• Home
  • History
  • Annotate
  • Raw
  • Download

Lines Matching refs:fatal

372 				fatal("AuthenticationMethods is not supported"  in monitor_child_preauth()
386 fatal("%s: unexpected authentication from %d", in monitor_child_preauth()
413 fatal("%s: authenticated invalid user", __func__); in monitor_child_preauth()
415 fatal("%s: authentication method name unknown", __func__); in monitor_child_preauth()
494 fatal("%s: mm_zalloc(%u, %u)", __func__, ncount, size); in mm_zalloc()
527 fatal("%s: log fd read: %s", __func__, strerror(errno)); in monitor_read_log()
531 fatal("%s: invalid log message length %u", __func__, len); in monitor_read_log()
538 fatal("%s: log fd read: %s", __func__, strerror(errno)); in monitor_read_log()
544 fatal("%s: invalid log level %u (corrupted message?)", in monitor_read_log()
572 fatal("%s: poll: %s", __func__, strerror(errno)); in monitor_read()
601 fatal("%s: unpermitted request %d", __func__, in monitor_read()
619 fatal("%s: unsupported request: %d", __func__, type); in monitor_read()
665 fatal("%s: bad parameters: %d %d %d", in mm_answer_moduli()
704 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in mm_answer_sign()
723 fatal("%s: bad data length: %zu", __func__, datlen); in mm_answer_sign()
725 fatal("%s: no hostkey for index %d", __func__, keyid); in mm_answer_sign()
727 fatal("%s: sshbuf_new", __func__); in mm_answer_sign()
732 fatal("%s: couldn't prepare private key " in mm_answer_sign()
736 fatal("%s: bad data length: %zu, hostkey proof len %zu", in mm_answer_sign()
752 fatal("%s: sshkey_sign failed: %s", in mm_answer_sign()
758 fatal("%s: ssh_agent_sign failed: %s", in mm_answer_sign()
762 fatal("%s: no hostkey from index %d", __func__, keyid); in mm_answer_sign()
769 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in mm_answer_sign()
795 fatal("%s: multiple attempts for getpwnam", __func__); in mm_answer_pwnamallow()
980 fatal("%s: no bsd auth session", __func__); in mm_answer_bsdauthrespond()
1059 fatal("UsePAM not set, but ended up in %s anyway", __func__); in mm_answer_pam_start()
1074 fatal("UsePAM not set, but ended up in %s anyway", __func__); in mm_answer_pam_account()
1208 fatal("%s: key type and protocol mismatch", __func__); in mm_answer_keyallowed()
1216 fatal("%s: passed a SSH_BUG_RSASIGMD5 key", __func__); in mm_answer_keyallowed()
1255 fatal("%s: unknown key type %d", __func__, type); in mm_answer_keyallowed()
1430 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_keyverify()
1434 fatal("%s: bad public key blob", __func__); in mm_answer_keyverify()
1449 fatal("%s: bad signature data blob", __func__); in mm_answer_keyverify()
1538 fatal("%s: dup2", __func__); in mm_answer_pty()
1553 fatal("%s: send fds failed", __func__); in mm_answer_pty()
1557 fatal("%s: open(/dev/null): %s", __func__, strerror(errno)); in mm_answer_pty()
1606 fatal("%s: BN_new", __func__); in mm_answer_sesskey()
1634 fatal("%s: bad ssh1 session id", __func__); in mm_answer_sessid()
1658 fatal("%s: BN_new", __func__); in mm_answer_rsa_keyallowed()
1673 fatal("%s: key_to_blob failed", __func__); in mm_answer_rsa_keyallowed()
1701 fatal("%s: authctxt not valid", __func__); in mm_answer_rsa_challenge()
1704 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_rsa_challenge()
1706 fatal("%s: key type mismatch", __func__); in mm_answer_rsa_challenge()
1708 fatal("%s: received bad key", __func__); in mm_answer_rsa_challenge()
1710 fatal("%s: received bad key type %d", __func__, key->type); in mm_answer_rsa_challenge()
1740 fatal("%s: authctxt not valid", __func__); in mm_answer_rsa_response()
1742 fatal("%s: no ssh1_challenge", __func__); in mm_answer_rsa_response()
1746 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_rsa_response()
1748 fatal("%s: key type mismatch: %d", __func__, key_blobtype); in mm_answer_rsa_response()
1750 fatal("%s: received bad key", __func__); in mm_answer_rsa_response()
1753 fatal("%s: received bad response to challenge", __func__); in mm_answer_rsa_response()
1822 fatal("Audit event type %d not permitted", event); in mm_answer_audit_event()
1852 fatal("%s: packet_set_state: %s", __func__, ssh_err(r)); in monitor_apply_keystate()
1890 fatal("%s: sshbuf_new failed", __func__); in mm_get_keystate()
1901 fatal("fcntl(%d, F_SETFD)", x); \
1910 fatal("%s: socketpair: %s", __func__, strerror(errno)); in monitor_openfds()
1918 fatal("%s: pipe: %s", __func__, strerror(errno)); in monitor_openfds()