/netbsd-src/usr.sbin/ldpd/ |
H A D | ldp_errors.c | 45 int debug_f = 0, warn_f = 0, syslog_f = 0; variable 57 if (!debug_f) in debugp() 73 if (!debug_f && !warn_f) in warnp()
|
H A D | main.c | 57 extern int debug_f, warn_f, syslog_f; 80 debug_f = 1; in main()
|
H A D | ldp_command.c | 56 min_label, max_label, debug_f, warn_f; 536 debug_f ? "YES" : "NO"); in show_debug() 624 debug_f = atoi(recvspace); in set_debug()
|
H A D | mpls_routes.c | 64 extern int debug_f, warn_f; 718 if (!debug_f && !warn_f) { in check_route()
|
/netbsd-src/crypto/external/bsd/openssh/dist/ |
H A D | serverloop.c | 440 debug_f("originator %s port %u, target %s port %u", in server_request_direct_tcpip() 485 debug_f("originator %s port %d, target %s", in server_request_direct_streamlocal() 533 debug_f("invalid tun"); in server_request_tun() 623 debug_f("ctype %s rchan %u win %u max %u", in server_input_channel_open() 636 debug_f("confirm %s", ctype); in server_input_channel_open() 653 debug_f("failure %s", ctype); in server_input_channel_open() 770 debug_f("rtype %s want_reply %d", rtype, want_reply); in server_input_global_request() 777 debug_f("tcpip-forward listen %s port %u", in server_input_global_request() 804 debug_f("cancel-tcpip-forward addr %s port %d", in server_input_global_request() 813 debug_f("streamlocal-forward listen path %s", in server_input_global_request() [all …]
|
H A D | ssh-agent.c | 298 debug_f("user %s hostname %s is_ca %d nkeys %u", in dump_dest_constraint_hop() 308 debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys, in dump_dest_constraint_hop() 325 debug_f("%s: %zu constraints", context, ndcs); in dump_dest_constraints() 327 debug_f("constraint %zu / %zu: from: ", i, ndcs); in dump_dest_constraints() 329 debug_f("constraint %zu / %zu: to: ", i, ndcs); in dump_dest_constraints() 332 debug_f("done for %s", context); in dump_dest_constraints() 396 debug_f("cert %s / hostname %s rejected: %s", in match_key_hop() 628 debug_f("key %u / %u: %s %s", i++, idtab->nentries, in process_request_identities() 803 debug_f("signed data matches public key userauth request"); in check_websafe_message_contents() 807 debug_f("signed data matches SSHSIG signature request"); in check_websafe_message_contents() [all …]
|
H A D | compat.c | 132 debug_f("match: %s pat %s compat 0x%08x", in compat_banner() 138 debug_f("no match: %s", version); in compat_banner()
|
H A D | ssh-sk-helper.c | 119 debug_f("ready to sign with key %s, provider %s: " in process_sign() 250 debug_f("key %zu %s %s uidlen %zu", i, in process_load_resident() 318 debug_f("received message len %zu", sshbuf_len(req)); in main() 349 debug_f("reply len %zu", sshbuf_len(resp)); in main()
|
H A D | readpass.c | 146 debug_f("requested to askpass"); in read_passphrase() 151 debug_f("stdin is not a tty"); in read_passphrase() 167 debug_f("can't open %s: %s", _PATH_TTY, in read_passphrase()
|
H A D | clientloop.c | 1708 debug_f("listen %s port %d, originator %s port %d", in client_request_forwarded_tcpip() 1764 debug_f("request: %s", listen_path); in client_request_forwarded_streamlocal() 1840 debug_f("bound agent to hostkey"); in client_request_agent() 2006 debug_f("no sink for exit-status on channel %d", in client_input_channel_req() 2227 debug_f("hostkeys file %s does not exist", in check_old_keys_othernames() 2322 debug_f("known hosts file %s does not " in update_known_hosts() 2402 debug_f("server used untrusted RSA signature algorithm " in client_global_hostkeys_prove_confirm() 2515 debug_f("server sent no hostkeys"); in client_input_hostkeys() 2532 debug_f("searching %s for %s / %s", in client_input_hostkeys() 2539 debug_f("hostkeys file %s does not exist", in client_input_hostkeys() [all …]
|
