/freebsd/crypto/openssh/ |
H A D | monitor_fdpass.c | 96 error_f("sendmsg(%d): %s", fd, strerror(errno)); in mm_send_fd() 101 error_f("sendmsg: expected sent 1 got %zd", n); in mm_send_fd() 151 error_f("recvmsg: %s", strerror(errno)); in mm_receive_fd() 156 error_f("recvmsg: expected received 1 got %zd", n); in mm_receive_fd() 162 error_f("no fd"); in mm_receive_fd() 168 error_f("no message header"); in mm_receive_fd() 174 error_f("expected %d got %d", SCM_RIGHTS, cmsg->cmsg_type); in mm_receive_fd() 182 error_f("file descriptor passing not supported"); in mm_receive_fd()
|
H A D | ssh-sk.c | 118 error_f("calloc failed"); in sshsk_open() 122 error_f("strdup failed"); in sshsk_open() 218 error_f("sshkey_new failed"); in sshsk_ecdsa_assemble() 227 error_f("allocation failed"); in sshsk_ecdsa_assemble() 248 error_f("allocation failed"); in sshsk_ecdsa_assemble() 253 error_f("allocation failed"); in sshsk_ecdsa_assemble() 258 error_f("Assigning EC_KEY failed"); in sshsk_ecdsa_assemble() 283 error_f("invalid size: %zu", resp->public_key_len); in sshsk_ed25519_assemble() 288 error_f("sshkey_new failed"); in sshsk_ed25519_assemble() 293 error_f("malloc failed"); in sshsk_ed25519_assemble() [all …]
|
H A D | msg.c | 55 error_f("write: %s", strerror(errno)); in ssh_msg_send() 59 error_f("write: %s", strerror(errno)); in ssh_msg_send() 77 error_f("read header: %s", strerror(errno)); in ssh_msg_recv() 82 error_f("read: bad msg_len %u", msg_len); in ssh_msg_recv() 91 error_f("read: %s", strerror(errno)); in ssh_msg_recv()
|
H A D | ssh-sk-client.c | 63 error_f("helper \"%s\" unusable: %s", helper, strerror(errno)); in start_helper() 89 error_f("dup2: %s", strerror(errno)); in start_helper() 98 error_f("execlp: %s", strerror(errno)); in start_helper() 125 error_f("waitpid: %s", strerror(errno)); in reap_helper() 130 error_f("helper exited abnormally"); in reap_helper() 133 error_f("helper exited with non-zero exit status"); in reap_helper() 179 error_f("unsupported version: got %u, expected %u", in client_converse() 201 error_f("helper returned incorrect message type %u, " in client_converse() 273 error_f("trailing data in response"); in sshsk_sign() 343 error_f("trailing data in response"); in sshsk_enroll() [all …]
|
H A D | kex.c | 245 error_f("type %u seq %u", type, seq); in kex_protocol_error() 361 error_f("send EXT_INFO"); in kex_maybe_send_ext_info() 386 error_f("send EXT_INFO"); in kex_server_update_ext_info() 436 error_f("nul byte in %s", name); in kex_ext_info_client_parse() 547 error_f("match_filter_denylist failed"); in kex_input_newkeys() 553 error_f("kex_prop2buf failed"); in kex_input_newkeys() 579 error_f("no kex"); in kex_send_kexinit() 588 error_f("bad kex length: %zu < %d", in kex_send_kexinit() 593 error_f("buffer error"); in kex_send_kexinit() 620 error_f("no kex"); in kex_input_kexinit() [all …]
|
H A D | readpass.c | 61 error_f("fflush: %s", strerror(errno)); in ssh_askpass() 65 error_f("pipe: %s", strerror(errno)); in ssh_askpass() 70 error_f("fork: %s", strerror(errno)); in ssh_askpass() 254 error_f("fflush: %s", strerror(errno)); in notify_start() 273 error_f("fork: %s", strerror(errno)); in notify_start() 284 error_f("exec(%s): %s", askpass, strerror(errno)); in notify_start()
|
