/titanic_50/usr/src/cmd/ssh/libssh/common/ |
H A D | kexgssc.c | 112 packet_disconnect("A GSS-API error occurred during " in kexgss_client() 188 packet_disconnect("Protocol error: " in kexgss_client() 210 packet_disconnect("Protocol error: " in kexgss_client() 217 packet_disconnect("Protocol error: " in kexgss_client() 233 packet_disconnect("The server had a GSS-API " in kexgss_client() 238 packet_disconnect("Protocol error: " in kexgss_client() 262 packet_disconnect("bad server public DH value"); in kexgss_client() 291 packet_disconnect("Hash's MIC didn't verify"); in kexgss_client()
|
H A D | packet.c | 1026 packet_disconnect("Protocol error: expected packet type %d, got %d", in packet_read_expect() 1053 packet_disconnect("Bad packet length %d.", len); in packet_read_poll1() 1073 packet_disconnect("crc32 compensation attack: " in packet_read_poll1() 1077 packet_disconnect("deattack denial of " in packet_read_poll1() 1104 packet_disconnect("packet_read_poll1: len %d != buffer_len %d.", in packet_read_poll1() 1110 packet_disconnect("Corrupted check bytes on input."); in packet_read_poll1() 1162 packet_disconnect("Bad packet length."); in packet_read_poll2() 1172 packet_disconnect("Bad packet length."); in packet_read_poll2() 1196 packet_disconnect("Corrupted MAC on input."); in packet_read_poll2() 1216 packet_disconnect("Corrupted padlen %d on input.", padlen); in packet_read_poll2() [all …]
|
H A D | kexgexs.c | 89 packet_disconnect("Protocol error: no matching DH grp found"); in kexgex_server() 126 packet_disconnect("bad client public DH value"); in kexgex_server()
|
H A D | kexgsss.c | 127 packet_disconnect("Protocol error: didn't expect " in kexgss_server() 171 packet_disconnect("bad client public DH value"); in kexgss_server()
|
H A D | dispatch.c | 97 packet_disconnect("protocol error: rcvd type %d", type); in dispatch_run()
|
H A D | channels.c | 1845 packet_disconnect("Received data for nonexistent channel %d.", id); in channel_input_data() 1890 packet_disconnect("Received extended_data for bad channel %d.", id); in channel_input_extended_data() 1899 packet_disconnect("Received extended_data after EOF " in channel_input_extended_data() 1933 packet_disconnect("Received ieof for nonexistent channel %d.", id); in channel_input_ieof() 1956 packet_disconnect("Received close for nonexistent channel %d.", id); in channel_input_close() 1992 packet_disconnect("Received oclose for nonexistent channel %d.", id); in channel_input_oclose() 2004 packet_disconnect("Received close confirmation for " in channel_input_close_confirmation() 2007 packet_disconnect("Received close confirmation for " in channel_input_close_confirmation() 2022 packet_disconnect("Received open confirmation for " in channel_input_open_confirmation() 2070 packet_disconnect("Received open failure for " in channel_input_open_failure() [all …]
|
H A D | kexdhc.c | 100 packet_disconnect("bad server public DH value"); in kexdh_client()
|
H A D | kexdhs.c | 86 packet_disconnect("bad client public DH value"); in kexdh_server()
|
H A D | kexgexc.c | 145 packet_disconnect("bad server public DH value"); in kexgex_client()
|
/titanic_50/usr/src/cmd/ssh/ssh/ |
H A D | sshconnect1.c | 114 packet_disconnect("Protocol error during RSA authentication: %d", in try_agent_authentication() 154 packet_disconnect("Protocol error waiting RSA auth response: %d", in try_agent_authentication() 177 packet_disconnect( in respond_to_rsa_challenge() 184 packet_disconnect( in respond_to_rsa_challenge() 246 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rsa_authentication() 323 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rsa_authentication() 360 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rhosts_rsa_authentication() 383 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rhosts_rsa_authentication() 487 packet_disconnect("Kerberos v4 challenge failed!"); in try_krb4_authentication() 499 packet_disconnect("Kerberos v4 challenge failed!"); in try_krb4_authentication() [all …]
|
H A D | ssh.c | 871 packet_disconnect("Protocol error waiting for compression response."); 910 packet_disconnect("Protocol error waiting for pty request response."); 930 packet_disconnect("Protocol error waiting for X11 forwarding");
|
/titanic_50/usr/src/cmd/ssh/include/ |
H A D | packet.h | 82 void packet_disconnect(const char *fmt,...) __attribute__((format(printf, 1, 2))); 113 packet_disconnect("Packet integrity error."); \
|
/titanic_50/usr/src/cmd/ssh/sshd/ |
H A D | auth1.c | 344 packet_disconnect("Authentication rejected for uid %d.", in do_authloop() 386 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in do_authloop() 451 packet_disconnect("Cannot change user when server not running as root."); in do_authentication()
|
H A D | serverloop.c | 230 packet_disconnect("No open channels after timeout!"); in client_alive_check() 236 packet_disconnect("Timeout, your session not responding."); in client_alive_check() 701 packet_disconnect("wait: %.100s", strerror(errno)); in server_loop() 732 packet_disconnect("Command terminated on signal %d.", in server_loop() 736 packet_disconnect("wait returned status %04x.", wait_status); in server_loop() 1230 packet_disconnect("server_input_channel_req: " in server_input_channel_req()
|
H A D | session.c | 212 packet_disconnect("socket: %.100s", strerror(errno)); in auth_input_request_forwarding() 220 packet_disconnect("bind: %.100s", strerror(errno)); in auth_input_request_forwarding() 227 packet_disconnect("listen: %.100s", strerror(errno)); in auth_input_request_forwarding() 469 packet_disconnect("Could not create socket pairs: %.100s", in do_exec_no_pty() 530 packet_disconnect("fork failed: %.100s", strerror(errno)); in do_exec_no_pty() 586 packet_disconnect("pipe failed: %.100s", strerror(errno)); in do_exec_pty() 658 packet_disconnect("fork failed: %.100s", strerror(errno)); in do_exec_pty() 671 packet_disconnect("dup #1 failed: %.100s", strerror(errno)); in do_exec_pty() 676 packet_disconnect("dup #2 failed: %.100s", strerror(errno)); in do_exec_pty() 1661 packet_disconnect("Protocol error: you already have a pty."); in session_pty_req() [all …]
|
H A D | auth2.c | 149 packet_disconnect("bad service request %s", service); in input_service_request() 377 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in userauth_finish() 445 packet_disconnect("Change of service not " in userauth_user_svc_change()
|
H A D | sshd.c | 609 packet_disconnect("Your ssh version is too old and " in sshd_exchange_identification() 1832 packet_disconnect("Warning: client selects unsupported cipher."); in do_ssh1_kex() 1839 packet_disconnect("IP Spoofing check bytes do not match."); in do_ssh1_kex()
|
/titanic_50/usr/src/cmd/ssh/ |
H A D | Makefile.msg.targ | 32 --keyword=packet_disconnect
|
/titanic_50/usr/src/cmd/ssh/doc/ |
H A D | ChangeLog | 1982 check format string for packet_disconnect and packet_send_debug, too 2516 - [all] replace assert() with error, fatal or packet_disconnect 2522 - [rsa.c] replace assert() with error, fatal or packet_disconnect
|