Home
last modified time | relevance | path

Searched refs:fatal_f (Results 1 – 25 of 55) sorted by relevance

123

/freebsd/crypto/openssh/
H A Dmonitor_wrap.c95 fatal_f("no log channel"); in mm_log_handler()
98 fatal_f("sshbuf_new failed"); in mm_log_handler()
106 fatal_f("bad length %zu", len); in mm_log_handler()
114 fatal_f("write: %s", strerror(errno)); in mm_log_handler()
130 fatal_f("waitpid: %s", strerror(errno)); in mm_reap()
159 fatal_f("bad length %zu", mlen); in mm_request_send()
169 fatal_f("write: %s", strerror(errno)); in mm_request_send()
188 fatal_f("read: %s", strerror(errno)); in mm_request_receive()
192 fatal_f("read: bad msg_len %d", msg_len); in mm_request_receive()
217 fatal_f("read: rtype %d != type %d", rtype, type); in mm_request_receive_expect()
[all …]
H A Dmux.c188 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_session_cleanup_cb()
191 fatal_f("channel %d missing control channel %d", in mux_master_session_cleanup_cb()
209 fatal_f("channel_by_id(%i) == NULL", cid); in mux_master_control_cleanup_cb()
212 fatal_f("channel %d missing session channel %u", in mux_master_control_cleanup_cb()
265 fatal_f("channel %d: c->mux_ctx == NULL", c->self); in mux_master_process_hello()
388 fatal_f("sshbuf_new"); in mux_master_process_new_session()
519 fatal_f("connection_info_message"); in mux_master_process_ext_info()
523 fatal_f("channel_open_message"); in mux_master_process_ext_info()
594 fatal_f("unknown forward type %u", ftype); in format_forward()
645 fatal_f("sshbuf_new"); in mux_confirm_remote_forward()
[all …]
H A Dmonitor.c321 fatal_f("unexpected authentication from %d", in monitor_child_preauth()
356 fatal_f("privsep child made too many authentication " in monitor_child_preauth()
364 fatal_f("authenticated invalid user"); in monitor_child_preauth()
369 fatal_f("authentication method name unknown"); in monitor_child_preauth()
387 fatal_f("waitpid: %s", strerror(errno)); in monitor_child_preauth()
391 fatal_f("preauth child %ld exited with status %d", in monitor_child_preauth()
394 fatal_f("preauth child %ld terminated by signal %d", in monitor_child_preauth()
461 fatal_f("sshbuf_new"); in monitor_read_log()
474 fatal_f("log fd read: %s", strerror(errno)); in monitor_read_log()
479 fatal_f("invalid log message length %u", len); in monitor_read_log()
[all …]
H A Dauth2-chall.c115 fatal_f("sshbuf_new failed"); in kbdint_alloc()
122 fatal_f("sshbuf_dup_string failed"); in kbdint_alloc()
170 fatal_f("internal error: too many devices"); in kbdint_next_device()
305 fatal_f("no authctxt"); in input_userauth_info_response()
308 fatal_f("no kbdintctxt"); in input_userauth_info_response()
310 fatal_f("no device"); in input_userauth_info_response()
316 fatal_f("wrong number of replies"); in input_userauth_info_response()
318 fatal_f("too many replies"); in input_userauth_info_response()
H A Dssh-pkcs11-client.c82 fatal_f("sshbuf_new failed"); in helper_by_key()
110 fatal_f("sshbuf_new failed"); in helper_add_key()
127 fatal_f("inconsistent helper"); in helper_terminate()
141 fatal_f("helper recorded more than once"); in helper_terminate()
246 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_sign()
297 fatal_f("no helper for %s key", sshkey_type(priv)); in pkcs11_make_cert()
337 fatal_f("too many helpers"); in pkcs11_start_helper()
400 fatal_f("sshbuf_new failed"); in pkcs11_add_provider()
470 fatal_f("no helper for %s key", sshkey_type(key)); in pkcs11_key_free()
472 fatal_f("sshbuf_new failed"); in pkcs11_key_free()
[all …]
H A Dsandbox-rlimit.c66 fatal_f("setrlimit(RLIMIT_FSIZE, { 0, 0 }): %s", in ssh_sandbox_child()
