/external/openssh/ |
D | nchan.c | 95 debug2("channel %d: input %s -> %s", c->self, istates[c->istate], in chan_set_istate() 104 debug2("channel %d: output %s -> %s", c->self, ostates[c->ostate], in chan_set_ostate() 116 debug2("channel %d: rcvd oclose", c->self); in chan_rcvd_oclose1() 140 debug2("channel %d: read failed", c->self); in chan_read_failed() 155 debug2("channel %d: ibuf empty", c->self); in chan_ibuf_empty() 181 debug2("channel %d: rcvd ieof", c->self); in chan_rcvd_ieof1() 198 debug2("channel %d: write failed", c->self); in chan_write_failed1() 219 debug2("channel %d: obuf empty", c->self); in chan_obuf_empty() 241 debug2("channel %d: send ieof", c->self); in chan_send_ieof1() 258 debug2("channel %d: send oclose", c->self); in chan_send_oclose1() [all …]
|
D | auth2-hostbased.c | 70 debug2("userauth_hostbased: disabled because of invalid user"); in userauth_hostbased() 147 debug2("userauth_hostbased: authenticated %d", authenticated); in userauth_hostbased() 174 debug2("%s: chost %s resolvedname %s ipaddr %s", __func__, in hostbased_key_allowed() 178 debug2("stripping trailing dot from chost %s", chost); in hostbased_key_allowed() 184 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed() 196 debug2("%s: auth_rhosts2 refused " in hostbased_key_allowed() 203 debug2("%s: access allowed by auth_rhosts2", __func__); in hostbased_key_allowed()
|
D | compat.c | 272 debug2("Compat: skipping algorithm \"%s\"", cp); in filter_proposal() 287 debug2("%s: original cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal() 289 debug2("%s: compat cipher proposal: %s", __func__, cipher_prop); in compat_cipher_proposal() 300 debug2("%s: original public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal() 302 debug2("%s: compat public key proposal: %s", __func__, pkalg_prop); in compat_pkalg_proposal() 313 debug2("%s: original KEX proposal: %s", __func__, p); in compat_kex_proposal() 320 debug2("%s: compat KEX proposal: %s", __func__, p); in compat_kex_proposal()
|
D | moduli.c | 346 debug2("start point: 0x%s", BN_bn2hex(largebase)); in gen_candidates() 423 debug2("test q = largebase+%u", 2 * j); in gen_candidates() 607 debug2("%.24s Final %u Miller-Rabin trials (%x generator)", in prime_test() 632 debug2("%10u: comment or short line", count_in); in prime_test() 647 debug2("%10u: known composite", count_in); in prime_test() 666 debug2("%10u: (%u) Sophie-Germain", count_in, in_type); in prime_test() 683 debug2("%10u: (%u)", count_in, in_type); in prime_test() 692 debug2("Unknown prime type"); in prime_test() 701 debug2("%10u: bit size %u mismatch", count_in, in_size); in prime_test() 705 debug2("%10u: bit size %u too short", count_in, in_size); in prime_test() [all …]
|
D | channels.c | 263 debug2("channel %d: rfd %d isatty", c->self, c->rfd); in channel_register_fds() 315 debug2("channel: expanding %d", channels_alloc); in channel_new() 515 debug2("channel %d: big input buffer %d", in channel_not_very_much_buffered_data() 521 debug2("channel %d: big output buffer %u > %u", in channel_not_very_much_buffered_data() 693 debug2("channel %d: send open", id); in channel_send_open() 711 debug2("channel %d: request %s confirm %d", id, service, wantconfirm); in channel_request_start() 859 debug2("channel %d: obuf_empty delayed efd %d/(%d)", in channel_pre_open() 889 debug2("channel %d: closing after input drain.", c->self); in channel_pre_input_draining() 938 debug2("Initial X11 packet contains bad byte order byte: 0x%x", in x11_open_helper() 951 debug2("X11 connection uses different authentication protocol."); in x11_open_helper() [all …]
