/freebsd/crypto/openssh/ |
H A D | ssh-pkcs11-client.c | 134 fatal_f("inconsistent helper"); in helper_free() 139 fatal_f("helper recorded more than once"); in helper_free() 263 fatal_f("no helper for PKCS11 key"); in rsa_encrypt() 283 fatal_f("sshbuf_new failed"); in rsa_encrypt() 314 fatal_f("no helper for PKCS11 key"); in rsa_finish() 319 fatal_f("RSA refcount error"); in rsa_finish() 343 fatal_f("no helper for PKCS11 key"); in ecdsa_do_sign() 367 fatal_f("sshbuf_new failed"); in ecdsa_do_sign() 397 fatal_f("no helper for PKCS11 key"); in ecdsa_do_finish() 402 fatal_f("ECDSA refcount error"); in ecdsa_do_finish() [all …]
|
H A D | mux.c | 198 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_session_cleanup_cb() 201 fatal_f("channel %d missing control channel %d", in mux_master_session_cleanup_cb() 219 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_control_cleanup_cb() 222 fatal_f("channel %d missing session channel %u", in mux_master_control_cleanup_cb() 275 fatal_f("channel %d: c->mux_ctx == NULL", c->self); in mux_master_process_hello() 393 fatal_f("sshbuf_new"); in mux_master_process_new_session() 560 fatal_f("unknown forward type %u", ftype); in format_forward() 611 fatal_f("sshbuf_new"); in mux_confirm_remote_forward() 678 fatal_f("mux_pause %d", c->mux_pause); in mux_confirm_remote_forward() 1065 fatal_f("cctx == NULL"); in mux_stdio_confirm() [all …]
|
H A D | monitor_wrap.c | 95 fatal_f("no log channel"); in mm_log_handler() 98 fatal_f("sshbuf_new failed"); in mm_log_handler() 106 fatal_f("bad length %zu", len); in mm_log_handler() 110 fatal_f("write: %s", strerror(errno)); in mm_log_handler() 135 fatal_f("waitpid: %s", strerror(errno)); in mm_reap() 164 fatal_f("bad length %zu", mlen); in mm_request_send() 174 fatal_f("write: %s", strerror(errno)); in mm_request_send() 193 fatal_f("read: %s", strerror(errno)); in mm_request_receive() 197 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive() 222 fatal_f("read: rtype %d != type %d", rtype, type); in mm_request_receive_expect() [all …]
|
H A D | monitor.c | 318 fatal_f("unexpected authentication from %d", in monitor_child_preauth() 351 fatal_f("privsep child made too many authentication " in monitor_child_preauth() 357 fatal_f("authenticated invalid user"); in monitor_child_preauth() 359 fatal_f("authentication method name unknown"); in monitor_child_preauth() 431 fatal_f("sshbuf_new"); in monitor_read_log() 444 fatal_f("log fd read: %s", strerror(errno)); in monitor_read_log() 449 fatal_f("invalid log message length %u", len); in monitor_read_log() 456 fatal_f("log fd read: %s", strerror(errno)); in monitor_read_log() 464 fatal_f("invalid log level %u (corrupted message?)", level); in monitor_read_log() 491 fatal_f("poll: %s", strerror(errno)); in monitor_read() [all …]
|
H A D | ssh-pkcs11-helper.c | 133 fatal_f("sshbuf_new failed"); in process_add() 173 fatal_f("sshbuf_new failed"); in process_del() 219 fatal_f("no RSA in pkey"); in process_sign() 221 fatal_f("bad RSA length"); in process_sign() 233 fatal_f("no ECDSA in pkey"); in process_sign() 235 fatal_f("bad ECDSA length"); in process_sign() 247 fatal_f("unsupported key type %d", key->type); in process_sign() 253 fatal_f("sshbuf_new failed"); in process_sign() 379 fatal_f("sshbuf_new failed"); in main() 381 fatal_f("sshbuf_new failed"); in main()
|
H A D | sandbox-rlimit.c | 68 fatal_f("setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child() 73 fatal_f("setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child() 78 fatal_f("setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child()
