Home
last modified time | relevance | path

Searched full:fatal (Results 1 – 25 of 1544) sorted by relevance

12345678910>>...62

/freebsd/crypto/openssh/regress/
H A Dlimit-keytype.sh28 fatal "ssh-keygen failed"
32 fatal "ssh-keygen failed"
34 fatal "ssh-keygen failed"
36 fatal "ssh-keygen failed"
38 fatal "ssh-keygen failed"
40 fatal "ssh-keygen failed"
42 fatal "ssh-keygen failed"
45 fatal "couldn't sign user_key1"
88 ${SSH} $certopts proxy true || fatal "cert failed"
89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed"
[all …]
H A Dkrl.sh27 fatal "$SSHKEYGEN CA failed"
29 fatal "$SSHKEYGEN CA2 failed"
78 || fatal "$SSHKEYGEN failed"
81 || fatal "$SSHKEYGEN sign failed"
113 >/dev/null || fatal "$SSHKEYGEN KRL failed"
115 >/dev/null || fatal "$SSHKEYGEN KRL failed"
117 >/dev/null || fatal "$SSHKEYGEN KRL failed"
119 >/dev/null || fatal "$SSHKEYGEN KRL failed"
121 >/dev/null || fatal "$SSHKEYGEN KRL failed"
123 >/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed"
[all …]
H A Dagent-pkcs11-restrict.sh15 fatal "ssh-keygen hostkey failed"
44 fatal "ssh-add -l did not fail with exit code 1 (got $r)"
122 $SSHADD -qD >/dev/null || fatal "clear agent failed"
124 fatal "failed to add keys"
133 host_$h true > $OBJ/ssh_output || fatal "test ssh $h failed"
134 cmp $OBJ/expect_$h $OBJ/ssh_output || fatal "unexpected output"
138 $SSHADD -qD >/dev/null || fatal "clear agent failed"
140 fatal "failed to add keys"
144 host_$h true > $OBJ/ssh_output && fatal "test ssh $h succeeded"
148 $SSHADD -qD >/dev/null || fatal "clear agent failed"
[all …]
H A Dcert-file.sh11 fatal "ssh-keygen failed"
13 fatal "ssh-keygen failed"
17 fatal "ssh-keygen failed"
19 fatal "ssh-keygen failed"
21 fatal "ssh-keygen failed"
23 fatal "ssh-keygen failed"
25 fatal "ssh-keygen failed"
31 fatal "couldn't sign user_key1 with user_ca_key1"
35 fatal "couldn't sign user_key1 with user_ca_key2"
39 fatal "couldn't sign user_key3 with user_ca_key1"
[all …]
H A Dagent-restrict.sh15 fatal "ssh-keygen hostkey failed"
17 fatal "ssh-keygen userkey failed"
24 fatal "ssh-keygen certify failed"
88 *) fatal "unsupported command $_whichcmd" ;;
170 mv $OBJ/user_$u $OBJ/user_x$u || fatal "hide privkey $u"
177 mv $OBJ/user_x$u $OBJ/user_$u || fatal "restore privkey $u"
181 ${SSHADD} -D > /dev/null 2>&1 || fatal "clear agent failed"
213 $SSHADD -q $OBJ/user_$u || fatal "add key $u unrestricted"
242 || fatal "add key $u basic restrict"
245 $SSHADD -q $OBJ/user_x || fatal "add unrestricted key"
[all …]
H A Dhostkey-agent.sh11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r"
18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA"
22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k"
25 fatal "sign $k"
27 fatal "couldn't load key $OBJ/agent-key.$k"
29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k"
64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key"
65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
H A Dagent-pkcs11-cert.sh17 $SSHKEYGEN -q -t ed25519 -C ca -N '' -f $OBJ/ca || fatal "ssh-keygen CA failed"
19 fatal "certify ECDSA key failed"
21 fatal "certify RSA key failed"
23 fatal "certify CA key failed"
38 fatal "ssh-add -l did not fail with exit code 1 (got $r)"
49 fatal "failed to add keys"
72 $SSHADD -qD >/dev/null || fatal "clear agent failed"
81 fatal "failed to add keys"
/freebsd/contrib/googletest/googletest/test/
H A Dgoogletest-output-test_.cc57 // Tests catching fatal failures.
