| /dflybsd-src/contrib/libpcap/ |
| H A D | savefile.c | 109 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setnonblock() 117 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats() 126 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats_ex() 134 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setbuff() 142 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmode() 150 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmintocopy() 158 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in sf_getevent() 167 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_get_request() 176 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_set_request() 184 pcap_strlcpy(p->errbuf, "Sending packets isn't supported on savefiles", in sf_sendqueue_transmit() [all …]
|
| H A D | sf-pcapng.c | 258 char *errbuf) in read_bytes() argument 265 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 270 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 280 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) in read_block() argument 291 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf); in read_block() 306 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 320 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 337 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length, in read_block() 343 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in read_block() 356 if (read_bytes(fp, bdata, data_remaining, 1, errbuf) == -1) in read_block() [all …]
|
| H A D | pcap-bpf.c | 110 static int bpf_load(char *errbuf); 371 pcap_fmt_errmsg_for_errno(p->errbuf, in pcap_next_zbuf() 399 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 418 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 477 bpf_open(char *errbuf) in bpf_open() argument 491 if (bpf_load(errbuf) == PCAP_ERROR) in bpf_open() 510 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 559 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 568 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 580 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() [all …]
|
| H A D | pcap.c | 169 internal_wsockinit(char *errbuf) in internal_wsockinit() argument 188 if (errbuf != NULL) { in internal_wsockinit() 189 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in internal_wsockinit() 244 pcap_init(unsigned int opts, char *errbuf) in pcap_init() argument 260 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 271 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 280 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified"); in pcap_init() 304 if (internal_wsockinit(errbuf) == -1) { in pcap_init() 336 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() 341 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() [all …]
|
| H A D | sf-pcap.c | 153 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, in pcap_check_header() argument 194 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 197 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 218 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 232 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 243 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf); in pcap_check_header() 303 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 406 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in pcap_check_header() 427 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in grow_buffer() 459 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_packet() [all …]
|
| H A D | sslutils.c | 62 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen) in ssl_init_once() argument 78 …snprintf(errbuf, errbuflen, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), … in ssl_init_once() 89 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once() 96 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once() 106 snprintf(errbuf, errbuflen, "Cannot read CA list from %s", ssl_rootfile); in ssl_init_once() 119 snprintf(errbuf, errbuflen, "Cannot init random"); in ssl_init_once() 136 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen) in ssl_promotion() argument 138 if (ssl_init_once(is_server, 1, errbuf, errbuflen) < 0) { in ssl_promotion() 147 snprintf(errbuf, errbuflen, "SSL_accept(): %s", in ssl_promotion() 153 snprintf(errbuf, errbuflen, "SSL_connect(): %s", in ssl_promotion() [all …]
|
| H A D | pcap-airpcap.c | 328 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_set_datalink() 383 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats() 429 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats_ex() 455 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setbuff() 468 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmode() 482 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmintocopy() 502 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_get_request() 511 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_set_request() 519 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_sendqueue_transmit() 531 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setuserbuffer() [all …]
