Lines Matching full:__func__
387 __func__, ent->type);
427 fatal("%s: authenticated invalid user", __func__);
429 fatal("%s: authentication method name unknown", __func__);
432 __func__, authctxt->user);
510 debug("%s: child log fd closed", __func__);
515 fatal("%s: log fd read: %s", __func__, strerror(errno));
519 fatal("%s: invalid log message length %u", __func__, len);
526 fatal("%s: log fd read: %s", __func__, strerror(errno));
533 __func__, level);
560 fatal("%s: poll: %s", __func__, strerror(errno));
579 debug3("%s: checking request %d", __func__, type);
589 fatal("%s: unpermitted request %d", __func__,
596 debug2("%s: %d used once, disabling now", __func__,
607 fatal("%s: unsupported request: %d", __func__, type);
652 __func__, min, want, max);
656 __func__, min, want, max);
685 debug3("%s", __func__);
695 fatal("%s: data length incorrect: %u", __func__, datlen);
705 fatal("%s: no hostkey from index %d", __func__, keyid);
707 fatal("%s: key_sign failed", __func__);
709 debug3("%s: signature %p(%u)", __func__, signature, siglen);
735 debug3("%s", __func__);
738 fatal("%s: multiple attempts for getpwnam", __func__);
789 debug3("%s: sending MONITOR_ANS_PWNAM: %d", __func__, allowed);
831 __func__, authctxt->service, authctxt->style);
864 debug3("%s: sending result %d", __func__, authenticated);
895 debug3("%s: sending challenge success: %u", __func__, success);
915 fatal("%s: no bsd auth session", __func__);
921 debug3("%s: <%s> = <%d>", __func__, response, authok);
927 debug3("%s: sending authenticated: %d", __func__, authok);
952 debug3("%s: sending challenge success: %u", __func__, success);
976 debug3("%s: sending authenticated: %d", __func__, authok);
990 fatal("UsePAM not set, but ended up in %s anyway", __func__);
1005 fatal("UsePAM not set, but ended up in %s anyway", __func__);
1024 debug3("%s", __func__);
1046 debug3("%s", __func__);
1081 debug3("%s", __func__);
1108 debug3("%s", __func__);
1127 debug3("%s entering", __func__);
1138 fatal("%s: key type and protocol mismatch", __func__);
1140 debug3("%s: key_from_blob: %p", __func__, key);
1167 fatal("%s: unknown key type %d", __func__, type);
1193 __func__, key, allowed ? "allowed" : "not allowed");
1334 fatal("%s: bad key, not previously allowed", __func__);
1338 fatal("%s: bad public key blob", __func__);
1353 fatal("%s: bad signature data blob", __func__);
1357 __func__, key, (verified == 1) ? "verified" : "unverified");
1403 debug3("%s: session %d pid %ld", __func__, s->self, (long)s->pid);
1405 debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ptyfd);
1418 debug3("%s entering", __func__);
1437 fatal("%s: dup2", __func__);
1452 fatal("%s: send fds failed", __func__);
1456 fatal("%s: open(/dev/null): %s", __func__, strerror(errno));
1458 error("%s: fd0 %d != 0", __func__, fd0);
1466 debug3("%s: tty %s ptyfd %d", __func__, s->tty, s->ttyfd);
1484 debug3("%s entering", __func__);
1504 fatal("%s: BN_new", __func__);
1529 debug3("%s entering", __func__);
1532 fatal("%s: bad ssh1 session id", __func__);
1551 debug3("%s entering", __func__);
1556 fatal("%s: BN_new", __func__);
1571 fatal("%s: key_to_blob failed", __func__);
1596 debug3("%s entering", __func__);
1599 fatal("%s: authctxt not valid", __func__);
1602 fatal("%s: bad key, not previously allowed", __func__);
1604 fatal("%s: key type mismatch", __func__);
1606 fatal("%s: received bad key", __func__);
1608 fatal("%s: received bad key type %d", __func__, key->type);
1617 debug3("%s sending reply", __func__);
1635 debug3("%s entering", __func__);
1638 fatal("%s: authctxt not valid", __func__);
1640 fatal("%s: no ssh1_challenge", __func__);
1644 fatal("%s: bad key, not previously allowed", __func__);
1646 fatal("%s: key type mismatch: %d", __func__, key_blobtype);
1648 fatal("%s: received bad key", __func__);
1651 fatal("%s: received bad response to challenge", __func__);
1678 debug3("%s: tearing down sessions", __func__);
1705 debug3("%s entering", __func__);
1731 debug3("%s entering", __func__);
1845 debug3("%s: Waiting for new keys", __func__);
1867 debug3("%s: Waiting for second key", __func__);
1889 debug3("%s: Getting compression state", __func__);
1893 fatal("%s: bad request size", __func__);
1899 fatal("%s: bad request size", __func__);
1904 debug3("%s: Getting Network I/O buffers", __func__);
1926 fatal("%s: mm_zalloc(%u, %u)", __func__, ncount, size);
1964 fatal("%s: socketpair: %s", __func__, strerror(errno));
1972 fatal("%s: pipe: %s", __func__, strerror(errno));
2104 debug3("%s: sending result %d", __func__, authenticated);
2127 __func__, authctxt->jpake_ctx);
2136 JPAKE_DEBUG_CTX((pctx, "step1 done in %s", __func__));
2146 debug3("%s: sending step1", __func__);
2167 fatal("%s: pctx == NULL", __func__);
2176 debug3("%s: sending pwdata", __func__);
2197 fatal("%s: pctx == NULL", __func__);
2201 fatal("%s: BN_new", __func__);
2217 JPAKE_DEBUG_CTX((pctx, "step2 done in %s", __func__));
2229 debug3("%s: sending step2", __func__);
2248 fatal("%s: pctx == NULL", __func__);
2251 fatal("%s: BN_new", __func__);
2264 JPAKE_DEBUG_CTX((pctx, "key_confirm done in %s", __func__));
2272 debug3("%s: sending confirmation hash", __func__);
2289 fatal("%s: pctx == NULL", __func__);
2298 JPAKE_DEBUG_CTX((pctx, "check_confirm done in %s", __func__));
2306 debug3("%s: sending result %d", __func__, authenticated);