/external/openssh/ |
D | monitor_wrap.c | 136 debug3("%s entering: type %d", __func__, type); in mm_request_send() 152 debug3("%s entering", __func__); in mm_request_receive() 173 debug3("%s entering: type %d", __func__, type); in mm_request_receive_expect() 197 debug3("%s: waiting for MONITOR_ANS_MODULI", __func__); in mm_choose_dh() 211 debug3("%s: remaining %d", __func__, buffer_len(&m)); in mm_choose_dh() 225 debug3("%s entering", __func__); in mm_key_sign() 234 debug3("%s: waiting for MONITOR_ANS_SIGN", __func__); in mm_key_sign() 250 debug3("%s entering", __func__); in mm_getpwnamallow() 257 debug3("%s: waiting for MONITOR_ANS_PWNAM", __func__); in mm_getpwnamallow() 311 debug3("%s entering", __func__); in mm_auth2_read_banner() [all …]
|
D | auth-shadow.c | 64 debug3("%s: today %d sp_expire %d days left %d", __func__, (int)today, in auth_shadow_acctexpired() 68 debug3("account expiration disabled"); in auth_shadow_acctexpired() 73 debug3("account will expire in %d days", daysleft); in auth_shadow_acctexpired() 102 debug3("%s: today %d sp_lstchg %d sp_max %d", __func__, (int)today, in auth_shadow_pwexpired() 123 debug3("password expiration disabled"); in auth_shadow_pwexpired() 128 debug3("password expiration disabled"); in auth_shadow_pwexpired() 133 debug3("password will expire in %d days", daysleft); in auth_shadow_pwexpired()
|
D | sandbox-systrace.c | 104 debug3("%s: preparing systrace sandbox", __func__); in ssh_sandbox_init() 116 debug3("%s: ready", __func__); in ssh_sandbox_child() 120 debug3("%s: started", __func__); in ssh_sandbox_child() 132 debug3("%s: wait for child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 146 debug3("%s: child %ld stopped", __func__, (long)child_pid); in ssh_sandbox_parent() 157 debug3("%s: systrace attach, fd=%d", __func__, box->systrace_fd); in ssh_sandbox_parent() 190 debug3("%s: policy: enable syscall %d", __func__, i); in ssh_sandbox_parent() 197 debug3("%s: start child %ld", __func__, (long)child_pid); in ssh_sandbox_parent() 209 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | monitor.c | 290 debug3("preauth child monitor started"); in monitor_child_preauth() 318 debug3("%s: method %s: partial", __func__, in monitor_child_preauth() 499 debug3("%s: checking request %d", __func__, type); in monitor_read() 569 debug3("%s: got parameters: %d %d %d", in mm_answer_moduli() 609 debug3("%s", __func__); in mm_answer_sign() 676 debug3("%s: %s signature %p(%zu)", __func__, in mm_answer_sign() 706 debug3("%s", __func__); in mm_answer_pwnamallow() 772 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); in mm_answer_pwnamallow() 807 debug3("%s: service=%s, style=%s", in mm_answer_authserv() 846 debug3("%s: sending result %d", __func__, authenticated); in mm_answer_authpassword() [all …]
|
D | sandbox-darwin.c | 52 debug3("%s: preparing Darwin sandbox", __func__); in ssh_sandbox_init() 65 debug3("%s: starting Darwin sandbox", __func__); in ssh_sandbox_child() 90 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | auth-pam.c | 291 debug3("%s %d", __func__, reqd); in sshpam_password_change_required() 314 debug3("PAM: %s entering", __func__); in import_environments() 327 debug3("PAM: num env strings %d", num_env); in import_environments() 362 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_thread_conv() 534 debug3("PAM: %s entering", __func__); in sshpam_thread_cleanup() 549 debug3("PAM: %s entering, %d messages", __func__, n); in sshpam_null_conv() 563 debug3("PAM: %s called with %d messages", __func__, n); in sshpam_store_conv() 677 debug3("PAM: %s entering", __func__); in sshpam_init_ctx() 725 debug3("PAM: %s entering", __func__); in sshpam_query() 767 debug3("PAM: %s", pam_strerror(sshpam_handle, type)); in sshpam_query() [all …]
|