|
| H A D | fmtutils.c | 269 pcap_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, in pcap_fmt_errmsg_for_errno() argument 278 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_errno() 280 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_errno() 290 p = errbuf + msglen; in pcap_fmt_errmsg_for_errno() 328 utf_8_to_acp_truncated(errbuf); in pcap_fmt_errmsg_for_errno() 377 pcap_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, in pcap_fmt_errmsg_for_win32_err() argument 389 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_win32_err() 391 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_win32_err() 401 p = errbuf + msglen; in pcap_fmt_errmsg_for_win32_err() 445 utf_8_len = p - errbuf; in pcap_fmt_errmsg_for_win32_err() [all …]
|
| H A D | charconv.c | 156 utf_8_to_acp_truncated(char *errbuf) in utf_8_to_acp_truncated() argument 175 utf_16_errbuf = cp_to_utf_16le(CP_UTF8, errbuf, 0); in utf_8_to_acp_truncated() 180 snprintf(errbuf, PCAP_ERRBUF_SIZE, in utf_8_to_acp_truncated() 202 errbuf, PCAP_ERRBUF_SIZE, NULL, NULL); in utf_8_to_acp_truncated() 207 snprintf(errbuf, PCAP_ERRBUF_SIZE, in utf_8_to_acp_truncated() 210 snprintf(errbuf, PCAP_ERRBUF_SIZE, in utf_8_to_acp_truncated()
|
| H A D | pcap-dpdk.c | 215 static void dpdk_fmt_errmsg_for_rte_errno(char *errbuf, size_t errbuflen, in dpdk_fmt_errmsg_for_rte_errno() argument 224 vsnprintf(errbuf, errbuflen, fmt, ap); in dpdk_fmt_errmsg_for_rte_errno() 226 msglen = strlen(errbuf); in dpdk_fmt_errmsg_for_rte_errno() 236 p = errbuf + msglen; in dpdk_fmt_errmsg_for_rte_errno() 414 pcap_strlcpy(p->errbuf, in pcap_dpdk_inject() 759 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_dpdk_activate() 768 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_dpdk_activate() 777 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_dpdk_activate() 787 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_dpdk_activate() 795 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_dpdk_activate() [all …]
|
| H A D | sslutils.h | 47 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen); 48 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen); 50 int ssl_send(SSL *, char const *buffer, int size, char *errbuf, size_t errbuflen); 51 int ssl_recv(SSL *, char *buffer, int size, char *errbuf, size_t errbuflen);
|
| H A D | pcap-haiku.cpp | 78 snprintf(handle->errbuf, sizeof(handle->errbuf), in pcap_read_haiku() 116 strlcpy(handle->errbuf, "Sending packets isn't supported yet", in pcap_inject_haiku() 133 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, "pcap_stats: %s", in pcap_stats_haiku() 165 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_haiku() 176 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_haiku() 263 get_if_flags(const char *name, bpf_u_int32 *flags, char *errbuf) in get_if_flags() argument
|
| /dflybsd-src/usr.bin/dfregress/ |
| H A D | runlist.c | 114 char errbuf[FILENAME_MAX*2]; in runlist_run_test() local 131 sprintf(errbuf, "could not switch working directory to %s: %s\n", in runlist_run_test() 134 testcase_set_sys_buf(testcase, errbuf); in runlist_run_test() 141 errbuf, sizeof(errbuf), &tr); in runlist_run_test() 143 testcase_set_sys_buf(testcase, errbuf); in runlist_run_test() 172 r = run_simple_cmd(testcase_path, "pre", errbuf, in runlist_run_test() 173 sizeof(errbuf), &tr); in runlist_run_test() 182 r = run_simple_cmd(prepost_path, NULL, errbuf, sizeof(errbuf), in runlist_run_test() 195 testcase_set_sys_buf(testcase, errbuf); in runlist_run_test() 227 0, errbuf, sizeof(errbuf), &tr); in runlist_run_test() [all …]
|
| H A D | userland.c | 69 char *errbuf, size_t errbuf_sz, struct testcase_result *tr) in run_userland() argument 89 if (errbuf) in run_userland() 90 snprintf(errbuf, errbuf_sz, "Could not mkostemp(): " in run_userland() 98 if (errbuf) in run_userland() 99 snprintf(errbuf, errbuf_sz, "Could not mkostemp(): " in run_userland() 107 if (errbuf) in run_userland() 108 snprintf(errbuf, errbuf_sz, "Could not fork to run " in run_userland() 127 if (errbuf) in run_userland() 128 snprintf(errbuf, errbuf_sz, "Could not " in run_userland() 149 if (errbuf) in run_userland() [all …]
|
| /dflybsd-src/usr.bin/wall/ |
