/external/openssh/openbsd-compat/ |
D | getopt.c | 63 extern char *__progname; 94 "%s: illegal option -- %c\n", __progname, BSDoptopt); 112 __progname, BSDoptopt);
|
D | bsd-misc.c | 36 char *__progname; variable 46 extern char *__progname; in ssh_get_progname() 48 return xstrdup(__progname); in ssh_get_progname()
|
D | setproctitle.c | 128 extern char *__progname; in setproctitle() 138 strlcpy(buf, __progname, sizeof(buf)); in setproctitle()
|
/external/openssh/ |
D | ssh-pkcs11-helper.c | 278 extern char *__progname; in main() 284 __progname = ssh_get_progname(argv[0]); in main() 286 log_init(__progname, log_level, log_facility, log_stderr); in main() 365 extern char *__progname; in main() 367 __progname = ssh_get_progname(argv[0]); in main() 368 log_init(__progname, SYSLOG_LEVEL_ERROR, SYSLOG_FACILITY_AUTH, 0); in main()
|
D | log.c | 62 extern char *__progname; 324 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata); in log_init() 327 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility); in log_init() 420 openlog_r(argv0 ? argv0 : __progname, LOG_PID, log_facility, &sdata); in do_log() 424 openlog(argv0 ? argv0 : __progname, LOG_PID, log_facility); in do_log()
|
D | ssh-keyscan.c | 72 extern char *__progname; 606 __progname); in usage() 622 __progname = ssh_get_progname(argv[0]); in main() 708 fatal("%s: fdlim_get: bad value", __progname); in main() 712 fatal("%s: not enough file descriptors", __progname); in main() 724 fatal("%s: %s: %s", __progname, argv[j], in main() 750 fatal("%s: %s: %s", __progname, argv[j], in main()
|
D | auth-pam.h | 31 # define SSHD_PAM_SERVICE __progname
|
D | logintest.c | 50 extern char *__progname; 288 __progname = ssh_get_progname(argv[0]); in main()
|
D | ssh-add.c | 67 extern char *__progname; 365 fprintf(stderr, "usage: %s [options] [file ...]\n", __progname); in usage() 391 __progname = ssh_get_progname(argv[0]); in main()
|
D | ssh-keygen.c | 151 extern char *__progname; 341 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_convert_to() 518 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_convert_from_ssh2() 568 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_convert_from_pkcs8() 611 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_convert_from_pem() 643 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_convert_from() 781 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_fingerprint() 883 printf("%s: generating new host keys: ", __progname); in do_gen_all_hostkeys() 988 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_known_hosts() 1812 fatal("%s: %s: %s", __progname, identity_file, strerror(errno)); in do_show_cert() [all …]
|
D | sftp-server.c | 1390 extern char *__progname; in sftp_server_usage() 1394 __progname); in sftp_server_usage() 1409 extern char *__progname; in sftp_server_main() 1411 __progname = ssh_get_progname(argv[0]); in sftp_server_main() 1412 log_init(__progname, log_level, log_facility, log_stderr); in sftp_server_main() 1453 log_init(__progname, log_level, log_facility, log_stderr); in sftp_server_main()
|
D | sshd.c | 141 extern char *__progname; 1256 log_init(__progname, 1331 __progname = ssh_get_progname(av[0]); 1498 log_init(__progname, 1748 log_init(__progname, options.log_level, options.log_facility, log_stderr); 1772 log_init(__progname, options.log_level, options.log_facility, log_stderr); 1860 log_init(__progname, options.log_level, 1934 request_init(&req, RQ_DAEMON, __progname, RQ_FILE, sock_in, 0);
|
D | sftp.c | 107 extern char *__progname; 1872 extern char *__progname; in interactive_loop() 1876 if ((el = el_init(__progname, stdin, stdout, stderr)) == NULL) in interactive_loop() 2066 extern char *__progname; in usage() 2078 __progname, __progname, __progname, __progname); in usage() 2103 __progname = ssh_get_progname(argv[0]); in main()
|
D | ssh-agent.c | 135 extern char *__progname; 1115 __progname); in usage() 1160 __progname = ssh_get_progname(av[0]); in main() 1282 log_init(__progname, SYSLOG_LEVEL_DEBUG1, SYSLOG_FACILITY_AUTH, 1); in main() 1316 log_init(__progname, SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_AUTH, 0); in main()
|
D | ssh-keysign.c | 59 extern char *__progname;
|
D | sshconnect.c | 74 extern char *__progname; 360 fatal("%s: Could not resolve hostname %.100s: %s", __progname, in ssh_connect()
|
D | session.c | 134 extern char *__progname; 522 log_init(__progname, options.log_level, in do_exec_no_pty() 691 log_init(__progname, options.log_level, in do_exec_pty() 1777 __progname = argv[0]; in do_child()
|
D | scp.c | 117 extern char *__progname; 386 __progname = ssh_get_progname(argv[0]); in main()
|
D | sshconnect1.c | 56 extern char *__progname;
|
D | ssh.c | 112 extern char *__progname; 255 __progname = ssh_get_progname(av[0]); in main()
|
D | INSTALL | 132 them). Note that the service name used to start PAM is __progname,
|
D | auth-pam.c | 623 extern char *__progname; in sshpam_init()
|
/external/llvm/autoconf/ |
D | ExportMap.map | 3 __progname;
|
/external/llvm/projects/sample/autoconf/ |
D | ExportMap.map | 3 __progname;
|
/external/mksh/src/ |
D | check.t | 72 ln -s "$__progname" cat 73 ln -s "$__progname" echo 1034 export TSHELL="$__progname" 1035 "$__progname" x 1037 "$__progname" x e 2088 "$__progname" -c "tr abcdefghijklmnopqrstuvwxyz nopqrstuvwxyzabcdefghijklm <<<foo" 3726 ) 2>&1 | sed "s^${__progname}: <stdin>\[[0-9]*]PROG" 4412 TMPDIR=$PWD/foo "$__progname" <<- 'EOF' 4425 TMPDIR=$PWD/foo "$__progname" <<- 'EOF' 4850 "$__progname" -c 'u=x; echo $? $u .' || echo aborted, $? [all …]
|