Symbol: debug_f
usr.bin/ssh/auth.c
403
debug_f("key for %s found at %s:%ld",
usr.bin/ssh/auth.c
406
debug_f("key for host %s not found", host);
usr.bin/ssh/auth.c
667
debug_f("setting new authentication options");
usr.bin/ssh/auth.c
682
debug_f("restricting session");
usr.bin/ssh/auth2-hostbased.c
77
debug_f("cuser %s chost %s pkalg %s slen %zu",
usr.bin/ssh/auth2-pubkey.c
232
debug_f("sk_counter = %u, sk_flags = 0x%02x",
usr.bin/ssh/auth2-pubkey.c
266
debug_f("%s test pkalg %s pkblob %s%s%s", method, pkalg, key_s,
usr.bin/ssh/auth2-pubkey.c
297
debug_f("key options inconsistent with existing");
usr.bin/ssh/auth2.c
485
debug_f("unrecognized authentication method name: %s", name);
usr.bin/ssh/channels.c
1762
debug_f("%s:%d", host_to_connect, port_to_connect);
usr.bin/ssh/channels.c
2915
debug_f("pfd[%u].fd %d rev 0x%04x",
usr.bin/ssh/channels.c
4457
debug_f("requested forward not found");
usr.bin/ssh/channels.c
4493
debug_f("requested forward not found");
usr.bin/ssh/channels.c
4600
debug_f("index out of range: %d num_permitted_user %d",
usr.bin/ssh/channels.c
4646
debug_f("start for host %.100s ([%.100s]:%s)",
usr.bin/ssh/channels.c
4660
debug_f("host %.100s ([%.100s]:%s): %.100s",
usr.bin/ssh/channels.c
4669
debug_f("connect host %.100s ([%.100s]:%s) in progress, fd=%d",
usr.bin/ssh/channels.c
5009
debug_f("requested forward not permitted");
usr.bin/ssh/clientloop.c
1723
debug_f("listen %s port %d, originator %s port %d",
usr.bin/ssh/clientloop.c
1779
debug_f("request: %s", listen_path);
usr.bin/ssh/clientloop.c
1849
debug_f("bound agent to hostkey");
usr.bin/ssh/clientloop.c
2006
debug_f("no sink for exit-status on channel %d",
usr.bin/ssh/clientloop.c
2227
debug_f("hostkeys file %s does not exist",
usr.bin/ssh/clientloop.c
2322
debug_f("known hosts file %s does not "
usr.bin/ssh/clientloop.c
2402
debug_f("server used untrusted RSA signature algorithm "
usr.bin/ssh/clientloop.c
2516
debug_f("server sent no hostkeys");
usr.bin/ssh/clientloop.c
2533
debug_f("searching %s for %s / %s",
usr.bin/ssh/clientloop.c
2540
debug_f("hostkeys file %s does not exist",
usr.bin/ssh/clientloop.c
2566
debug_f("no new or deprecated keys from server");
usr.bin/ssh/clientloop.c
2572
debug_f("CA/revocation marker, manual host list or wildcard "
usr.bin/ssh/clientloop.c
2577
debug_f("host key found matching a different name/address, "
usr.bin/ssh/clientloop.c
2592
debug_f("key(s) for %s%s%s exist under other names; "
usr.bin/ssh/compat.c
129
debug_f("match: %s pat %s compat 0x%08x",
usr.bin/ssh/compat.c
135
debug_f("no match: %s", version);
usr.bin/ssh/dns.c
262
debug_f("matched SSHFP type %d fptype %d",
usr.bin/ssh/dns.c
266
debug_f("failed SSHFP type %d fptype %d",
usr.bin/ssh/ed25519-openssl.c
167
debug_f("message bad length: %llu", *mlen);
usr.bin/ssh/gss-serv.c
335
debug_f("delegate credential is disabled, doing nothing");