71 fatal_f("setrlimit(RLIMIT_NOFILE, { 0, 0 }): %s", in ssh_sandbox_child()
76 fatal_f("setrlimit(RLIMIT_NPROC, { 0, 0 }): %s", in ssh_sandbox_child()
H A Dsrclimit.c110 fatal_f("invalid max_sources"); /* shouldn't happen */ in srclimit_init()
122 fatal_f("invalid number of sockets: %d", max); in srclimit_init()
229 fatal_f("internal error: %s penalty table corrupt", t); in expire_penalties_from_tree()
232 fatal_f("internal error: %s npenalties underflow", t); in expire_penalties_from_tree()
322 fatal_f("internal error: %s table corrupt (find)", t); in srclimit_early_expire_penalties_from_tree()
328 fatal_f("internal error: %s table corrupt (remove)", t); in srclimit_early_expire_penalties_from_tree()
398 fatal_f("internal error: unknown penalty %d", penalty_type); in srclimit_penalise()
438 fatal_f("internal error: %s penalty tables corrupt", t); in srclimit_penalise()
453 fatal_f("internal error: %s penalty table corrupt (remove)", t); in srclimit_penalise()
469 fatal_f("internal error: %s penalty table corrupt (insert)", t); in srclimit_penalise()
H A Dauth-pam.c238 fatal_f("waitpid: %s", strerror(errno)); in pthread_join()
289 fatal_f("PAM authctxt not initialized"); in sshpam_password_change_required()
323 fatal_f("invalid PAM account status %u", n); in import_environments()
333 fatal_f("received %u environment variables, expected <= 1024", in import_environments()
348 fatal_f("received %u PAM env variables, expected <= 1024", in import_environments()
462 fatal_f("PAM authctxt user not initialized"); in check_pam_user()
474 fatal_f("internal error: sshpam_initial_user NULL"); in check_pam_user()
523 fatal_f("PAM authctxt not initialized"); in sshpam_thread()
526 fatal_f("sshbuf_new failed"); in sshpam_thread()
565 fatal_f("too many environment strings"); in sshpam_thread()
[all …]
H A Dsandbox-capsicum.c100 fatal_f("failed to limit the network socket"); in ssh_sandbox_child()
104 fatal_f("failed to limit the logging socket"); in ssh_sandbox_child()
106 fatal_f("failed to enter capability mode"); in ssh_sandbox_child()
H A Duidswap.c165 fatal_f("setuid failed: %s", strerror(errno)); in restore_uid()
167 fatal_f("setgid failed: %s", strerror(errno)); in restore_uid()
214 fatal_f("was able to restore old [e]gid"); in permanently_set_uid()
228 fatal_f("was able to restore old [e]uid"); in permanently_set_uid()
H A Dssh-pkcs11-helper.c70 fatal_f("provider already set"); in process_add()
72 fatal_f("sshbuf_new failed"); in process_add()
134 fatal_f("sshbuf_new failed"); in process_sign()
251 fatal_f("sshbuf_new failed"); in main()
253 fatal_f("sshbuf_new failed"); in main()
H A Dreadpass.c74 fatal_f("dup2: %s", strerror(errno)); in ssh_askpass()
78 fatal_f("exec(%s): %s", askpass, strerror(errno)); in ssh_askpass()
277 fatal_f("stdfd_devnull failed"); in notify_start()
289 fatal_f("calloc failed"); in notify_start()
327 fatal_f("waitpid: %s", strerror(errno)); in notify_complete()
H A Dssh-keygen.c333 fatal_f("sshbuf_new failed"); in do_convert_to_ssh2()
337 fatal_f("sshbuf_dtob64_string failed"); in do_convert_to_ssh2()
371 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pkcs8()
392 fatal_f("unsupported key type %s", sshkey_type(k)); in do_convert_to_pem()
420 fatal_f("unknown key format %d", convert_format); in do_convert_to()
438 fatal_f("input buffer too small: need %d have %zu", in buffer_get_bignum_bits()
441 fatal_f("BN_bin2bn failed"); in buffer_get_bignum_bits()
513 fatal_f("BN_new"); in do_convert_private_ssh2()
