| /freebsd/crypto/openssh/regress/ |
| H A D | limit-keytype.sh | 28 fatal "ssh-keygen failed" 32 fatal "ssh-keygen failed" 34 fatal "ssh-keygen failed" 36 fatal "ssh-keygen failed" 38 fatal "ssh-keygen failed" 40 fatal "ssh-keygen failed" 42 fatal "ssh-keygen failed" 45 fatal "couldn't sign user_key1" 88 ${SSH} $certopts proxy true || fatal "cert failed" 89 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" [all …]
|
| H A D | cert-file.sh | 11 fatal "ssh-keygen failed" 13 fatal "ssh-keygen failed" 17 fatal "ssh-keygen failed" 19 fatal "ssh-keygen failed" 21 fatal "ssh-keygen failed" 23 fatal "ssh-keygen failed" 25 fatal "ssh-keygen failed" 31 fatal "couldn't sign user_key1 with user_ca_key1" 35 fatal "couldn't sign user_key1 with user_ca_key2" 39 fatal "couldn't sign user_key3 with user_ca_key1" [all …]
|
| H A D | agent-pkcs11-restrict.sh | 15 fatal "ssh-keygen hostkey failed" 44 fatal "ssh-add -l did not fail with exit code 1 (got $r)" 122 $SSHADD -qD >/dev/null || fatal "clear agent failed" 124 fatal "failed to add keys" 133 host_$h true > $OBJ/ssh_output || fatal "test ssh $h failed" 134 cmp $OBJ/expect_$h $OBJ/ssh_output || fatal "unexpected output" 138 $SSHADD -qD >/dev/null || fatal "clear agent failed" 140 fatal "failed to add keys" 144 host_$h true > $OBJ/ssh_output && fatal "test ssh $h succeeded" 148 $SSHADD -qD >/dev/null || fatal "clear agent failed" [all …]
|
| H A D | krl.sh | 27 fatal "$SSHKEYGEN CA failed" 29 fatal "$SSHKEYGEN CA2 failed" 78 || fatal "$SSHKEYGEN failed" 81 || fatal "$SSHKEYGEN sign failed" 113 >/dev/null || fatal "$SSHKEYGEN KRL failed" 115 >/dev/null || fatal "$SSHKEYGEN KRL failed" 117 >/dev/null || fatal "$SSHKEYGEN KRL failed" 119 >/dev/null || fatal "$SSHKEYGEN KRL failed" 121 >/dev/null || fatal "$SSHKEYGEN KRL failed" 123 >/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed" [all …]
|
| H A D | check-perm.c | 23 fatal(const char *fmt, ...) in fatal() function 42 fatal("chroot path does not begin at root"); in safely_chroot() 44 fatal("chroot path too long"); in safely_chroot() 62 fatal("%s: stat(\"%s\"): %s", __func__, in safely_chroot() 65 fatal("bad ownership or modes for chroot " in safely_chroot() 69 fatal("chroot path %s\"%s\" is not a directory", in safely_chroot() 75 fatal("Unable to chdir to chroot path \"%s\": " in safely_chroot() 196 fatal("Could not stat %s: %s", path, strerror(errno)); in main() 199 fatal("Unsafe %s: %s", path, errmsg); in main()
|
| H A D | agent-pkcs11-cert.sh | 17 $SSHKEYGEN -q -t ed25519 -C ca -N '' -f $OBJ/ca || fatal "ssh-keygen CA failed" 19 fatal "certify ECDSA key failed" 21 fatal "certify RSA key failed" 23 fatal "certify CA key failed" 38 fatal "ssh-add -l did not fail with exit code 1 (got $r)" 49 fatal "failed to add keys" 72 $SSHADD -qD >/dev/null || fatal "clear agent failed" 81 fatal "failed to add keys"
|
| H A D | hostkey-agent.sh | 11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r" 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 25 fatal "sign $k" 27 fatal "couldn't load key $OBJ/agent-key.$k" 29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k" 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
|
| H A D | penalty.sh | 20 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed" 26 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 31 ${SSH} -F $OBJ/ssh_config somehost true || fatal "authfail not expired" 36 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 45 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed" 47 ${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null || fatal "keyscan failed"
|