H A D | ssh-agent.c | 504 error_f("previous session bind failed on socket"); in identity_permitted() 554 error_f("tried to sign on forwarding hop"); in identity_permitted() 558 error_f("tried to forward though signing bind"); in identity_permitted() 912 error_f("unexpected session ID (%zu listed) on " in process_sign_request2() 924 error_f("refusing use of destination-constrained key: " in process_sign_request2() 931 error_f("refusing use of destination-constrained key: " in process_sign_request2() 1104 error_f("unsupported extensions (len %zu)", elen); in parse_dest_constraint_hop() 1165 error_f("unsupported extensions (len %zu)", elen); in parse_dest_constraint() 1176 error_f("inconsistent \"from\" specification"); in parse_dest_constraint() 1181 error_f("incomplete \"to\" specification"); in parse_dest_constraint() [all …]
|
H A D | sshsig.c | 57 error_f("sshbuf_new failed"); in sshsig_armor() 97 error_f("sshbuf_fromb failed"); in sshsig_dearmor() 117 error_f("no header eol"); in sshsig_dearmor() 136 error_f("sshbuf_dup_string failed"); in sshsig_dearmor() 142 error_f("sshbuf_new() failed"); in sshsig_dearmor() 178 error_f("sshbuf_new failed"); in sshsig_wrap_sign() 263 error_f("unsupported hash algorithm \"%.100s\"", hashalg); in sshsig_check_hashalg() 318 error_f("sshbuf_new failed"); in sshsig_wrap_verify() 413 error_f("can't look up hash algorithm %s", hashalg); in hash_buffer() 515 error_f("can't look up hash algorithm %s", hashalg); in hash_file() [all …]
|
H A D | addrmatch.c | 124 error_f("empty entry in list \"%.100s\"", o); in addr_match_cidr_list() 137 error_f("list entry \"%.100s\" too long", cp); in addr_match_cidr_list() 143 error_f("list entry \"%.100s\" contains invalid " in addr_match_cidr_list()
|
H A D | mux.c | 253 error_f("name '%.100s...' too long", env); in env_permitted() 277 error_f("HELLO received twice"); in mux_master_process_hello() 285 error_f("unsupported multiplexing protocol version %u " in mux_master_process_hello() 364 error_f("malformed message"); in mux_master_process_new_session() 381 error_f(">%d environment variables received, " in mux_master_process_new_session() 402 error_f("failed to receive fd %d from client", i); in mux_master_process_new_session() 452 error_f("tcgetattr: %s", strerror(errno)); in mux_master_process_new_session() 607 error_f("unknown channel"); in mux_confirm_remote_forward() 670 error_f("%s", failmsg); in mux_confirm_remote_forward() 703 error_f("malformed message"); in mux_master_process_open_fwd() [all …]
|
H A D | misc.c | 1236 error_f("No such user %s", user); in tilde_expand() 1240 error_f("No such uid %ld", (long)uid); in tilde_expand() 1249 error_f("xasprintf failed"); in tilde_expand() 1253 error_f("Path too long"); in tilde_expand() 1328 error_f("environment variable '%s' missing " in vdollar_percent_expand() 1334 error_f("zero-length environment variable"); in vdollar_percent_expand() 1340 error_f("env var ${%s} has no value", var); in vdollar_percent_expand() 1368 error_f("invalid format"); in vdollar_percent_expand() 1380 error_f("unknown key %%%c", *string); in vdollar_percent_expand() 1945 error_f("path \"%s\" too long for Unix domain socket", path); in unix_listener() [all …]
|
