| /src/contrib/ntp/scripts/monitoring/ |
| H A D | ntptrap | 166 &debug(sprintf("hostname(%d.%d.%d.%d) = \"%s\"",unpack("C4",$addr),$name)) 169 &debug(sprintf("Failed to get name for %d.%d.%d.%d",unpack("C4",$addr))); 176 &debug(sprintf("%d request(s) scheduled",scalar(@Requests))); 177 grep(&debug(" - ".$_),keys(%Host)); 199 &debug(sprintf("Request: %s: %s(%d)",&hostname($addr), &ntp'cntrlop_name($op), $assoc)); #';)) 257 &debug("-Packet from ",&hostname($from)); 262 &debug(sprintf("%s uses auth_keyid %d",&hostname($from),$auth_keyid)) if defined($auth_keyid); 302 &debug(sprintf("Schedule timeout \"%s\" for %s", $id, $date)); 311 &debug("Clear timeout \"$id\""); 319 &debug(sprintf("Refreshing trap for %s", &hostname($addr))); [all …]
|
| /src/contrib/pam-krb5/pam-util/ |
| H A D | logging.c | 85 char *msg; in format() local 87 if (vasprintf(&msg, fmt, args) < 0) { in format() 91 return msg; in format() 103 char *msg; in log_vplain() local 105 if (priority == LOG_DEBUG && (pargs == NULL || !pargs->debug)) in log_vplain() 108 msg = format(fmt, args); in log_vplain() 109 if (msg == NULL) in log_vplain() 111 pam_syslog(pargs->pamh, priority, "(user %s) %s", pargs->user, msg); in log_vplain() 112 free(msg); in log_vplain() 116 msg = format(fmt, args); in log_vplain() [all …]
|
| /src/sys/tools/ |
| H A D | makeobjops.awk | 51 function warn (msg) 53 print "makeobjops.awk:", msg > "/dev/stderr"; 56 function warnsrc (msg) 58 warn(src ":" lineno ": " msg); 61 function debug (msg) function 64 warn(msg); 67 function die (msg) 69 warn(msg); 138 debug($0); 146 debug("Interface " intname); [all …]
|
| /src/contrib/netbsd-tests/net/fdpass/ |
| H A D | fdpass.c | 44 static int debug; variable 49 struct msghdr msg; in send_fd() local 64 memset(&msg, 0, sizeof(msg)); in send_fd() 65 msg.msg_control = &cmsgbuf.buf; in send_fd() 66 msg.msg_controllen = CMSG_SPACE(sizeof(int)); in send_fd() 67 cmsg = CMSG_FIRSTHDR(&msg); in send_fd() 72 msg.msg_controllen = cmsg->cmsg_len; in send_fd() 76 msg.msg_iov = &vec; in send_fd() 77 msg.msg_iovlen = 1; in send_fd() 81 while ((n = sendmsg(sock, &msg, 0)) == -1 && in send_fd() [all …]
|
| /src/lib/libc/rpc/ |
| H A D | svc_auth_des.c | 70 #define debug(msg) printf("svcauth_des: %s\n", msg) argument 108 _svcauth_des(struct svc_req *rqst, struct rpc_msg *msg) in _svcauth_des() argument 138 ixdr = (long *)msg->rm_call.cb_cred.oa_base; in _svcauth_des() 165 ixdr = (long *)msg->rm_call.cb_verf.oa_base; in _svcauth_des() 180 debug("getpublickey"); in _svcauth_des() 187 debug("decryptsessionkey"); in _svcauth_des() 193 debug("bad nickname"); in _svcauth_des() 216 debug("decryption failure"); in _svcauth_des() 242 debug("window verifier mismatch"); in _svcauth_des() 248 debug("replayed credential"); in _svcauth_des() [all …]
|
| H A D | key_call.c | 68 #define debug(msg) (void) fprintf(stderr, "%s\n", msg); argument 70 #define debug(msg) argument 99 debug("set status is nonzero"); in key_setsecret() 144 debug("encrypt status is nonzero"); in key_encryptsession_pk() 165 debug("decrypt status is nonzero"); in key_decryptsession_pk() 185 debug("encrypt status is nonzero"); in key_encryptsession() 205 debug("decrypt status is nonzero"); in key_decryptsession() 234 debug("key_setnet status is nonzero"); in key_setnet() 251 debug("get_conv status is nonzero"); in key_get_conv()
|
| /src/libexec/pppoed/ |
| H A D | pppoed.c | 88 int cs, int ds, int debug, struct ngm_connect *ngc) in ConfigureNode() argument 133 if (debug) in ConfigureNode() 156 if (debug) in ConfigureNode() 171 if (debug) in ConfigureNode() 200 if (debug) in ConfigureNode() 234 if (debug) { in ConfigureNode() 255 int sz, int debug) in Spawn() argument 263 const char *msg; in Spawn() local 284 if (debug) in Spawn() 296 if (debug) in Spawn() [all …]