|
H A D | auth2-chall.c | 115 fatal_f("sshbuf_new failed"); in kbdint_alloc() 122 fatal_f("sshbuf_dup_string failed"); in kbdint_alloc() 301 fatal_f("no authctxt"); in input_userauth_info_response() 304 fatal_f("no kbdintctxt"); in input_userauth_info_response() 306 fatal_f("no device"); in input_userauth_info_response() 312 fatal_f("wrong number of replies"); in input_userauth_info_response() 314 fatal_f("too many replies"); in input_userauth_info_response()
|
H A D | srclimit.c | 110 fatal_f("invalid max_sources"); /* shouldn't happen */ in srclimit_init() 229 fatal_f("internal error: %s penalty table corrupt", t); in expire_penalties_from_tree() 232 fatal_f("internal error: %s npenalties underflow", t); in expire_penalties_from_tree() 322 fatal_f("internal error: %s table corrupt (find)", t); in srclimit_early_expire_penalties_from_tree() 328 fatal_f("internal error: %s table corrupt (remove)", t); in srclimit_early_expire_penalties_from_tree() 393 fatal_f("internal error: unknown penalty %d", penalty_type); in srclimit_penalise() 429 fatal_f("internal error: %s penalty tables corrupt", t); in srclimit_penalise() 442 fatal_f("internal error: %s penalty table corrupt (remove)", t); in srclimit_penalise() 459 fatal_f("internal error: %s penalty table corrupt (insert)", t); in srclimit_penalise()
|
H A D | readpass.c | 77 fatal_f("dup2: %s", strerror(errno)); in ssh_askpass() 81 fatal_f("exec(%s): %s", askpass, strerror(errno)); in ssh_askpass() 280 fatal_f("stdfd_devnull failed"); in notify_start() 292 fatal_f("calloc failed"); in notify_start() 330 fatal_f("waitpid: %s", strerror(errno)); in notify_complete()
|
H A D | ssh-keygen.c | 354 fatal_f("sshbuf_new failed"); in do_convert_to_ssh2() 358 fatal_f("sshbuf_dtob64_string failed"); in do_convert_to_ssh2() 399 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pkcs8() 427 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pem() 456 fatal_f("unknown key format %d", convert_format); in do_convert_to() 475 fatal_f("input buffer too small: need %d have %zu", in buffer_get_bignum_bits() 478 fatal_f("BN_bin2bn failed"); in buffer_get_bignum_bits() 549 fatal_f("BN_new"); in do_convert_private_ssh2() 556 fatal_f("DSA_set0_pqg failed"); in do_convert_private_ssh2() 559 fatal_f("DSA_set0_key failed"); in do_convert_private_ssh2() [all …]
|
H A D | sshd-session.c | 360 fatal_f("waitpid: %s", strerror(errno)); in privsep_preauth() 366 fatal_f("preauth child exited with status %d", in privsep_preauth() 369 fatal_f("preauth child terminated by signal %d", in privsep_preauth() 471 fatal_f("sshbuf_new failed"); in list_hostkey_types() 516 fatal_f("sshbuf_dup_string failed"); in list_hostkey_types() 632 fatal_f("sshbuf_new"); in notify_hostkeys() 662 fatal_f("no hostkeys"); in notify_hostkeys() 692 fatal_f("too many hostkeys"); in parse_hostkeys() 748 fatal_f("sshbuf_new failed"); in recv_rexec_state() 750 fatal_f("ssh_msg_recv failed"); in recv_rexec_state() [all …]
|
H A D | auth2.c | 238 fatal_f("ssh_digest_memory"); in user_specific_delay() 502 fatal_f("sshbuf_new failed"); in authmethods_get() 517 fatal_f("sshbuf_dup_string failed"); in authmethods_get() 528 fatal_f("NULL authentication method name"); in authmethod_byname() 684 fatal_f("method not in AuthenticationMethods"); in auth2_update_methods_lists() 712 fatal_f("vasprintf failed"); in auth2_record_info() 741 fatal_f("reallocarray failed"); in auth2_record_key() 781 fatal_f("sshbuf_new"); in auth2_update_session_info() 801 fatal_f("auth_method_info contains \\n"); in auth2_update_session_info()
