Searched refs:packet_disconnect (Results 1 – 15 of 15) sorted by relevance
/external/openssh/ |
D | sshconnect1.c | 107 packet_disconnect("Protocol error during RSA authentication: %d", in try_agent_authentication() 147 packet_disconnect("Protocol error waiting RSA auth response: %d", in try_agent_authentication() 170 packet_disconnect( in respond_to_rsa_challenge() 177 packet_disconnect( in respond_to_rsa_challenge() 239 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rsa_authentication() 316 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rsa_authentication() 353 packet_disconnect("Protocol error during RSA authentication: %d", type); in try_rhosts_rsa_authentication() 376 packet_disconnect("Protocol error waiting RSA auth response: %d", type); in try_rhosts_rsa_authentication() 404 packet_disconnect("Protocol error: got %d in response " in try_challenge_response_authentication() 436 packet_disconnect("Protocol error: got %d in response " in try_challenge_response_authentication() [all …]
|
D | packet.h | 75 void packet_disconnect(const char *fmt,...) __attribute__((format(printf, 1, 2))); 114 packet_disconnect("Packet integrity error."); \
|
D | auth1.c | 359 packet_disconnect("%s", msg); in do_authloop() 379 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in do_authloop() 434 packet_disconnect("Cannot change user when server not running as root."); in do_authentication()
|
D | auth2.c | 207 packet_disconnect("bad service request %s", service); in input_service_request() 260 packet_disconnect("Change of username or service not allowed: " in input_userauth_request() 357 packet_disconnect(AUTH_FAIL_MSG, authctxt->user); in userauth_finish()
|
D | kexgexs.c | 107 packet_disconnect("Protocol error: no matching DH grp found"); in kexgex_server() 144 packet_disconnect("bad client public DH value"); in kexgex_server()
|
D | packet.c | 279 packet_disconnect("Packet corrupt"); in packet_start_discard() 1130 packet_disconnect("Protocol error: expected packet type %d, got %d", in packet_read_expect() 1157 packet_disconnect("Bad packet length %u.", len); in packet_read_poll1() 1178 packet_disconnect("crc32 compensation attack: " in packet_read_poll1() 1181 packet_disconnect("deattack denial of " in packet_read_poll1() 1208 packet_disconnect("packet_read_poll1: len %d != buffer_len %d.", in packet_read_poll1() 1214 packet_disconnect("Corrupted check bytes on input."); in packet_read_poll1() 1230 packet_disconnect("Invalid ssh1 packet type: %d", type); in packet_read_poll1() 1344 packet_disconnect("Corrupted padlen %d on input.", padlen); in packet_read_poll2() 1369 packet_disconnect("Invalid ssh2 packet type: %d", type); in packet_read_poll2() [all …]
|
D | serverloop.c | 757 packet_disconnect("wait: %.100s", strerror(errno)); in server_loop() 788 packet_disconnect("Command terminated on signal %d.", in server_loop() 792 packet_disconnect("wait returned status %04x.", wait_status); in server_loop() 1025 packet_disconnect("Possible attack: attempt to open a session " in server_request_session() 1182 packet_disconnect("server_input_channel_req: " in server_input_channel_req()
|
D | dispatch.c | 100 packet_disconnect("protocol error: rcvd type %d", type); in dispatch_run()
|
D | channels.c | 2272 packet_disconnect("Received data for nonexistent channel %d.", id); 2333 packet_disconnect("Received extended_data for bad channel %d.", id); 2342 packet_disconnect("Received extended_data after EOF " 2377 packet_disconnect("Received ieof for nonexistent channel %d.", id); 2401 packet_disconnect("Received close for nonexistent channel %d.", id); 2438 packet_disconnect("Received oclose for nonexistent channel %d.", id); 2451 packet_disconnect("Received close confirmation for " 2454 packet_disconnect("Received close confirmation for " 2470 packet_disconnect("Received open confirmation for " 2519 packet_disconnect("Received open failure for " [all …]
|
D | kexdhc.c | 114 packet_disconnect("bad server public DH value"); in kexdh_client()
|
D | kexdhs.c | 107 packet_disconnect("bad client public DH value"); in kexdh_server()
|
D | kexgexc.c | 152 packet_disconnect("bad server public DH value"); in kexgex_client()
|
D | ssh.c | 1186 packet_disconnect("Protocol error waiting for " in ssh_session() 1227 packet_disconnect("Protocol error waiting for pty " in ssh_session() 1251 packet_disconnect("Protocol error waiting for X11 " in ssh_session()
|
D | session.c | 410 packet_disconnect( in do_authenticated1() 415 packet_disconnect( in do_authenticated1() 2029 packet_disconnect("Protocol error: you already have a pty."); in session_pty_req() 2438 packet_disconnect("wait returned status %04x.", status); in session_exit_message()
|
D | sshd.c | 503 packet_disconnect("Your ssh version is too old and " in sshd_exchange_identification() 2201 packet_disconnect("Warning: client selects unsupported cipher."); 2207 packet_disconnect("IP Spoofing check bytes do not match.");
|