/freebsd-9.3-release/usr.sbin/rtsold/ |
H A D | rtsock.c | 93 char msg[2048]; local 102 n = read(s, msg, sizeof(msg)); 104 lim = msg + n; 105 for (next = msg; next < lim; next += len) {
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | winrand.c | 75 MSG msg; local 108 while (GetMessage(&msg, NULL, 0, 0)) { 109 TranslateMessage(&msg); 110 DispatchMessage(&msg); 113 return msg.wParam;
|
/freebsd-9.3-release/contrib/llvm/tools/clang/lib/StaticAnalyzer/Checkers/ |
H A D | BasicObjCFoundationChecks.cpp | 50 static StringRef GetReceiverInterfaceName(const ObjCMethodCall &msg) { argument 51 if (const ObjCInterfaceDecl *ID = msg.getReceiverInterface()) 104 const ObjCMethodCall &msg, unsigned Arg, 137 const ObjCMethodCall &msg, 143 if (!State->isNull(msg.getArgSVal(Arg)).isConstrainedTrue()) 150 if (CanBeSubscript && msg.getMessageKind() == OCM_Subscript) { 157 os << GetReceiverInterfaceName(msg) << "' cannot be nil"; 160 os << "'"<< GetReceiverInterfaceName(msg) << "' key cannot be nil"; 173 os << "to '" << msg.getSelector().getAsString() << "' cannot be nil"; 175 os << "Argument to '" << GetReceiverInterfaceName(msg) << "' metho 136 warnIfNilArg(CheckerContext &C, const ObjCMethodCall &msg, unsigned int Arg, FoundationClass Class, bool CanBeSubscript) const argument 199 checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const argument 596 checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const argument 703 checkPreObjCMessage(const ObjCMethodCall &msg, CheckerContext &C) const argument [all...] |
/freebsd-9.3-release/sbin/dump/ |
H A D | dumprmt.c | 100 msg("Lost connection to remote host.\n"); 115 msg("on %s: %s%s", rmtpeer, buf, 139 msg("shell/tcp: unknown service\n"); 144 msg("who are you?\n"); 158 msg("%s", ""); 162 msg("login to %s as %s failed.\n", rmtpeer, tuser); 193 msg("invalid user name %s\n", cp0); 327 msg("%s: %s", cmd, emsg); 339 msg("Protocol to remote tape server botched (code \"%s\").\n", 372 msg("Protoco [all...] |
H A D | tape.c | 201 msg("write error on %s\n", tape); 205 msg("write error %ld blocks into volume %d\n", blocksthisvol, tapeno); 209 msg("Closing this volume. Prepare to restart with new media;\n"); 210 msg("this dump volume will be rewritten.\n"); 254 msg("End of tape detected\n"); 325 msg("EOT detected in last 2 tape records!\n"); 326 msg("Use a longer tape, decrease the size estimate\n"); 338 msg("Closing %s\n", tape); 375 msg("Change Volumes: Mount volume #%d\n", tapeno+1); 524 msg("Contex [all...] |
/freebsd-9.3-release/sys/xen/xenstore/ |
H A D | xenstore_dev.c | 65 struct xsd_sockmsg msg; member in union:xs_dev_data::__anon10631 130 if (u->len < (sizeof(u->u.msg) + u->u.msg.len)) 133 switch (u->u.msg.type) { 145 error = xs_dev_request_and_reply(&u->u.msg, &reply); 147 if (u->u.msg.type == XS_TRANSACTION_START) { 152 } else if (u->u.msg.type == XS_TRANSACTION_END) { 154 if (trans->handle.id == u->u.msg.tx_id) 162 xs_queue_reply(u, (char *)&u->u.msg, sizeof(u->u.msg)); [all...] |
/freebsd-9.3-release/contrib/wpa/src/wps/ |
H A D | wps_er_ssdp.c | 133 struct wpabuf *msg; local 136 msg = wpabuf_alloc(500); 137 if (msg == NULL) 140 wpabuf_put_str(msg, 154 if (sendto(er->multicast_sd, wpabuf_head(msg), wpabuf_len(msg), 0, 159 wpabuf_free(msg);
|