524 fatal_f("BN_new"); in do_convert_private_ssh2()
535 fatal_f("EVP_PKEY_new failed"); in do_convert_private_ssh2()
[all …]
H A Dauth2.c237 fatal_f("ssh_digest_memory"); in user_specific_delay()
499 fatal_f("sshbuf_new failed"); in authmethods_get()
514 fatal_f("sshbuf_dup_string failed"); in authmethods_get()
525 fatal_f("NULL authentication method name"); in authmethod_byname()
681 fatal_f("method not in AuthenticationMethods"); in auth2_update_methods_lists()
709 fatal_f("vasprintf failed"); in auth2_record_info()
738 fatal_f("reallocarray failed"); in auth2_record_key()
778 fatal_f("sshbuf_new"); in auth2_update_session_info()
798 fatal_f("auth_method_info contains \\n"); in auth2_update_session_info()
H A Dsftp-client.c228 fatal_f("sshbuf_new failed"); in send_string_request()
246 fatal_f("sshbuf_new failed"); in send_string_attrs_request()
267 fatal_f("sshbuf_new failed"); in get_status()
306 fatal_f("sshbuf_new failed"); in get_handle()
345 fatal_f("sshbuf_new failed"); in get_decode_stat()
395 fatal_f("sshbuf_new failed"); in get_decode_statvfs()
464 fatal_f("sshbuf_new failed"); in sftp_init()
556 fatal_f("limits failed"); in sftp_init()
619 fatal_f("sshbuf_new failed"); in sftp_get_limits()
667 fatal_f("sshbuf_new failed"); in sftp_close()
[all …]
H A Dsshd-session.c274 fatal_f("sshbuf_new failed"); in pack_hostkeys()
367 fatal_f("exec of %s failed: %s", in privsep_preauth()
538 fatal_f("sshbuf_new"); in notify_hostkeys()
568 fatal_f("no hostkeys"); in notify_hostkeys()
598 fatal_f("too many hostkeys"); in parse_hostkeys()
654 fatal_f("sshbuf_new failed"); in recv_rexec_state()
658 fatal_f("ssh_msg_recv failed"); in recv_rexec_state()
662 fatal_f("rexec version mismatch"); in recv_rexec_state()
674 fatal_f("sshbuf_new failed"); in recv_rexec_state()
685 fatal_f("ssh_msg_recv failed"); in recv_rexec_state()
[all …]
H A Dauth2-hostbased.c129 fatal_f("sshbuf_new failed"); in userauth_hostbased()
219 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed()
247 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed()
255 fatal_f("sshkey_fingerprint fail"); in hostbased_key_allowed()
H A Dauth2-pubkey.c115 fatal_f("internal error: initial hostkey not recorded"); in userauth_pubkey()
117 fatal_f("%s packet contained wrong host key", method); in userauth_pubkey()
127 fatal_f("sshbuf_from failed"); in userauth_pubkey()
129 fatal_f("sshbuf_dtob64 failed"); in userauth_pubkey()
190 fatal_f("sshbuf_new failed"); in userauth_pubkey()
339 fatal_f("too many glob results for \"%s\"", file); in match_principals_file()
466 fatal_f("percent_expand failed"); in match_principals_command()
561 fatal_f("internal error: missing principals_opts"); in user_cert_trusted_ca()
728 fatal_f("percent_expand failed"); in user_key_command_allowed2()
834 fatal_f("too many glob results for \"%s\"", file); in user_key_allowed()
H A Dsshd-auth.c186 fatal_f("ssh_sandbox_init failed"); in privsep_child_demote()
212 fatal_f("pledge()"); in privsep_child_demote()
240 fatal_f("sshbuf_new failed"); in list_hostkey_types()
279 fatal_f("sshbuf_dup_string failed"); in list_hostkey_types()
387 fatal_f("too many hostkeys"); in parse_hostkeys()
783 fatal_f("privkey sign failed"); in sshd_hostkey_sign()
788 fatal_f("pubkey sign failed"); in sshd_hostkey_sign()
H A Dclientloop.c546 fatal_f("internal error: fuzz %u%% %lldns > interval %lldns", in set_next_interval()
694 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in client_wait_until_can_do_something()
902 fatal_f("last_gc->ref_count = %d", in client_register_global_confirm()