| /freebsd/crypto/openssh/ |
| H A D | uidswap.c | 88 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 93 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 102 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid() 107 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 112 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 121 fatal("setgroups: %.100s", strerror(errno)); in temporarily_use_uid() 131 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid() 134 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid() 150 fatal("restore_uid: temporarily_use_uid not effective"); in temporarily_use_uid() 156 fatal("seteui [all...] |
| H A D | auth-pam.c | 233 fatal("%s: waitpid: %s", __func__, strerror(errno)); in pthread_join() 289 fatal("PAM: sshpam_authctxt not initialized"); in sshpam_chauthtok_ruid() 291 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid() 294 fatal("%s: setreuid failed: %s", __func__, strerror(errno)); in sshpam_chauthtok_ruid() 308 fatal("%s: PAM authctxt not initialized", __func__); in sshpam_password_change_required() 340 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 342 fatal("%s: invalid PAM account status %u", __func__, n); in import_environments() 345 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 350 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() 359 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in import_environments() [all …]
|
| H A D | sandbox-capsicum.c | 77 fatal("%s: setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child() 81 fatal("%s: setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child() 85 fatal("%s: setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child() 91 fatal("can't limit stdin: %m"); in ssh_sandbox_child() 93 fatal("can't limit stdout: %m"); in ssh_sandbox_child() 95 fatal("can't limit stderr: %m"); in ssh_sandbox_child() 100 fatal("%s: failed to limit the network socket", __func__); in ssh_sandbox_child() 104 fatal("%s: failed to limit the logging socket", __func__); in ssh_sandbox_child() 106 fatal("%s: failed to enter capability mode", __func__); in ssh_sandbox_child()
|
| H A D | ssh-keygen.c | 182 fatal("unknown key type %s", key_type_name); in type_bits_valid() 208 fatal("Invalid DSA key length: must be 1024 bits"); in type_bits_valid() 212 fatal("Invalid RSA key length: minimum is %d bits", in type_bits_valid() 215 fatal("Invalid RSA key length: maximum is %d bits", in type_bits_valid() 221 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 224 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 298 fatal("bad key type"); in ask_filename() 383 fatal("PEM_write_RSA_PUBKEY failed"); in do_convert_to_pkcs8() 388 fatal("PEM_write_DSA_PUBKEY failed"); in do_convert_to_pkcs8() 395 fatal("PEM_write_EC_PUBKEY failed"); in do_convert_to_pkcs8() [all …]
|
| H A D | ssh-keysign.c | 189 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 212 fatal("getpwuid failed"); in main() 229 fatal("ssh-keysign not enabled in %s", in main() 233 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 240 fatal("could not open any host key"); in main() 258 fatal("no hostkey found"); in main() 261 fatal("%s: sshbuf_new failed", __progname); in main() 263 fatal("%s: ssh_msg_recv failed", __progname); in main() 267 fatal("%s: bad version: received %d, expected %d", in main() 272 fatal("%s: bad fd = %d", __progname, fd); in main() [all …]
|
