/external/openssh/ |
auth2-chall.c | 186 debug2("kbdint_next_device: devices %s", kbdintctxt->devices ? 229 debug2("auth2_challenge_start: devices %s",
|
auth2-pubkey.c | 89 debug2("userauth_pubkey: disabled because of invalid user"); 94 debug2("userauth_pubkey: SSH_BUG_PKAUTH"); 209 debug2("userauth_pubkey: authenticated %d pkalg %s", authenticated, pkalg); 745 debug2("user_key_allowed: check options: '%s'", cp); 757 debug2("user_key_allowed: advance: '%s'", cp); 824 debug2("key not found"); 845 debug2("%s: CA %s %s is not listed in %s", __func__,
|
ssh-ed25519.c | 144 debug2("%s: crypto_sign_ed25519_open failed: %d",
|
addrmatch.c | 385 debug2("%s: couldn't parse address %.100s", __func__, addr); 445 debug2("%s: couldn't parse address %.100s", __func__, addr);
|
kex.c | 271 debug2("kex_parse_kexinit: %s", proposal[i]); 279 debug2("first_kex_follows %d ", v); 280 debug2("reserved %u ", i); 637 debug2("proposal mismatch: my %s peer %s", 642 debug2("proposals match");
|
clientloop.c | 273 debug2("%s: cancel scheduled exit", __func__); 279 debug2("%s: schedule exit in %d seconds", __func__, 367 debug2("x11_get_proto: %s", cmd); 394 debug2("x11_get_proto: %s", cmd); 539 debug2("client_check_window_change: changed"); 805 debug2("%s request accepted on channel %d", [all...] |
session.c | 320 debug2("compression disabled"); 338 debug2("SSH_PROTOFLAG_SCREEN_NUMBER: %d", screen_flag); 342 debug2("Buggy client: " [all...] |
ssh_api.c | 517 debug2("%s: orig/%d %s", __func__, ssh->kex->server, orig); 518 debug2("%s: replace/%d %s", __func__, ssh->kex->server, replace);
|
auth-rhosts.c | 208 debug2("auth_rhosts2: clientuser %s hostname %s ipaddr %s",
|
dh.c | 247 debug2("bits set: %d/%d", bits_set, BN_num_bits(dh->p));
|
ssh-keysign.c | 134 debug2("%s: check expect chost %s got %s", __func__, host, p);
|
sshconnect1.c | 283 debug2("no passphrase given, try next key"); 290 debug2("bad passphrase given, try again...");
|
log.c | 103 { "DEBUG2", SYSLOG_LEVEL_DEBUG2 }, 217 debug2(const char *fmt,...) function 419 txt = "debug2";
|
misc.c | 95 debug2("fd %d setting O_NONBLOCK", fd); 150 debug2("fd %d is TCP_NODELAY", fd); 154 debug2("fd %d setting TCP_NODELAY", fd);
|
ssh.c | 302 debug2("%s: could not resolve name %.100s as address: %s", 399 debug2("%s: hostname %.100s is address", __func__, *hostp); 401 debug2("%s: canonicalised address \"%s\" => \"%s\"", 445 debug2("%s: host %s not found in any suffix", __func__, *hostp); [all...] |
sftp-client.c | 417 debug2("Remote version: %u", ret->version); 451 debug2("Server supports extension \"%s\" revision %s", 454 debug2("Unrecognised server extension \"%s\"", name); 682 debug2("Sending SSH2_FXP_REMOVE \"%s\"", path); [all...] |
sshconnect.c | 435 debug2("ssh_connect: needpriv %d", needpriv); [all...] |
sftp-server.c | 176 debug2("Permitting whitelisted %s request", h->name); 753 debug2("read change len %d", len); 811 debug2("nothing at all written"); [all...] |
ssh-pkcs11.c | 643 debug2("%s: ignoring uninitialised token in slot %lu",
|
krl.c | [all...] |
readconf.c | 388 debug2("%s: ignoring duplicate key %s", __func__, path); 512 debug2("checking match for '%s' host %s originally %s", 622 debug2("match %sfound", result ? "" : "not "); [all...] |
servconf.c | [all...] |
auth-pam.c | 819 debug2("PAM: %s entering, %u responses", __func__, num);
|
serverloop.c | 166 debug2("notify_done: reading"); [all...] |
/external/ipsec-tools/src/racoon/ |
cftoken.l | 191 <S_LOG>debug2 { YYD; yylval.num = LLV_DEBUG2; return(LOGLEV); } 192 <S_LOG>debug3 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(LOGLEV); } 193 <S_LOG>debug4 { YYD; yywarn("it is obsoleted. use \"debug2\""); yylval.num = LLV_DEBUG2; return(LOGLEV); }
|