usr.bin/ssh/hostfile.c
290
debug_f("fopen %s: %s", path, strerror(errno));
usr.bin/ssh/hostfile.c
484
debug_f("failed to format host entry");
usr.bin/ssh/kex.c
1268
debug_f("write: %.100s", strerror(errno));
usr.bin/ssh/kex.c
1366
debug_f("banner line %zu: %s", n, cp);
usr.bin/ssh/kex.c
377
debug_f("Sending SSH2_MSG_EXT_INFO");
usr.bin/ssh/kex.c
415
debug_f("%s=<%s>", name, val);
usr.bin/ssh/kex.c
419
debug_f("unsupported version of %s extension", name);
usr.bin/ssh/kex.c
436
debug_f("%s=<%s>", name, value);
usr.bin/ssh/kex.c
458
debug_f("%s (unrecognised)", name);
usr.bin/ssh/kex.c
475
debug_f("%s (unrecognised)", name);
usr.bin/ssh/krl.c
1025
debug_f("extension %s critical %u len %zu",
usr.bin/ssh/krl.c
846
debug_f("cert extension %s critical %u len %zu",
usr.bin/ssh/misc-agent.c
112
debug_f("trying path \"%s\"", path);
usr.bin/ssh/misc-agent.c
235
debug_f("path for \"%s\" too long for sockaddr_un", path);
usr.bin/ssh/misc-agent.c
245
debug_f("connect \"%s\": %s", path, strerror(errno));
usr.bin/ssh/misc-agent.c
250
debug_f("getsockopt: %s", strerror(errno));
usr.bin/ssh/misc-agent.c
255
debug_f("socket error on %s: %s", path, strerror(errno));
usr.bin/ssh/misc-agent.c
260
debug_f("socket %s seems still active", path);
usr.bin/ssh/misc-agent.c
322
debug_f("cleanup stale socket %s", path);
usr.bin/ssh/misc.c
1499
debug_f("invalid tunnel %u", tun);
usr.bin/ssh/misc.c
1504
debug_f("%s open: %s", name, strerror(errno));
usr.bin/ssh/misc.c
1508
debug_f("%s mode %d fd %d", name, mode, fd);
usr.bin/ssh/misc.c
1516
debug_f("get interface %s flags: %s", ifr.ifr_name,
usr.bin/ssh/misc.c
1524
debug_f("activate interface %s: %s", ifr.ifr_name,
usr.bin/ssh/misc.c
295
debug_f("invalid TOS %d", tos);
usr.bin/ssh/monitor.c
310
debug_f("user %s authenticated by privileged process", authctxt->user);
usr.bin/ssh/monitor.c
404
debug_f("child log fd closed");
usr.bin/ssh/monitor.c
546
debug_f("config len %zu", sshbuf_len(cfg));
usr.bin/ssh/monitor.c
693
debug_f("hostkey %s index %d", sshkey_ssh_name(pubkey), keyid);
usr.bin/ssh/monitor.c
878
debug_f("no valid authentication method lists");
usr.bin/ssh/monitor_wrap.c
108
debug_f("write: %s", strerror(errno));
usr.bin/ssh/monitor_wrap.c
131
debug_f("child exited with status %d",
usr.bin/ssh/mux.c
1139
debug_f("channel %d: stop listening", c->self);
usr.bin/ssh/mux.c
1171
debug_f("channel %d: proxy request", c->self);
usr.bin/ssh/mux.c
1647
debug_f("write packet: %s", strerror(errno));
usr.bin/ssh/mux.c
1655
debug_f("read packet failed");
usr.bin/ssh/mux.c
2064
debug_f("master session id: %u", sid);
usr.bin/ssh/mux.c
2267
debug_f("master session id: %u", sid);
usr.bin/ssh/mux.c
290
debug_f("Received 'info' extension");
usr.bin/ssh/mux.c
651
debug_f("%s for: listen %d, connect %s:%d",
usr.bin/ssh/nchan.c
428
debug_f("channel %d: (i%d o%d sock %d wfd %d efd %d [%s])",
