| /freebsd/crypto/openssh/regress/ |
| H A D | limit-keytype.sh | 27 fatal "ssh-keygen failed" 31 fatal "ssh-keygen failed" 33 fatal "ssh-keygen failed" 35 fatal "ssh-keygen failed" 37 fatal "ssh-keygen failed" 39 fatal "ssh-keygen failed" 41 fatal "ssh-keygen failed" 44 fatal "couldn't sign user_key1" 86 ${SSH} $certopts proxy true || fatal "cert failed" 87 ${SSH} $opts -i $OBJ/user_key1 proxy true || fatal "key1 failed" [all …]
|
| H A D | cert-file.sh | 11 fatal "ssh-keygen failed" 13 fatal "ssh-keygen failed" 17 fatal "ssh-keygen failed" 19 fatal "ssh-keygen failed" 21 fatal "ssh-keygen failed" 23 fatal "ssh-keygen failed" 25 fatal "ssh-keygen failed" 31 fatal "couldn't sign user_key1 with user_ca_key1" 35 fatal "couldn't sign user_key1 with user_ca_key2" 39 fatal "couldn't sign user_key3 with user_ca_key1" [all …]
|
| H A D | agent-pkcs11-restrict.sh | 15 fatal "ssh-keygen hostkey failed" 107 $SSHADD -qD >/dev/null || fatal "clear agent failed" 109 fatal "failed to add keys" 118 host_$h true > $OBJ/ssh_output || fatal "test ssh $h failed" 119 cmp $OBJ/expect_$h $OBJ/ssh_output || fatal "unexpected output" 123 $SSHADD -qD >/dev/null || fatal "clear agent failed" 125 fatal "failed to add keys" 129 host_$h true > $OBJ/ssh_output && fatal "test ssh $h succeeded" 133 $SSHADD -qD >/dev/null || fatal "clear agent failed" 135 fatal "failed to add keys" [all …]
|
| H A D | krl.sh | 26 fatal "$SSHKEYGEN CA failed" 28 fatal "$SSHKEYGEN CA2 failed" 77 || fatal "$SSHKEYGEN failed" 80 || fatal "$SSHKEYGEN sign failed" 112 >/dev/null || fatal "$SSHKEYGEN KRL failed" 114 >/dev/null || fatal "$SSHKEYGEN KRL failed" 116 >/dev/null || fatal "$SSHKEYGEN KRL failed" 118 >/dev/null || fatal "$SSHKEYGEN KRL failed" 120 >/dev/null || fatal "$SSHKEYGEN KRL failed" 122 >/dev/null 2>&1 || fatal "$SSHKEYGEN KRL failed" [all …]
|
| H A D | ssh-tty.sh | 56 fatal "mux never becomes ready" 66 fatal "mux socket never removed" 82 fatal "failed to match \"$string\" in terminal output" 96 fatal "$error" 106 fatal "tmux session didn't terminate" 168 not_in_term "$MAGIC1" "terminal already contains magic1 string" fatal 169 not_in_term "$MAGIC2" "terminal already contains magic2 string" fatal 170 not_in_term "$MAGIC3" "terminal already contains magic3 string" fatal 171 not_in_term "$MAGIC4" "terminal already contains magic4 string" fatal 172 not_in_term "$MAGIC5" "terminal already contains magic5 string" fatal [all …]
|
| H A D | check-perm.c | 21 fatal(const char *fmt, ...) in fatal() function 40 fatal("chroot path does not begin at root"); in safely_chroot() 42 fatal("chroot path too long"); in safely_chroot() 60 fatal("%s: stat(\"%s\"): %s", __func__, in safely_chroot() 63 fatal("bad ownership or modes for chroot " in safely_chroot() 67 fatal("chroot path %s\"%s\" is not a directory", in safely_chroot() 73 fatal("Unable to chdir to chroot path \"%s\": " in safely_chroot() 194 fatal("Could not stat %s: %s", path, strerror(errno)); in main() 197 fatal("Unsafe %s: %s", path, errmsg); in main()
|
| H A D | penalty.sh | 20 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed" 26 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 31 ${SSH} -F $OBJ/ssh_config somehost true || fatal "authfail not expired" 36 ${SSH} -F $OBJ/ssh_config somehost true && fatal "noauth connect succeeded" 45 ${SSH} -F $OBJ/ssh_config somehost true || fatal "basic connect failed" 47 ${SSHKEYSCAN} -t ssh-ed25519 -p $PORT 127.0.0.1 >/dev/null || fatal "keyscan failed"
