Lines Matching refs:__func__
377 debug3("%s: method %s: partial", __func__, in monitor_child_preauth()
387 __func__, ent->type); in monitor_child_preauth()
413 fatal("%s: authenticated invalid user", __func__); in monitor_child_preauth()
415 fatal("%s: authentication method name unknown", __func__); in monitor_child_preauth()
418 __func__, authctxt->user); in monitor_child_preauth()
494 fatal("%s: mm_zalloc(%u, %u)", __func__, ncount, size); in mm_zalloc()
522 debug("%s: child log fd closed", __func__); in monitor_read_log()
527 fatal("%s: log fd read: %s", __func__, strerror(errno)); in monitor_read_log()
531 fatal("%s: invalid log message length %u", __func__, len); in monitor_read_log()
538 fatal("%s: log fd read: %s", __func__, strerror(errno)); in monitor_read_log()
545 __func__, level); in monitor_read_log()
572 fatal("%s: poll: %s", __func__, strerror(errno)); in monitor_read()
591 debug3("%s: checking request %d", __func__, type); in monitor_read()
601 fatal("%s: unpermitted request %d", __func__, in monitor_read()
608 debug2("%s: %d used once, disabling now", __func__, in monitor_read()
619 fatal("%s: unsupported request: %d", __func__, type); in monitor_read()
662 __func__, min, want, max); in mm_answer_moduli()
666 __func__, min, want, max); in mm_answer_moduli()
700 debug3("%s", __func__); in mm_answer_sign()
704 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in mm_answer_sign()
723 fatal("%s: bad data length: %zu", __func__, datlen); in mm_answer_sign()
725 fatal("%s: no hostkey for index %d", __func__, keyid); in mm_answer_sign()
727 fatal("%s: sshbuf_new", __func__); in mm_answer_sign()
733 "proof buffer: %s", __func__, ssh_err(r)); in mm_answer_sign()
737 __func__, datlen, sshbuf_len(sigbuf)); in mm_answer_sign()
753 __func__, ssh_err(r)); in mm_answer_sign()
759 __func__, ssh_err(r)); in mm_answer_sign()
762 fatal("%s: no hostkey from index %d", __func__, keyid); in mm_answer_sign()
764 debug3("%s: %s signature %p(%zu)", __func__, in mm_answer_sign()
769 fatal("%s: buffer error: %s", __func__, ssh_err(r)); in mm_answer_sign()
792 debug3("%s", __func__); in mm_answer_pwnamallow()
795 fatal("%s: multiple attempts for getpwnam", __func__); in mm_answer_pwnamallow()
853 debug("%s: no valid authentication method lists", __func__); in mm_answer_pwnamallow()
856 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed); in mm_answer_pwnamallow()
896 __func__, authctxt->service, authctxt->style); in mm_answer_authserv()
929 debug3("%s: sending result %d", __func__, authenticated); in mm_answer_authpassword()
960 debug3("%s: sending challenge success: %u", __func__, success); in mm_answer_bsdauthquery()
980 fatal("%s: no bsd auth session", __func__); in mm_answer_bsdauthrespond()
986 debug3("%s: <%s> = <%d>", __func__, response, authok); in mm_answer_bsdauthrespond()
992 debug3("%s: sending authenticated: %d", __func__, authok); in mm_answer_bsdauthrespond()
1021 debug3("%s: sending challenge success: %u", __func__, success); in mm_answer_skeyquery()
1045 debug3("%s: sending authenticated: %d", __func__, authok); in mm_answer_skeyrespond()
1059 fatal("UsePAM not set, but ended up in %s anyway", __func__); in mm_answer_pam_start()
1074 fatal("UsePAM not set, but ended up in %s anyway", __func__); in mm_answer_pam_account()
1092 debug3("%s", __func__); in mm_answer_pam_init_ctx()
1113 debug3("%s", __func__); in mm_answer_pam_query()
1147 debug3("%s", __func__); in mm_answer_pam_respond()
1176 debug3("%s", __func__); in mm_answer_pam_free_ctx()
1197 debug3("%s entering", __func__); in mm_answer_keyallowed()
1209 fatal("%s: key type and protocol mismatch", __func__); in mm_answer_keyallowed()