usr.bin/ssh/packet.c
1004
DBG(debug_f("cipher_init: %s", dir));
usr.bin/ssh/packet.c
1353
debug_f("resetting send seqnr %u", state->p_send.seqnr);
usr.bin/ssh/packet.c
1825
debug_f("resetting read seqnr %u", state->p_read.seqnr);
usr.bin/ssh/packet.c
2299
debug_f("setting to %d", s);
usr.bin/ssh/packet.c
2372
debug_f("called");
usr.bin/ssh/packet.c
550
debug_f("getpeername failed: %.100s", strerror(errno));
usr.bin/ssh/packet.c
981
debug_f("rekeying %s, input %llu bytes %llu blocks, "
usr.bin/ssh/readpass.c
141
debug_f("requested to askpass");
usr.bin/ssh/readpass.c
146
debug_f("stdin is not a tty");
usr.bin/ssh/readpass.c
162
debug_f("can't open %s: %s", _PATH_TTY,
usr.bin/ssh/servconf.c
2836
debug_f("override \"%s\"", dst->subsystem_name[j]);
usr.bin/ssh/servconf.c
2845
debug_f("add \"%s\"", src->subsystem_name[i]);
usr.bin/ssh/serverloop.c
435
debug_f("originator %s port %u, target %s port %u",
usr.bin/ssh/serverloop.c
480
debug_f("originator %s port %d, target %s",
usr.bin/ssh/serverloop.c
528
debug_f("invalid tun");
usr.bin/ssh/serverloop.c
612
debug_f("ctype %s rchan %u win %u max %u",
usr.bin/ssh/serverloop.c
625
debug_f("confirm %s", ctype);
usr.bin/ssh/serverloop.c
642
debug_f("failure %s", ctype);
usr.bin/ssh/serverloop.c
760
debug_f("rtype %s want_reply %d", rtype, want_reply);
usr.bin/ssh/serverloop.c
767
debug_f("tcpip-forward listen %s port %u",
usr.bin/ssh/serverloop.c
794
debug_f("cancel-tcpip-forward addr %s port %d",
usr.bin/ssh/serverloop.c
803
debug_f("streamlocal-forward listen path %s",
usr.bin/ssh/serverloop.c
821
debug_f("cancel-streamlocal-forward path %s",
usr.bin/ssh/session.c
1801
debug_f("signal %s, killpg(%ld, %d)", signame, (long)s->pid, sig);
usr.bin/ssh/session.c
1829
debug_f("agent forwarding disabled");
usr.bin/ssh/session.c
1849
debug_f("session %d req %s", s->self, rtype);
usr.bin/ssh/session.c
1915
debug_f("session %d release %s", s->self, s->tty);
usr.bin/ssh/session.c
1971
debug_f("x11 channel %d missing", id);
usr.bin/ssh/session.c
1974
debug_f("detach x11 channel %d", id);
usr.bin/ssh/session.c
1992
debug_f("session %d: closing channel %d",
usr.bin/ssh/session.c
2045
debug_f("session %d channel %d pid %ld %s", s->self, s->chanid,
usr.bin/ssh/session.c
2050
debug_f("release channel %d", s->chanid);
usr.bin/ssh/session.c
2105
debug_f("no session for pid %ld", (long)pid);
usr.bin/ssh/session.c
2126
debug_f("no session for id %d", id);
usr.bin/ssh/session.c
2129
debug_f("channel %d child %ld", id, (long)s->pid);
usr.bin/ssh/session.c
2131
debug_f("channel %d: has child, ttyfd %d", id, s->ttyfd);
usr.bin/ssh/sftp-client.c
630
debug_f("expected SSH2_FXP_EXTENDED_REPLY(%u) packet, got %u",
usr.bin/ssh/sftp-server.c
1708
debug_f("uids len = %zu, gids len = %zu",
usr.bin/ssh/srclimit.c
137
debug_f("sock %d id %d limit %d", sock, id, max_persource);
