/external/openssh/ |
D | monitor_wrap.c | 137 debug3("%s entering: type %d", __func__, type); in mm_request_send() 153 debug3("%s entering", __func__); in mm_request_receive() 174 debug3("%s entering: type %d", __func__, type); in mm_request_receive_expect() 198 debug3("%s: waiting for MONITOR_ANS_MODULI", __func__); in mm_choose_dh() 212 debug3("%s: remaining %d", __func__, buffer_len(&m)); in mm_choose_dh() 226 debug3("%s entering", __func__); in mm_key_sign() 234 debug3("%s: waiting for MONITOR_ANS_SIGN", __func__); in mm_key_sign() 250 debug3("%s entering", __func__); in mm_getpwnamallow() 257 debug3("%s: waiting for MONITOR_ANS_PWNAM", __func__); in mm_getpwnamallow() 311 debug3("%s entering", __func__); in mm_auth2_read_banner() [all …]
|
D | auth-shadow.c | 64 debug3("%s: today %d sp_expire %d days left %d", __func__, (int)today, in auth_shadow_acctexpired() 68 debug3("account expiration disabled"); in auth_shadow_acctexpired() 73 debug3("account will expire in %d days", daysleft); in auth_shadow_acctexpired() 102 debug3("%s: today %d sp_lstchg %d sp_max %d", __func__, (int)today, in auth_shadow_pwexpired() 123 debug3("password expiration disabled"); in auth_shadow_pwexpired() 128 debug3("password expiration disabled"); in auth_shadow_pwexpired() 133 debug3("password will expire in %d days", daysleft); in auth_shadow_pwexpired()
|
D | sandbox-systrace.c | 98 debug3("%s: preparing systrace sandbox", __func__); in ssh_sandbox_init() 110 debug3("%s: ready", __func__); in ssh_sandbox_child() 114 debug3("%s: started", __func__); in ssh_sandbox_child() 126 debug3("%s: wait for child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 140 debug3("%s: child %ld stopped", __func__, (long)child_pid); in ssh_sandbox_parent() 151 debug3("%s: systrace attach, fd=%d", __func__, box->systrace_fd); in ssh_sandbox_parent() 184 debug3("%s: policy: enable syscall %d", __func__, i); in ssh_sandbox_parent() 191 debug3("%s: start child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 203 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | monitor.c | 339 debug3("preauth child monitor started"); in monitor_child_preauth() 377 debug3("%s: method %s: partial", __func__, in monitor_child_preauth() 591 debug3("%s: checking request %d", __func__, type); in monitor_read() 661 debug3("%s: got parameters: %d %d %d", in mm_answer_moduli() 700 debug3("%s", __func__); in mm_answer_sign() 764 debug3("%s: %s signature %p(%zu)", __func__, in mm_answer_sign() 792 debug3("%s", __func__); in mm_answer_pwnamallow() 856 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); in mm_answer_pwnamallow() 895 debug3("%s: service=%s, style=%s", in mm_answer_authserv() 929 debug3("%s: sending result %d", __func__, authenticated); in mm_answer_authpassword() [all …]
|
D | sandbox-darwin.c | 51 debug3("%s: preparing Darwin sandbox", __func__); in ssh_sandbox_init() 64 debug3("%s: starting Darwin sandbox", __func__); in ssh_sandbox_child() 89 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | sandbox-seccomp-filter.c | 224 debug3("%s: preparing seccomp filter sandbox", __func__); in ssh_sandbox_init() 253 debug3("%s: installing SIGSYS handler", __func__); in ssh_sandbox_child_debugging() 290 debug3("%s: setting PR_SET_NO_NEW_PRIVS", __func__); in ssh_sandbox_child() 296 debug3("%s: attaching seccomp filter program", __func__); in ssh_sandbox_child() 309 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | auth-pam.c | 278 debug3("%s %d", __func__, reqd); in sshpam_password_change_required() 301 debug3("PAM: %s entering", __func__); in import_environments() 314 debug3("PAM: num env strings %d", num_env); in import_environments() 349 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_thread_conv() 534 debug3("PAM: %s entering", __func__); in sshpam_thread_cleanup() 549 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_null_conv() 563 debug3("PAM: %s called with %d messages", __func__, n); in sshpam_store_conv() 677 debug3("PAM: %s entering", __func__); in sshpam_init_ctx() 724 debug3("PAM: %s entering", __func__); in sshpam_query() 762 debug3("PAM: %s", pam_strerror(sshpam_handle, type)); in sshpam_query() [all …]