|
| H A D | hostkey-agent.sh | 11 [ $r -ne 0 ] && fatal "could not start ssh-agent: exit code $r" 18 ${SSHKEYGEN} -qt ed25519 -f $OBJ/agent-ca -N '' || fatal "ssh-keygen CA" 22 ${SSHKEYGEN} -qt $k -f $OBJ/agent-key.$k -N '' || fatal "ssh-keygen $k" 25 fatal "sign $k" 27 fatal "couldn't load key $OBJ/agent-key.$k" 29 rm $OBJ/agent-key.$k || fatal "couldn't rm $OBJ/agent-key.$k" 64 test -f $OBJ/agent-key.${k}.pub || fatal "no $k key" 65 test -f $OBJ/agent-key.${k}-cert.pub || fatal "no $k cert"
|
| H A D | agent-pkcs11-cert.sh | 14 $SSHKEYGEN -q -t ed25519 -C ca -N '' -f $OBJ/ca || fatal "ssh-keygen CA failed" 16 fatal "certify ECDSA key failed" 18 fatal "certify RSA key failed" 21 fatal "certify ed25519 key failed" 23 fatal "certify CA key failed" 37 fatal "failed to add keys" 69 $SSHADD -qD >/dev/null || fatal "clear agent failed" 80 fatal "failed to add keys"
|
| H A D | connection-timeout.sh | 26 test $r -eq 0 || fatal "failed to start ssh $r" 27 check_ssh || fatal "ssh process unresponsive" 32 check_ssh || fatal "ssh process is unresponsive: cannot close" 35 fatal "ssh process did not respond to close" 44 fatal "ssh process did not exit" 53 check_ssh || fatal "ssh unexpectedly missing"
|
| /freebsd/crypto/openssh/ |
| H A D | uidswap.c | 87 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 92 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 101 fatal("initgroups: %s: %.100s", pw->pw_name, in temporarily_use_uid() 106 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 111 fatal("getgroups: %.100s", strerror(errno)); in temporarily_use_uid() 120 fatal("setgroups: %.100s", strerror(errno)); in temporarily_use_uid() 130 fatal("setegid %u: %.100s", (u_int)pw->pw_gid, in temporarily_use_uid() 133 fatal("seteuid %u: %.100s", (u_int)pw->pw_uid, in temporarily_use_uid() 149 fatal("restore_uid: temporarily_use_uid not effective"); in restore_uid() 155 fatal("seteuid %u: %.100s", (u_int)saved_euid, strerror(errno)); in restore_uid() [all …]
|
| H A D | ssh-keysign.c | 196 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 208 fatal("getpwuid failed"); in main() 225 fatal("ssh-keysign not enabled in %s", in main() 229 fatal("%s: pledge: %s", __progname, strerror(errno)); in main() 236 fatal("could not open any host key"); in main() 254 fatal("no hostkey found"); in main() 257 fatal("%s: sshbuf_new failed", __progname); in main() 259 fatal("%s: ssh_msg_recv failed", __progname); in main() 263 fatal("%s: bad version: received %d, expected %d", in main() 268 fatal("%s: bad fd = %d", __progname, fd); in main() [all …]
|
| H A D | xmalloc.c | 37 fatal("xmalloc: zero size"); in xmalloc() 40 fatal("xmalloc: out of memory (allocating %zu bytes)", size); in xmalloc() 50 fatal("xcalloc: zero size"); in xcalloc() 52 fatal("xcalloc: nmemb * size > SIZE_MAX"); in xcalloc() 55 fatal("xcalloc: out of memory (allocating %zu bytes)", in xcalloc() 67 fatal("xreallocarray: out of memory (%zu elements of %zu bytes)", in xreallocarray() 79 fatal("xrecallocarray: out of memory (%zu elements of %zu bytes)", in xrecallocarray() 102 fatal("xvasprintf: could not allocate memory"); in xvasprintf()
|