H A D | serverloop.c | 330 error_f("bsigset setup: %s", strerror(errno)); in server_loop2() 351 error_f("bsigset sigprocmask: %s", strerror(errno)); in server_loop2() 357 error_f("osigset sigprocmask: %s", strerror(errno)); in server_loop2() 407 error_f("invalid target port"); in server_request_direct_tcpip() 412 error_f("invalid originator port"); in server_request_direct_tcpip() 458 error_f("invalid originator port"); in server_request_direct_streamlocal() 674 error_f("unknown host %s key", sshkey_type(key)); in server_input_hostkeys_prove() 683 error_f("can't retrieve hostkey %d", ndx); in server_input_hostkeys_prove()
|
H A D | ssh-pkcs11-client.c | 268 error_f("sshkey_new failed"); in rsa_encrypt() 273 error_f("pkey setup failed"); in rsa_encrypt() 347 error_f("sshkey_new failed"); in ecdsa_do_sign() 469 error_f("private key %s doesn't match cert %s", in pkcs11_make_cert() 575 error_f("socketpair: %s", strerror(errno)); in pkcs11_start_helper() 580 error_f("pkcs11_start_helper_methods failed"); in pkcs11_start_helper() 584 error_f("fork: %s", strerror(errno)); in pkcs11_start_helper()
|
H A D | hostfile.c | 448 error_f("host_hash failed"); in write_host_entry() 631 error_f("mkstemp: %s", strerror(oerrno)); in hostfile_replace_entries() 638 error_f("fdopen: %s", strerror(oerrno)); in hostfile_replace_entries() 699 error_f("unlink %.100s: %s", back, strerror(errno)); in hostfile_replace_entries() 705 error_f("link %.100s to %.100s: %s", filename, in hostfile_replace_entries() 712 error_f("rename \"%s\" to \"%s\": %s", temp, in hostfile_replace_entries() 720 error_f("unlink \"%s\": %s", temp, strerror(errno)); in hostfile_replace_entries() 870 error_f("sshkey_new failed"); in hostkeys_foreach_file()
|
H A D | session.c | 281 error_f("mkstemp: %s", strerror(errno)); in prepare_auth_info_file() 286 error_f("write: %s", strerror(errno)); in prepare_auth_info_file() 290 error_f("close: %s", strerror(errno)); in prepare_auth_info_file() 410 error_f("pipe in: %.100s", strerror(errno)); in do_exec_no_pty() 414 error_f("pipe out: %.100s", strerror(errno)); in do_exec_no_pty() 420 error_f("pipe err: %.100s", strerror(errno)); in do_exec_no_pty() 435 error_f("socketpair #1: %.100s", strerror(errno)); in do_exec_no_pty() 439 error_f("socketpair #2: %.100s", strerror(errno)); in do_exec_no_pty() 451 error_f("fork: %.100s", strerror(errno)); in do_exec_no_pty() 586 error_f("dup #1: %s", strerror(errno)); in do_exec_pty() [all …]
|
H A D | sshconnect2.c | 731 error_f("server replied with unknown key: %s %s", in input_userauth_pk_ok() 1235 error_f("private key %s contents do not match public", in identity_sign() 1394 error_f("no mutual signature supported"); in sign_and_send_pubkey() 2029 error_f("not installed: %s", strerror(errno)); in ssh_keysign() 2033 error_f("fflush: %s", strerror(errno)); in ssh_keysign() 2037 error_f("pipe: %s", strerror(errno)); in ssh_keysign() 2041 error_f("pipe: %s", strerror(errno)); in ssh_keysign() 2045 error_f("fork: %s", strerror(errno)); in ssh_keysign() 2089 error_f("no reply"); in ssh_keysign() 2096 error_f("waitpid %ld: %s", (long)pid, strerror(errno)); in ssh_keysign() [all …]
|
