| /freebsd/crypto/openssh/ |
| H A D | monitor_wrap.c | 95 fatal_f("no log channel"); in mm_log_handler() 98 fatal_f("sshbuf_new failed"); in mm_log_handler() 106 fatal_f("bad length %zu", len); in mm_log_handler() 114 fatal_f("write: %s", strerror(errno)); in mm_log_handler() 130 fatal_f("waitpid: %s", strerror(errno)); in mm_reap() 159 fatal_f("bad length %zu", mlen); in mm_request_send() 169 fatal_f("write: %s", strerror(errno)); in mm_request_send() 188 fatal_f("read: %s", strerror(errno)); in mm_request_receive() 192 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive() 217 fatal_f("read: rtype %d != type %d", rtype, type); in mm_request_receive_expect() [all …]
|
| H A D | mux.c | 188 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_session_cleanup_cb() 191 fatal_f("channel %d missing control channel %d", in mux_master_session_cleanup_cb() 209 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_control_cleanup_cb() 212 fatal_f("channel %d missing session channel %u", in mux_master_control_cleanup_cb() 265 fatal_f("channel %d: c->mux_ctx == NULL", c->self); in mux_master_process_hello() 388 fatal_f("sshbuf_new"); in mux_master_process_new_session() 519 fatal_f("connection_info_message"); in mux_master_process_ext_info() 523 fatal_f("channel_open_message"); in mux_master_process_ext_info() 594 fatal_f("unknown forward type %u", ftype); in format_forward() 645 fatal_f("sshbuf_new"); in mux_confirm_remote_forward() [all …]
|
| H A D | monitor.c | 321 fatal_f("unexpected authentication from %d", in monitor_child_preauth() 356 fatal_f("privsep child made too many authentication " in monitor_child_preauth() 364 fatal_f("authenticated invalid user"); in monitor_child_preauth() 369 fatal_f("authentication method name unknown"); in monitor_child_preauth() 387 fatal_f("waitpid: %s", strerror(errno)); in monitor_child_preauth() 391 fatal_f("preauth child %ld exited with status %d", in monitor_child_preauth() 394 fatal_f("preauth child %ld terminated by signal %d", in monitor_child_preauth() 461 fatal_f("sshbuf_new"); in monitor_read_log() 474 fatal_f("log fd read: %s", strerror(errno)); in monitor_read_log() 479 fatal_f("invalid log message length %u", len); in monitor_read_log() [all …]
|
| H A D | auth2-chall.c | 115 fatal_f("sshbuf_new failed"); in kbdint_alloc() 122 fatal_f("sshbuf_dup_string failed"); in kbdint_alloc() 170 fatal_f("internal error: too many devices"); in kbdint_next_device() 305 fatal_f("no authctxt"); in input_userauth_info_response() 308 fatal_f("no kbdintctxt"); in input_userauth_info_response() 310 fatal_f("no device"); in input_userauth_info_response() 316 fatal_f("wrong number of replies"); in input_userauth_info_response() 318 fatal_f("too many replies"); in input_userauth_info_response()
|
| H A D | ssh-pkcs11-client.c | 82 fatal_f("sshbuf_new failed"); in helper_by_key() 110 fatal_f("sshbuf_new failed"); in helper_add_key() 127 fatal_f("inconsistent helper"); in helper_terminate() 141 fatal_f("helper recorded more than once"); in helper_terminate() 246 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_sign() 297 fatal_f("no helper for %s key", sshkey_type(priv)); in pkcs11_make_cert() 337 fatal_f("too many helpers"); in pkcs11_start_helper() 400 fatal_f("sshbuf_new failed"); in pkcs11_add_provider() 470 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_key_free() 472 fatal_f("sshbuf_new failed"); in pkcs11_key_free() [all …]
|
| H A D | sandbox-rlimit.c | 66 fatal_f("setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child() 71 fatal_f("setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child() 76 fatal_f("setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child()