|
D | auth-bsdauth.c | 65 debug2("bsdauth_query: try reuse session"); in bsdauth_query() 74 debug2("bsdauth_query: new bsd auth session"); in bsdauth_query() 81 debug2("bsdauth_query: <%s>", challenge ? challenge : "empty"); in bsdauth_query()
|
D | mux.c | 229 debug2("%s: channel %d: not open", __func__, sc->self); in mux_master_control_cleanup_cb() 287 debug2("%s: channel %d slave version %u", __func__, c->self, ver); in process_mux_master_hello() 299 debug2("Unrecognised slave extension \"%s\"", name); in process_mux_master_hello() 364 debug2("%s: channel %d: request tty %d, X %d, agent %d, subsys %d, " in process_mux_new_session() 402 debug2("%s: session already open", __func__); in process_mux_new_session() 425 debug2("%s: session refused by user", __func__); in process_mux_new_session() 467 debug2("%s: channel_new: %d linked to control channel %d", in process_mux_new_session() 482 debug2("%s: channel %d: alive check", __func__, c->self); in process_mux_alive_check() 495 debug2("%s: channel %d: terminate request", __func__, c->self); in process_mux_terminate() 501 debug2("%s: termination refused by user", __func__); in process_mux_terminate() [all …]
|
D | hostfile.c | 80 debug2("extract_salt: string too short"); in extract_salt() 84 debug2("extract_salt: invalid magic identifier"); in extract_salt() 90 debug2("extract_salt: missing salt termination character"); in extract_salt() 97 debug2("extract_salt: bad encoded salt length %u", b64len); in extract_salt() 107 debug2("extract_salt: salt decode error"); in extract_salt() 111 debug2("extract_salt: expected salt len %zd, got %d", in extract_salt() 733 debug2("%s: %s:%ld: bad host hash \"%.32s\"", in hostkeys_foreach() 746 debug2("%s: %s:%ld: bad ip hash " in hostkeys_foreach() 770 debug2("%s:%ld: truncated before key type", in hostkeys_foreach() 832 debug2("%s:%ld: truncated after key type", in hostkeys_foreach()
|
D | sshconnect2.c | 378 debug2("service_accept: %s", reply); in ssh_userauth2() 381 debug2("buggy server: service_accept w/o service"); in ssh_userauth2() 448 debug2("we sent a %s packet, wait for reply", method->name); in userauth() 451 debug2("we did not send a packet, disable method"); in userauth() 564 debug2("input_userauth_pk_ok: SSH_BUG_PKOK"); in input_userauth_pk_ok() 595 debug2("input_userauth_pk_ok: fp %s", fp); in input_userauth_pk_ok() 915 debug2("input_userauth_passwd_changereq"); in input_userauth_passwd_changereq() 1141 debug2("no passphrase given, try next key"); in load_identity_file() 1156 debug2("bad passphrase given, try again..."); in load_identity_file() 1160 debug2("Load key \"%s\": %s", in load_identity_file() [all …]
|
D | auth2.c | 238 debug2("input_userauth_request: setting up authctxt for %s", user); in input_userauth_request() 280 debug2("input_userauth_request: try method %s", method); in input_userauth_request() 446 debug2("Unrecognized authentication method name: %s", in authmethod_lookup() 607 debug2("authentication methods list %d complete", i); in auth2_update_methods_lists()
|
D | auth2-pubkey.c | 89 debug2("userauth_pubkey: disabled because of invalid user"); in userauth_pubkey() 94 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); in userauth_pubkey() 209 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); in userauth_pubkey() 745 debug2("user_key_allowed: check options: '%s'", cp); in check_authkeys_file() 757 debug2("user_key_allowed: advance: '%s'", cp); in check_authkeys_file() 824 debug2("key not found"); in check_authkeys_file() 845 debug2("%s: CA %s %s is not listed in %s", __func__, in user_cert_trusted_ca()