|
| /src/contrib/pam-krb5/tests/pam-util/ |
| H A D | logging-t.c | 74 const char *msg; \ 79 msg = krb5_get_error_message(args->ctx, code); \ 80 basprintf(&expected, "%s: %s", "krb", msg); \ 86 krb5_free_error_message(args->ctx, msg); \ 114 args->debug = true; in main() 116 args->debug = false; in main() 124 args->debug = true; in main() 127 args->debug = false; in main() 135 args->debug = true; in main() 137 args->debug = false; in main()
|
| /src/crypto/openssh/ |
| H A D | auth-pam.c | 79 # define PAM_MSG_MEMBER(msg, n, member) ((*(msg))[(n)].member) argument 81 # define PAM_MSG_MEMBER(msg, n, member) ((msg)[(n)]->member) argument 370 debug("PAM: num PAM env strings %u", num_env); in import_environments() 392 sshpam_thread_conv(int n, sshpam_const struct pam_message **msg, in sshpam_thread_conv() argument 420 switch (PAM_MSG_MEMBER(msg, i, msg_style)) { in sshpam_thread_conv() 424 PAM_MSG_MEMBER(msg, i, msg))) != 0) in sshpam_thread_conv() 428 PAM_MSG_MEMBER(msg, i, msg_style), buffer) == -1) in sshpam_thread_conv() 446 PAM_MSG_MEMBER(msg, i, msg))) != 0) in sshpam_thread_conv() 450 PAM_MSG_MEMBER(msg, i, msg_style), buffer) == -1) in sshpam_thread_conv() 613 sshpam_null_conv(int n, sshpam_const struct pam_message **msg, in sshpam_null_conv() argument [all …]
|
| H A D | ssh-pkcs11-helper.c | 104 debug("check %s %s %s", sshkey_type(ki->key), in lookup_key() 129 struct sshbuf *msg; in process_add() local 132 if ((msg = sshbuf_new()) == NULL) in process_add() 138 if ((r = sshbuf_put_u8(msg, in process_add() 140 (r = sshbuf_put_u32(msg, nkeys)) != 0) in process_add() 147 if ((r = sshbuf_put_string(msg, blob, blen)) != 0 || in process_add() 148 (r = sshbuf_put_cstring(msg, labels[i])) != 0) in process_add() 154 } else if ((r = sshbuf_put_u8(msg, SSH_AGENT_FAILURE)) != 0 || in process_add() 155 (r = sshbuf_put_u32(msg, -nkeys)) != 0) in process_add() 161 send_msg(msg); in process_add() [all …]
|
| H A D | sftp-server.c | 551 struct sshbuf *msg; in send_status_errmsg() local 558 if ((msg = sshbuf_new()) == NULL) in send_status_errmsg() 560 if ((r = sshbuf_put_u8(msg, SSH2_FXP_STATUS)) != 0 || in send_status_errmsg() 561 (r = sshbuf_put_u32(msg, id)) != 0 || in send_status_errmsg() 562 (r = sshbuf_put_u32(msg, status)) != 0) in send_status_errmsg() 565 if ((r = sshbuf_put_cstring(msg, errmsg == NULL ? in send_status_errmsg() 567 (r = sshbuf_put_cstring(msg, "")) != 0) in send_status_errmsg() 570 send_msg(msg); in send_status_errmsg() 571 sshbuf_free(msg); in send_status_errmsg() 583 struct sshbuf *msg; in send_data_or_handle() local [all …]
|
| H A D | auth.c | 519 debug("unable to get login class: %s", user); in getpwnamallow() 526 debug("Denied connection for %.200s from %.200s [%.200s].", in getpwnamallow() 533 debug("LOGIN %.200s REFUSED (TIME)", pw->pw_name); in getpwnamallow() 540 debug("Approval failure for %s", user); in getpwnamallow() 610 char *msg; in auth_debug_send() local 616 if ((r = sshbuf_get_cstring(auth_debug, &msg, NULL)) != 0) in auth_debug_send() 618 ssh_packet_send_debug(ssh, "%s", msg); in auth_debug_send() 619 free(msg); in auth_debug_send() 696 char msg[1024], buf[64]; in auth_log_authopts() local 700 snprintf(msg, sizeof(msg), "key options:%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s", in auth_log_authopts() [all …]
|
