/freebsd/crypto/openssh/regress/ |
H A D | limit-keytype.sh | 28 fatal "ssh-keygen failed" 32 fatal "ssh-keygen failed" 34 fatal "ssh-keygen failed" 36 fatal "ssh-keygen failed" 38 fatal "ssh-keygen failed" 40 fatal "ssh-keygen failed" 42 fatal "ssh-keygen failed" 45 fatal "couldn't sign user_key1" 88 ${SSH} $certopts proxy true || fatal "cert failed" 89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" [all …]
|
H A D | krl.sh | 27 fatal "$SSHKEYGEN CA failed" 29 fatal "$SSHKEYGEN CA2 failed" 78 || fatal "$SSHKEYGEN failed" 81 || fatal "$SSHKEYGEN sign failed" 113 >/dev/null || fatal "$SSHKEYGEN KRL failed" 115 >/dev/null || fatal "$SSHKEYGEN KRL failed" 117 >/dev/null || fatal "$SSHKEYGEN KRL failed" 119 >/dev/null || fatal "$SSHKEYGEN KRL failed" 121 >/dev/null || fatal "$SSHKEYGEN KRL failed" 123 >/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed" [all …]
|
H A D | agent-pkcs11-restrict.sh | 15 fatal "ssh-keygen hostkey failed" 44 fatal "ssh-add -l did not fail with exit code 1 (got $r)" 122 $SSHADD -qD >/dev/null || fatal "clear agent failed" 124 fatal "failed to add keys" 133 host_$h true > $OBJ/ssh_output || fatal "test ssh $h failed" 134 cmp $OBJ/expect_$h $OBJ/ssh_output || fatal "unexpected output" 138 $SSHADD -qD >/dev/null || fatal "clear agent failed" 140 fatal "failed to add keys" 144 host_$h true > $OBJ/ssh_output && fatal "test ssh $h succeeded" 148 $SSHADD -qD >/dev/null || fatal "clear agent failed" [all …]
|
H A D | cert-file.sh | 11 fatal "ssh-keygen failed" 13 fatal "ssh-keygen failed" 17 fatal "ssh-keygen failed" 19 fatal "ssh-keygen failed" 21 fatal "ssh-keygen failed" 23 fatal "ssh-keygen failed" 25 fatal "ssh-keygen failed" 31 fatal "couldn't sign user_key1 with user_ca_key1" 35 fatal "couldn't sign user_key1 with user_ca_key2" 39 fatal "couldn't sign user_key3 with user_ca_key1" [all …]
|
H A D | agent-restrict.sh | 15 fatal "ssh-keygen hostkey failed" 17 fatal "ssh-keygen userkey failed" 24 fatal "ssh-keygen certify failed" 88 *) fatal "unsupported command $_whichcmd" ;; 170 mv $OBJ/user_$u $OBJ/user_x$u || fatal "hide privkey $u" 177 mv $OBJ/user_x$u $OBJ/user_$u || fatal "restore privkey $u" 181 ${SSHADD} -D > /dev/null 2>&1 || fatal "clear agent failed" 213 $SSHADD -q $OBJ/user_$u || fatal "add key $u unrestricted" 242 || fatal "add key $u basic restrict" 245 $SSHADD -q $OBJ/user_x || fatal "add unrestricted key" [all …]
|
H A D | hostkey-agent.sh | 11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r" 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 25 fatal "sign $k" 27 fatal "couldn't load key $OBJ/agent-key.$k" 29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k" 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
|
H A D | agent-pkcs11-cert.sh | 17 $SSHKEYGEN -q -t ed25519 -C ca -N '' -f $OBJ/ca || fatal "ssh-keygen CA failed" 19 fatal "certify ECDSA key failed" 21 fatal "certify RSA key failed" 23 fatal "certify CA key failed" 38 fatal "ssh-add -l did not fail with exit code 1 (got $r)" 49 fatal "failed to add keys" 72 $SSHADD -qD >/dev/null || fatal "clear agent failed" 81 fatal "failed to add keys"
|
/freebsd/contrib/googletest/googletest/test/ |
H A D | googletest-output-test_.cc | 57 // Tests catching fatal failures. 62 // This function calls a test subroutine, catches the fatal failure it 65 // Calls a subrountine that yields a fatal failure. in TryTestSubroutine() 68 // Catches the fatal failure and aborts the test. in TryTestSubroutine() 116 // Tests catching a fatal failure in a subroutine. 123 // Tests catching a fatal failure in a nested subroutine. 127 // Calls a subrountine that yields a fatal failure. in TEST() 130 // Catches the fatal failure and aborts the test. in TEST() 355 // Tests non-fatal failures in the fixture constructor. 378 // Tests fatal failures in the fixture constructor. [all …]
|