H A D | wps_upnp.c | 563 struct wpabuf *msg = wpabuf_alloc(100); local 564 if (msg == NULL) 566 wpabuf_put_u8(msg, UPNP_WPS_WLANEVENT_TYPE_EAP); 567 wpabuf_put_str(msg, "00:00:00:00:00:00"); 568 if (wps_build_version(msg) || 569 wps_build_msg_type(msg, WPS_WSC_ACK)) { 570 wpabuf_free(msg); 574 wpabuf_put_be16(msg, ATTR_ENROLLEE_NONCE); 575 wpabuf_put_be16(msg, WPS_NONCE_LEN); 576 wpabuf_put(msg, WPS_NONCE_LE 619 struct wpabuf *msg; local 745 upnp_wps_device_send_wlan_event(struct upnp_wps_device_sm *sm, const u8 from_mac_addr[ETH_ALEN], enum upnp_wps_wlanevent_type ev_type, const struct wpabuf *msg) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/kpasswd/ |
H A D | kpasswd.c | 65 char *msg, *name; local 70 name = msg = NULL; 72 asprintf(&msg, "New password: "); 78 asprintf(&msg, "New password for %s: ", name); 81 if (msg == NULL) 84 ret = UI_UTIL_read_pw_string (pwbuf, sizeof(pwbuf), msg, 1); 85 free(msg);
|
/freebsd-9.3-release/sys/dev/drm2/radeon/ |
H A D | atombios_dp.c | 119 u8 msg[20]; local 127 msg[0] = address; 128 msg[1] = address >> 8; 129 msg[2] = AUX_NATIVE_WRITE << 4; 130 msg[3] = (msg_bytes << 4) | (send_bytes - 1); 131 memcpy(&msg[4], send, send_bytes); 135 msg, msg_bytes, NULL, 0, delay, &ack); 155 u8 msg[4]; local 161 msg[0] = address; 162 msg[ 207 u8 msg[5]; local 453 u8 msg[DP_DPCD_SIZE]; local [all...] |
/freebsd-9.3-release/sys/netgraph/atm/sscop/ |
H A D | ng_sscop.c | 294 flow_upper(node_p node, struct ng_mesg *msg) argument 300 if (msg->header.arglen != sizeof(struct ngm_queue_state)) 302 q = (struct ngm_queue_state *)msg->data; 304 switch (msg->header.cmd) { 350 flow_lower(node_p node, struct ng_mesg *msg) argument 354 if (msg->header.arglen != sizeof(struct ngm_queue_state)) 357 switch (msg->header.cmd) { 447 struct ng_mesg *msg; local 450 NGI_GET_MSG(item, msg); 452 switch (msg [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | tkey.c | 70 _dns_tkey_dumpmessage(dns_message_t *msg) { argument 76 result = dns_message_totext(msg, &dns_master_style_debug, 0, 139 add_rdata_to_list(dns_message_t *msg, dns_name_t *name, dns_rdata_t *rdata, argument 150 RETERR(dns_message_gettemprdata(msg, &newrdata)); 153 RETERR(isc_buffer_allocate(msg->mctx, &tmprdatabuf, r.length)); 157 dns_message_takebuffer(msg, &tmprdatabuf); 159 RETERR(dns_message_gettempname(msg, &newname)); 161 RETERR(dns_name_dup(name, msg->mctx, newname)); 163 RETERR(dns_message_gettemprdatalist(msg, &newlist)); 171 RETERR(dns_message_gettemprdataset(msg, 202 free_namelist(dns_message_t *msg, dns_namelist_t *namelist) argument 270 process_dhtkey(dns_message_t *msg, dns_name_t *signer, dns_name_t *name, dns_rdata_tkey_t *tkeyin, dns_tkeyctx_t *tctx, dns_rdata_tkey_t *tkeyout, dns_tsig_keyring_t *ring, dns_namelist_t *namelist) argument 611 dns_tkey_processquery(dns_message_t *msg, dns_tkeyctx_t *tctx, dns_tsig_keyring_t *ring) argument 856 buildquery(dns_message_t *msg, dns_name_t *name, dns_rdata_tkey_t *tkey, isc_boolean_t win2k) argument 935 dns_tkey_builddhquery(dns_message_t *msg, dst_key_t *key, dns_name_t *name, dns_name_t *algorithm, isc_buffer_t *nonce, isc_uint32_t lifetime) argument 1013 dns_tkey_buildgssquery(dns_message_t *msg, dns_name_t *name, dns_name_t *gname, isc_buffer_t *intoken, isc_uint32_t lifetime, gss_ctx_id_t *context, isc_boolean_t win2k, isc_mem_t *mctx, char **err_message) argument 1068 dns_tkey_builddeletequery(dns_message_t *msg, dns_tsigkey_t *key) argument 1090 find_tkey(dns_message_t *msg, dns_name_t **name, dns_rdata_t *rdata, int section) argument [all...] |
/freebsd-9.3-release/lib/libnetgraph/ |
H A D | debug.c | 220 _NgDebugMsg(const struct ng_mesg *msg, const char *path) argument 229 NGLOGX(" vers %d", msg->header.version); 230 NGLOGX(" arglen %d", msg->header.arglen); 231 NGLOGX(" flags %ld", msg->header.flags); 232 NGLOGX(" token %lu", (u_long)msg->header.token); 234 NgCookie(msg->header.typecookie), msg->header.typecookie); 250 arglen = msg->header.arglen; 253 memcpy(bin, msg, sizeof(*msg) [all...] |
