/sssd-io/src/p11_child/ |
H A D | p11_child_nss.c | 159 DEBUG(SSSDBG_TRACE_ALL, "Default Module List:\n"); 163 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n", 165 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n", 169 DEBUG(SSSDBG_TRACE_ALL, "Dead Module List:\n"); 173 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n", 175 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n", 179 DEBUG(SSSDBG_TRACE_ALL, "DB Module List:\n"); 183 DEBUG(SSSDBG_TRACE_ALL, "common name: [%s].\n", 185 DEBUG(SSSDBG_TRACE_ALL, "dll name: [%s].\n", 201 DEBUG(SSSDBG_TRACE_ALL, [all...] |
/sssd-io/src/providers/ldap/ |
H A D | sdap_ad_groups.c | 49 DEBUG(SSSDBG_TRACE_ALL,
|
H A D | sdap_id_op.c | 182 DEBUG(SSSDBG_TRACE_ALL, "releasing unused connection\n"); 338 DEBUG(SSSDBG_TRACE_ALL, "releasing operation connection\n"); 425 DEBUG(SSSDBG_TRACE_ALL, "reusing operation connection\n"); 467 DEBUG(SSSDBG_TRACE_ALL, "waiting for connection to complete\n"); 473 DEBUG(SSSDBG_TRACE_ALL, "reusing cached connection\n"); 478 DEBUG(SSSDBG_TRACE_ALL, "releasing expired cached connection\n"); 483 DEBUG(SSSDBG_TRACE_ALL, "beginning to connect\n"); 637 DEBUG(SSSDBG_TRACE_ALL, 668 DEBUG(SSSDBG_TRACE_ALL, 677 DEBUG(SSSDBG_TRACE_ALL, [all...] |
H A D | sdap_certmap.c | 73 DEBUG(SSSDBG_TRACE_ALL, "No certmap data, nothing to do.\n"); 85 DEBUG(SSSDBG_TRACE_ALL, "Trying to add rule [%s][%d][%s][%s].\n",
|
H A D | sdap_fd_events.c | 79 DEBUG(SSSDBG_TRACE_ALL, "Successfully removed connection callback.\n"); 154 DEBUG(SSSDBG_TRACE_ALL, "Closing LDAP connection with fd [%d].\n", ber_fd); 267 DEBUG(SSSDBG_TRACE_ALL, "LDAP connection callbacks are not supported.\n"); 320 DEBUG(SSSDBG_TRACE_ALL, "LDAP connection callbacks are not supported.\n");
|
/sssd-io/src/providers/data_provider/ |
H A D | dp_builtin.c | 49 DEBUG(SSSDBG_TRACE_ALL, "Access permit, returning PAM_SUCCESS.\n"); 95 DEBUG(SSSDBG_TRACE_ALL, "Access deny, returning PAM_PERM_DENIED.\n");
|
/sssd-io/src/util/ |
H A D | sss_selinux.c | 94 DEBUG(SSSDBG_TRACE_ALL, 116 DEBUG(SSSDBG_TRACE_ALL, "No users specified in the rule!\n"); 126 DEBUG(SSSDBG_TRACE_ALL, "User did not match\n"); 143 DEBUG(SSSDBG_TRACE_ALL, 164 DEBUG(SSSDBG_TRACE_ALL, "No users specified in the rule!\n"); 174 DEBUG(SSSDBG_TRACE_ALL, "Host did not match\n");
|
H A D | debug.h | 81 #define SSSDBG_TRACE_ALL 0x4000 /* level 9 */ macro
|
/sssd-io/src/responder/pam/ |
H A D | pam_helpers.c | 142 DEBUG(SSSDBG_TRACE_ALL, "Error searching user [%s] in PAM cache.\n", 146 DEBUG(SSSDBG_TRACE_ALL, "User [%s] not found in PAM cache.\n", name);
|
/sssd-io/src/providers/ad/ |
H A D | ad_gpo_child.c | 68 DEBUG(SSSDBG_TRACE_ALL, "smb_server length: %d\n", len); 75 DEBUG(SSSDBG_TRACE_ALL, "smb_server: %s\n", ibuf->smb_server); 81 DEBUG(SSSDBG_TRACE_ALL, "smb_share length: %d\n", len); 88 DEBUG(SSSDBG_TRACE_ALL, "smb_share: %s\n", ibuf->smb_share); 94 DEBUG(SSSDBG_TRACE_ALL, "smb_path length: %d\n", len); 101 DEBUG(SSSDBG_TRACE_ALL, "smb_path: %s\n", ibuf->smb_path); 107 DEBUG(SSSDBG_TRACE_ALL, "smb_cse_suffix length: %d\n", len); 114 DEBUG(SSSDBG_TRACE_ALL, "smb_cse_suffix: %s\n", ibuf->smb_cse_suffix); 175 DEBUG(SSSDBG_TRACE_ALL, "r->size: %zu\n", r->size); 218 DEBUG(SSSDBG_TRACE_ALL, "smb_path_with_suffi [all...] |
H A D | ad_gpo.c | 349 DEBUG(SSSDBG_TRACE_ALL, "gpo_map_type: %s\n", 406 DEBUG(SSSDBG_TRACE_ALL, "Explicitly added service: %s\n", key.str); 425 DEBUG(SSSDBG_TRACE_ALL, "Default service (not explicitly removed): %s\n", 465 DEBUG(SSSDBG_TRACE_ALL, "gpo_default_right_config: %s\n", 497 DEBUG(SSSDBG_TRACE_ALL, "gpo_default_right: %d\n", gpo_default_right); 869 DEBUG(SSSDBG_TRACE_ALL, "examining dacl candidate_gpo_guid:%s\n", 874 DEBUG(SSSDBG_TRACE_ALL, 882 DEBUG(SSSDBG_TRACE_ALL, "Security descriptor is missing\n"); 891 DEBUG(SSSDBG_TRACE_ALL, 904 DEBUG(SSSDBG_TRACE_ALL, "DAC [all...] |
/sssd-io/src/tests/ |