| H A D | sshconnect.c | 131 debug("Executing proxy dialer command: %.500s", command_string); in ssh_proxy_fdpass_connect() 214 debug("Executing proxy command: %.500s", command_string); in ssh_proxy_connect() 467 debug("Trying again..."); in ssh_connect_direct() 502 debug("Connecting to %.200s [%.100s] port %s.", in ssh_connect_direct() 521 debug("connect to address %s port %s: %s", in ssh_connect_direct() 539 debug("Connection established."); in ssh_connect_direct() 587 const char *msg, *again = "Please type 'yes' or 'no': "; in confirm() local 594 for (msg = prompt;;msg = fingerprint ? again_fp : again) { in confirm() 595 cp = p = read_passphrase(msg, RP_ECHO); in confirm() 677 debug("using hostkeyalias: %s", *hostfile_hostname); in get_hostfile_hostname_ipaddr() [all …]
|
| /src/contrib/netbsd-tests/net/mcast/ |
| H A D | mcast.c | 61 #define ERRX(ev, msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 62 #define ERRX0(ev, msg) ATF_REQUIRE_MSG(0, msg) argument 64 #define SKIPX(ev, msg, ...) do { \ argument 65 atf_tc_skip(msg, __VA_ARGS__); \ 70 #define ERRX(ev, msg, ...) errx(ev, msg, __VA_ARGS__) argument 71 #define ERRX0(ev, msg) errx(ev, msg) argument 72 #define SKIPX(ev, msg, ...) errx(ev, msg, __VA_ARGS__) argument 75 static int debug; variable 180 show(const char *prefix, const struct message *msg) in show() argument 182 printf("%10.10s: %zu [%jd.%ld]\n", prefix, msg->seq, (intmax_t) in show() [all …]
|
| /src/contrib/netbsd-tests/lib/libpthread/ |
| H A D | t_condwait.c | 48 static const int debug = 1; variable 71 if (debug) in run() 82 if (debug) { in run() 116 cond_wait(clockid_t clck, const char *msg) { in cond_wait() argument 119 if (debug) in cond_wait() 120 printf( "**** %s clock wait starting\n", msg); in cond_wait() 123 if (debug) in cond_wait() 124 printf( "**** %s clock wait ended\n", msg); in cond_wait()
|
| /src/tools/test/stress2/misc/ |
| H A D | unionfs20.sh | 89 static int debug; 96 struct msghdr msg = {0}; 105 msg.msg_iov = &iov; 106 msg.msg_iovlen = 1; 108 msg.msg_control = cmsgbuf; 109 msg.msg_controllen = sizeof(cmsgbuf); 111 cmsg = CMSG_FIRSTHDR(&msg); 118 return (sendmsg(socket, &msg, 0)); 125 struct msghdr msg = {0}; 135 msg.msg_iov = &iov; [all …]
|
| /src/crypto/openssh/openbsd-compat/ |
| H A D | port-aix.c | 179 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; in sys_auth_passwd() local 205 expired = passwdexpired(name, &msg); in sys_auth_passwd() 206 if (msg && *msg) { in sys_auth_passwd() 208 msg, strlen(msg))) != 0) in sys_auth_passwd() 211 aix_remove_embedded_newlines(msg); in sys_auth_passwd() 213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); in sys_auth_passwd() 223 name, msg); in sys_auth_passwd() 224 free(msg); in sys_auth_passwd() 243 char *msg = NULL; in sys_auth_allowed_user() local 257 result = loginrestrictions(pw->pw_name, S_RLOGIN, NULL, &msg); in sys_auth_allowed_user() [all …]
|
| H A D | port-prngd.c | 63 u_char msg[2]; in get_random_bytes_prngd() local 116 msg[0] = 0x02; in get_random_bytes_prngd() 117 msg[1] = len; in get_random_bytes_prngd() 119 if (atomicio(vwrite, fd, msg, sizeof(msg)) != sizeof(msg)) { in get_random_bytes_prngd() 154 debug("trying egd/prngd port %d", PRNGD_PORT); in seed_from_prngd() 159 debug("trying egd/prngd socket %s", PRNGD_SOCKET); in seed_from_prngd()
|
| /src/contrib/netbsd-tests/lib/libc/db/ |
| H A D | t_db_hash_seq.c | 69 #define DO_ERR(msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 70 #define DO_WARNX(msg, ...) ATF_REQUIRE_MSG(0, msg, __VA_ARGS__) argument 89 static int debug = 0; variable 139 if (debug > 1) { in state_del() 170 if (debug > 1) 196 if (debug > 1) { in state_put() 226 if (debug > 1) in state_iterate() 230 if (debug > 1) in state_iterate() 265 if (debug > 1) in testdb()
|
| /src/contrib/openbsm/bin/auditd/ |