| H A D | ssh-keygen.c | 178 fatal("unknown key type %s", key_type_name); in type_bits_valid() 201 fatal("Invalid RSA key length: minimum is %d bits", in type_bits_valid() 204 fatal("Invalid RSA key length: maximum is %d bits", in type_bits_valid() 210 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 213 fatal("Invalid ECDSA key length: valid lengths are " in type_bits_valid() 277 fatal("bad key type"); in ask_filename() 361 fatal("PEM_write_RSA_PUBKEY failed"); in do_convert_to_pkcs8() 367 fatal("PEM_write_EC_PUBKEY failed"); in do_convert_to_pkcs8() 382 fatal("PEM_write_RSAPublicKey failed"); in do_convert_to_pem() 388 fatal("PEM_write_EC_PUBKEY failed"); in do_convert_to_pem() [all …]
|
| H A D | ssh-sk-helper.c | 73 fatal("%s: sshbuf_new failed", __progname); in reply_error() 76 fatal("%s: buffer error", __progname); in reply_error() 127 fatal("%s: trailing data in request", __progname); in process_sign() 132 fatal("%s: Unsupported key type %s", in process_sign() 149 fatal("%s: sshbuf_new failed", __progname); in process_sign() 177 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 189 fatal("%s: trailing data in request", __progname); in process_enroll() 192 fatal("%s: bad type %u", __progname, type); in process_enroll() 208 fatal("%s: sshbuf_new failed", __progname); in process_enroll() 240 fatal("%s: sshbuf_new failed", __progname); in process_load_resident() [all …]
|
| H A D | sandbox-capsicum.c | 77 fatal("%s: setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child() 81 fatal("%s: setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child() 85 fatal("%s: setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child() 91 fatal("can't limit stdin: %m"); in ssh_sandbox_child() 93 fatal("can't limit stdout: %m"); in ssh_sandbox_child() 95 fatal("can't limit stderr: %m"); in ssh_sandbox_child()
|
| H A D | servconf.c | 320 fatal("No host key files found"); in fill_default_server_options() 885 fatal("bad addr or host: %s (%s)", in add_one_listen_addr() 1039 fatal("'Match %s' in configuration but '%s' not in connection " in match_test_missing_fatal() 1167 fatal("Invalid Match address argument " in match_cfg_line() 1190 fatal("Invalid Match localaddress " in match_cfg_line() 1395 fatal("%s line %d: Directive '%s' is not allowed " in process_server_config_line_depth() 1412 fatal("%s line %d: missing argument.", in process_server_config_line_depth() 1429 fatal("%s line %d: too many ports.", in process_server_config_line_depth() 1433 fatal("%s line %d: missing port number.", in process_server_config_line_depth() 1437 fatal("%s line %d: Badly formatted port number.", in process_server_config_line_depth() [all …]
|
| H A D | moduli.c | 278 fatal("BN_new failed"); in gen_candidates() 285 fatal("BN_new failed"); in gen_candidates() 288 fatal("BN_rand failed"); in gen_candidates() 291 fatal("BN_copy: failed"); in gen_candidates() 296 fatal("BN_set_bit: failed"); in gen_candidates() 381 fatal("BN_set_word failed"); in gen_candidates() 383 fatal("BN_add failed"); in gen_candidates() 559 fatal("BN_new failed"); in prime_test() 561 fatal("BN_new failed"); in prime_test() 625 fatal("BN_hex2bn failed"); in prime_test() [all …]
|
| /freebsd/usr.sbin/watch/ |
| H A D | watch.c | 54 static void fatal(int, const char *); 138 fatal(int error, const char *buf) in fatal() function 163 fatal(EX_OSFILE, "cannot open snoop device"); in open_snp() 218 fatal(EX_DATAERR, "can't open device"); in attach_snp() 220 fatal(EX_UNAVAILABLE, "cannot attach to tty"); in attach_snp() 242 fatal(EX_DATAERR, "bad device name"); in set_dev() 245 fatal(EX_DATAERR, "must be a character device"); in set_dev() 338 fatal(EX_DATAERR, "no device name given"); in main() 345 fatal(EX_UNAVAILABLE, "malloc failed"); in main() 357 fatal(EX_OSERR, "ioctl(FIONREAD)"); in main() [all …]
