/external/openssh/ |
D | monitor_wrap.c | 127 debug3("%s entering: type %d", __func__, type); in mm_request_send() 146 debug3("%s entering", __func__); in mm_request_receive() 169 debug3("%s entering: type %d", __func__, type); in mm_request_receive_expect() 197 debug3("%s: waiting for MONITOR_ANS_MODULI", __func__); in mm_choose_dh() 209 debug3("%s: remaining %zu", __func__, sshbuf_len(m)); in mm_choose_dh() 226 debug3("%s entering", __func__); in mm_sshkey_sign() 237 debug3("%s: waiting for MONITOR_ANS_SIGN", __func__); in mm_sshkey_sign() 258 debug3("%s entering", __func__); in mm_getpwnamallow() 267 debug3("%s: waiting for MONITOR_ANS_PWNAM", __func__); in mm_getpwnamallow() 346 debug3("%s entering", __func__); in mm_auth2_read_banner() [all …]
|
D | auth-shadow.c | 64 debug3("%s: today %d sp_expire %d days left %d", __func__, (int)today, in auth_shadow_acctexpired() 68 debug3("account expiration disabled"); in auth_shadow_acctexpired() 73 debug3("account will expire in %d days", daysleft); in auth_shadow_acctexpired() 101 debug3("%s: today %d sp_lstchg %d sp_max %d", __func__, (int)today, in auth_shadow_pwexpired() 122 debug3("password expiration disabled"); in auth_shadow_pwexpired() 127 debug3("password expiration disabled"); in auth_shadow_pwexpired() 132 debug3("password will expire in %d days", daysleft); in auth_shadow_pwexpired()
|
D | sandbox-systrace.c | 104 debug3("%s: preparing systrace sandbox", __func__); in ssh_sandbox_init() 116 debug3("%s: ready", __func__); in ssh_sandbox_child() 120 debug3("%s: started", __func__); in ssh_sandbox_child() 132 debug3("%s: wait for child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 146 debug3("%s: child %ld stopped", __func__, (long)child_pid); in ssh_sandbox_parent() 157 debug3("%s: systrace attach, fd=%d", __func__, box->systrace_fd); in ssh_sandbox_parent() 190 debug3("%s: policy: enable syscall %d", __func__, i); in ssh_sandbox_parent() 197 debug3("%s: start child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 209 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | monitor.c | 278 debug3("preauth child monitor started"); in monitor_child_preauth() 312 debug3("%s: method %s: partial", __func__, in monitor_child_preauth() 510 debug3("%s: checking request %d", __func__, type); in monitor_read() 585 debug3("%s: got parameters: %d %d %d", in mm_answer_moduli() 627 debug3("%s", __func__); in mm_answer_sign() 695 debug3("%s: %s signature %p(%zu)", __func__, in mm_answer_sign() 724 debug3("%s", __func__); in mm_answer_pwnamallow() 801 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); in mm_answer_pwnamallow() 841 debug3("%s: service=%s, style=%s", in mm_answer_authserv() 913 debug3("%s: sending result %d", __func__, authenticated); in mm_answer_authpassword() [all …]
|
D | sandbox-darwin.c | 52 debug3("%s: preparing Darwin sandbox", __func__); in ssh_sandbox_init() 65 debug3("%s: starting Darwin sandbox", __func__); in ssh_sandbox_child() 90 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | sandbox-pledge.c | 49 debug3("%s: preparing pledge sandbox", __func__); in ssh_sandbox_init() 67 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | auth-pam.c | 310 debug3("%s %d", __func__, reqd); in sshpam_password_change_required() 339 debug3("PAM: %s entering", __func__); in import_environments() 359 debug3("PAM: num env strings %d", num_env); in import_environments() 396 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_thread_conv() 596 debug3("PAM: %s entering", __func__); in sshpam_thread_cleanup() 611 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_null_conv() 624 debug3("PAM: %s called with %d messages", __func__, n); in sshpam_store_conv() 783 debug3("PAM: %s entering", __func__); in sshpam_init_ctx() 833 debug3("PAM: %s entering", __func__); in sshpam_query() 877 debug3("PAM: %s", pam_strerror(sshpam_handle, type)); in sshpam_query() [all …]