/freebsd-9.3-release/sys/compat/linux/ |
H A D | linux_socket.c | 589 l_uintptr_t msg; member in struct:linux_sendto_args 611 struct msghdr msg; local 623 if ((error = copyin(PTRIN(linux_args->msg), packet, 632 msg.msg_name = PTRIN(linux_args->to); 633 msg.msg_namelen = linux_args->tolen; 634 msg.msg_iov = aiov; 635 msg.msg_iovlen = 1; 636 msg.msg_control = NULL; 637 msg.msg_flags = 0; 640 error = linux_sendit(td, linux_args->s, &msg, linux_arg 1009 l_uintptr_t msg; member in struct:linux_send_args 1037 l_uintptr_t msg; member in struct:linux_recv_args 1066 struct msghdr msg; local 1138 l_uintptr_t msg; member in struct:linux_sendmsg_args 1148 struct msghdr msg; local 1281 l_uintptr_t msg; member in struct:linux_recvmsg_args 1290 struct msghdr msg; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_server/ |
H A D | eap_server_sake.c | 107 struct wpabuf *msg; local 112 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_SAKE, plen, 114 if (msg == NULL) { 120 sake = wpabuf_put(msg, sizeof(*sake)); 125 return msg; 133 struct wpabuf *msg; local 141 msg = eap_sake_build_msg(data, id, plen, EAP_SAKE_SUBTYPE_IDENTITY); 142 if (msg == NULL) { 148 eap_sake_add_attr(msg, EAP_SAKE_AT_PERM_ID_REQ, NULL, 2); 152 eap_sake_add_attr(msg, EAP_SAKE_AT_SERVERI 164 struct wpabuf *msg; local 204 struct wpabuf *msg; local [all...] |
/freebsd-9.3-release/sys/netgraph/ |
H A D | ng_ether.c | 383 struct ng_mesg *msg; local 394 NG_MKMESSAGE(msg, NGM_FLOW_COOKIE, cmd, 0, M_NOWAIT); 395 if (msg != NULL) 396 NG_SEND_MSG_HOOK(dummy_error, node, msg, priv->lower, 0); 399 NG_MKMESSAGE(msg, NGM_FLOW_COOKIE, cmd, 0, M_NOWAIT); 400 if (msg != NULL) 401 NG_SEND_MSG_HOOK(dummy_error, node, msg, priv->orphan, 0); 501 struct ng_mesg *msg; local 503 NGI_GET_MSG(item, msg); 504 switch (msg [all...] |
H A D | ng_one2many.c | 259 struct ng_mesg *msg; local 261 NGI_GET_MSG(item, msg); 262 switch (msg->header.typecookie) { 264 switch (msg->header.cmd) { 271 if (msg->header.arglen != sizeof(*conf)) { 275 conf = (struct ng_one2many_config *)msg->data; 309 NG_MKRESPONSE(resp, msg, sizeof(*conf), M_NOWAIT); 326 if (msg->header.arglen != sizeof(int32_t)) { 330 linkNum = *((int32_t *)msg->data); 342 if (msg 603 struct ng_mesg *msg; local [all...] |
/freebsd-9.3-release/contrib/wpa/src/radius/ |
H A D | radius_client.c | 71 RadiusRxResult (*handler)(struct radius_msg *msg, 99 * msg - RADIUS message 101 struct radius_msg *msg; member in struct:radius_msg_list 249 radius_msg_free(req->msg); 272 RadiusRxResult (*handler)(struct radius_msg *msg, 358 radius_msg_get_hdr(entry->msg)->identifier); 361 buf = radius_msg_get_buf(entry->msg); 519 struct radius_msg *msg, 529 radius_msg_free(msg); 536 radius_msg_free(msg); 270 radius_client_register(struct radius_client_data *radius, RadiusType msg_type, RadiusRxResult (*handler)(struct radius_msg *msg, struct radius_msg *req, const u8 *shared_secret, size_t shared_secret_len, void *data), void *data) argument 518 radius_client_list_add(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *shared_secret, size_t shared_secret_len, const u8 *addr) argument 627 radius_client_send(struct radius_client_data *radius, struct radius_msg *msg, RadiusType msg_type, const u8 *addr) argument 698 struct radius_msg *msg; local 1365 struct radius_msg_list *msg; local 1414 struct radius_msg_list *msg; local [all...] |