|
D | sftp-client.c | 173 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_request() 192 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_attrs_request() 221 debug3("SSH2_FXP_STATUS %u", status); in get_status() 288 debug3("Received stat reply T:%u I:%u", type, id); in get_decode_stat() 334 debug3("Received statvfs reply T:%u I:%u", type, id); in get_decode_statvfs() 499 debug3("Sent message SSH2_FXP_CLOSE I:%u", id); in do_close() 552 debug3("Sending SSH2_FXP_READDIR I:%u", id); in do_lsreaddir() 569 debug3("Received reply T:%u I:%u", type, id); in do_lsreaddir() 580 debug3("Received SSH2_FXP_STATUS %d", rstatus); in do_lsreaddir() 593 debug3("Received %d SSH2_FXP_NAME responses", count); in do_lsreaddir() [all …]
|
D | sandbox-rlimit.c | 53 debug3("%s: preparing rlimit sandbox", __func__); in ssh_sandbox_init() 88 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | audit-bsm.c | 273 debug3("BSM audit: typ %d rc %d \"%s\"", typ, rc, string); in bsm_audit_record() 277 debug3("BSM audit: writing audit new record"); in bsm_audit_record() 360 debug3("BSM audit: connection from %.100s port %d", host, port); in audit_connection_from() 368 debug3("BSM audit: iptype %d machine ID %s", (int)tid->at_type, buf); in audit_connection_from() 374 debug3("BSM audit: machine ID %s", buf); in audit_connection_from()
|
D | mux.c | 197 debug3("%s: entering for channel %d", __func__, cid); in mux_master_session_cleanup_cb() 218 debug3("%s: entering for channel %d", __func__, cid); in mux_master_control_cleanup_cb() 397 debug3("%s: got fds stdin %d, stdout %d, stderr %d", __func__, in process_mux_new_session() 982 debug3("%s: got fds stdin %d, stdout %d", __func__, in process_mux_stdio_fwd() 1054 debug3("%s: sending failure reply", __func__); in mux_stdio_confirm() 1063 debug3("%s: sending success reply", __func__); in mux_stdio_confirm() 1140 debug3("%s: channel %d: hello sent", __func__, c->self); in mux_master_read_cb() 1157 debug3("%s: channel %d packet type 0x%08x len %u", in mux_master_read_cb() 1202 debug3("%s: channel %d: exit message, exitval %d", __func__, c->self, in mux_exit_message() 1225 debug3("%s: channel %d: TTY alloc failed", __func__, c->self); in mux_tty_alloc_failed() [all …]
|
D | msg.c | 50 debug3("ssh_msg_send: type %u", (unsigned int)type & 0xff); in ssh_msg_send() 72 debug3("ssh_msg_recv entering"); in ssh_msg_recv()
|
D | sandbox-capsicum.c | 59 debug3("%s: preparing capsicum sandbox", __func__); in ssh_sandbox_init() 113 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | ssh_api.c | 439 debug3("%s: need %d", __func__, type); in _ssh_host_public_key() 441 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_public_key() 454 debug3("%s: need %d", __func__, type); in _ssh_host_private_key() 456 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_private_key() 469 debug3("%s: need %s", __func__, sshkey_type(hostkey)); in _ssh_verify_host_key() 471 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_verify_host_key()
|
D | auth-bsdauth.c | 75 debug3("bsdauth_query: style %s", in bsdauth_query() 114 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
|
D | sftp-server.c | 520 debug3("request %u: sent status %u", id, status); in send_status() 692 debug3("request %u: open flags %d", id, pflags); in process_open() 729 debug3("request %u: close handle %u", id, handle); in process_close() 831 debug3("request %u: %sstat", id, do_lstat ? "l" : ""); in process_do_stat() 1018 debug3("request %u: opendir", id); in process_opendir() 1103 debug3("request %u: remove", id); in process_remove() 1124 debug3("request %u: mkdir", id); in process_mkdir() 1141 debug3("request %u: rmdir", id); in process_rmdir() 1163 debug3("request %u: realpath", id); in process_realpath() 1187 debug3("request %u: rename", id); in process_rename() [all …]
