summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorHansH111 <hans@atbas.org>2022-03-19 09:02:55 +0000
committerHansH111 <hans@atbas.org>2022-03-19 09:02:55 +0000
commit2ad42f37e3add326c372f96d323bb69bd9be3738 (patch)
treefe8fc3bd74bab3158cabb38b2707b977c03e7606
parentf7ea00bfb1e8626949e4e8032c9f1fc349079d83 (diff)
downloaddropbear-2ad42f37e3add326c372f96d323bb69bd9be3738.tar.gz
changed TRACE to DEBUG1 for dbclient
-rw-r--r--cli-auth.c43
-rw-r--r--cli-authpasswd.c2
-rw-r--r--cli-authpubkey.c2
-rw-r--r--cli-main.c9
-rw-r--r--cli-session.c2
-rw-r--r--common-session.c2
6 files changed, 32 insertions, 28 deletions
diff --git a/cli-auth.c b/cli-auth.c
index 49b5ed8..9f9639d 100644
--- a/cli-auth.c
+++ b/cli-auth.c
@@ -85,32 +85,31 @@ void recv_msg_userauth_banner() {
banner = buf_getstring(ses.payload, &bannerlen);
buf_eatstring(ses.payload); /* The language string */
- if (cli_opts.quiet == 0) {
- if (bannerlen > MAX_BANNER_SIZE) {
- TRACE(("recv_msg_userauth_banner: bannerlen too long: %d", bannerlen))
- truncated = 1;
- } else {
- cleantext(banner);
-
- /* Limit to 24 lines */
- linecount = 1;
- for (i = 0; i < bannerlen; i++) {
- if (banner[i] == '\n') {
- if (linecount >= MAX_BANNER_LINES) {
- banner[i] = '\0';
- truncated = 1;
- break;
- }
- linecount++;
+ if (bannerlen > MAX_BANNER_SIZE) {
+ TRACE(("recv_msg_userauth_banner: bannerlen too long: %d", bannerlen))
+ truncated = 1;
+ } else {
+ cleantext(banner);
+
+ /* Limit to 24 lines */
+ linecount = 1;
+ for (i = 0; i < bannerlen; i++) {
+ if (banner[i] == '\n') {
+ if (linecount >= MAX_BANNER_LINES) {
+ banner[i] = '\0';
+ truncated = 1;
+ break;
}
+ linecount++;
}
- fprintf(stderr, "%s\n", banner);
}
+ fprintf(stderr, "%s\n", banner);
+ }
- if (truncated) {
- fprintf(stderr, "[Banner from the server is too long]\n");
- }
+ if (truncated) {
+ fprintf(stderr, "[Banner from the server is too long]\n");
}
+
m_free(banner);
TRACE(("leave recv_msg_userauth_banner"))
}
@@ -261,7 +260,7 @@ void recv_msg_userauth_success() {
/* This function can validly get called multiple times
if DROPBEAR_CLI_IMMEDIATE_AUTH is set */
- TRACE(("received msg_userauth_success"))
+ DEBUG1(("received msg_userauth_success"))
if (cli_opts.disable_trivial_auth && cli_ses.is_trivial_auth) {
dropbear_exit("trivial authentication not allowed");
}
diff --git a/cli-authpasswd.c b/cli-authpasswd.c
index a24d43e..91790ce 100644
--- a/cli-authpasswd.c
+++ b/cli-authpasswd.c
@@ -120,7 +120,7 @@ void cli_auth_password() {
char* password = NULL;
char prompt[80];
- TRACE(("enter cli_auth_password"))
+ DEBUG1(("enter cli_auth_password"))
CHECKCLEARTOWRITE();
snprintf(prompt, sizeof(prompt), "%s@%s's password: ",
diff --git a/cli-authpubkey.c b/cli-authpubkey.c
index c0da77f..817a81d 100644
--- a/cli-authpubkey.c
+++ b/cli-authpubkey.c
@@ -147,7 +147,7 @@ static void send_msg_userauth_pubkey(sign_key *key, enum signature_type sigtype,
buffer* sigbuf = NULL;
enum signkey_type keytype = signkey_type_from_signature(sigtype);
- TRACE(("enter send_msg_userauth_pubkey sigtype %d", sigtype))
+ DEBUG1(("enter send_msg_userauth_pubkey %s", signkey_name_from_type(sigtype,NULL)))
CHECKCLEARTOWRITE();
buf_putbyte(ses.writepayload, SSH_MSG_USERAUTH_REQUEST);
diff --git a/cli-main.c b/cli-main.c
index b571b90..065fd76 100644
--- a/cli-main.c
+++ b/cli-main.c
@@ -65,8 +65,12 @@ int main(int argc, char ** argv) {
}
#endif
- TRACE(("user='%s' host='%s' port='%s' bind_address='%s' bind_port='%s'", cli_opts.username,
- cli_opts.remotehost, cli_opts.remoteport, cli_opts.bind_address, cli_opts.bind_port))
+ if (cli_opts.bind_address) {
+ DEBUG1(("connect to: user=%s host=%s/%s bind_address=%s:%s", cli_opts.username,
+ cli_opts.remotehost, cli_opts.remoteport, cli_opts.bind_address, cli_opts.bind_port))
+ } else {
+ DEBUG1(("connect to: user=%s host=%s/%s",cli_opts.username,cli_opts.remotehost,cli_opts.remoteport))
+ }
if (signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
dropbear_exit("signal() error");
@@ -135,6 +139,7 @@ static void cli_proxy_cmd(int *sock_in, int *sock_out, pid_t *pid_out) {
ret = spawn_command(exec_proxy_cmd, ex_cmd,
sock_out, sock_in, NULL, pid_out);
+ DEBUG1(("cmd: %s pid=%d", ex_cmd,*pid_out))
m_free(ex_cmd);
if (ret == DROPBEAR_FAILURE) {
dropbear_exit("Failed running proxy command");
diff --git a/cli-session.c b/cli-session.c
index 2044b46..5981b24 100644
--- a/cli-session.c
+++ b/cli-session.c
@@ -102,7 +102,7 @@ void cli_connected(int result, int sock, void* userdata, const char *errstring)
dropbear_exit("Connect failed: %s", errstring);
}
myses->sock_in = myses->sock_out = sock;
- TRACE(("cli_connected"))
+ DEBUG1(("cli_connected"))
ses.socket_prio = DROPBEAR_PRIO_NORMAL;
/* switches to lowdelay */
update_channel_prio();
diff --git a/common-session.c b/common-session.c
index 3d406b1..5b61920 100644
--- a/common-session.c
+++ b/common-session.c
@@ -404,7 +404,7 @@ static void read_session_identification() {
dropbear_exit("Incompatible remote version '%s'", ses.remoteident);
}
- TRACE(("remoteident: %s", ses.remoteident))
+ DEBUG1(("remoteident: %s", ses.remoteident))
}