D | sandbox-seccomp-filter.c | 263 debug3("%s: preparing seccomp filter sandbox", __func__); in ssh_sandbox_init() 292 debug3("%s: installing SIGSYS handler", __func__); in ssh_sandbox_child_debugging() 329 debug3("%s: setting PR_SET_NO_NEW_PRIVS", __func__); in ssh_sandbox_child() 335 debug3("%s: attaching seccomp filter program", __func__); in ssh_sandbox_child() 348 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | sftp-client.c | 180 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_request() 199 debug3("Sent message fd %d T:%u I:%u", conn->fd_out, code, id); in send_string_attrs_request() 228 debug3("SSH2_FXP_STATUS %u", status); in get_status() 295 debug3("Received stat reply T:%u I:%u", type, id); in get_decode_stat() 341 debug3("Received statvfs reply T:%u I:%u", type, id); in get_decode_statvfs() 506 debug3("Sent message SSH2_FXP_CLOSE I:%u", id); in do_close() 558 debug3("Sending SSH2_FXP_READDIR I:%u", id); in do_lsreaddir() 575 debug3("Received reply T:%u I:%u", type, id); in do_lsreaddir() 586 debug3("Received SSH2_FXP_STATUS %d", rstatus); in do_lsreaddir() 601 debug3("Received %d SSH2_FXP_NAME responses", count); in do_lsreaddir() [all …]
|
D | sandbox-pledge.c | 49 debug3("%s: preparing pledge sandbox", __func__); in ssh_sandbox_init() 67 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | mux.c | 200 debug3("%s: entering for channel %d", __func__, cid); in mux_master_session_cleanup_cb() 221 debug3("%s: entering for channel %d", __func__, cid); in mux_master_control_cleanup_cb() 400 debug3("%s: got fds stdin %d, stdout %d, stderr %d", __func__, in process_mux_new_session() 985 debug3("%s: got fds stdin %d, stdout %d", __func__, in process_mux_stdio_fwd() 1057 debug3("%s: sending failure reply", __func__); in mux_stdio_confirm() 1066 debug3("%s: sending success reply", __func__); in mux_stdio_confirm() 1155 debug3("%s: channel %d: hello sent", __func__, c->self); in mux_master_read_cb() 1172 debug3("%s: channel %d packet type 0x%08x len %u", in mux_master_read_cb() 1217 debug3("%s: channel %d: exit message, exitval %d", __func__, c->self, in mux_exit_message() 1240 debug3("%s: channel %d: TTY alloc failed", __func__, c->self); in mux_tty_alloc_failed() [all …]
|
D | sandbox-rlimit.c | 52 debug3("%s: preparing rlimit sandbox", __func__); in ssh_sandbox_init() 87 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | audit-bsm.c | 271 debug3("BSM audit: typ %d rc %d \"%s\"", typ, rc, string); in bsm_audit_record() 275 debug3("BSM audit: writing audit new record"); in bsm_audit_record() 358 debug3("BSM audit: connection from %.100s port %d", host, port); in audit_connection_from() 366 debug3("BSM audit: iptype %d machine ID %s", (int)tid->at_type, buf); in audit_connection_from() 372 debug3("BSM audit: machine ID %s", buf); in audit_connection_from()
|
D | msg.c | 50 debug3("ssh_msg_send: type %u", (unsigned int)type & 0xff); in ssh_msg_send() 72 debug3("ssh_msg_recv entering"); in ssh_msg_recv()
|
D | dh.c | 443 debug3("%s: requested max size %d", __func__, max); in dh_new_group_fallback() 445 debug3("using 2k bit group 14"); in dh_new_group_fallback() 448 debug3("using 4k bit group 16"); in dh_new_group_fallback() 451 debug3("using 8k bit group 18"); in dh_new_group_fallback()
|
D | sandbox-capsicum.c | 59 debug3("%s: preparing capsicum sandbox", __func__); in ssh_sandbox_init() 113 debug3("%s: finished", __func__); in ssh_sandbox_parent_finish()
|
D | auth-bsdauth.c | 75 debug3("bsdauth_query: style %s", in bsdauth_query() 114 debug3("bsdauth_respond: <%s> = <%d>", responses[0], authok); in bsdauth_respond()
|