usr.bin/ssh/srclimit.c
186
debug_f("id %d", id);
usr.bin/ssh/srclimit.c
446
debug_f("%s penalty for %s %s already exists, %lld seconds remaining",
usr.bin/ssh/ssh-agent.c
1003
debug_f("key not found");
usr.bin/ssh/ssh-agent.c
1195
debug_f("constraint ext %s", ext_name);
usr.bin/ssh/ssh-agent.c
1371
debug_f("internal provider");
usr.bin/ssh/ssh-agent.c
1429
debug_f("add %s %s \"%.100s\" (life: %u) (confirm: %u) "
usr.bin/ssh/ssh-agent.c
1586
debug_f("add %.100s", canonical_provider);
usr.bin/ssh/ssh-agent.c
1653
debug_f("remove %.100s", canonical_provider);
usr.bin/ssh/ssh-agent.c
1718
debug_f("session ID already recorded for %s %s",
usr.bin/ssh/ssh-agent.c
1742
debug_f("recorded %s %s (slot %zu of %d)", sshkey_type(key), fp, i,
usr.bin/ssh/ssh-agent.c
1800
debug_f("unsupported extension \"%s\"", name);
usr.bin/ssh/ssh-agent.c
1833
debug_f("socket %u (fd=%d) message too long %u > %u",
usr.bin/ssh/ssh-agent.c
1852
debug_f("socket %u (fd=%d) type %d", socknum, e->fd, type);
usr.bin/ssh/ssh-agent.c
1921
debug_f("type = %s", type == AUTH_CONNECTION ? "CONNECTION" :
usr.bin/ssh/ssh-agent.c
2166
debug_f("cleanup");
usr.bin/ssh/ssh-agent.c
296
debug_f("user %s hostname %s is_ca %d nkeys %u",
usr.bin/ssh/ssh-agent.c
306
debug_f("key %u/%u: %s%s%s key_is_ca %d", i, dch->nkeys,
usr.bin/ssh/ssh-agent.c
323
debug_f("%s: %zu constraints", context, ndcs);
usr.bin/ssh/ssh-agent.c
325
debug_f("constraint %zu / %zu: from: ", i, ndcs);
usr.bin/ssh/ssh-agent.c
327
debug_f("constraint %zu / %zu: to: ", i, ndcs);
usr.bin/ssh/ssh-agent.c
330
debug_f("done for %s", context);
usr.bin/ssh/ssh-agent.c
394
debug_f("cert %s / hostname %s rejected: %s",
usr.bin/ssh/ssh-agent.c
632
debug_f("key %u / %u: %s %s", i++, idtab->nentries,
usr.bin/ssh/ssh-agent.c
806
debug_f("signed data matches public key userauth request");
usr.bin/ssh/ssh-agent.c
810
debug_f("signed data matches SSHSIG signature request");
usr.bin/ssh/ssh-agent.c
848
debug_f("entering");
usr.bin/ssh/ssh-agent.c
880
debug_f("user=%s", user);
usr.bin/ssh/ssh-agent.c
961
debug_f("good signature");
usr.bin/ssh/ssh-keygen.c
2469
debug_f("%s looks like a public key, using private key "
usr.bin/ssh/ssh-keygen.c
2882
debug_f("match: %s", ssh_err(r));
usr.bin/ssh/ssh-keygen.c
3128
debug_f("key %zu: %s %s %s (flags 0x%02x)", i,
usr.bin/ssh/ssh-pkcs11-client.c
362
debug_f("starting %s %s", prog,
usr.bin/ssh/ssh-pkcs11-client.c
435
debug_f("no keys; terminate helper");
usr.bin/ssh/ssh-pkcs11.c
106
debug_f("provider \"%s\" refcount %d valid %d",
usr.bin/ssh/ssh-pkcs11.c
132
debug_f("provider \"%s\" refcount %d", p->name, p->refcount);
usr.bin/ssh/ssh-pkcs11.c
1467
debug_f("failed to fetch key");
usr.bin/ssh/ssh-pkcs11.c
1592
debug_f("failed to fetch key");
usr.bin/ssh/ssh-pkcs11.c
1850
debug_f("provider already registered: %s", provider_id);