H A D | googletest-output-test-golden-lin.txt | 391 Expected fatal failure in foo.cc 484 Expected: 1 non-fatal failure 492 Expected: 1 non-fatal failure 494 googletest-output-test_.cc:#: Non-fatal failure: 496 Expected non-fatal failure 1. 500 googletest-output-test_.cc:#: Non-fatal failure: 502 Expected non-fatal failure 2. 512 Expected: 1 non-fatal failure 514 googletest-output-test_.cc:#: Fatal failure: 516 Expected fatal failure. [all …]
|
H A D | gtest_environment_test.cc | 54 // generate a non-fatal failure, generate a fatal failure, or 61 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp() 64 FAIL() << "Expected fatal failure in global set-up."; in SetUp() 71 // Generates a non-fatal failure. 74 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown() 134 // set-up generates no fatal failure. 139 "and the global tear-down should generate a non-fatal failure."); in TestTestsRun() 142 "fatal failure."); in TestTestsRun() 148 // generates a fatal failure. 153 "should generate a fatal failure."); in TestNoTestsRunSetUpFailure() [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | SSL_alert_type_string.pod | 38 A warning alert is sent, when a non-fatal error condition occurs. The 40 non-fatal errors are certificate errors ("certificate expired", 42 (The sending party may however decide to send a fatal error.) The 46 Several alert messages must be sent as fatal alert messages as specified 47 by the TLS RFC. A fatal alert always leads to a connection abort. 58 =item "F"/"fatal" 78 An inappropriate message was received. This alert is always fatal 85 MAC. This message is always fatal. 91 fatal. 97 parameters given the options available. This is a fatal error. [all …]
|
/freebsd/crypto/openssh/ |
H A D | uidswap.c | 88 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 93 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 102 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid() 107 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 112 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 121 fatal("setgroups: %.100s", strerror(errno)); in temporarily_use_uid() 131 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid() 134 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid() 150 fatal("restore_uid: temporarily_use_uid not effective"); in restore_uid() 156 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); in restore_uid() [all …]
|
H A D | auth-pam.c | 233 fatal("%s: waitpid: %s", __func__, strerror(errno)); in pthread_join() 289 fatal("PAM: sshpam_authctxt not initialized"); in sshpam_chauthtok_ruid() 291 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid() 294 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid() 308 fatal("%s: PAM authctxt not initialized", __func__); in sshpam_password_change_required() 340 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 342 fatal("%s: invalid PAM account status %u", __func__, n); in import_environments() 345 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 350 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 359 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() [all …]
|
H A D | xmalloc.c | 7 * failure (they call fatal if they encounter an error). 39 fatal("xmalloc: zero size"); in xmalloc() 42 fatal("xmalloc: out of memory (allocating %zu bytes)", size); in xmalloc() 52 fatal("xcalloc: zero size"); in xcalloc() 54 fatal("xcalloc: nmemb * size > SIZE_MAX"); in xcalloc() 57 fatal("xcalloc: out of memory (allocating %zu bytes)", in xcalloc() 69 fatal("xreallocarray: out of memory (%zu elements of %zu bytes)", in xreallocarray() 81 fatal("xrecallocarray: out of memory (%zu elements of %zu bytes)", in xrecallocarray() 104 fatal("xvasprintf: could not allocate memory"); in xvasprintf()
|