|
H A D | sftp-client.c | 240 fatal_f("sshbuf_new failed"); in send_string_request() 258 fatal_f("sshbuf_new failed"); in send_string_attrs_request() 279 fatal_f("sshbuf_new failed"); in get_status() 318 fatal_f("sshbuf_new failed"); in get_handle() 357 fatal_f("sshbuf_new failed"); in get_decode_stat() 407 fatal_f("sshbuf_new failed"); in get_decode_statvfs() 476 fatal_f("sshbuf_new failed"); in sftp_init() 568 fatal_f("limits failed"); in sftp_init() 634 fatal_f("sshbuf_new failed"); in sftp_get_limits() 682 fatal_f("sshbuf_new failed"); in sftp_close() [all …]
|
H A D | clientloop.c | 550 fatal_f("internal error: fuzz %u%% %lldns > interval %lldns", in set_next_interval() 697 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in client_wait_until_can_do_something() 905 fatal_f("last_gc->ref_count = %d", in client_register_global_confirm() 963 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 968 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 972 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 1462 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1468 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1474 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1480 fatal_f("pledge(): %s", strerror(errno)); in client_loop() [all …]
|
H A D | ssh-agent.c | 331 fatal_f("fingerprint failed"); in dump_dest_constraint_hop() 389 fatal_f("fingerprint failed"); in match_key_hop() 399 fatal_f("fingerprint failed"); in match_key_hop() 516 fatal_f("internal error: no bound key"); in identity_permitted() 522 fatal_f("fingerprint failed"); in identity_permitted() 525 fatal_f("fingerprint failed"); in identity_permitted() 647 fatal_f("sshbuf_new failed"); in process_request_identities() 651 fatal_f("fingerprint failed"); in process_request_identities() 722 fatal_f("sshbuf_fromb"); in parse_userauth_request() 796 fatal_f("sshbuf_fromb"); in parse_sshsig_request() [all …]
|
H A D | auth2-pubkey.c | 116 fatal_f("internal error: initial hostkey not recorded"); in userauth_pubkey() 118 fatal_f("%s packet contained wrong host key", method); in userauth_pubkey() 128 fatal_f("sshbuf_from failed"); in userauth_pubkey() 130 fatal_f("sshbuf_dtob64 failed"); in userauth_pubkey() 190 fatal_f("sshbuf_new failed"); in userauth_pubkey() 435 fatal_f("percent_expand failed"); in match_principals_command() 530 fatal_f("internal error: missing principals_opts"); in user_cert_trusted_ca() 691 fatal_f("percent_expand failed"); in user_key_command_allowed2()
|
H A D | sshconnect2.c | 179 fatal_f("unknown alg %s", alg); in order_hostkeyalgs() 453 fatal_f("internal error: cannot send userauth none request"); in ssh_userauth2() 564 fatal_f("bad message during authentication: type %d", type); in input_userauth_error() 593 fatal_f("no authentication context"); in input_userauth_success() 612 fatal_f("no authentication context"); 859 fatal_f("sshbuf_new failed"); in process_gssapi_token() 865 fatal_f("sshbuf_mutable_ptr failed"); in process_gssapi_token() 1249 fatal_f("fingerprint failed"); in identity_sign() 1401 fatal_f("sshbuf_new failed"); in sign_and_send_pubkey() 1422 fatal_f("internal error: initial hostkey " in sign_and_send_pubkey() [all …]
|
H A D | auth2-hostbased.c | 128 fatal_f("sshbuf_new failed"); in userauth_hostbased() 237 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed() 245 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed()
|