/freebsd-9.3-release/sbin/setkey/ |
H A D | parse.y | 212 struct sadb_msg msg; 213 setkeymsg0(&msg, SADB_FLUSH, $2, sizeof(msg)); 214 sendkeymsg((char *)&msg, sizeof(msg)); 222 struct sadb_msg msg; 223 setkeymsg0(&msg, SADB_DUMP, $2, sizeof(msg)); 224 sendkeymsg((char *)&msg, sizeof(msg)); [all...] |
/freebsd-9.3-release/lib/libc/rpc/ |
H A D | clnt_bcast.c | 247 struct rpc_msg msg; /* RPC message */ local 249 char *outbuf = NULL; /* Broadcast msg buffer */ 374 msg.rm_xid = __RPC_GETXID(&t); 375 msg.rm_direction = CALL; 376 msg.rm_call.cb_rpcvers = RPC_MSG_VERSION; 377 msg.rm_call.cb_prog = RPCBPROG; 378 msg.rm_call.cb_vers = RPCBVERS; 379 msg.rm_call.cb_proc = RPCBPROC_CALLIT; 388 msg.rm_call.cb_cred = sys_auth->ah_cred; 389 msg [all...] |
/freebsd-9.3-release/contrib/wpa/src/eap_peer/ |
H A D | eap_aka.c | 302 const struct wpabuf *msg) 304 if (msg == NULL) 308 data->id_msgs = wpabuf_dup(msg); 312 if (wpabuf_resize(&data->id_msgs, wpabuf_len(msg)) < 0) 314 wpabuf_put_buf(data->id_msgs, msg); 321 struct eap_sim_msg *msg) 334 eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, NULL, 0); 349 eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, hash, 408 struct eap_sim_msg *msg; local 414 msg 301 eap_aka_add_id_msg(struct eap_aka_data *data, const struct wpabuf *msg) argument 320 eap_aka_add_checkcode(struct eap_aka_data *data, struct eap_sim_msg *msg) argument 424 struct eap_sim_msg *msg; local 441 struct eap_sim_msg *msg; local 464 struct eap_sim_msg *msg; local 504 struct eap_sim_msg *msg; local 527 struct eap_sim_msg *msg; local 569 struct eap_sim_msg *msg; local 665 struct eap_sim_msg *msg; local [all...] |
/freebsd-9.3-release/contrib/binutils/opcodes/ |
H A D | cgen-asm.in | 164 static char msg[80]; 166 regerror (reg_err, (regex_t *) CGEN_INSN_RX (insn), msg, 80); 170 return msg; 259 static char msg [80]; 262 sprintf (msg, _("syntax error (expected char `%c', found `%c')"), 264 return msg; 269 static char msg [80]; 272 sprintf (msg, _("syntax error (expected char `%c', found end of instruction)"), 274 return msg;
|
/freebsd-9.3-release/lib/libz/ |
H A D | gzlib.c | 119 state->msg = NULL; /* no error message yet */ 548 (state->msg == NULL ? "" : state->msg); 573 state->msg accordingly. Free any previous error message already there. Do 578 void ZLIB_INTERNAL gz_error(state, err, msg) 581 const char *msg; 584 if (state->msg != NULL) { 586 free(state->msg); 587 state->msg = NULL; 596 if (msg [all...] |
/freebsd-9.3-release/sys/netgraph/atm/ |
H A D | ngatmbase.c | 78 mtx_init(&ngatm_unilist_mtx, "netgraph UNI msg header lists", NULL, 136 uni_msg_pack_mbuf(struct uni_msg *msg, void *hdr, size_t hdrlen) argument 153 if ((n = uni_msg_len(msg)) > MHLEN) { 161 bcopy(msg->b_rptr, m0->m_data, n); 162 msg->b_rptr += n; 168 while (msg != NULL && (n = uni_msg_len(msg)) != 0) { 183 bcopy(msg->b_rptr, m->m_data, n); 184 msg->b_rptr += n; 205 struct uni_msg msg; member in struct:ngatm_msg [all...] |
/freebsd-9.3-release/contrib/openbsm/bin/auditd/ |
H A D | auditd_darwin.c | 241 launch_data_t msg, msd, ld, cdict, to; local 244 msg = launch_data_new_string(LAUNCH_KEY_CHECKIN); 246 cdict = launch_msg(msg); 420 auditd_log_info("Recevied msg on bad port 0x%x.", local_port); 476 mach_msg_empty_send_t msg; local 478 msg.header.msgh_id = signal; 479 msg.header.msgh_remote_port = signal_port; 480 msg.header.msgh_local_port = MACH_PORT_NULL; 481 msg.header.msgh_bits = MACH_MSGH_BITS(MACH_MSG_TYPE_MAKE_SEND, 0); 482 mach_msg(&(msg [all...] |