Searched refs:SSSDBG_TRACE_ALL (Results 1 - 25 of 100) sorted by relevance

1234

/sssd-io/src/p11_child/
H A Dp11_child_nss.c159 DEBUG(SSSDBG_TRACE_ALL, "Default Module List:\n");
163 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n",
165 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n",
169 DEBUG(SSSDBG_TRACE_ALL, "Dead Module List:\n");
173 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n",
175 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n",
179 DEBUG(SSSDBG_TRACE_ALL, "DB Module List:\n");
183 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n",
185 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n",
201 DEBUG(SSSDBG_TRACE_ALL,
[all...]
/sssd-io/src/providers/ldap/
H A Dsdap_ad_groups.c49 DEBUG(SSSDBG_TRACE_ALL,
H A Dsdap_id_op.c182 DEBUG(SSSDBG_TRACE_ALL, "releasing unused connection\n");
338 DEBUG(SSSDBG_TRACE_ALL, "releasing operation connection\n");
425 DEBUG(SSSDBG_TRACE_ALL, "reusing operation connection\n");
467 DEBUG(SSSDBG_TRACE_ALL, "waiting for connection to complete\n");
473 DEBUG(SSSDBG_TRACE_ALL, "reusing cached connection\n");
478 DEBUG(SSSDBG_TRACE_ALL, "releasing expired cached connection\n");
483 DEBUG(SSSDBG_TRACE_ALL, "beginning to connect\n");
637 DEBUG(SSSDBG_TRACE_ALL,
668 DEBUG(SSSDBG_TRACE_ALL,
677 DEBUG(SSSDBG_TRACE_ALL,
[all...]
H A Dsdap_certmap.c73 DEBUG(SSSDBG_TRACE_ALL, "No certmap data, nothing to do.\n");
85 DEBUG(SSSDBG_TRACE_ALL, "Trying to add rule [%s][%d][%s][%s].\n",
H A Dsdap_fd_events.c79 DEBUG(SSSDBG_TRACE_ALL, "Successfully removed connection callback.\n");
154 DEBUG(SSSDBG_TRACE_ALL, "Closing LDAP connection with fd [%d].\n", ber_fd);
267 DEBUG(SSSDBG_TRACE_ALL, "LDAP connection callbacks are not supported.\n");
320 DEBUG(SSSDBG_TRACE_ALL, "LDAP connection callbacks are not supported.\n");
/sssd-io/src/providers/data_provider/
H A Ddp_builtin.c49 DEBUG(SSSDBG_TRACE_ALL, "Access permit, returning PAM_SUCCESS.\n");
95 DEBUG(SSSDBG_TRACE_ALL, "Access deny, returning PAM_PERM_DENIED.\n");
/sssd-io/src/util/
H A Dsss_selinux.c94 DEBUG(SSSDBG_TRACE_ALL,
116 DEBUG(SSSDBG_TRACE_ALL, "No users specified in the rule!\n");
126 DEBUG(SSSDBG_TRACE_ALL, "User did not match\n");
143 DEBUG(SSSDBG_TRACE_ALL,
164 DEBUG(SSSDBG_TRACE_ALL, "No users specified in the rule!\n");
174 DEBUG(SSSDBG_TRACE_ALL, "Host did not match\n");
H A Ddebug.h81 #define SSSDBG_TRACE_ALL 0x4000 /* level 9 */ macro
/sssd-io/src/responder/pam/
H A Dpam_helpers.c142 DEBUG(SSSDBG_TRACE_ALL, "Error searching user [%s] in PAM cache.\n",
146 DEBUG(SSSDBG_TRACE_ALL, "User [%s] not found in PAM cache.\n", name);
/sssd-io/src/providers/ad/
H A Dad_gpo_child.c68 DEBUG(SSSDBG_TRACE_ALL, "smb_server length: %d\n", len);
75 DEBUG(SSSDBG_TRACE_ALL, "smb_server: %s\n", ibuf->smb_server);
81 DEBUG(SSSDBG_TRACE_ALL, "smb_share length: %d\n", len);
88 DEBUG(SSSDBG_TRACE_ALL, "smb_share: %s\n", ibuf->smb_share);
94 DEBUG(SSSDBG_TRACE_ALL, "smb_path length: %d\n", len);
101 DEBUG(SSSDBG_TRACE_ALL, "smb_path: %s\n", ibuf->smb_path);
107 DEBUG(SSSDBG_TRACE_ALL, "smb_cse_suffix length: %d\n", len);
114 DEBUG(SSSDBG_TRACE_ALL, "smb_cse_suffix: %s\n", ibuf->smb_cse_suffix);
175 DEBUG(SSSDBG_TRACE_ALL, "r->size: %zu\n", r->size);
218 DEBUG(SSSDBG_TRACE_ALL, "smb_path_with_suffi
[all...]
H A Dad_gpo.c349 DEBUG(SSSDBG_TRACE_ALL, "gpo_map_type: %s\n",
406 DEBUG(SSSDBG_TRACE_ALL, "Explicitly added service: %s\n", key.str);
425 DEBUG(SSSDBG_TRACE_ALL, "Default service (not explicitly removed): %s\n",
465 DEBUG(SSSDBG_TRACE_ALL, "gpo_default_right_config: %s\n",
497 DEBUG(SSSDBG_TRACE_ALL, "gpo_default_right: %d\n", gpo_default_right);
869 DEBUG(SSSDBG_TRACE_ALL, "examining dacl candidate_gpo_guid:%s\n",
874 DEBUG(SSSDBG_TRACE_ALL,
882 DEBUG(SSSDBG_TRACE_ALL, "Security descriptor is missing\n");
891 DEBUG(SSSDBG_TRACE_ALL,
904 DEBUG(SSSDBG_TRACE_ALL, "DAC
[all...]
/sssd-io/src/tests/