960 fatal_f("pledge(): %s", strerror(errno)); in client_repledge()
965 fatal_f("pledge(): %s", strerror(errno)); in client_repledge()
969 fatal_f("pledge(): %s", strerror(errno)); in client_repledge()
1472 fatal_f("pledge(): %s", strerror(errno)); in client_loop()
1478 fatal_f("pledge(): %s", strerror(errno)); in client_loop()
1484 fatal_f("pledge(): %s", strerror(errno)); in client_loop()
1490 fatal_f("pledge(): %s", strerror(errno)); in client_loop()
[all …]
H A Dssh-agent.c326 fatal_f("fingerprint failed"); in dump_dest_constraint_hop()
384 fatal_f("fingerprint failed"); in match_key_hop()
394 fatal_f("fingerprint failed"); in match_key_hop()
511 fatal_f("internal error: no bound key"); in identity_permitted()
517 fatal_f("fingerprint failed"); in identity_permitted()
520 fatal_f("fingerprint failed"); in identity_permitted()
648 fatal_f("sshbuf_new failed"); in process_request_identities()
652 fatal_f("fingerprint failed"); in process_request_identities()
722 fatal_f("sshbuf_fromb"); in parse_userauth_request()
796 fatal_f("sshbuf_fromb"); in parse_sshsig_request()
[all …]
H A Dsshd.c258 fatal_f("error: accepted connection when all %d child " in child_register()
264 fatal_f("sshbuf_fromb failed"); in child_register()
283 fatal_f("internal error: more children than max_startups"); in child_register()
295 fatal_f("internal error: children_active underflow"); in child_finish()
685 fatal_f("sshbuf_new failed"); in pack_hostkeys()
723 fatal_f("bad length %zu", len); in pack_hostkeys()
743 fatal_f("sshbuf_new failed"); in pack_config()
761 fatal_f("bad length %zu", len); in pack_config()
804 fatal_f("fork failed: %s", strerror(errno)); in send_rexec_state()
1300 fatal_f("ssh_digest_start"); in accumulate_host_timing_secret()
[all …]
H A Dsshconnect2.c180 fatal_f("unknown alg %s", alg); in order_hostkeyalgs()
454 fatal_f("internal error: cannot send userauth none request"); in ssh_userauth2()
565 fatal_f("bad message during authentication: type %d", type); in input_userauth_error()
594 fatal_f("no authentication context"); in input_userauth_success()
613 fatal_f("no authentication context");
860 fatal_f("sshbuf_new failed"); in process_gssapi_token()
866 fatal_f("sshbuf_mutable_ptr failed"); in process_gssapi_token()
1253 fatal_f("fingerprint failed"); in identity_sign()
1406 fatal_f("sshbuf_new failed"); in sign_and_send_pubkey()
1427 fatal_f("internal error: initial hostkey " in sign_and_send_pubkey()
[all …]
H A Dserverloop.c170 fatal_f("bad npfd %u", *npfd_activep); /* shouldn't happen */ in wait_until_can_do_something()
232 fatal_f("ppoll: %.100s", strerror(errno)); in wait_until_can_do_something()
475 fatal_f("no/invalid user"); in server_request_direct_streamlocal()
682 fatal_f("sshbuf_new"); in server_input_hostkeys_prove()
767 fatal_f("no/invalid user"); in server_input_global_request()
797 fatal_f("sshbuf_new"); in server_input_global_request()
889 fatal_f("channel %d: no remote_id", c->self); in server_input_channel_req()
H A Dmisc.c1200 fatal_f("argument too long"); in addargs()
1207 fatal_f("too many arguments"); in addargs()
1209 fatal_f("arglist corrupt"); in addargs()
1231 fatal_f("argument too long"); in replacearg()
1233 fatal_f("arglist corrupt"); in replacearg()
1236 fatal_f("tried to replace invalid arg %d >= %d", in replacearg()
1363 fatal_f("sshbuf_new failed"); in vdollar_percent_expand()
1365 fatal_f("null parseerror arg"); in vdollar_percent_expand()
1376 fatal_f("NULL replacement for token %s", in vdollar_percent_expand()
1381 fatal_f("too many keys"); in vdollar_percent_expand()
[all …]

123