H A D | session.c | 1975 debug_f("signal %s, killpg(%ld, %d)", signame, (long)s->pid, sig); in session_signal_req() 2002 debug_f("agent forwarding disabled"); in session_auth_agent_req() 2023 debug_f("session %d req %s", s->self, rtype); in session_input_channel_req() 2093 debug_f("session %d release %s", s->self, s->tty); in session_pty_cleanup2() 2149 debug_f("x11 channel %d missing", id); in session_close_x11() 2152 debug_f("detach x11 channel %d", id); in session_close_x11() 2170 debug_f("session %d: closing channel %d", in session_close_single_x11() 2223 debug_f("session %d channel %d pid %ld %s", s->self, s->chanid, in session_exit_message() 2228 debug_f("release channel %d", s->chanid); in session_exit_message() 2283 debug_f("no session for pid %ld", (long)pid); in session_close_by_pid() [all …]
|
H A D | dns.c | 273 debug_f("matched SSHFP type %d fptype %d", in verify_host_key_dns() 277 debug_f("failed SSHFP type %d fptype %d", in verify_host_key_dns()
|
H A D | ssh-sk-client.c | 96 debug_f("starting %s %s", helper, in start_helper() 194 debug_f("helper returned error -%u", rerr); in client_converse() 448 debug_f("srks[%zu]: %s %s uidlen %zu", nsrks, in sshsk_load_resident()
|
H A D | sshsig.c | 313 debug_f("verify message length %zu", sshbuf_len(h_message)); in sshsig_wrap_verify() 354 debug_f("expected namespace \"%s\" received \"%s\"", in sshsig_wrap_verify() 361 debug_f("expected algorithm \"%s\" received \"%s\"", in sshsig_wrap_verify() 486 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verifyb() 614 debug_f("signature made with hash \"%s\"", hashalg); in sshsig_verify_fd() 777 debug_f("%s:%lu: matched principal \"%s\"", in parse_principals_key_and_options()
|
H A D | ssh.c | 347 debug_f("getaddrinfo %.100s returned no addresses", name); in resolve_addr() 351 debug_f("getaddrinfo %.100s returned multiple addresses", name); in resolve_addr() 356 debug_f("Could not format address for name %.100s: %s", in resolve_addr() 445 debug_f("hostname %.100s is an unrecognised address", *hostp); in resolve_canonicalize() 1800 debug_f("backgrounding master process"); in control_persist_detach() 1856 debug_f("all expected forwarding replies received"); in forwarding_success() 1951 debug_f("tunnel forward established, id=%d", id); in ssh_tun_confirm() 2086 debug_f("expecting replies for %d forwards", in ssh_init_forwarding() 2484 debug_f("key %s type %s is not a certificate", in load_public_identity_files() 2517 debug_f("key %s type %s is not a certificate", in load_public_identity_files()
|
H A D | sshconnect.c | 476 debug_f("bound to %s", ntop); in ssh_create_socket() 796 debug_f("found matching key in %s:%lu", path, l->linenum); in hostkeys_find_by_key_cb() 817 debug_f("hostkeys file %s does not exist", file); in hostkeys_find_by_key_hostfile() 1036 debug_f("invalid hostname \"%s\"; will not record: %s", in check_host_key() 1468 debug_f("hostkey not known or explicitly trusted: " in check_host_key()
|
H A D | auth2-pubkey.c | 239 debug_f("sk_counter = %u, sk_flags = 0x%02x", in userauth_pubkey() 273 debug_f("%s test pkalg %s pkblob %s%s%s", method, pkalg, key_s, in userauth_pubkey() 304 debug_f("key options inconsistent with existing"); in userauth_pubkey()
|
H A D | ttymodes.c | 266 debug_f("no fd or tio"); in ssh_tty_make_modes()
|
H A D | sshlogin.c | 121 debug_f("truncated lastlog"); in get_last_login_time()
|
H A D | auth2-hostbased.c | 80 debug_f("cuser %s chost %s pkalg %s slen %zu", in userauth_hostbased()
|
H A D | log.h | 96 #define debug_f(...) sshlog(__FILE__, __func__, __LINE__, 1, SYSLOG_LEVEL_DEBUG1, NULL, __VA_ARGS_… macro
|
H A D | misc.c | 1418 debug_f("invalid tunnel %u", tun); in tun_open() 1423 debug_f("%s open: %s", name, strerror(errno)); in tun_open() 1427 debug_f("%s mode %d fd %d", name, mode, fd); in tun_open() 1448 debug_f("get interface %s flags: %s", ifr.ifr_name, in tun_open() 1456 debug_f("activate interface %s: %s", ifr.ifr_name, in tun_open()
|
H A D | krl.c | 854 debug_f("cert extension %s critical %u len %zu", in cert_extension_subsection() 1033 debug_f("extension %s critical %u len %zu", in extension_section()
|
H A D | hostfile.c | 293 debug_f("fopen %s: %s", path, strerror(errno)); in load_hostkeys()
|
H A D | monitor_wrap.c | 144 debug_f("preauth child exited with status %d", in mm_reap()
|