H A D | ssh-keygen.c | 182 fatal("unknown key type %s", key_type_name); in type_bits_valid() 208 fatal("Invalid DSA key length: must be 1024 bits"); in type_bits_valid() 212 fatal("Invalid RSA key length: minimum is %d bits", in type_bits_valid() 215 fatal("Invalid RSA key length: maximum is %d bits", in type_bits_valid() 221 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 224 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 298 fatal("bad key type"); in ask_filename() 383 fatal("PEM_write_RSA_PUBKEY failed"); in do_convert_to_pkcs8() 388 fatal("PEM_write_DSA_PUBKEY failed"); in do_convert_to_pkcs8() 395 fatal("PEM_write_EC_PUBKEY failed"); in do_convert_to_pkcs8() [all …]
|
H A D | ssh-sk-helper.c | 72 fatal("%s: sshbuf_new failed", __progname); in reply_error() 75 fatal("%s: buffer error", __progname); in reply_error() 110 fatal("%s: trailing data in request", __progname); in process_sign() 115 fatal("%s: Unsupported key type %s", in process_sign() 132 fatal("%s: sshbuf_new failed", __progname); in process_sign() 160 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 172 fatal("%s: trailing data in request", __progname); in process_enroll() 175 fatal("%s: bad type %u", __progname, type); in process_enroll() 191 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 223 fatal("%s: sshbuf_new failed", __progname); in process_load_resident() [all …]
|
H A D | sandbox-capsicum.c | 82 fatal("%s: setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child() 86 fatal("%s: setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child() 90 fatal("%s: setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child() 96 fatal("can't limit stdin: %m"); in ssh_sandbox_child() 98 fatal("can't limit stdout: %m"); in ssh_sandbox_child() 100 fatal("can't limit stderr: %m"); in ssh_sandbox_child() 105 fatal("%s: failed to limit the network socket", __func__); in ssh_sandbox_child() 109 fatal("%s: failed to limit the logging socket", __func__); in ssh_sandbox_child() 111 fatal("%s: failed to enter capability mode", __func__); in ssh_sandbox_child()
|
H A D | servconf.c | 327 fatal("No host key files found"); in fill_default_server_options() 882 fatal("bad addr or host: %s (%s)", in add_one_listen_addr() 1036 fatal("'Match %s' in configuration but '%s' not in connection " in match_test_missing_fatal() 1162 fatal("Invalid Match address argument " in match_cfg_line() 1185 fatal("Invalid Match localaddress " in match_cfg_line() 1380 fatal("%s line %d: Directive '%s' is not allowed " in process_server_config_line_depth() 1397 fatal("%s line %d: missing argument.", in process_server_config_line_depth() 1414 fatal("%s line %d: too many ports.", in process_server_config_line_depth() 1418 fatal("%s line %d: missing port number.", in process_server_config_line_depth() 1422 fatal("%s line %d: Badly formatted port number.", in process_server_config_line_depth() [all …]
|
H A D | ssh-keysign.c | 189 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 212 fatal("getpwuid failed"); in main() 229 fatal("ssh-keysign not enabled in %s", in main() 233 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 240 fatal("could not open any host key"); in main() 258 fatal("no hostkey found"); in main() 261 fatal("%s: sshbuf_new failed", __progname); in main() 263 fatal("%s: ssh_msg_recv failed", __progname); in main() 267 fatal("%s: bad version: received %d, expected %d", in main() 272 fatal("%s: bad fd = %d", __progname, fd); in main() [all …]
|
H A D | sandbox-systrace.c | 119 fatal("%s: kill(%d, SIGSTOP)", __func__, getpid()); in ssh_sandbox_child() 139 fatal("%s: child terminated with signal %d", in ssh_sandbox_parent() 142 fatal("%s: child exited with status %d", in ssh_sandbox_parent() 144 fatal("%s: child not stopped", __func__); in ssh_sandbox_parent() 151 fatal("%s: open(\"/dev/systrace\"): %s", __func__, in ssh_sandbox_parent() 154 fatal("%s: ioctl(STRIOCCLONE, %d): %s", __func__, in ssh_sandbox_parent() 159 fatal("%s: ioctl(%d, STRIOCATTACH, %d): %s", __func__, in ssh_sandbox_parent() 167 fatal("%s: ioctl(%d, STRIOCPOLICY (new)): %s", __func__, in ssh_sandbox_parent() 173 fatal("%s: ioctl(%d, STRIOCPOLICY (assign)): %s", in ssh_sandbox_parent() 192 fatal("%s: ioctl(%d, STRIOCPOLICY (modify)): %s", in ssh_sandbox_parent() [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | SSL_alert_type_string.3 | 172 A warning alert is sent, when a non-fatal error condition occurs. The 174 non-fatal errors are certificate errors (\*(L"certificate expired\*(R", 176 (The sending party may however decide to send a fatal error.) The 180 Several alert messages must be sent as fatal alert messages as specified 181 by the \s-1TLS RFC. A\s0 fatal alert always leads to a connection abort. 