|
D | sftp-client.c | 193 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_request() 212 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_attrs_request() 241 debug3("SSH2_FXP_STATUS %u", status); in get_status() 308 debug3("Received stat reply T:%u I:%u", type, id); in get_decode_stat() 354 debug3("Received statvfs reply T:%u I:%u", type, id); in get_decode_statvfs() 523 debug3("Sent message SSH2_FXP_CLOSE I:%u", id); in do_close() 575 debug3("Sending SSH2_FXP_READDIR I:%u", id); in do_lsreaddir() 592 debug3("Received reply T:%u I:%u", type, id); in do_lsreaddir() 603 debug3("Received SSH2_FXP_STATUS %d", rstatus); in do_lsreaddir() 618 debug3("Received %d SSH2_FXP_NAME responses", count); in do_lsreaddir() [all …]
|
D | sandbox-rlimit.c | 52 debug3("%s: preparing rlimit sandbox", __func__); in ssh_sandbox_init() 87 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | sandbox-seccomp-filter.c | 335 debug3("%s: preparing seccomp filter sandbox", __func__); in ssh_sandbox_init() 364 debug3("%s: installing SIGSYS handler", __func__); in ssh_sandbox_child_debugging() 401 debug3("%s: setting PR_SET_NO_NEW_PRIVS", __func__); in ssh_sandbox_child() 407 debug3("%s: attaching seccomp filter program", __func__); in ssh_sandbox_child() 420 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | audit-bsm.c | 270 debug3("BSM audit: typ %d rc %d \"%s\"", typ, rc, string); in bsm_audit_record() 274 debug3("BSM audit: writing audit new record"); in bsm_audit_record() 357 debug3("BSM audit: connection from %.100s port %d", host, port); in audit_connection_from() 365 debug3("BSM audit: iptype %d machine ID %s", (int)tid->at_type, buf); in audit_connection_from() 371 debug3("BSM audit: machine ID %s", buf); in audit_connection_from()
|
D | msg.c | 50 debug3("%s: type %u", __func__, (unsigned int)type & 0xff); in ssh_msg_send() 72 debug3("ssh_msg_recv entering"); in ssh_msg_recv()
|
D | mux.c | 197 debug3("%s: entering for channel %d", __func__, cid); in mux_master_session_cleanup_cb() 219 debug3("%s: entering for channel %d", __func__, cid); in mux_master_control_cleanup_cb() 420 debug3("%s: got fds stdin %d, stdout %d, stderr %d", __func__, in mux_master_process_new_session() 1010 debug3("%s: got fds stdin %d, stdout %d", __func__, in mux_master_process_stdio_fwd() 1084 debug3("%s: sending failure reply", __func__); in mux_stdio_confirm() 1091 debug3("%s: sending success reply", __func__); in mux_stdio_confirm() 1184 debug3("%s: channel %d: hello sent", __func__, c->self); in mux_master_read_cb() 1198 debug3("%s: channel %d packet type 0x%08x len %zu", in mux_master_read_cb() 1244 debug3("%s: channel %d: exit message, exitval %d", __func__, c->self, in mux_exit_message() 1269 debug3("%s: channel %d: TTY alloc failed", __func__, c->self); in mux_tty_alloc_failed() [all …]
|
D | sandbox-capsicum.c | 59 debug3("%s: preparing capsicum sandbox", __func__); in ssh_sandbox_init() 113 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | auth-bsdauth.c | 73 debug3("bsdauth_query: style %s", in bsdauth_query() 112 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
|
D | dh.c | 461 debug3("%s: requested max size %d", __func__, max); in dh_new_group_fallback() 463 debug3("using 2k bit group 14"); in dh_new_group_fallback() 466 debug3("using 4k bit group 16"); in dh_new_group_fallback() 469 debug3("using 8k bit group 18"); in dh_new_group_fallback()
|
D | ssh_api.c | 474 debug3("%s: need %d", __func__, type); in _ssh_host_public_key() 476 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_public_key() 489 debug3("%s: need %d", __func__, type); in _ssh_host_private_key() 491 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_private_key() 504 debug3("%s: need %s", __func__, sshkey_type(hostkey)); in _ssh_verify_host_key() 506 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_verify_host_key()
|