62 // This function calls a test subroutine, catches the fatal failure it
65 // Calls a subrountine that yields a fatal failure. in TryTestSubroutine()
68 // Catches the fatal failure and aborts the test. in TryTestSubroutine()
116 // Tests catching a fatal failure in a subroutine.
123 // Tests catching a fatal failure in a nested subroutine.
127 // Calls a subrountine that yields a fatal failure. in TEST()
130 // Catches the fatal failure and aborts the test. in TEST()
355 // Tests non-fatal failures in the fixture constructor.
378 // Tests fatal failures in the fixture constructor.
[all …]
H A Dgoogletest-output-test-golden-lin.txt391 Expected fatal failure in foo.cc
484 Expected: 1 non-fatal failure
492 Expected: 1 non-fatal failure
494 googletest-output-test_.cc:#: Non-fatal failure:
496 Expected non-fatal failure 1.
500 googletest-output-test_.cc:#: Non-fatal failure:
502 Expected non-fatal failure 2.
512 Expected: 1 non-fatal failure
514 googletest-output-test_.cc:#: Fatal failure:
516 Expected fatal failure.
[all …]
H A Dgtest_environment_test.cc54 // generate a non-fatal failure, generate a fatal failure, or
61 ADD_FAILURE() << "Expected non-fatal failure in global set-up."; in SetUp()
64 FAIL() << "Expected fatal failure in global set-up."; in SetUp()
71 // Generates a non-fatal failure.
74 ADD_FAILURE() << "Expected non-fatal failure in global tear-down."; in TearDown()
134 // set-up generates no fatal failure.
139 "and the global tear-down should generate a non-fatal failure."); in TestTestsRun()
142 "fatal failure."); in TestTestsRun()
148 // generates a fatal failure.
153 "should generate a fatal failure."); in TestNoTestsRunSetUpFailure()
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DSSL_alert_type_string.pod38 A warning alert is sent, when a non-fatal error condition occurs. The
40 non-fatal errors are certificate errors ("certificate expired",
42 (The sending party may however decide to send a fatal error.) The
46 Several alert messages must be sent as fatal alert messages as specified
47 by the TLS RFC. A fatal alert always leads to a connection abort.
58 =item "F"/"fatal"
78 An inappropriate message was received. This alert is always fatal
85 MAC. This message is always fatal.
91 fatal.
97 parameters given the options available. This is a fatal error.
[all …]
/freebsd/crypto/openssh/
H A Duidswap.c88 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid()
93 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid()
102 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid()
107 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid()
112 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid()
121 fatal("setgroups: %.100s", strerror(errno)); in temporarily_use_uid()
131 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid()
134 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid()
150 fatal("restore_uid: temporarily_use_uid not effective"); in restore_uid()
156 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); in restore_uid()
[all …]
H A Dauth-pam.c233 fatal("%s: waitpid: %s", __func__, strerror(errno)); in pthread_join()
289 fatal("PAM: sshpam_authctxt not initialized"); in sshpam_chauthtok_ruid()
291 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid()
294 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid()
308 fatal("%s: PAM authctxt not initialized", __func__); in sshpam_password_change_required()
340 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments()
342 fatal("%s: invalid PAM account status %u", __func__, n); in import_environments()
345 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments()
350 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments()
359 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments()
[all …]
H A Dxmalloc.c7 * failure (they call fatal if they encounter an error).
