Home
last modified time | relevance | path

Searched refs:debug2 (Results 1 – 25 of 51) sorted by relevance

123

/external/openssh/
Dnchan.c95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], in chan_set_istate()
104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], in chan_set_ostate()
116 debug2("channel %d: rcvd oclose", c->self); in chan_rcvd_oclose1()
140 debug2("channel %d: read failed", c->self); in chan_read_failed()
155 debug2("channel %d: ibuf empty", c->self); in chan_ibuf_empty()
181 debug2("channel %d: rcvd ieof", c->self); in chan_rcvd_ieof1()
198 debug2("channel %d: write failed", c->self); in chan_write_failed1()
219 debug2("channel %d: obuf empty", c->self); in chan_obuf_empty()
241 debug2("channel %d: send ieof", c->self); in chan_send_ieof1()
258 debug2("channel %d: send oclose", c->self); in chan_send_oclose1()
[all …]
Dauth2-hostbased.c70 debug2("userauth_hostbased: disabled because of invalid user"); in userauth_hostbased()
147 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased()
175 debug2("%s: chost %s resolvedname %s ipaddr %s", __func__, in hostbased_key_allowed()
179 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed()
185 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed()
197 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed()
204 debug2("%s: access allowed by auth_rhosts2", __func__); in hostbased_key_allowed()
Dcompat.c259 debug2("%s: original cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal()
262 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal()
273 debug2("%s: original public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal()
276 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal()
287 debug2("%s: original KEX proposal: %s", __func__, p); in compat_kex_proposal()
298 debug2("%s: compat KEX proposal: %s", __func__, p); in compat_kex_proposal()
Dmoduli.c345 debug2("start point: 0x%s", BN_bn2hex(largebase)); in gen_candidates()
422 debug2("test q = largebase+%u", 2 * j); in gen_candidates()
606 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", in prime_test()
631 debug2("%10u: comment or short line", count_in); in prime_test()
646 debug2("%10u: known composite", count_in); in prime_test()
665 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); in prime_test()
682 debug2("%10u: (%u)", count_in, in_type); in prime_test()
691 debug2("Unknown prime type"); in prime_test()
700 debug2("%10u: bit size %u mismatch", count_in, in_size); in prime_test()
704 debug2("%10u: bit size %u too short", count_in, in_size); in prime_test()
[all …]
Dchannels.c283 debug2("channel %d: rfd %d isatty", c->self, c->rfd); in channel_register_fds()
335 debug2("channel: expanding %d", channels_alloc); in channel_new()
577 debug2("channel %d: big input buffer %d", in channel_not_very_much_buffered_data()
583 debug2("channel %d: big output buffer %u > %u", in channel_not_very_much_buffered_data()
757 debug2("channel %d: send open", id); in channel_send_open()
775 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); in channel_request_start()
923 debug2("channel %d: obuf_empty delayed efd %d/(%d)", in channel_pre_open()
953 debug2("channel %d: closing after input drain.", c->self); in channel_pre_input_draining()
1002 debug2("Initial X11 packet contains bad byte order byte: 0x%x", in x11_open_helper()
1015 debug2("X11 connection uses different authentication protocol."); in x11_open_helper()
[all …]
Dauth-bsdauth.c65 debug2("bsdauth_query: try reuse session"); in bsdauth_query()
74 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query()
81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
Dmux.c232 debug2("%s: channel %d: not open", __func__, sc->self); in mux_master_control_cleanup_cb()
290 debug2("%s: channel %d slave version %u", __func__, c->self, ver); in process_mux_master_hello()
302 debug2("Unrecognised slave extension \"%s\"", name); in process_mux_master_hello()
367 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, " in process_mux_new_session()
405 debug2("%s: session already open", __func__); in process_mux_new_session()
428 debug2("%s: session refused by user", __func__); in process_mux_new_session()
470 debug2("%s: channel_new: %d linked to control channel %d", in process_mux_new_session()
485 debug2("%s: channel %d: alive check", __func__, c->self); in process_mux_alive_check()
498 debug2("%s: channel %d: terminate request", __func__, c->self); in process_mux_terminate()
504 debug2("%s: termination refused by user", __func__); in process_mux_terminate()
[all …]
Dhostfile.c80 debug2("extract_salt: string too short"); in extract_salt()
84 debug2("extract_salt: invalid magic identifier"); in extract_salt()
90 debug2("extract_salt: missing salt termination character"); in extract_salt()
97 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt()
107 debug2("extract_salt: salt decode error"); in extract_salt()
111 debug2("extract_salt: expected salt len %zd, got %d", in extract_salt()
737 debug2("%s: %s:%ld: bad host hash \"%.32s\"", in hostkeys_foreach()
