctid); in solaris_contract_post_fork_parent()
|
/external/ipsec-tools/src/racoon/ |
D | cftoken.l | 192 <S_LOG>debug3 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L… 193 <S_LOG>debug4 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L…
|
/external/elfutils/tests/ |
D | run-strip-reloc.sh | 24 tempfiles out.stripped1 out.debug1 out.stripped2 out.debug2 33 debugfile2=out.debug2
|
/external/kernel-headers/original/uapi/linux/ |
D | baycom.h | 18 unsigned long debug2; member
|
/external/u-boot/arch/arm/dts/ |
D | keystone-k2hk-evm.dts | 70 debug2 { 71 label = "keystone:blue:debug2";
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 18 # or "debug2".
|
/external/u-boot/drivers/ddr/altera/ |
D | sequencer.h | 145 u32 debug2; member
|