| H A D | ttymsg.c | 62 static char errbuf[1024]; in ttymsg() local 76 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 78 return (errbuf); in ttymsg() 88 (void) snprintf(errbuf, sizeof(errbuf), "%s: %s", device, in ttymsg() 90 return (errbuf); in ttymsg() 127 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 130 return (errbuf); in ttymsg() 154 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 156 return (errbuf); in ttymsg()
|
| /dflybsd-src/lib/libkcore/ |
| H A D | kcore.c | 53 const char *corefile, char *errbuf) in kcore_open_int() argument 55 kc->kd = kvm_openfiles(execfile, corefile, NULL, O_RDONLY, errbuf); in kcore_open_int() 64 kcore_wrapper_open(const char *execfile, const char *corefile, char *errbuf) in kcore_wrapper_open() argument 66 return(kcore_open_int(&kcore_global, execfile, corefile, errbuf)); in kcore_wrapper_open() 70 kcore_open(const char *execfile, const char *corefile, char *errbuf) in kcore_open() argument 77 if (kcore_open_int(kc, execfile, corefile, errbuf)) { in kcore_open()
|
| /dflybsd-src/sbin/mount_nfs/ |
| H A D | mount_nfs.c | 593 static char errbuf[256]; in nfs_tryproto() local 607 errbuf[0] = '\0'; in nfs_tryproto() 608 *errstr = errbuf; in nfs_tryproto() 611 snprintf(errbuf, sizeof errbuf, in nfs_tryproto() 617 snprintf(errbuf, sizeof errbuf, "%s: %s", netid, nc_sperror()); in nfs_tryproto() 649 snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", in nfs_tryproto() 661 snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid, in nfs_tryproto() 676 snprintf(errbuf, sizeof errbuf, in nfs_tryproto() 694 snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid, in nfs_tryproto() 706 snprintf(errbuf, sizeof errbuf, "[%s] %s:%s: %s", netid_mnt, in nfs_tryproto() [all …]
|
| /dflybsd-src/usr.sbin/rrenumd/ |
| H A D | parser.y | 64 char errbuf[LINE_MAX]; variable 199 snprintf(errbuf, sizeof(errbuf), 202 yyerror(errbuf); 282 snprintf(errbuf, sizeof(errbuf), 285 yyerror(errbuf); 303 snprintf(errbuf, sizeof(errbuf), 307 yyerror(errbuf); 317 snprintf(errbuf, sizeof(errbuf), 320 yyerror(errbuf);
|
| /dflybsd-src/contrib/tre/lib/ |
| H A D | regerror.c | 58 char * __restrict errbuf, size_t errbuf_size) in tre_regerror() argument 72 if (errbuf_size > 0 && errbuf != NULL) in tre_regerror() 76 strncpy(errbuf, err, errbuf_size - 1); in tre_regerror() 77 errbuf[errbuf_size - 1] = '\0'; in tre_regerror() 81 strcpy(errbuf, err); in tre_regerror()
|
| /dflybsd-src/test/kvm/kvm_file/ |
| H A D | test_kvm_file.c | 51 char *errbuf; in main() local 74 errbuf = malloc(_POSIX2_LINE_MAX); in main() 75 if (errbuf == NULL) in main() 78 kd = kvm_openfiles(file, core, NULL, O_RDONLY, errbuf); in main() 80 errx(2, "%s", errbuf); in main()
|
| /dflybsd-src/contrib/flex/src/ |
| H A D | regex.c | 58 char *errbuf; in flex_regcomp() local 61 errbuf = malloc(errbuf_sz * sizeof(char)); in flex_regcomp() 62 if (!errbuf) in flex_regcomp() 64 n = snprintf(errbuf, errbuf_sz, "regcomp for \"%s\" failed: ", regex); in flex_regcomp() 65 regerror(err, preg, errbuf+n, errbuf_sz-(size_t)n); in flex_regcomp() 67 flexfatal (errbuf); /* never returns - no need to free(errbuf) */ in flex_regcomp()
|
| /dflybsd-src/lib/libtelnet/ |
| H A D | kerberos5.c | 359 char *errbuf; in kerberos5_is() local 361 asprintf(&errbuf, in kerberos5_is() 364 Data(ap, KRB_REJECT, errbuf, -1); in kerberos5_is() 366 printf("%s\r\n", errbuf); in kerberos5_is() 367 free (errbuf); in kerberos5_is() 383 char *errbuf; in kerberos5_is() local 384 asprintf(&errbuf, "Bad checksum: %s", in kerberos5_is() 386 Data(ap, KRB_REJECT, errbuf, -1); in kerberos5_is() 388 printf ("%s\r\n", errbuf); in kerberos5_is() 389 free(errbuf); in kerberos5_is() [all …]
|
| /dflybsd-src/contrib/tcpdump/ |
| H A D | netdissect.c | 48 nd_init(char *errbuf, size_t errbuf_size) in nd_init() argument 61 strlcpy(errbuf, "Attempting to initialize Winsock failed", in nd_init() 79 strlcpy(errbuf, "", errbuf_size); in nd_init() 122 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) in nd_load_smi_module() argument 126 snprintf(errbuf, errbuf_size, "could not load MIB module %s", in nd_load_smi_module() 133 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support", in nd_load_smi_module()
|
| /dflybsd-src/usr.sbin/config/ |
| H A D | config.y | 96 char errbuf[80]; variable 429 snprintf(errbuf, sizeof(errbuf), in connect() 431 yyerror(errbuf); in connect() 440 snprintf(errbuf, sizeof(errbuf), in connect() 442 yyerror(errbuf); in connect() 447 snprintf(errbuf, sizeof(errbuf), "%s %d not defined", dev, num); in connect() 448 yyerror(errbuf); in connect()
|
| /dflybsd-src/lib/libc/stdlib/ |
| H A D | strsuftoll.c | 94 char errbuf[100]; in strsuftoll() local 96 result = strsuftollx(desc, val, min, max, errbuf, sizeof(errbuf)); in strsuftoll() 97 if (*errbuf != '\0') in strsuftoll() 98 errx(EXIT_FAILURE, "%s", errbuf); in strsuftoll()
|