D | sftp-server.c | 516 debug3("request %u: sent status %u", id, status); in send_status() 688 debug3("request %u: open flags %d", id, pflags); in process_open() 725 debug3("request %u: close handle %u", id, handle); in process_close() 827 debug3("request %u: %sstat", id, do_lstat ? "l" : ""); in process_do_stat() 1014 debug3("request %u: opendir", id); in process_opendir() 1099 debug3("request %u: remove", id); in process_remove() 1120 debug3("request %u: mkdir", id); in process_mkdir() 1137 debug3("request %u: rmdir", id); in process_rmdir() 1159 debug3("request %u: realpath", id); in process_realpath() 1183 debug3("request %u: rename", id); in process_rename() [all …]
|
D | ssh_api.c | 443 debug3("%s: need %d", __func__, type); in _ssh_host_public_key() 445 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_public_key() 458 debug3("%s: need %d", __func__, type); in _ssh_host_private_key() 460 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_host_private_key() 473 debug3("%s: need %s", __func__, sshkey_type(hostkey)); in _ssh_verify_host_key() 475 debug3("%s: check %s", __func__, sshkey_type(k->key)); in _ssh_verify_host_key()
|
D | sshconnect2.c | 146 debug3("%s: prefer hostkeyalgs: %s", __func__, first); in order_hostkeyalgs() 505 debug3("%s", __func__); in input_userauth_banner() 1077 debug3("%s: %s %s", __func__, key_type(id->key), fp); in sign_and_send_pubkey() 1082 debug3("sign_and_send_pubkey: cannot handle key"); in sign_and_send_pubkey() 1205 debug3("send_pubkey_test"); in send_pubkey_test() 1209 debug3("send_pubkey_test: cannot handle key"); in send_pubkey_test() 1237 (id->userprovided ? logit : debug3)("no such identity: %s: %s", in load_identity_file() 1532 debug3("userauth_kbdint: disable: no info_req_seen"); in userauth_kbdint() 1660 debug3("%s: [child] pid=%ld, exec %s", in ssh_keysign() 1751 debug3("%s: trying key type %s", __func__, in userauth_hostbased() [all …]
|
D | monitor_fdpass.c | 92 debug3("%s: sendmsg(%d): %s", __func__, fd, strerror(errno)); in mm_send_fd() 148 debug3("%s: recvmsg: %s", __func__, strerror(errno)); in mm_receive_fd()
|
D | entropy.c | 204 debug3("rexec_recv_rng_seed: seeding rng with %u bytes", len); in rexec_recv_rng_seed() 222 debug3("RNG is ready, skipping seeding"); in seed_rng()
|
D | auth2.c | 375 debug3("%s: failure partial=%d next methods=\"%s\"", __func__, in userauth_finish() 518 debug3("%s: checking methods", __func__); in auth2_setup_methods_lists() 606 debug3("%s: updating methods list after \"%s\"", __func__, method); in auth2_update_methods_lists() 616 debug3("authentication methods list %d remaining: \"%s\"", in auth2_update_methods_lists()
|
/external/openssh/openbsd-compat/ |
D | port-aix.c | 87 debug3("AIX/UsrInfo: set len %d", i); in aix_usrinfo() 141 debug3("AIX SYSTEM attribute %s", sys); in aix_valid_authentications() 154 debug3("AIX auth1 attribute list member %s", p); in aix_valid_authentications() 183 debug3("AIX/authenticate result %d, authmsg %.100s", result, in sys_auth_passwd() 207 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 247 debug3("%s: not checking", __func__); in sys_auth_allowed_user() 266 debug3("AIX/loginrestrictions returned %d msg %.100s", result, msg); in sys_auth_allowed_user() 337 debug3("%s: Could not open userdb to read", __func__); in aix_setauthdb() 343 debug3("AIX/setauthdb set registry '%s'", registry); in aix_setauthdb() 345 debug3("AIX/setauthdb set registry '%s' failed: %s", in aix_setauthdb() [all …]
|
D | port-linux.c | 113 debug3("%s: setting execution context", __func__); in ssh_selinux_setup_exec_context() 132 debug3("%s: done", __func__); in ssh_selinux_setup_exec_context() 146 debug3("%s: setting TTY context on %s", __func__, tty); in ssh_selinux_setup_pty() 173 debug3("%s: done", __func__); in ssh_selinux_setup_pty() 202 switchlog = debug3; in ssh_selinux_change_context() 211 debug3("%s: setting context from '%s' to '%s'", __func__, in ssh_selinux_change_context() 265 debug3("%s", __func__); in oom_adjust_setup() 295 debug3("%s", __func__); in oom_adjust_restore()
|
/external/kernel-headers/original/uapi/linux/ |
D | baycom.h | 18 long debug3; member
|