usr.bin/ssh/ssh-pkcs11.c
1899
debug_f("provider %s returned no slots", provider_id);
usr.bin/ssh/ssh-pkcs11.c
2038
debug_f("provider %s returned no keys", provider_id);
usr.bin/ssh/ssh-pkcs11.c
2092
debug_f("provider \"%s\" available", provider_id);
usr.bin/ssh/ssh-pkcs11.c
2095
debug_f("could not register provider %s", provider_id);
usr.bin/ssh/ssh-pkcs11.c
2106
debug_f("could not supply SO pin: %lu", rv);
usr.bin/ssh/ssh-pkcs11.c
2115
debug_f("failed to generate RSA key");
usr.bin/ssh/ssh-pkcs11.c
2122
debug_f("failed to generate ECDSA key");
usr.bin/ssh/ssh-pkcs11.c
2128
debug_f("unknown type %d", type);
usr.bin/ssh/ssh-pkcs11.c
2163
debug_f("using provider \"%s\"", provider_id);
usr.bin/ssh/ssh-pkcs11.c
2166
debug_f("could not register provider %s",
usr.bin/ssh/ssh-pkcs11.c
2178
debug_f("could not supply SO pin: %lu", rv);
usr.bin/ssh/ssh-pkcs11.c
2192
debug_f("could not destroy private key 0x%hhx",
usr.bin/ssh/ssh-pkcs11.c
2214
debug_f("could not get key type of public key 0x%hhx",
usr.bin/ssh/ssh-pkcs11.c
2230
debug_f("unsupported key type %lu", (u_long)key_type);
usr.bin/ssh/ssh-pkcs11.c
2235
debug_f("could not destroy public key 0x%hhx", keyid);
usr.bin/ssh/ssh-pkcs11.c
239
debug_f("no pin specified");
usr.bin/ssh/ssh-pkcs11.c
313
debug_f("provider \"%s\" slot %lu object %lu: attrib %lu = %d",
usr.bin/ssh/ssh-pkcs11.c
383
debug_f("always-auth key");
usr.bin/ssh/ssh-pkcs11.c
404
debug_f("%s key: provider %s slot %lu keyid %s",
usr.bin/ssh/ssh-pkcs11.c
417
debug_f("Already seen this key at "
usr.bin/ssh/ssh-sk-client.c
100
debug_f("starting %s %s", helper,
usr.bin/ssh/ssh-sk-client.c
209
debug_f("helper returned error -%u", rerr);
usr.bin/ssh/ssh-sk-client.c
465
debug_f("srks[%zu]: %s %s uidlen %zu", nsrks,
usr.bin/ssh/ssh-sk-helper.c
133
debug_f("ready to sign with key %s, provider %s: "
usr.bin/ssh/ssh-sk-helper.c
264
debug_f("key %zu %s %s uidlen %zu", i,
usr.bin/ssh/ssh-sk-helper.c
332
debug_f("received message len %zu", sshbuf_len(req));
usr.bin/ssh/ssh-sk-helper.c
363
debug_f("reply len %zu", sshbuf_len(resp));
usr.bin/ssh/ssh-sk.c
131
debug_f("provider %s implements version 0x%08lx", ret->path,
usr.bin/ssh/ssh-sk.c
474
debug_f("provider \"%s\", device \"%s\", application \"%s\", "
usr.bin/ssh/ssh-sk.c
512
debug_f("using random challenge");
usr.bin/ssh/ssh-sk.c
533
debug_f("provider \"%s\" failure %d", provider_path, r);
usr.bin/ssh/ssh-sk.c
644
debug_f("provider \"%s\", key %s, flags 0x%02x%s",
usr.bin/ssh/ssh-sk.c
684
debug_f("sk_sign failed with code %d", r);
usr.bin/ssh/ssh-sk.c
795
debug_f("provider \"%s\"%s", provider_path,
usr.bin/ssh/ssh.c
1835
debug_f("backgrounding master process");
usr.bin/ssh/ssh.c
1891
debug_f("all expected forwarding replies received");
usr.bin/ssh/ssh.c
1986
debug_f("tunnel forward established, id=%d", id);
usr.bin/ssh/ssh.c
2121
debug_f("expecting replies for %d forwards",