|
| H A D | srclimit.c | 110 fatal_f("invalid max_sources"); /* shouldn't happen */ in srclimit_init() 122 fatal_f("invalid number of sockets: %d", max); in srclimit_init() 229 fatal_f("internal error: %s penalty table corrupt", t); in expire_penalties_from_tree() 232 fatal_f("internal error: %s npenalties underflow", t); in expire_penalties_from_tree() 322 fatal_f("internal error: %s table corrupt (find)", t); in srclimit_early_expire_penalties_from_tree() 328 fatal_f("internal error: %s table corrupt (remove)", t); in srclimit_early_expire_penalties_from_tree() 398 fatal_f("internal error: unknown penalty %d", penalty_type); in srclimit_penalise() 438 fatal_f("internal error: %s penalty tables corrupt", t); in srclimit_penalise() 453 fatal_f("internal error: %s penalty table corrupt (remove)", t); in srclimit_penalise() 469 fatal_f("internal error: %s penalty table corrupt (insert)", t); in srclimit_penalise()
|
| H A D | auth-pam.c | 238 fatal_f("waitpid: %s", strerror(errno)); in pthread_join() 289 fatal_f("PAM authctxt not initialized"); in sshpam_password_change_required() 323 fatal_f("invalid PAM account status %u", n); in import_environments() 333 fatal_f("received %u environment variables, expected <= 1024", in import_environments() 348 fatal_f("received %u PAM env variables, expected <= 1024", in import_environments() 462 fatal_f("PAM authctxt user not initialized"); in check_pam_user() 474 fatal_f("internal error: sshpam_initial_user NULL"); in check_pam_user() 523 fatal_f("PAM authctxt not initialized"); in sshpam_thread() 526 fatal_f("sshbuf_new failed"); in sshpam_thread() 565 fatal_f("too many environment strings"); in sshpam_thread() [all …]
|
| H A D | sandbox-capsicum.c | 100 fatal_f("failed to limit the network socket"); in ssh_sandbox_child() 104 fatal_f("failed to limit the logging socket"); in ssh_sandbox_child() 106 fatal_f("failed to enter capability mode"); in ssh_sandbox_child()
|
| H A D | uidswap.c | 165 fatal_f("setuid failed: %s", strerror(errno)); in restore_uid() 167 fatal_f("setgid failed: %s", strerror(errno)); in restore_uid() 214 fatal_f("was able to restore old [e]gid"); in permanently_set_uid() 228 fatal_f("was able to restore old [e]uid"); in permanently_set_uid()
|
| H A D | ssh-pkcs11-helper.c | 70 fatal_f("provider already set"); in process_add() 72 fatal_f("sshbuf_new failed"); in process_add() 134 fatal_f("sshbuf_new failed"); in process_sign() 251 fatal_f("sshbuf_new failed"); in main() 253 fatal_f("sshbuf_new failed"); in main()
|
| H A D | readpass.c | 74 fatal_f("dup2: %s", strerror(errno)); in ssh_askpass() 78 fatal_f("exec(%s): %s", askpass, strerror(errno)); in ssh_askpass() 277 fatal_f("stdfd_devnull failed"); in notify_start() 289 fatal_f("calloc failed"); in notify_start() 327 fatal_f("waitpid: %s", strerror(errno)); in notify_complete()
|
| H A D | ssh-keygen.c | 333 fatal_f("sshbuf_new failed"); in do_convert_to_ssh2() 337 fatal_f("sshbuf_dtob64_string failed"); in do_convert_to_ssh2() 371 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pkcs8() 392 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pem() 420 fatal_f("unknown key format %d", convert_format); in do_convert_to() 438 fatal_f("input buffer too small: need %d have %zu", in buffer_get_bignum_bits() 441 fatal_f("BN_bin2bn failed"); in buffer_get_bignum_bits() 513 fatal_f("BN_new"); in do_convert_private_ssh2() 524 fatal_f("BN_new"); in do_convert_private_ssh2() 535 fatal_f("EVP_PKEY_new failed"); in do_convert_private_ssh2() [all …]