1211 debug3("%s: key_from_blob: %p", __func__, key); in mm_answer_keyallowed()
1217 fatal("%s: passed a SSH_BUG_RSASIGMD5 key", __func__); in mm_answer_keyallowed()
1256 fatal("%s: unknown key type %d", __func__, type); in mm_answer_keyallowed()
1282 __func__, key, allowed ? "allowed" : "not allowed"); in mm_answer_keyallowed()
1431 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_keyverify()
1435 fatal("%s: bad public key blob", __func__); in mm_answer_keyverify()
1450 fatal("%s: bad signature data blob", __func__); in mm_answer_keyverify()
1454 __func__, key, (verified == 1) ? "verified" : "unverified"); in mm_answer_keyverify()
1508 debug3("%s: session %d pid %ld", __func__, s->self, (long)s->pid); in mm_session_close()
1510 debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ptyfd); in mm_session_close()
1523 debug3("%s entering", __func__); in mm_answer_pty()
1542 fatal("%s: dup2", __func__); in mm_answer_pty()
1557 fatal("%s: send fds failed", __func__); in mm_answer_pty()
1561 fatal("%s: open(/dev/null): %s", __func__, strerror(errno)); in mm_answer_pty()
1563 error("%s: fd0 %d != 0", __func__, fd0); in mm_answer_pty()
1571 debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ttyfd); in mm_answer_pty()
1589 debug3("%s entering", __func__); in mm_answer_pty_cleanup()
1610 fatal("%s: BN_new", __func__); in mm_answer_sesskey()
1635 debug3("%s entering", __func__); in mm_answer_sessid()
1638 fatal("%s: bad ssh1 session id", __func__); in mm_answer_sessid()
1657 debug3("%s entering", __func__); in mm_answer_rsa_keyallowed()
1662 fatal("%s: BN_new", __func__); in mm_answer_rsa_keyallowed()
1677 fatal("%s: key_to_blob failed", __func__); in mm_answer_rsa_keyallowed()
1702 debug3("%s entering", __func__); in mm_answer_rsa_challenge()
1705 fatal("%s: authctxt not valid", __func__); in mm_answer_rsa_challenge()
1708 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_rsa_challenge()
1710 fatal("%s: key type mismatch", __func__); in mm_answer_rsa_challenge()
1712 fatal("%s: received bad key", __func__); in mm_answer_rsa_challenge()
1714 fatal("%s: received bad key type %d", __func__, key->type); in mm_answer_rsa_challenge()
1723 debug3("%s sending reply", __func__); in mm_answer_rsa_challenge()
1741 debug3("%s entering", __func__); in mm_answer_rsa_response()
1744 fatal("%s: authctxt not valid", __func__); in mm_answer_rsa_response()
1746 fatal("%s: no ssh1_challenge", __func__); in mm_answer_rsa_response()
1750 fatal("%s: bad key, not previously allowed", __func__); in mm_answer_rsa_response()
1752 fatal("%s: key type mismatch: %d", __func__, key_blobtype); in mm_answer_rsa_response()
1754 fatal("%s: received bad key", __func__); in mm_answer_rsa_response()
1757 fatal("%s: received bad response to challenge", __func__); in mm_answer_rsa_response()
1785 debug3("%s: tearing down sessions", __func__); in mm_answer_term()
1812 debug3("%s entering", __func__); in mm_answer_audit_event()
1838 debug3("%s entering", __func__); in mm_answer_audit_command()
1854 debug3("%s: packet_set_state", __func__); in monitor_apply_keystate()
1856 fatal("%s: packet_set_state: %s", __func__, ssh_err(r)); in monitor_apply_keystate()
1891 debug3("%s: Waiting for new keys", __func__); in mm_get_keystate()
1894 fatal("%s: sshbuf_new failed", __func__); in mm_get_keystate()
1897 debug3("%s: GOT new keys", __func__); in mm_get_keystate()
1914 fatal("%s: socketpair: %s", __func__, strerror(errno)); in monitor_openfds()
1922 fatal("%s: pipe: %s", __func__, strerror(errno)); in monitor_openfds()
2057 debug3("%s: sending result %d", __func__, authenticated); in mm_answer_gss_userok()