| H A D | auditd_darwin.c | 93 auditd_openlog(int debug, gid_t gid) in auditd_openlog() argument 98 if (debug) in auditd_openlog() 122 if (debug) in auditd_openlog() 239 launch_data_t msg, msd, ld, cdict, to; in lookup_machport() local 242 msg = launch_data_new_string(LAUNCH_KEY_CHECKIN); in lookup_machport() 244 cdict = launch_msg(msg); in lookup_machport() 474 mach_msg_empty_send_t msg; in auditd_relay_signal() local 476 msg.header.msgh_id = signal; in auditd_relay_signal() 477 msg.header.msgh_remote_port = signal_port; in auditd_relay_signal() 478 msg.header.msgh_local_port = MACH_PORT_NULL; in auditd_relay_signal() [all …]
|
| /src/lib/libpam/modules/pam_krb5/ |
| H A D | pam_krb5.c | 119 int debug; in pam_sm_authenticate() local 167 debug = openpam_get_option(pamh, PAM_OPT_DEBUG) ? 1 : 0; in pam_sm_authenticate() 168 krbret = verify_krb_v5_tgt_begin(krbctx, srvdup, debug, in pam_sm_authenticate() 330 debug, in pam_sm_authenticate() 385 verify_krb_v5_tgt_cleanup(krbctx, debug, in pam_sm_authenticate() 883 verify_krb_v5_tgt_begin(krb5_context context, char *pam_service, int debug, in verify_krb_v5_tgt_begin() argument 893 if (debug) in verify_krb_v5_tgt_begin() 914 if (debug) { in verify_krb_v5_tgt_begin() 915 const char *msg = krb5_get_error_message( in verify_krb_v5_tgt_begin() local 919 "krb5_sname_to_principal()", msg); in verify_krb_v5_tgt_begin() [all …]
|
| /src/sbin/fsck_ffs/ |
| H A D | pass5.c | 356 if (bkgrdflag != 0 || usedsoftdep || debug) in pass5() 369 if (debug) { in pass5() 401 if (debug) in pass5() 411 if (debug) in pass5() 422 if (debug) in pass5() 433 if (debug) in pass5() 445 if (debug) in pass5() 506 void (*msg)(const char *fmt, ...); in check_maps() local 509 msg = pfatal; in check_maps() 511 msg = pwarn; in check_maps() [all …]
|
| /src/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | t_cc.c | 41 int debug=0; variable 185 #define CHECK(kret,msg) \ argument 187 com_err(msg, kret, ""); \ 190 } else if(debug) printf("%s went ok\n", msg); 192 #define CHECK_STR(str,msg) \ argument 194 com_err(msg, kret, ""); \ 196 } else if(debug) printf("%s went ok\n", msg); 198 #define CHECK_BOOL(expr,errstr,msg) \ argument 200 fprintf(stderr, "%s %s\n", msg, errstr); \ 202 } else if(debug) printf("%s went ok\n", msg); [all …]
|
| /src/usr.sbin/bsdconfig/share/ |
| H A D | common.subr | 78 # disable truncating the debug file when initializing). To get child processes 89 # d Sets $debug to 1 125 # Sensible debug function. Override in ~/.bsdconfigrc if desired. 128 # If $debug is set and non-NULL, prints DEBUG info using printf(1) syntax: 135 [ "$debug" ] || return $SUCCESS 161 d) debug=1 ;; 166 f_dprintf "f_debug_init: debug=[%s] debugFile=[%s]" \ 167 "$debug" "$debugFile" 172 [ "$debugFile" ] && { [ "${debug+set}" ] || debug=1; } 177 [ "$debug" ] && export debug [all …]
|
| /src/sys/netgraph/bluetooth/l2cap/ |
| H A D | ng_l2cap_main.c | 120 l2cap->debug = NG_L2CAP_WARN_LEVEL; in ng_l2cap_constructor() 259 struct ng_mesg *msg = NGI_MSG(item); /* item still has message */ in ng_l2cap_lower_rcvmsg() local 262 switch (msg->header.typecookie) { in ng_l2cap_lower_rcvmsg() 264 switch (msg->header.cmd) { in ng_l2cap_lower_rcvmsg() 269 if (msg->header.arglen != sizeof(*ep)) in ng_l2cap_lower_rcvmsg() 272 ep = (ng_hci_node_up_ep *)(msg->data); in ng_l2cap_lower_rcvmsg() 299 if (msg->header.arglen != sizeof(*ep)) in ng_l2cap_lower_rcvmsg() 302 ep = (ng_hci_sync_con_queue_ep *)(msg->data); in ng_l2cap_lower_rcvmsg() 332 error = ng_l2cap_lp_con_cfm(l2cap, msg); in ng_l2cap_lower_rcvmsg() 337 error = ng_l2cap_lp_con_ind(l2cap, msg); in ng_l2cap_lower_rcvmsg() [all …]
|