39 fatal("xmalloc: zero size"); in xmalloc()
42 fatal("xmalloc: out of memory (allocating %zu bytes)", size); in xmalloc()
52 fatal("xcalloc: zero size"); in xcalloc()
54 fatal("xcalloc: nmemb * size > SIZE_MAX"); in xcalloc()
57 fatal("xcalloc: out of memory (allocating %zu bytes)", in xcalloc()
69 fatal("xreallocarray: out of memory (%zu elements of %zu bytes)", in xreallocarray()
81 fatal("xrecallocarray: out of memory (%zu elements of %zu bytes)", in xrecallocarray()
104 fatal("xvasprintf: could not allocate memory"); in xvasprintf()
H A Dssh-keygen.c182 fatal("unknown key type %s", key_type_name); in type_bits_valid()
208 fatal("Invalid DSA key length: must be 1024 bits"); in type_bits_valid()
212 fatal("Invalid RSA key length: minimum is %d bits", in type_bits_valid()
215 fatal("Invalid RSA key length: maximum is %d bits", in type_bits_valid()
221 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid()
224 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid()
298 fatal("bad key type"); in ask_filename()
383 fatal("PEM_write_RSA_PUBKEY failed"); in do_convert_to_pkcs8()
388 fatal("PEM_write_DSA_PUBKEY failed"); in do_convert_to_pkcs8()
395 fatal("PEM_write_EC_PUBKEY failed"); in do_convert_to_pkcs8()
[all …]
H A Dssh-sk-helper.c72 fatal("%s: sshbuf_new failed", __progname); in reply_error()
75 fatal("%s: buffer error", __progname); in reply_error()
110 fatal("%s: trailing data in request", __progname); in process_sign()
115 fatal("%s: Unsupported key type %s", in process_sign()
132 fatal("%s: sshbuf_new failed", __progname); in process_sign()
160 fatal("%s: sshbuf_new failed", __progname); in process_enroll()
172 fatal("%s: trailing data in request", __progname); in process_enroll()
175 fatal("%s: bad type %u", __progname, type); in process_enroll()
191 fatal("%s: sshbuf_new failed", __progname); in process_enroll()
223 fatal("%s: sshbuf_new failed", __progname); in process_load_resident()
[all …]
H A Dsandbox-capsicum.c82 fatal("%s: setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child()
86 fatal("%s: setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child()
90 fatal("%s: setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child()
96 fatal("can't limit stdin: %m"); in ssh_sandbox_child()
98 fatal("can't limit stdout: %m"); in ssh_sandbox_child()
100 fatal("can't limit stderr: %m"); in ssh_sandbox_child()
105 fatal("%s: failed to limit the network socket", __func__); in ssh_sandbox_child()
109 fatal("%s: failed to limit the logging socket", __func__); in ssh_sandbox_child()
111 fatal("%s: failed to enter capability mode", __func__); in ssh_sandbox_child()
H A Dservconf.c327 fatal("No host key files found"); in fill_default_server_options()
882 fatal("bad addr or host: %s (%s)", in add_one_listen_addr()
1036 fatal("'Match %s' in configuration but '%s' not in connection " in match_test_missing_fatal()
1162 fatal("Invalid Match address argument " in match_cfg_line()
1185 fatal("Invalid Match localaddress " in match_cfg_line()
1380 fatal("%s line %d: Directive '%s' is not allowed " in process_server_config_line_depth()
1397 fatal("%s line %d: missing argument.", in process_server_config_line_depth()
1414 fatal("%s line %d: too many ports.", in process_server_config_line_depth()
1418 fatal("%s line %d: missing port number.", in process_server_config_line_depth()
1422 fatal("%s line %d: Badly formatted port number.", in process_server_config_line_depth()
[all …]
H A Dssh-keysign.c189 fatal("%s: pledge: %s", __progname, strerror(errno)); in main()
212 fatal("getpwuid failed"); in main()
229 fatal("ssh-keysign not enabled in %s", in main()
233 fatal("%s: pledge: %s", __progname, strerror(errno)); in main()
240 fatal("could not open any host key"); in main()
258 fatal("no hostkey found"); in main()
261 fatal("%s: sshbuf_new failed", __progname); in main()
263 fatal("%s: ssh_msg_recv failed", __progname); in main()
267 fatal("%s: bad version: received %d, expected %d", in main()
272 fatal("%s: bad fd = %d", __progname, fd); in main()
[all …]
H A Dsandbox-systrace.c119 fatal("%s: kill(%d, SIGSTOP)", __func__, getpid()); in ssh_sandbox_child()
139 fatal("%s: child terminated with signal %d", in ssh_sandbox_parent()
142 fatal("%s: child exited with status %d", in ssh_sandbox_parent()
144 fatal("%s: child not stopped", __func__); in ssh_sandbox_parent()
151 fatal("%s: open(\"/dev/systrace\"): %s", __func__, in ssh_sandbox_parent()
154 fatal("%s: ioctl(STRIOCCLONE, %d): %s", __func__, in ssh_sandbox_parent()
159 fatal("%s: ioctl(%d, STRIOCATTACH, %d): %s", __func__, in ssh_sandbox_parent()
167 fatal("%s: ioctl(%d, STRIOCPOLICY (new)): %s", __func__, in ssh_sandbox_parent()
173 fatal("%s: ioctl(%d, STRIOCPOLICY (assign)): %s", in ssh_sandbox_parent()
192 fatal("%s: ioctl(%d, STRIOCPOLICY (modify)): %s", in ssh_sandbox_parent()
[all …]
/freebsd/secure/lib/libcrypto/man/man3/
H A DSSL_alert_type_string.3172 A warning alert is sent, when a non-fatal error condition occurs. The
174 non-fatal errors are certificate errors (\*(L"certificate expired\*(R",
176 (The sending party may however decide to send a fatal error.) The
180 Several alert messages must be sent as fatal alert messages as specified
181 by the \s-1TLS RFC. A\s0 fatal alert always leads to a connection abort.
