Home
last modified time | relevance | path

Searched refs:packet_disconnect (Results 1 – 19 of 19) sorted by relevance

/titanic_50/usr/src/cmd/ssh/libssh/common/
H A Dkexgssc.c112 packet_disconnect("A GSS-API error occurred during " in kexgss_client()
188 packet_disconnect("Protocol error: " in kexgss_client()
210 packet_disconnect("Protocol error: " in kexgss_client()
217 packet_disconnect("Protocol error: " in kexgss_client()
233 packet_disconnect("The server had a GSS-API " in kexgss_client()
238 packet_disconnect("Protocol error: " in kexgss_client()
262 packet_disconnect("bad server public DH value"); in kexgss_client()
291 packet_disconnect("Hash's MIC didn't verify"); in kexgss_client()
H A Dpacket.c1026 packet_disconnect("Protocol error: expected packet type %d, got %d", in packet_read_expect()
1053 packet_disconnect("Bad packet length %d.", len); in packet_read_poll1()
1073 packet_disconnect("crc32 compensation attack: " in packet_read_poll1()
1077 packet_disconnect("deattack denial of " in packet_read_poll1()
1104 packet_disconnect("packet_read_poll1: len %d != buffer_len %d.", in packet_read_poll1()
1110 packet_disconnect("Corrupted check bytes on input."); in packet_read_poll1()
1162 packet_disconnect("Bad packet length."); in packet_read_poll2()
1172 packet_disconnect("Bad packet length."); in packet_read_poll2()
1196 packet_disconnect("Corrupted MAC on input."); in packet_read_poll2()
1216 packet_disconnect("Corrupted padlen %d on input.", padlen); in packet_read_poll2()
[all …]
H A Dkexgexs.c89 packet_disconnect("Protocol error: no matching DH grp found"); in kexgex_server()
126 packet_disconnect("bad client public DH value"); in kexgex_server()
H A Dkexgsss.c127 packet_disconnect("Protocol error: didn't expect " in kexgss_server()
171 packet_disconnect("bad client public DH value"); in kexgss_server()
H A Ddispatch.c97 packet_disconnect("protocol error: rcvd type %d", type); in dispatch_run()
H A Dchannels.c1845 packet_disconnect("Received data for nonexistent channel %d.", id); in channel_input_data()
1890 packet_disconnect("Received extended_data for bad channel %d.", id); in channel_input_extended_data()
1899 packet_disconnect("Received extended_data after EOF " in channel_input_extended_data()
1933 packet_disconnect("Received ieof for nonexistent channel %d.", id); in channel_input_ieof()
1956 packet_disconnect("Received close for nonexistent channel %d.", id); in channel_input_close()
1992 packet_disconnect("Received oclose for nonexistent channel %d.", id); in channel_input_oclose()
2004 packet_disconnect("Received close confirmation for " in channel_input_close_confirmation()
2007 packet_disconnect("Received close confirmation for " in channel_input_close_confirmation()
2022 packet_disconnect("Received open confirmation for " in channel_input_open_confirmation()
2070 packet_disconnect("Received open failure for " in channel_input_open_failure()
[all …]
H A Dkexdhc.c100 packet_disconnect("bad server public DH value"); in kexdh_client()
H A Dkexdhs.c86 packet_disconnect("bad client public DH value"); in kexdh_server()
H A Dkexgexc.c145 packet_disconnect("bad server public DH value"); in kexgex_client()
/titanic_50/usr/src/cmd/ssh/ssh/
H A Dsshconnect1.c114 packet_disconnect("Protocol error during RSA authentication: %d", in try_agent_authentication()
154 packet_disconnect("Protocol error waiting RSA auth response: %d", in try_agent_authentication()
177 packet_disconnect( in respond_to_rsa_challenge()
184 packet_disconnect( in respond_to_rsa_challenge()
246 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rsa_authentication()
323 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rsa_authentication()
360 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rhosts_rsa_authentication()
383 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rhosts_rsa_authentication()
487 packet_disconnect("Kerberos v4 challenge failed!"); in try_krb4_authentication()
499 packet_disconnect("Kerberos v4 challenge failed!"); in try_krb4_authentication()
[all …]
H A Dssh.c871 packet_disconnect("Protocol error waiting for compression response.");
910 packet_disconnect("Protocol error waiting for pty request response.");
930 packet_disconnect("Protocol error waiting for X11 forwarding");
/titanic_50/usr/src/cmd/ssh/include/
H A Dpacket.h82 void packet_disconnect(const char *fmt,...) __attribute__((format(printf, 1, 2)));
113 packet_disconnect("Packet integrity error."); \
/titanic_50/usr/src/cmd/ssh/sshd/
H A Dauth1.c344 packet_disconnect("Authentication rejected for uid %d.", in do_authloop()
386 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in do_authloop()
451 packet_disconnect("Cannot change user when server not running as root."); in do_authentication()
H A Dserverloop.c230 packet_disconnect("No open channels after timeout!"); in client_alive_check()
236 packet_disconnect("Timeout, your session not responding."); in client_alive_check()
701 packet_disconnect("wait: %.100s", strerror(errno)); in server_loop()
732 packet_disconnect("Command terminated on signal %d.", in server_loop()
736 packet_disconnect("wait returned status %04x.", wait_status); in server_loop()
1230 packet_disconnect("server_input_channel_req: " in server_input_channel_req()
H A Dsession.c212 packet_disconnect("socket: %.100s", strerror(errno)); in auth_input_request_forwarding()
220 packet_disconnect("bind: %.100s", strerror(errno)); in auth_input_request_forwarding()
227 packet_disconnect("listen: %.100s", strerror(errno)); in auth_input_request_forwarding()
469 packet_disconnect("Could not create socket pairs: %.100s", in do_exec_no_pty()
530 packet_disconnect("fork failed: %.100s", strerror(errno)); in do_exec_no_pty()
586 packet_disconnect("pipe failed: %.100s", strerror(errno)); in do_exec_pty()
658 packet_disconnect("fork failed: %.100s", strerror(errno)); in do_exec_pty()
671 packet_disconnect("dup #1 failed: %.100s", strerror(errno)); in do_exec_pty()
676 packet_disconnect("dup #2 failed: %.100s", strerror(errno)); in do_exec_pty()
1661 packet_disconnect("Protocol error: you already have a pty."); in session_pty_req()
[all …]
H A Dauth2.c149 packet_disconnect("bad service request %s", service); in input_service_request()
377 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in userauth_finish()
445 packet_disconnect("Change of service not " in userauth_user_svc_change()
H A Dsshd.c609 packet_disconnect("Your ssh version is too old and " in sshd_exchange_identification()
1832 packet_disconnect("Warning: client selects unsupported cipher."); in do_ssh1_kex()
1839 packet_disconnect("IP Spoofing check bytes do not match."); in do_ssh1_kex()
/titanic_50/usr/src/cmd/ssh/
H A DMakefile.msg.targ32 --keyword=packet_disconnect
/titanic_50/usr/src/cmd/ssh/doc/
H A DChangeLog1982 check format string for packet_disconnect and packet_send_debug, too
2516 - [all] replace assert() with error, fatal or packet_disconnect
2522 - [rsa.c] replace assert() with error, fatal or packet_disconnect