D | sftp-server.c | 520 debug3("request %u: sent status %u", id, status); in send_status() 694 debug3("request %u: open flags %d", id, pflags); in process_open() 731 debug3("request %u: close handle %u", id, handle); in process_close() 833 debug3("request %u: %sstat", id, do_lstat ? "l" : ""); in process_do_stat() 1032 debug3("request %u: opendir", id); in process_opendir() 1117 debug3("request %u: remove", id); in process_remove() 1138 debug3("request %u: mkdir", id); in process_mkdir() 1155 debug3("request %u: rmdir", id); in process_rmdir() 1177 debug3("request %u: realpath", id); in process_realpath() 1201 debug3("request %u: rename", id); in process_rename() [all …]
|
D | auth2.c | 239 debug3("%s: user specific delay %0.3lfms", __func__, delay/1000); in user_specific_delay() 255 debug3("%s: elapsed %0.3lfms, delaying %0.3lfms (requested %0.3lfms)", in ensure_minimum_time_since() 436 debug3("%s: failure partial=%d next methods=\"%s\"", __func__, in userauth_finish() 588 debug3("%s: checking methods", __func__); in auth2_setup_methods_lists() 676 debug3("%s: updating methods list after \"%s\"", __func__, method); in auth2_update_methods_lists() 686 debug3("authentication methods list %d remaining: \"%s\"", in auth2_update_methods_lists() 766 debug3("%s: key already used: %s %s", __func__, in auth2_key_already_used()
|
D | ssh.c | 417 debug3("%s: check \"%s\" CNAME \"%s\"", __func__, *namep, cname); in check_follow_cname() 487 debug3("%s: name is fully qualified", __func__); in resolve_canonicalize() 503 debug3("%s: not canonicalizing hostname \"%s\" (max dots %d)", in resolve_canonicalize() 511 debug3("%s: attempting \"%s\" => \"%s\"", __func__, in resolve_canonicalize() 1367 debug3("expanding RemoteCommand: %s", options.remote_command); in main() 1371 debug3("expanded RemoteCommand: %s", options.remote_command); in main() 1412 debug3("expanded LocalForward listen path " in main() 1422 debug3("expanded LocalForward connect path " in main() 1435 debug3("expanded RemoteForward listen path " in main() 1445 debug3("expanded RemoteForward connect path " in main() [all …]
|
D | monitor_fdpass.c | 92 debug3("%s: sendmsg(%d): %s", __func__, fd, strerror(errno)); in mm_send_fd() 148 debug3("%s: recvmsg: %s", __func__, strerror(errno)); in mm_receive_fd()
|
/external/openssh/openbsd-compat/ |
D | port-aix.c | 89 debug3("AIX/UsrInfo: set len %d", i); in aix_usrinfo() 143 debug3("AIX SYSTEM attribute %s", sys); in aix_valid_authentications() 156 debug3("AIX auth1 attribute list member %s", p); in aix_valid_authentications() 186 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd() 213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 253 debug3("%s: not checking", __func__); in sys_auth_allowed_user() 274 debug3("AIX/loginrestrictions returned %d msg %.100s", result, msg); in sys_auth_allowed_user() 346 debug3("%s: Could not open userdb to read", __func__); in aix_setauthdb() 352 debug3("AIX/setauthdb set registry '%s'", registry); in aix_setauthdb() 354 debug3("AIX/setauthdb set registry '%s' failed: %s", in aix_setauthdb() [all …]
|
D | port-linux.c | 113 debug3("%s: setting execution context", __func__); in ssh_selinux_setup_exec_context() 132 debug3("%s: done", __func__); in ssh_selinux_setup_exec_context() 147 debug3("%s: setting TTY context on %s", __func__, tty); in ssh_selinux_setup_pty() 177 debug3("%s: done", __func__); in ssh_selinux_setup_pty() 206 switchlog = debug3; in ssh_selinux_change_context() 215 debug3("%s: setting context from '%s' to '%s'", __func__, in ssh_selinux_change_context() 269 debug3("%s", __func__); in oom_adjust_setup() 299 debug3("%s", __func__); in oom_adjust_restore()
|
/external/perfetto/test/trace_processor/track_event/ |
D | track_event_merged_debug_annotations_args.out | 23 "debug.debug3","debug.debug3",32,"[NULL]"
|
D | track_event_merged_debug_annotations.textproto | 64 name: "debug3" 125 name: "debug3"
|