|
| H A D | auth2.c | 237 fatal_f("ssh_digest_memory"); in user_specific_delay() 499 fatal_f("sshbuf_new failed"); in authmethods_get() 514 fatal_f("sshbuf_dup_string failed"); in authmethods_get() 525 fatal_f("NULL authentication method name"); in authmethod_byname() 681 fatal_f("method not in AuthenticationMethods"); in auth2_update_methods_lists() 709 fatal_f("vasprintf failed"); in auth2_record_info() 738 fatal_f("reallocarray failed"); in auth2_record_key() 778 fatal_f("sshbuf_new"); in auth2_update_session_info() 798 fatal_f("auth_method_info contains \\n"); in auth2_update_session_info()
|
| H A D | sftp-client.c | 228 fatal_f("sshbuf_new failed"); in send_string_request() 246 fatal_f("sshbuf_new failed"); in send_string_attrs_request() 267 fatal_f("sshbuf_new failed"); in get_status() 306 fatal_f("sshbuf_new failed"); in get_handle() 345 fatal_f("sshbuf_new failed"); in get_decode_stat() 395 fatal_f("sshbuf_new failed"); in get_decode_statvfs() 464 fatal_f("sshbuf_new failed"); in sftp_init() 556 fatal_f("limits failed"); in sftp_init() 619 fatal_f("sshbuf_new failed"); in sftp_get_limits() 667 fatal_f("sshbuf_new failed"); in sftp_close() [all …]
|
| H A D | sshd-session.c | 274 fatal_f("sshbuf_new failed"); in pack_hostkeys() 367 fatal_f("exec of %s failed: %s", in privsep_preauth() 538 fatal_f("sshbuf_new"); in notify_hostkeys() 568 fatal_f("no hostkeys"); in notify_hostkeys() 598 fatal_f("too many hostkeys"); in parse_hostkeys() 654 fatal_f("sshbuf_new failed"); in recv_rexec_state() 658 fatal_f("ssh_msg_recv failed"); in recv_rexec_state() 662 fatal_f("rexec version mismatch"); in recv_rexec_state() 674 fatal_f("sshbuf_new failed"); in recv_rexec_state() 685 fatal_f("ssh_msg_recv failed"); in recv_rexec_state() [all …]
|
| H A D | auth2-hostbased.c | 129 fatal_f("sshbuf_new failed"); in userauth_hostbased() 219 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed() 247 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed() 255 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed()
|
| H A D | auth2-pubkey.c | 115 fatal_f("internal error: initial hostkey not recorded"); in userauth_pubkey() 117 fatal_f("%s packet contained wrong host key", method); in userauth_pubkey() 127 fatal_f("sshbuf_from failed"); in userauth_pubkey() 129 fatal_f("sshbuf_dtob64 failed"); in userauth_pubkey() 190 fatal_f("sshbuf_new failed"); in userauth_pubkey() 339 fatal_f("too many glob results for \"%s\"", file); in match_principals_file() 466 fatal_f("percent_expand failed"); in match_principals_command() 561 fatal_f("internal error: missing principals_opts"); in user_cert_trusted_ca() 728 fatal_f("percent_expand failed"); in user_key_command_allowed2() 834 fatal_f("too many glob results for \"%s\"", file); in user_key_allowed()
|
| H A D | sshd-auth.c | 186 fatal_f("ssh_sandbox_init failed"); in privsep_child_demote() 212 fatal_f("pledge()"); in privsep_child_demote() 240 fatal_f("sshbuf_new failed"); in list_hostkey_types() 279 fatal_f("sshbuf_dup_string failed"); in list_hostkey_types() 387 fatal_f("too many hostkeys"); in parse_hostkeys() 783 fatal_f("privkey sign failed"); in sshd_hostkey_sign() 788 fatal_f("pubkey sign failed"); in sshd_hostkey_sign()
|