192 .IX Item "F/fatal" 209 An inappropriate message was received. This alert is always fatal 216 \&\s-1MAC.\s0 This message is always fatal. 222 fatal. 228 parameters given the options available. This is a fatal error. [all …]
|
/freebsd/usr.sbin/watch/ |
H A D | watch.c | 54 static void fatal(int, const char *); 138 fatal(int error, const char *buf) in fatal() function 143 errx(error, "fatal: %s", buf); in fatal() 163 fatal(EX_OSFILE, "cannot open snoop device"); in open_snp() 218 fatal(EX_DATAERR, "can't open device"); in attach_snp() 220 fatal(EX_UNAVAILABLE, "cannot attach to tty"); in attach_snp() 242 fatal(EX_DATAERR, "bad device name"); in set_dev() 245 fatal(EX_DATAERR, "must be a character device"); in set_dev() 338 fatal(EX_DATAERR, "no device name given"); in main() 345 fatal(EX_UNAVAILABLE, "malloc failed"); in main() [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-solaris.c | 94 "fatal events: %s", __func__, strerror(errno)); in solaris_contract_pre_fork() 275 fatal("priv_allocset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 277 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 284 fatal("priv_addset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 293 fatal("priv_delset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 305 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 308 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 315 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 319 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 325 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() [all …]
|
/freebsd/sys/dev/sfxge/common/ |
H A D | efx_intr.c | 324 * Under legacy interrupts, don't share a level between fatal in siena_intr_init() 334 /* Enable all the genuinely fatal interrupts */ in siena_intr_init() 463 EFSYS_PROBE(fatal); in siena_intr_check_fatal() 465 /* Clear the fatal interrupt condition */ in siena_intr_check_fatal() 524 efx_oword_t fatal; in siena_intr_fatal() local 527 EFX_BAR_READO(enp, FR_AZ_FATAL_INTR_REG_KER, &fatal); in siena_intr_fatal() 530 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRM_PERR_INT_KER) != 0 || in siena_intr_fatal() 531 EFX_OWORD_FIELD(fatal, FRF_AZ_MEM_PERR_INT_KER) != 0) in siena_intr_fatal() 534 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRAM_OOB_INT_KER) != 0) in siena_intr_fatal() 537 if (EFX_OWORD_FIELD(fatal, FRF_AZ_BUFID_DC_OOB_INT_KER) != 0) in siena_intr_fatal() [all …]
|
/freebsd/sys/dev/qat/qat_hw/qat_c4xxx/ |
H A D | adf_c4xxx_ras.c | 121 "QAT RAS fatal"); in adf_init_ras() 372 /* For each uncorrectable fatal error in AE increment RAS error in adf_handle_ae_uncorr_err() 412 "Uncorrectable fatal MSIX table parity error detected.\n"); in adf_handle_ri_mem_par_err() 458 "Fatal error detected: %s command parity\n", in adf_log_fatal_cmd_par_err() 516 /* RI memory parity errors are uncorrectable non-fatal errors in adf_process_errsou9() 518 * be treated as fatal error, followed by device restart. in adf_process_errsou9() 615 /* All SPP parity errors are treated as uncorrectable fatal errors */ in adf_process_spp_par_err() 619 "Uncorrectable fatal SPP parity error detected\n"); in adf_process_spp_par_err() 709 "Uncorrectable non-fatal BME response order error.\n"); in adf_handle_ti_misc_err() 714 "Uncorrectable non-fatal response order error.\n"); in adf_handle_ti_misc_err() [all …]
|