H A D | serverloop.c | 165 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in wait_until_can_do_something() 224 fatal_f("ppoll: %.100s", strerror(errno)); in wait_until_can_do_something() 450 fatal_f("no/invalid user"); in server_request_direct_streamlocal() 657 fatal_f("sshbuf_new"); in server_input_hostkeys_prove() 741 fatal_f("no/invalid user"); in server_input_global_request() 771 fatal_f("sshbuf_new"); in server_input_global_request() 863 fatal_f("channel %d: no remote_id", c->self); in server_input_channel_req()
|
H A D | misc.c | 993 fatal_f("input too large"); in urldecode() 1136 fatal_f("argument too long"); in addargs() 1143 fatal_f("too many arguments"); in addargs() 1145 fatal_f("arglist corrupt"); in addargs() 1167 fatal_f("argument too long"); in replacearg() 1169 fatal_f("arglist corrupt"); in replacearg() 1172 fatal_f("tried to replace invalid arg %d >= %d", in replacearg() 1299 fatal_f("sshbuf_new failed"); in vdollar_percent_expand() 1301 fatal_f("null parseerror arg"); in vdollar_percent_expand() 1312 fatal_f("NULL replacement for token %s", in vdollar_percent_expand() [all …]
|
H A D | sshd.c | 262 fatal_f("error: accepted connection when all %d child " in child_register() 285 fatal_f("internal error: more children than max_startups"); in child_register() 297 fatal_f("internal error: children_active underflow"); in child_finish() 668 fatal_f("sshbuf_new failed"); in pack_hostkeys() 717 fatal_f("sshbuf_new failed"); in send_rexec_state() 753 fatal_f("setsockopt SO_SNDBUF: %s", strerror(errno)); in send_rexec_state() 1199 fatal_f("ssh_digest_start"); in accumulate_host_timing_secret() 1204 fatal_f("ssh_digest_update"); in accumulate_host_timing_secret() 1208 fatal_f("ssh_digest_final"); in accumulate_host_timing_secret() 1216 fatal_f("could not allocate buffer"); in accumulate_host_timing_secret() [all …]
|
H A D | nchan.c | 192 fatal_f("channel %d: no remote_id", c->self); in chan_send_eof2() 220 fatal_f("channel %d: no remote_id", c->self); in chan_send_close2() 245 fatal_f("channel %d: no remote_id", c->self); in chan_send_eow2()
|
H A D | sftp-server.c | 559 fatal_f("sshbuf_new failed"); in send_status_errmsg() 587 fatal_f("sshbuf_new failed"); in send_data_or_handle() 622 fatal_f("sshbuf_new failed"); in send_names() 646 fatal_f("sshbuf_new failed"); in send_attrib() 666 fatal_f("sshbuf_new failed"); in send_statvfs() 696 fatal_f("internal error: no handler for %s", name); in compose_extension() 719 fatal_f("sshbuf_new failed"); in process_init() 823 fatal_f("realloc failed"); in process_read() 1534 fatal_f("sshbuf_new failed"); in process_extended_limits() 1737 fatal_f("sshbuf_new failed"); in process_extended_get_users_groups_by_id() [all …]
|
H A D | sandbox-pledge.c | 60 fatal_f("pledge()"); in ssh_sandbox_child()
|
H A D | session.c | 317 fatal_f("internal error: hpdelim"); in set_fwdpermit_from_authopts() 320 fatal_f("internal error: permitopen port"); in set_fwdpermit_from_authopts() 332 fatal_f("internal error: hpdelim"); in set_fwdpermit_from_authopts() 335 fatal_f("internal error: permitlisten port"); in set_fwdpermit_from_authopts() 1224 fatal_f("xasprintf: %s", strerror(errno)); in do_rc_files() 1261 fatal_f("xasprintf: %s", strerror(errno)); in do_rc_files() 1341 fatal_f("stat(\"%s\"): %s", in safely_chroot() 1359 fatal_f("chdir(/) after chroot: %s", strerror(errno)); in safely_chroot() 1731 fatal_f("insane session id %d (max %d nalloc %d)", in session_unused() 1769 fatal_f("insane first_unused %d max %d nalloc %d", in session_new() [all …]
|