|
D | sshconnect2.c | 145 debug3("%s: prefer hostkeyalgs: %s", __func__, first); in order_hostkeyalgs() 473 debug3("input_userauth_banner"); in input_userauth_banner() 1015 debug3("sign_and_send_pubkey: %s %s", key_type(id->key), fp); in sign_and_send_pubkey() 1020 debug3("sign_and_send_pubkey: cannot handle key"); in sign_and_send_pubkey() 1097 debug3("send_pubkey_test"); in send_pubkey_test() 1101 debug3("send_pubkey_test: cannot handle key"); in send_pubkey_test() 1129 (userprovided ? logit : debug3)("no such identity: %s: %s", in load_identity_file() 1386 debug3("userauth_kbdint: disable: no info_req_seen"); in userauth_kbdint() 1514 debug3("%s: [child] pid=%ld, exec %s", in ssh_keysign() 1605 debug3("%s: trying key type %s", __func__, in userauth_hostbased() [all …]
|
D | monitor_fdpass.c | 92 debug3("%s: sendmsg(%d): %s", __func__, fd, strerror(errno)); in mm_send_fd() 149 debug3("%s: recvmsg: %s", __func__, strerror(errno)); in mm_receive_fd()
|
D | entropy.c | 204 debug3("rexec_recv_rng_seed: seeding rng with %u bytes", len); in rexec_recv_rng_seed() 222 debug3("RNG is ready, skipping seeding"); in seed_rng()
|
D | auth2.c | 369 debug3("%s: failure partial=%d next methods=\"%s\"", __func__, in userauth_finish() 512 debug3("%s: checking methods", __func__); in auth2_setup_methods_lists() 600 debug3("%s: updating methods list after \"%s\"", __func__, method); in auth2_update_methods_lists() 610 debug3("authentication methods list %d remaining: \"%s\"", in auth2_update_methods_lists()
|
D | auth-rhosts.c | 237 debug3("%s: no hosts access files exist", __func__); in auth_rhosts2_raw() 246 debug3("%s: root user, ignoring system hosts files", __func__); in auth_rhosts2_raw()
|
D | ssh.c | 357 debug3("%s: check \"%s\" CNAME \"%s\"", __func__, *namep, cname); in check_follow_cname() 416 debug3("%s: not canonicalizing hostname \"%s\" (max dots %d)", in resolve_canonicalize() 425 debug3("%s: attempting \"%s\" => \"%s\"", __func__, in resolve_canonicalize() 1137 debug3("expanding LocalCommand: %s", options.local_command); in main() 1150 debug3("expanded LocalCommand: %s", options.local_command); in main() 1208 debug3("timeout: %d ms remain after connect", timeout_ms); in main() 1341 debug3("clear hostkey %d", i); in main() 1502 debug3("%s: %s:%d", __func__, stdio_forward_host, stdio_forward_port); in ssh_init_stdio_forwarding() 1848 debug3("ssh_session2_open: channel_new: %d", c->self); in ssh_session2_open()
|
/external/openssh/openbsd-compat/ |
D | port-aix.c | 87 debug3("AIX/UsrInfo: set len %d", i); in aix_usrinfo() 141 debug3("AIX SYSTEM attribute %s", sys); in aix_valid_authentications() 154 debug3("AIX auth1 attribute list member %s", p); in aix_valid_authentications() 183 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd() 207 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 247 debug3("%s: not checking", __func__); in sys_auth_allowed_user() 266 debug3("AIX/loginrestrictions returned %d msg %.100s", result, msg); in sys_auth_allowed_user() 337 debug3("%s: Could not open userdb to read", __func__); in aix_setauthdb() 343 debug3("AIX/setauthdb set registry '%s'", registry); in aix_setauthdb() 345 debug3("AIX/setauthdb set registry '%s' failed: %s", in aix_setauthdb() [all …]
|
D | port-linux.c | 115 debug3("%s: setting execution context", __func__); in ssh_selinux_setup_exec_context() 134 debug3("%s: done", __func__); in ssh_selinux_setup_exec_context() 148 debug3("%s: setting TTY context on %s", __func__, tty); in ssh_selinux_setup_pty() 175 debug3("%s: done", __func__); in ssh_selinux_setup_pty() 204 switchlog = debug3; in ssh_selinux_change_context() 213 debug3("%s: setting context from '%s' to '%s'", __func__, in ssh_selinux_change_context() 267 debug3("%s", __func__); in oom_adjust_setup() 297 debug3("%s", __func__); in oom_adjust_restore()
|
/external/kernel-headers/original/uapi/linux/ |
D | baycom.h | 18 long debug3; member
|