H A Ddebug-tests.c51 SSSDBG_TRACE_ALL | SSSDBG_BE_FO
108 debug_convert_old_level(SSSDBG_TRACE_ALL) == SSSDBG_TRACE_ALL,
109 "Invalid conversion of SSSDBG_TRACE_ALL"
338 SSSDBG_TRACE_ALL
381 SSSDBG_TRACE_ALL
430 SSSDBG_TRACE_ALL
480 SSSDBG_TRACE_ALL
527 SSSDBG_TRACE_ALL
574 SSSDBG_TRACE_ALL
[all...]
/sssd-io/src/db/
H A Dsysdb_gpo.c40 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO"\n", clean_gpo_guid, domain->name);
175 DEBUG(SSSDBG_TRACE_ALL, "Updating new GPO [%s][%s]\n", domain->name, gpo_guid);
257 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_BASE"\n", domain->name);
291 DEBUG(SSSDBG_TRACE_ALL, "No such entry.\n");
316 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_BASE"\n", domain->name);
347 DEBUG(SSSDBG_TRACE_ALL, "No GPO entries.\n");
372 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_RESULT"\n",
548 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_RESULT_BASE"\n", domain->name);
579 DEBUG(SSSDBG_TRACE_ALL, "No GPO Result object.\n");
627 DEBUG(SSSDBG_TRACE_ALL, "N
[all...]
H A Dsysdb_idmap.c40 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_IDMAP"\n", clean_sid, domain->name);
291 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_IDMAP_BASE"\n", domain->name);
/sssd-io/src/responder/nss/
H A Dnss_protocol.c48 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: success\n");
52 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: not found\n");
56 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: error [%d]: %s\n",
382 DEBUG(SSSDBG_TRACE_ALL, "Input certificate [%s]\n", derb64);
437 DEBUG(SSSDBG_TRACE_ALL, "Input SID [%s]\n", sid);
/sssd-io/src/providers/krb5/
H A Dkrb5_child.c550 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Vendor [%s].\n",
552 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Token-ID [%s].\n",
554 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Challenge [%s].\n",
556 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Flags [%d].\n",
639 DEBUG(SSSDBG_TRACE_ALL, "Identity [%s] does not contain [%s].\n",
643 DEBUG(SSSDBG_TRACE_ALL, "Found [%s] in identity [%s].\n", str, identity);
652 DEBUG(SSSDBG_TRACE_ALL, "Identity [%s] does not contain [%s].\n",
656 DEBUG(SSSDBG_TRACE_ALL, "Found [%s] in identity [%s].\n", str, identity);
689 if (DEBUG_IS_SET(SSSDBG_TRACE_ALL)) {
691 DEBUG(SSSDBG_TRACE_ALL, "[
[all...]
H A Dkrb5_keytab.c52 DEBUG(SSSDBG_TRACE_ALL,
64 DEBUG(SSSDBG_TRACE_ALL,
H A Dkrb5_delayed_online_authentication.c72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd);
299 DEBUG(SSSDBG_TRACE_ALL,
320 DEBUG(SSSDBG_TRACE_ALL, "Added user [%s] successfully to "
/sssd-io/src/responder/ssh/
H A Dssh_protocol.c54 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: success\n");
58 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: error [%d]: %s\n",
/sssd-io/src/providers/
H A Ddata_provider_callbacks.c232 DEBUG(SSSDBG_TRACE_ALL,
259 DEBUG(SSSDBG_TRACE_ALL,
283 DEBUG(SSSDBG_TRACE_ALL,
/sssd-io/src/providers/ipa/
H A Dipa_idmap.c50 DEBUG(SSSDBG_TRACE_ALL,
59 DEBUG(SSSDBG_TRACE_ALL,
65 DEBUG(SSSDBG_TRACE_ALL, "Trying to add idmap for domain [%s].\n",
H A Dipa_views.c319 DEBUG(SSSDBG_TRACE_ALL, "View not defined, nothing to do.\n");
409 DEBUG(SSSDBG_TRACE_ALL,
455 DEBUG(SSSDBG_TRACE_ALL, "No override found with filter [%s].\n",
468 DEBUG(SSSDBG_TRACE_ALL, "Found override for object with filter [%s].\n",
/sssd-io/src/sbus/
H A Dsssd_dbus_server.c149 DEBUG(SSSDBG_TRACE_ALL, "The symlink points to [%s]\n", target);
162 DEBUG(SSSDBG_TRACE_ALL, "The path including our pid is [%s]\n", pidpath);
180 DEBUG(SSSDBG_TRACE_ALL, "Removed the symlink\n");
H A Dsssd_dbus_common.c231 if (DEBUG_IS_SET(SSSDBG_TRACE_ALL)) {
238 DEBUG(SSSDBG_TRACE_ALL,
/sssd-io/src/responder/common/cache_req/plugins/
H A Dcache_req_object_by_sid.c42 CACHE_REQ_DEBUG(SSSDBG_TRACE_ALL, cr,

Completed in 35 milliseconds

1234