H A D | debug-tests.c | 51 SSSDBG_TRACE_ALL | SSSDBG_BE_FO 108 debug_convert_old_level(SSSDBG_TRACE_ALL) == SSSDBG_TRACE_ALL, 109 "Invalid conversion of SSSDBG_TRACE_ALL" 338 SSSDBG_TRACE_ALL 381 SSSDBG_TRACE_ALL 430 SSSDBG_TRACE_ALL 480 SSSDBG_TRACE_ALL 527 SSSDBG_TRACE_ALL 574 SSSDBG_TRACE_ALL [all...] |
/sssd-io/src/db/ |
H A D | sysdb_gpo.c | 40 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO"\n", clean_gpo_guid, domain->name); 175 DEBUG(SSSDBG_TRACE_ALL, "Updating new GPO [%s][%s]\n", domain->name, gpo_guid); 257 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_BASE"\n", domain->name); 291 DEBUG(SSSDBG_TRACE_ALL, "No such entry.\n"); 316 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_BASE"\n", domain->name); 347 DEBUG(SSSDBG_TRACE_ALL, "No GPO entries.\n"); 372 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_RESULT"\n", 548 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_GPO_RESULT_BASE"\n", domain->name); 579 DEBUG(SSSDBG_TRACE_ALL, "No GPO Result object.\n"); 627 DEBUG(SSSDBG_TRACE_ALL, "N [all...] |
H A D | sysdb_idmap.c | 40 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_IDMAP"\n", clean_sid, domain->name); 291 DEBUG(SSSDBG_TRACE_ALL, SYSDB_TMPL_IDMAP_BASE"\n", domain->name);
|
/sssd-io/src/responder/nss/ |
H A D | nss_protocol.c | 48 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: success\n"); 52 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: not found\n"); 56 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: error [%d]: %s\n", 382 DEBUG(SSSDBG_TRACE_ALL, "Input certificate [%s]\n", derb64); 437 DEBUG(SSSDBG_TRACE_ALL, "Input SID [%s]\n", sid);
|
/sssd-io/src/providers/krb5/ |
H A D | krb5_child.c | 550 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Vendor [%s].\n", 552 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Token-ID [%s].\n", 554 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Challenge [%s].\n", 556 DEBUG(SSSDBG_TRACE_ALL, "[%zu] Flags [%d].\n", 639 DEBUG(SSSDBG_TRACE_ALL, "Identity [%s] does not contain [%s].\n", 643 DEBUG(SSSDBG_TRACE_ALL, "Found [%s] in identity [%s].\n", str, identity); 652 DEBUG(SSSDBG_TRACE_ALL, "Identity [%s] does not contain [%s].\n", 656 DEBUG(SSSDBG_TRACE_ALL, "Found [%s] in identity [%s].\n", str, identity); 689 if (DEBUG_IS_SET(SSSDBG_TRACE_ALL)) { 691 DEBUG(SSSDBG_TRACE_ALL, "[ [all...] |
H A D | krb5_keytab.c | 52 DEBUG(SSSDBG_TRACE_ALL, 64 DEBUG(SSSDBG_TRACE_ALL,
|
H A D | krb5_delayed_online_authentication.c | 72 DEBUG_PAM_DATA(SSSDBG_TRACE_ALL, pd); 299 DEBUG(SSSDBG_TRACE_ALL, 320 DEBUG(SSSDBG_TRACE_ALL, "Added user [%s] successfully to "
|
/sssd-io/src/responder/ssh/ |
H A D | ssh_protocol.c | 54 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: success\n"); 58 DEBUG(SSSDBG_TRACE_ALL, "Sending reply: error [%d]: %s\n",
|
/sssd-io/src/providers/ |
H A D | data_provider_callbacks.c | 232 DEBUG(SSSDBG_TRACE_ALL, 259 DEBUG(SSSDBG_TRACE_ALL, 283 DEBUG(SSSDBG_TRACE_ALL,
|
/sssd-io/src/providers/ipa/ |
H A D | ipa_idmap.c | 50 DEBUG(SSSDBG_TRACE_ALL, 59 DEBUG(SSSDBG_TRACE_ALL, 65 DEBUG(SSSDBG_TRACE_ALL, "Trying to add idmap for domain [%s].\n",
|
H A D | ipa_views.c | 319 DEBUG(SSSDBG_TRACE_ALL, "View not defined, nothing to do.\n"); 409 DEBUG(SSSDBG_TRACE_ALL, 455 DEBUG(SSSDBG_TRACE_ALL, "No override found with filter [%s].\n", 468 DEBUG(SSSDBG_TRACE_ALL, "Found override for object with filter [%s].\n",
|
/sssd-io/src/sbus/ |
H A D | sssd_dbus_server.c | 149 DEBUG(SSSDBG_TRACE_ALL, "The symlink points to [%s]\n", target); 162 DEBUG(SSSDBG_TRACE_ALL, "The path including our pid is [%s]\n", pidpath); 180 DEBUG(SSSDBG_TRACE_ALL, "Removed the symlink\n");
|
H A D | sssd_dbus_common.c | 231 if (DEBUG_IS_SET(SSSDBG_TRACE_ALL)) { 238 DEBUG(SSSDBG_TRACE_ALL,
|
/sssd-io/src/responder/common/cache_req/plugins/ |
H A D | cache_req_object_by_sid.c | 42 CACHE_REQ_DEBUG(SSSDBG_TRACE_ALL, cr,
|