192 .IX Item "F/fatal"
209 An inappropriate message was received. This alert is always fatal
216 \&\s-1MAC.\s0 This message is always fatal.
222 fatal.
228 parameters given the options available. This is a fatal error.
[all …]
/freebsd/usr.sbin/watch/
H A Dwatch.c54 static void fatal(int, const char *);
138 fatal(int error, const char *buf) in fatal() function
143 errx(error, "fatal: %s", buf); in fatal()
163 fatal(EX_OSFILE, "cannot open snoop device"); in open_snp()
218 fatal(EX_DATAERR, "can't open device"); in attach_snp()
220 fatal(EX_UNAVAILABLE, "cannot attach to tty"); in attach_snp()
242 fatal(EX_DATAERR, "bad device name"); in set_dev()
245 fatal(EX_DATAERR, "must be a character device"); in set_dev()
338 fatal(EX_DATAERR, "no device name given"); in main()
345 fatal(EX_UNAVAILABLE, "malloc failed"); in main()
[all …]
/freebsd/crypto/openssh/openbsd-compat/
H A Dport-solaris.c94 "fatal events: %s", __func__, strerror(errno)); in solaris_contract_pre_fork()
275 fatal("priv_allocset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
277 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
284 fatal("priv_addset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
293 fatal("priv_delset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
305 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
308 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
315 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
319 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
325 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec()
[all …]
/freebsd/sys/dev/sfxge/common/
H A Defx_intr.c324 * Under legacy interrupts, don't share a level between fatal in siena_intr_init()
334 /* Enable all the genuinely fatal interrupts */ in siena_intr_init()
463 EFSYS_PROBE(fatal); in siena_intr_check_fatal()
465 /* Clear the fatal interrupt condition */ in siena_intr_check_fatal()
524 efx_oword_t fatal; in siena_intr_fatal() local
527 EFX_BAR_READO(enp, FR_AZ_FATAL_INTR_REG_KER, &fatal); in siena_intr_fatal()
530 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRM_PERR_INT_KER) != 0 || in siena_intr_fatal()
531 EFX_OWORD_FIELD(fatal, FRF_AZ_MEM_PERR_INT_KER) != 0) in siena_intr_fatal()
534 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRAM_OOB_INT_KER) != 0) in siena_intr_fatal()
537 if (EFX_OWORD_FIELD(fatal, FRF_AZ_BUFID_DC_OOB_INT_KER) != 0) in siena_intr_fatal()
[all …]
/freebsd/sys/dev/qat/qat_hw/qat_c4xxx/
H A Dadf_c4xxx_ras.c121 "QAT RAS fatal"); in adf_init_ras()
372 /* For each uncorrectable fatal error in AE increment RAS error in adf_handle_ae_uncorr_err()
412 "Uncorrectable fatal MSIX table parity error detected.\n"); in adf_handle_ri_mem_par_err()
458 "Fatal error detected: %s command parity\n", in adf_log_fatal_cmd_par_err()
516 /* RI memory parity errors are uncorrectable non-fatal errors in adf_process_errsou9()
518 * be treated as fatal error, followed by device restart. in adf_process_errsou9()
615 /* All SPP parity errors are treated as uncorrectable fatal errors */ in adf_process_spp_par_err()
619 "Uncorrectable fatal SPP parity error detected\n"); in adf_process_spp_par_err()
709 "Uncorrectable non-fatal BME response order error.\n"); in adf_handle_ti_misc_err()
714 "Uncorrectable non-fatal response order error.\n"); in adf_handle_ti_misc_err()
[all …]

12345678910>>...62