| H A D | ssh-sk-helper.c | 72 fatal("%s: sshbuf_new failed", __progname); in reply_error() 75 fatal("%s: buffer error", __progname); in reply_error() 110 fatal("%s: trailing data in request", __progname); in process_sign() 115 fatal("%s: Unsupported key type %s", in process_sign() 132 fatal("%s: sshbuf_new failed", __progname); in process_sign() 160 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 172 fatal("%s: trailing data in request", __progname); in process_enroll() 175 fatal("%s: bad type %u", __progname, type); in process_enroll() 191 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 223 fatal("%s: sshbuf_new failed", __progname); in process_load_resident() [all …]
|
| H A D | xmalloc.c | 39 fatal("xmalloc: zero size"); in xmalloc() 42 fatal("xmalloc: out of memory (allocating %zu bytes)", size); in xmalloc() 52 fatal("xcalloc: zero size"); in xcalloc() 54 fatal("xcalloc: nmemb * size > SIZE_MAX"); in xcalloc() 57 fatal("xcalloc: out of memory (allocating %zu bytes)", in xcalloc() 69 fatal("xreallocarray: out of memory (%zu elements of %zu bytes)", in xreallocarray() 81 fatal("xrecallocarray: out of memory (%zu elements of %zu bytes)", in xrecallocarray() 104 fatal("xvasprintf: could not allocate memory"); in xvasprintf()
|
| H A D | servconf.c | 328 fatal("No host key files found"); in fill_default_server_options() 886 fatal("bad addr or host: %s (%s)", in add_one_listen_addr() 1040 fatal("'Match %s' in configuration but '%s' not in connection " in match_test_missing_fatal() 1168 fatal("Invalid Match address argument " in match_cfg_line() 1191 fatal("Invalid Match localaddress " in match_cfg_line() 1394 fatal("%s line %d: Directive '%s' is not allowed " in process_server_config_line_depth() 1411 fatal("%s line %d: missing argument.", in process_server_config_line_depth() 1428 fatal("%s line %d: too many ports.", in process_server_config_line_depth() 1432 fatal("%s line %d: missing port number.", in process_server_config_line_depth() 1436 fatal("%s line %d: Badly formatted port number.", in process_server_config_line_depth() [all …]
|
| /freebsd/usr.sbin/watch/ |
| H A D | watch.c | 54 static void fatal(int, const char *); 138 fatal(int error, const char *buf) in fatal() function 163 fatal(EX_OSFILE, "cannot open snoop device"); in open_snp() 218 fatal(EX_DATAERR, "can't open device"); in attach_snp() 220 fatal(EX_UNAVAILABLE, "cannot attach to tty"); in attach_snp() 242 fatal(EX_DATAERR, "bad device name"); in set_dev() 245 fatal(EX_DATAERR, "must be a character device"); in set_dev() 338 fatal(EX_DATAERR, "no device name given"); in main() 345 fatal(EX_UNAVAILABLE, "malloc failed"); in main() 357 fatal(EX_OSERR, "ioctl(FIONREAD)"); in main() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-solaris.c | 275 fatal("priv_allocset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 277 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 284 fatal("priv_addset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 293 fatal("priv_delset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 305 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 308 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 315 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 319 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 325 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 338 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_root_pinfo_net() [all …]
|
| /freebsd/contrib/sendmail/libsm/ |
| H A D | b-strl.c | 36 fatal(str) 114 fatal("gettimeofday"); 120 fatal("gettimeofday"); 125 fatal("gettimeofday"); 131 fatal("gettimeofday"); 155 fatal("gettimeofday"); 161 fatal("gettimeofday"); 166 fatal("gettimeofday"); 172 fatal("gettimeofday");
|
| /freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/cmd/baddof/ |