750 debug2("%s: %s:%ld: bad ip hash " in hostkeys_foreach()
774 debug2("%s:%ld: truncated before key type", in hostkeys_foreach()
836 debug2("%s:%ld: truncated after key type", in hostkeys_foreach()
Dsshconnect2.c426 debug2("service_accept: %s", reply); in input_userauth_service_accept()
429 debug2("buggy server: service_accept w/o service"); in input_userauth_service_accept()
480 debug2("we sent a %s packet, wait for reply", method->name); in userauth()
483 debug2("we did not send a packet, disable method"); in userauth()
589 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); in input_userauth_pk_ok()
620 debug2("input_userauth_pk_ok: fp %s", fp); in input_userauth_pk_ok()
939 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq()
1144 debug2("%s: using private key \"%s\"%s for " in sign_and_send_pubkey()
1249 debug2("no passphrase given, try next key"); in load_identity_file()
1264 debug2("bad passphrase given, try again..."); in load_identity_file()
[all …]
Dauth2.c239 debug2("%s: setting up authctxt for %s", in input_userauth_request()
284 debug2("input_userauth_request: try method %s", method); in input_userauth_request()
452 debug2("Unrecognized authentication method name: %s", in authmethod_lookup()
613 debug2("authentication methods list %d complete", i); in auth2_update_methods_lists()
Daddrmatch.c385 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_list()
401 debug2("%s: inconsistent mask length for " in addr_match_list()
445 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_cidr_list()
Dauth2-pubkey.c89 debug2("%s: disabled because of invalid user", __func__); in userauth_pubkey()
94 debug2("%s: SSH_BUG_PKAUTH", __func__); in userauth_pubkey()
213 debug2("%s: authenticated %d pkalg %s", __func__, authenticated, pkalg); in userauth_pubkey()
795 debug2("user_key_allowed: check options: '%s'", cp); in check_authkeys_file()
807 debug2("user_key_allowed: advance: '%s'", cp); in check_authkeys_file()
873 debug2("key not found"); in check_authkeys_file()
894 debug2("%s: CA %s %s is not listed in %s", __func__, in user_cert_trusted_ca()
Dkex.c293 debug2("%s: %s", proposal_names[i], proposal[i]); in kex_buf2prop()
301 debug2("first_kex_follows %d ", v); in kex_buf2prop()
302 debug2("reserved %u ", i); in kex_buf2prop()
761 debug2("proposal mismatch: my %s peer %s", in proposals_match()
766 debug2("proposals match"); in proposals_match()
781 debug2("local %s KEXINIT proposal", kex->server ? "server" : "client"); in kex_choose_conf()
784 debug2("peer %s KEXINIT proposal", kex->server ? "client" : "server"); in kex_choose_conf()
Dauth2-chall.c186 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device()
229 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
Dlog.h71 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
Ddispatch.c114 debug2("skipped packet (type %u)", type); in ssh_dispatch_run()
Dclientloop.c272 debug2("%s: cancel scheduled exit", __func__); in set_control_persist_exit_time()
278 debug2("%s: schedule exit in %d seconds", __func__, in set_control_persist_exit_time()
385 debug2("%s: %s", __func__, cmd); in client_x11_get_proto()
410 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto()
559 debug2("client_check_window_change: changed"); in client_check_window_change()
825 debug2("%s request accepted on channel %d", in client_status_confirm()
1980 debug2("buggy server: x11 request w/o originator_port"); in client_request_x11()
2598 debug2("%s: id %d", __func__, id); in client_session2_setup()
/external/openssh/openbsd-compat/
Dgetrrsetbyname-ldns.c147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname()
155 debug2("ldns: trying to validate RRset"); in getrrsetbyname()
161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", in getrrsetbyname()
167 debug2("ldns: RRset is signed with a valid key"); in getrrsetbyname()
169 debug2("ldns: RRset validation failed: %s", in getrrsetbyname()
Dport-solaris.c84 debug2("%s: setting up process contract template on fd %d", in solaris_contract_pre_fork()
127 debug2("%s: clearing process contract template on fd %d", in solaris_contract_post_fork_child()
146 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); in solaris_contract_post_fork_parent()
170 debug2("%s: abandoning contract id %ld", __func__, ctid); in solaris_contract_post_fork_parent()
/external/ipsec-tools/src/racoon/
Dcftoken.l192 <S_LOG>debug3 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L…
193 <S_LOG>debug4 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L…
/external/elfutils/tests/
Drun-strip-reloc.sh24 tempfiles out.stripped1 out.debug1 out.stripped2 out.debug2
33 debugfile2=out.debug2
/external/kernel-headers/original/uapi/linux/
Dbaycom.h18 unsigned long debug2; member
/external/u-boot/arch/arm/dts/
Dkeystone-k2hk-evm.dts70 debug2 {
71 label = "keystone:blue:debug2";
/external/ipsec-tools/src/racoon/samples/
Dracoon.conf.sample18 # or "debug2".
/external/u-boot/drivers/ddr/altera/
Dsequencer.h145 u32 debug2; member

123