| H A D | clientloop.c | 546 fatal_f("internal error: fuzz %u%% %lldns > interval %lldns", in set_next_interval() 694 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in client_wait_until_can_do_something() 902 fatal_f("last_gc->ref_count = %d", in client_register_global_confirm() 960 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 965 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 969 fatal_f("pledge(): %s", strerror(errno)); in client_repledge() 1472 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1478 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1484 fatal_f("pledge(): %s", strerror(errno)); in client_loop() 1490 fatal_f("pledge(): %s", strerror(errno)); in client_loop() [all …]
|
| H A D | ssh-agent.c | 326 fatal_f("fingerprint failed"); in dump_dest_constraint_hop() 384 fatal_f("fingerprint failed"); in match_key_hop() 394 fatal_f("fingerprint failed"); in match_key_hop() 511 fatal_f("internal error: no bound key"); in identity_permitted() 517 fatal_f("fingerprint failed"); in identity_permitted() 520 fatal_f("fingerprint failed"); in identity_permitted() 648 fatal_f("sshbuf_new failed"); in process_request_identities() 652 fatal_f("fingerprint failed"); in process_request_identities() 722 fatal_f("sshbuf_fromb"); in parse_userauth_request() 796 fatal_f("sshbuf_fromb"); in parse_sshsig_request() [all …]
|
| H A D | sshd.c | 258 fatal_f("error: accepted connection when all %d child " in child_register() 264 fatal_f("sshbuf_fromb failed"); in child_register() 283 fatal_f("internal error: more children than max_startups"); in child_register() 295 fatal_f("internal error: children_active underflow"); in child_finish() 685 fatal_f("sshbuf_new failed"); in pack_hostkeys() 723 fatal_f("bad length %zu", len); in pack_hostkeys() 743 fatal_f("sshbuf_new failed"); in pack_config() 761 fatal_f("bad length %zu", len); in pack_config() 804 fatal_f("fork failed: %s", strerror(errno)); in send_rexec_state() 1300 fatal_f("ssh_digest_start"); in accumulate_host_timing_secret() [all …]
|
| H A D | sshconnect2.c | 180 fatal_f("unknown alg %s", alg); in order_hostkeyalgs() 454 fatal_f("internal error: cannot send userauth none request"); in ssh_userauth2() 565 fatal_f("bad message during authentication: type %d", type); in input_userauth_error() 594 fatal_f("no authentication context"); in input_userauth_success() 613 fatal_f("no authentication context"); 860 fatal_f("sshbuf_new failed"); in process_gssapi_token() 866 fatal_f("sshbuf_mutable_ptr failed"); in process_gssapi_token() 1253 fatal_f("fingerprint failed"); in identity_sign() 1406 fatal_f("sshbuf_new failed"); in sign_and_send_pubkey() 1427 fatal_f("internal error: initial hostkey " in sign_and_send_pubkey() [all …]
|
| H A D | serverloop.c | 170 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in wait_until_can_do_something() 232 fatal_f("ppoll: %.100s", strerror(errno)); in wait_until_can_do_something() 475 fatal_f("no/invalid user"); in server_request_direct_streamlocal() 682 fatal_f("sshbuf_new"); in server_input_hostkeys_prove() 767 fatal_f("no/invalid user"); in server_input_global_request() 797 fatal_f("sshbuf_new"); in server_input_global_request() 889 fatal_f("channel %d: no remote_id", c->self); in server_input_channel_req()
|
| H A D | misc.c | 1200 fatal_f("argument too long"); in addargs() 1207 fatal_f("too many arguments"); in addargs() 1209 fatal_f("arglist corrupt"); in addargs() 1231 fatal_f("argument too long"); in replacearg() 1233 fatal_f("arglist corrupt"); in replacearg() 1236 fatal_f("tried to replace invalid arg %d >= %d", in replacearg() 1363 fatal_f("sshbuf_new failed"); in vdollar_percent_expand() 1365 fatal_f("null parseerror arg"); in vdollar_percent_expand() 1376 fatal_f("NULL replacement for token %s", in vdollar_percent_expand() 1381 fatal_f("too many keys"); in vdollar_percent_expand() [all …]
|