|
| /freebsd/crypto/openssh/openbsd-compat/ |
| H A D | port-solaris.c | 275 fatal("priv_allocset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 277 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 284 fatal("priv_addset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 293 fatal("priv_delset: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 305 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 308 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 315 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 319 fatal("getppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 325 fatal("setppriv: %s", strerror(errno)); in solaris_drop_privs_pinfo_net_fork_exec() 338 fatal("solaris_basic_privset: %s", strerror(errno)); in solaris_drop_privs_root_pinfo_net() [all …]
|
| /freebsd/contrib/sendmail/libsm/ |
| H A D | b-strl.c | 36 fatal(str) 114 fatal("gettimeofday"); 120 fatal("gettimeofday"); 125 fatal("gettimeofday"); 131 fatal("gettimeofday"); 155 fatal("gettimeofday"); 161 fatal("gettimeofday"); 166 fatal("gettimeofday"); 172 fatal("gettimeofday");
|
| /freebsd/cddl/contrib/opensolaris/cmd/dtrace/test/cmd/baddof/ |
| H A D | baddof.c | 37 fatal(char *fmt, ...) in fatal() function 104 fatal("couldn't open DTrace pseudo device"); in corrupt() 164 fatal("expected D script as argument\n"); in main() 167 fatal("couldn't open %s", filename); in main() 173 fatal("cannot open dtrace library: %s\n", in main() 181 fatal("failed to compile script %s: %s\n", filename, in main() 189 fatal("could not allocate copy of %d bytes", len); in main() 199 fatal("couldn't open DTrace pseudo device"); in main()
|
| /freebsd/usr.sbin/lpr/common_source/ |
| H A D | rmjob.c | 81 fatal(pp, "getprintcap: %s", pcaperr(i)); in rmjob() 101 fatal(pp, "The login name \"-all\" is reserved"); in rmjob() 108 fatal(pp, "cannot chdir to spool directory"); in rmjob() 110 fatal(pp, "cannot access spool directory"); in rmjob() 124 fatal(pp, "cannot kill printer daemon"); in rmjob() 137 fatal(pp, "cannot restart printer daemon\n"); in rmjob() 155 fatal(pp, "%s: %s", slockf, strerror(errno)); in lockchk() 193 fatal(pp, "cannot open %s", file); in process() 330 fatal(pp, "out of memory in rmremote()"); in rmremote() 345 fatal(pp, "out of memory in rmremote()"); in rmremote() [all …]
|
| /freebsd/sys/dev/acpica/Osd/ |
| H A D | OsdDebug.c | 71 ACPI_SIGNAL_FATAL_INFO *fatal; in AcpiOsSignal() local 75 fatal = (ACPI_SIGNAL_FATAL_INFO *)Info; in AcpiOsSignal() 77 fatal->Type, fatal->Code, fatal->Argument); in AcpiOsSignal()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | SSL_alert_type_string.pod | 38 A warning alert is sent, when a non-fatal error condition occurs. The 40 non-fatal errors are certificate errors ("certificate expired", 42 (The sending party may however decide to send a fatal error.) The 46 Several alert messages must be sent as fatal alert messages as specified 47 by the TLS RFC. A fatal alert always leads to a connection abort. 58 =item "F"/"fatal" 78 An inappropriate message was received. This alert is always fatal 85 MAC. This message is always fatal. 91 fatal. 97 parameters given the options available. This is a fatal error. [all …]
|