H A D | ssh-pkcs11.c | 88 error_f("%s", msg); in ossl_error() 90 error_f("libcrypto error: %s", ERR_error_string(e, NULL)); in ossl_error() 141 error_f("provider \"%s\" still valid", p->name); in pkcs11_provider_unref() 478 error_f("setup pkcs11 method failed"); in pkcs11_rsa_start_wrapper() 550 error_f("bad signature length: %lu", (u_long)siglen); in ecdsa_do_sign() 566 error_f("ECDSA_SIG_set0 failed"); in ecdsa_do_sign() 1110 error_f("sshkey_fingerprint failed"); in note_key() 1396 error_f("key generation failed: error 0x%lx", rv); in pkcs11_rsa_generate_private_key() 1488 error_f("invalid key size %lu", bits); in pkcs11_ecdsa_generate_private_key() 1493 error_f("invalid oid"); in pkcs11_ecdsa_generate_private_key() [all …]
|
H A D | auth2-pubkey.c | 149 error_f("cannot decode key: %s", pkalg); in userauth_pubkey() 153 error_f("type mismatch for decoded key " in userauth_pubkey() 398 error_f("sshkey_fingerprint failed"); in match_principals_command() 403 error_f("sshkey_fingerprint failed"); in match_principals_command() 658 error_f("sshkey_fingerprint failed"); in user_key_command_allowed2()
|
H A D | auth2-hostbased.c | 96 error_f("cannot decode key: %s", pkalg); in userauth_hostbased() 100 error_f("type mismatch for decoded key " in userauth_hostbased()
|
H A D | clientloop.c | 328 error_f("display name too long"); in client_x11_get_proto() 343 error_f("mkdtemp: %s", strerror(errno)); in client_x11_get_proto() 350 error_f("xauthfile path too long"); in client_x11_get_proto() 1539 error_f("bsigset setup: %s", strerror(errno)); in client_loop() 1578 error_f("bsigset sigprocmask: %s", strerror(errno)); in client_loop() 1585 error_f("osigset sigprocmask: %s", strerror(errno)); in client_loop() 1708 error_f("invalid listen port"); in client_request_forwarded_tcpip() 1710 error_f("invalid originator port"); in client_request_forwarded_tcpip() 1719 error_f("alloc reply"); in client_request_forwarded_tcpip() 2311 error_f("known hosts file %s " in update_known_hosts() [all …]
|
H A D | sshconnect.c | 156 error_f("stdfd_devnull failed"); in ssh_proxy_fdpass_connect() 239 error_f("stdfd_devnull failed"); in ssh_proxy_connect() 320 error_f("v4 addr doesn't fit"); in check_ifaddrs() 334 error_f("v6 addr doesn't fit"); in check_ifaddrs() 415 error_f("getnameinfo failed: %s", ssh_gai_strerror(r)); in ssh_create_socket() 481 error_f("getnameinfo failed"); in ssh_connect_direct() 560 error_f("dup() in/out failed"); in ssh_connect()
|
H A D | ssh-pkcs11-helper.c | 225 error_f("RSA_private_encrypt failed"); in process_sign() 240 error_f("ECDSA_sign failed"); in process_sign()
|
H A D | canohost.c | 102 error_f("getnameinfo %d failed: %s", in get_socket_address()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-linux.c | 346 error_f("socket \"%s\" is not compatible with AF_UNIX", path); in ssh_systemd_notify() 351 error_f("socket \"%s\" stat: %s", path, strerror(errno)); in ssh_systemd_notify() 359 error_f("socket path \"%s\" too long", path); in ssh_systemd_notify() 366 error_f("socket \"%s\": %s", path, strerror(errno)); in ssh_systemd_notify() 370 error_f("socket \"%s\" connect: %s", path, strerror(errno)); in ssh_systemd_notify() 374 error_f("socket \"%s\" write: %s", path, strerror(errno)); in ssh_systemd_notify() 397 error_f("monotime returned negative value"); in ssh_systemd_notify_reload()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | agent_fuzz_helper.c | 15 error_f("open /dev/null: %s", strerror(errno)); in devnull_or_die() 47 error_f("sshbuf_from failed"); in privkey_or_die() 141 error_f("dup: %s", strerror(errno)); in reset_sockettab()
|