usr.bin/ssh/ssh.c
2407
debug_f("key %s type %s is not a certificate",
usr.bin/ssh/ssh.c
2439
debug_f("key %s type %s is not a certificate",
usr.bin/ssh/ssh.c
332
debug_f("getaddrinfo %.100s returned no addresses", name);
usr.bin/ssh/ssh.c
336
debug_f("getaddrinfo %.100s returned multiple addresses", name);
usr.bin/ssh/ssh.c
341
debug_f("Could not format address for name %.100s: %s",
usr.bin/ssh/ssh.c
430
debug_f("hostname %.100s is an unrecognised address", *hostp);
usr.bin/ssh/ssh_api.c
366
debug_f("%.*s", (int)sshbuf_len(banner),
usr.bin/ssh/sshconnect.c
1389
debug_f("hostkey not known or explicitly trusted: "
usr.bin/ssh/sshconnect.c
397
debug_f("bound to %s", ntop);
usr.bin/ssh/sshconnect.c
717
debug_f("found matching key in %s:%lu", path, l->linenum);
usr.bin/ssh/sshconnect.c
738
debug_f("hostkeys file %s does not exist", file);
usr.bin/ssh/sshconnect.c
957
debug_f("invalid hostname \"%s\"; will not record: %s",
usr.bin/ssh/sshconnect2.c
1372
debug_f("no separate private key for certificate "
usr.bin/ssh/sshconnect2.c
1489
debug_f("no mutual signature algorithm");
usr.bin/ssh/sshconnect2.c
1644
debug_f("bound agent to hostkey");
usr.bin/ssh/sshconnect2.c
1656
debug_f("agent returned %zu keys", idlist->nkeys);
usr.bin/ssh/sshconnect2.c
1689
debug_f("ignoring certificate %s: not a user "
usr.bin/ssh/sshconnect2.c
1694
debug_f("ignoring authenticator-hosted key %s as no "
usr.bin/ssh/sshconnect2.c
1712
debug_f("ignoring certificate %s: not a user "
usr.bin/ssh/sshconnect2.c
1717
debug_f("ignoring authenticator-hosted key "
usr.bin/ssh/sshconnect2.c
2194
debug_f("trying hostkey %s %s using sigalg %s",
usr.bin/ssh/sshconnect2.c
694
debug_f("server sent unknown pkalg %s", pkalg);
usr.bin/ssh/sshd-auth.c
267
debug_f("%s", ret);
usr.bin/ssh/sshd-session.c
725
debug_f("set routing domain %d (was %d)", rtable, ortable);
usr.bin/ssh/sshd.c
292
debug_f("enter%s", force_final ? " (forcing)" : "");
usr.bin/ssh/sshd.c
380
debug_f("preauth child %ld for %s exited "
usr.bin/ssh/sshd.c
386
debug_f("preauth child %ld for %s exited "
usr.bin/ssh/sshd.c
392
debug_f("preauth child %ld for %s prohibited by"
usr.bin/ssh/sshd.c
398
debug_f("preauth child %ld for %s exited "
usr.bin/ssh/sshd.c
562
debug_f("p %d, r %d", p, r);
usr.bin/ssh/sshlogin.c
96
debug_f("truncated lastlog");
usr.bin/ssh/sshsig.c
314
debug_f("verify message length %zu", sshbuf_len(h_message));
usr.bin/ssh/sshsig.c
355
debug_f("expected namespace \"%s\" received \"%s\"",
usr.bin/ssh/sshsig.c
362
debug_f("expected algorithm \"%s\" received \"%s\"",
usr.bin/ssh/sshsig.c
487
debug_f("signature made with hash \"%s\"", hashalg);
usr.bin/ssh/sshsig.c
615
debug_f("signature made with hash \"%s\"", hashalg);
usr.bin/ssh/sshsig.c
778
debug_f("%s:%lu: matched principal \"%s\"",
usr.bin/ssh/ttymodes.c
261
debug_f("no fd or tio");