| H A D | baddof.c | 37 fatal(char *fmt, ...) in fatal() function 104 fatal("couldn't open DTrace pseudo device"); in corrupt() 164 fatal("expected D script as argument\n"); in main() 167 fatal("couldn't open %s", filename); in main() 173 fatal("cannot open dtrace library: %s\n", in main() 181 fatal("failed to compile script %s: %s\n", filename, in main() 189 fatal("could not allocate copy of %d bytes", len); in main() 199 fatal("couldn't open DTrace pseudo device"); in main()
|
| /freebsd/contrib/llvm-project/lld/COFF/ |
| H A D | DriverUtils.cpp | 66 fatal("unable to find " + prog + " in PATH: " + ec.message()); in run() 71 fatal("ExecuteAndWait failed: " + in run() 86 fatal("invalid number: " + s1); in parseNumbers() 88 fatal("invalid number: " + s2); in parseNumbers() 97 fatal("invalid number: " + s1); in parseVersion() 100 fatal("invalid number: " + s2); in parseVersion() 118 fatal("invalid argument to /guard: " + arg); in parseGuard() 141 fatal("unknown subsystem: " + sysStr); in parseSubsystem() 153 fatal("/alternatename: invalid argument: " + s); in parseAlternateName() 156 fatal("/alternatename: conflicts: " + s); in parseAlternateName() [all …]
|
| /freebsd/usr.sbin/lpr/common_source/ |
| H A D | rmjob.c | 81 fatal(pp, "getprintcap: %s", pcaperr(i)); in rmjob() 101 fatal(pp, "The login name \"-all\" is reserved"); in rmjob() 108 fatal(pp, "cannot chdir to spool directory"); in rmjob() 110 fatal(pp, "cannot access spool directory"); in rmjob() 124 fatal(pp, "cannot kill printer daemon"); in rmjob() 137 fatal(pp, "cannot restart printer daemon\n"); in rmjob() 155 fatal(pp, "%s: %s", slockf, strerror(errno)); in lockchk() 193 fatal(pp, "cannot open %s", file); in process() 330 fatal(pp, "out of memory in rmremote()"); in rmremote() 345 fatal(pp, "out of memory in rmremote()"); in rmremote() [all …]
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_alert_type_string.pod | 38 A warning alert is sent, when a non-fatal error condition occurs. The 40 non-fatal errors are certificate errors ("certificate expired", 42 (The sending party may however decide to send a fatal error.) The 46 Several alert messages must be sent as fatal alert messages as specified 47 by the TLS RFC. A fatal alert always leads to a connection abort. 58 =item "F"/"fatal" 78 An inappropriate message was received. This alert is always fatal 85 MAC. This message is always fatal. 91 fatal. 97 parameters given the options available. This is a fatal error. [all …]
|
| /freebsd/sys/dev/sfxge/common/ |
| H A D | efx_intr.c | 463 EFSYS_PROBE(fatal); in siena_intr_check_fatal() 524 efx_oword_t fatal; in siena_intr_fatal() local 527 EFX_BAR_READO(enp, FR_AZ_FATAL_INTR_REG_KER, &fatal); in siena_intr_fatal() 530 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRM_PERR_INT_KER) != 0 || in siena_intr_fatal() 531 EFX_OWORD_FIELD(fatal, FRF_AZ_MEM_PERR_INT_KER) != 0) in siena_intr_fatal() 534 if (EFX_OWORD_FIELD(fatal, FRF_AZ_SRAM_OOB_INT_KER) != 0) in siena_intr_fatal() 537 if (EFX_OWORD_FIELD(fatal, FRF_AZ_BUFID_DC_OOB_INT_KER) != 0) in siena_intr_fatal() 540 if (EFX_OWORD_FIELD(fatal, FRF_AZ_MEM_PERR_INT_KER) != 0) in siena_intr_fatal() 545 if (EFX_OWORD_FIELD(fatal, FRF_AZ_RBUF_OWN_INT_KER) != 0) in siena_intr_fatal() 548 if (EFX_OWORD_FIELD(fatal, FRF_AZ_TBUF_OWN_INT_KER) != 0) in siena_intr_fatal() [all …]
|
| /freebsd/sys/dev/acpica/Osd/ |
| H A D | OsdDebug.c | 71 ACPI_SIGNAL_FATAL_INFO *fatal; in AcpiOsSignal() local 75 fatal = (ACPI_SIGNAL_FATAL_INFO *)Info; in AcpiOsSignal() 77 fatal->Type, fatal->Code, fatal->Argument); in AcpiOsSignal()
|