Searched refs:packet_disconnect (Results 1 - 16 of 16) sorted by relevance
/freebsd-10.0-release/crypto/openssh/ |
H A D | sshconnect1.c | 107 packet_disconnect("Protocol error during RSA authentication: %d", 147 packet_disconnect("Protocol error waiting RSA auth response: %d", 170 packet_disconnect( 177 packet_disconnect( 239 packet_disconnect("Protocol error during RSA authentication: %d", type); 316 packet_disconnect("Protocol error waiting RSA auth response: %d", type); 353 packet_disconnect("Protocol error during RSA authentication: %d", type); 376 packet_disconnect("Protocol error waiting RSA auth response: %d", type); 404 packet_disconnect("Protocol error: got %d in response " 436 packet_disconnect("Protoco [all...] |
H A D | packet.h | 78 void packet_disconnect(const char *fmt,...) __attribute__((noreturn)) __attribute__((format(printf, 1, 2))); 117 packet_disconnect("Packet integrity error."); \
|
H A D | dispatch.c | 100 packet_disconnect("protocol error: rcvd type %d", type);
|
H A D | auth2.c | 214 packet_disconnect("bad service request %s", service); 273 packet_disconnect("no authentication methods enabled"); 276 packet_disconnect("Change of username or service not allowed: " 289 packet_disconnect("Sorry, you are not allowed to connect."); 294 packet_disconnect("Logins not available right now."); 404 packet_disconnect(AUTH_FAIL_MSG, authctxt->user);
|
H A D | kexgexs.c | 103 packet_disconnect("Protocol error: no matching DH grp found"); 140 packet_disconnect("bad client public DH value");
|
H A D | auth1.c | 348 packet_disconnect("%s", msg); 366 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); 426 packet_disconnect("Cannot change user when server not running as root.");
|
H A D | kexdhc.c | 114 packet_disconnect("bad server public DH value");
|
H A D | packet.c | 288 packet_disconnect("Packet corrupt"); 1155 packet_disconnect("Protocol error: expected packet type %d, got %d", 1182 packet_disconnect("Bad packet length %u.", len); 1203 packet_disconnect("crc32 compensation attack: " 1206 packet_disconnect("deattack denial of " 1233 packet_disconnect("packet_read_poll1: len %d != buffer_len %d.", 1239 packet_disconnect("Corrupted check bytes on input."); 1255 packet_disconnect("Invalid ssh1 packet type: %d", type); 1295 packet_disconnect("Packet corrupt"); 1389 /* XXX now it's safe to use fatal/packet_disconnect */ 1672 packet_disconnect(const char *fmt,...) function [all...] |
H A D | kexdhs.c | 104 packet_disconnect("bad client public DH value");
|
H A D | kexgexc.c | 152 packet_disconnect("bad server public DH value");
|
H A D | serverloop.c | 762 packet_disconnect("wait: %.100s", strerror(errno)); 793 packet_disconnect("Command terminated on signal %d.", 797 packet_disconnect("wait returned status %04x.", wait_status); 1048 packet_disconnect("Possible attack: attempt to open a session " 1207 packet_disconnect("server_input_channel_req: "
|
H A D | channels.c | 2373 packet_disconnect("Received data for nonexistent channel %d.", id); 2434 packet_disconnect("Received extended_data for bad channel %d.", id); 2443 packet_disconnect("Received extended_data after EOF " 2478 packet_disconnect("Received ieof for nonexistent channel %d.", id); 2502 packet_disconnect("Received close for nonexistent channel %d.", id); 2539 packet_disconnect("Received oclose for nonexistent channel %d.", id); 2552 packet_disconnect("Received close confirmation for " 2555 packet_disconnect("Received close confirmation for " 2571 packet_disconnect("Received open confirmation for " 2620 packet_disconnect("Receive [all...] |
H A D | ssh.c | 1252 packet_disconnect("Protocol error waiting for " 1293 packet_disconnect("Protocol error waiting for pty " 1317 packet_disconnect("Protocol error waiting for X11 "
|
H A D | session.c | 418 packet_disconnect( 423 packet_disconnect( 2063 packet_disconnect("Protocol error: you already have a pty."); 2467 packet_disconnect("wait returned status %04x.", status);
|
H A D | sshd.c | 534 packet_disconnect("Your ssh version is too old and " 2352 packet_disconnect("Warning: client selects unsupported cipher."); 2358 packet_disconnect("IP Spoofing check bytes do not match.");
|
H A D | ssh_namespace.h | 345 #define packet_disconnect ssh_packet_disconnect macro
|
Completed in 203 milliseconds