|
D | log.h | 69 void debug2(const char *, ...) __attribute__((format(printf, 1, 2)));
|
D | kex.c | 271 debug2("kex_parse_kexinit: %s", proposal[i]); in kex_buf2prop() 279 debug2("first_kex_follows %d ", v); in kex_buf2prop() 280 debug2("reserved %u ", i); in kex_buf2prop() 637 debug2("proposal mismatch: my %s peer %s", in proposals_match() 642 debug2("proposals match"); in proposals_match()
|
D | auth2-chall.c | 186 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? in kbdint_next_device() 229 debug2("auth2_challenge_start: devices %s", in auth2_challenge_start()
|
D | addrmatch.c | 385 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_list() 445 debug2("%s: couldn't parse address %.100s", __func__, addr); in addr_match_cidr_list()
|
D | dispatch.c | 114 debug2("skipped packet (type %u)", type); in ssh_dispatch_run()
|
D | clientloop.c | 273 debug2("%s: cancel scheduled exit", __func__); in set_control_persist_exit_time() 279 debug2("%s: schedule exit in %d seconds", __func__, in set_control_persist_exit_time() 367 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto() 394 debug2("x11_get_proto: %s", cmd); in client_x11_get_proto() 539 debug2("client_check_window_change: changed"); in client_check_window_change() 805 debug2("%s request accepted on channel %d", in client_status_confirm() 1913 debug2("buggy server: x11 request w/o originator_port"); in client_request_x11() 2509 debug2("%s: id %d", __func__, id); in client_session2_setup()
|
D | session.c | 320 debug2("compression disabled"); in do_authenticated1() 338 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag); in do_authenticated1() 342 debug2("Buggy client: " in do_authenticated1() 1921 debug2("%s: allocate (allocated %d max %d)", in session_new() 2145 debug2("subsystem request for %.100s by user %s", s->subsys, in session_subsystem_req() 2243 debug2("Ignoring env request %s: too many env vars", name); in session_env_req() 2249 debug2("Setting env %d: %s=%s", s->num_env, name, val); in session_env_req() 2258 debug2("Ignoring env request %s: disallowed name", name); in session_env_req()
|
D | ssh-ed25519.c | 144 debug2("%s: crypto_sign_ed25519_open failed: %d", in ssh_ed25519_verify()
|
/external/openssh/openbsd-compat/ |
D | port-solaris.c | 86 debug2("%s: setting up process contract template on fd %d", in solaris_contract_pre_fork() 129 debug2("%s: clearing process contract template on fd %d", in solaris_contract_post_fork_child() 148 debug2("%s: clearing template (fd %d)", __func__, tmpl_fd); in solaris_contract_post_fork_parent() 172 debug2("%s: abandoning contract id %ld", __func__, ctid); in solaris_contract_post_fork_parent()
|
D | getrrsetbyname-ldns.c | 147 debug2("ldns: got %u answers from DNS", rrset->rri_nrdatas); in getrrsetbyname() 155 debug2("ldns: trying to validate RRset"); in getrrsetbyname() 161 debug2("ldns: got %u signature(s) (RRTYPE %u) from DNS", in getrrsetbyname() 167 debug2("ldns: RRset is signed with a valid key"); in getrrsetbyname() 169 debug2("ldns: RRset validation failed: %s", in getrrsetbyname()
|
/external/ipsec-tools/src/racoon/ |
D | cftoken.l | 192 <S_LOG>debug3 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L… 193 <S_LOG>debug4 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(L…
|
/external/elfutils/tests/ |
D | run-strip-reloc.sh | 24 tempfiles out.stripped1 out.debug1 out.stripped2 out.debug2 33 debugfile2=out.debug2
|
/external/kernel-headers/original/uapi/linux/ |
D | baycom.h | 17 unsigned long debug2; member
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample | 18 # or "debug2".
|