Searched refs:errbuf (Results 26 - 50 of 152) sorted by relevance

1234567

/freebsd-current/contrib/libpcap/rpcapd/
H A Drpcapd.c187 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
199 // Initialize errbuf
200 memset(errbuf, 0, sizeof(errbuf));
336 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1)
338 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf);
343 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1)
345 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf);
364 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE,
366 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf);
558 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
735 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
857 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
1136 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
1330 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
[all...]
H A Ddaemon.c130 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
145 static int daemon_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf);
221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
249 *errbuf = 0; // Initialize errbuf
264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE);
268 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf);
329 "TLS is required by this server", errbuf) == -1)
332 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZ
1143 char errbuf[PCAP_ERRBUF_SIZE]; local
1222 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
1421 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument
1606 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
1857 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
1960 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2297 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2420 char errbuf[PCAP_ERRBUF_SIZE]; local
2474 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2534 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2606 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer local
2914 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2946 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local
2974 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local
[all...]
/freebsd-current/lib/libprocstat/
H A Dlibprocstat_compat.c91 struct filestat *fst, struct freebsd11_ptsstat *pts, char *errbuf);
93 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf);
95 struct filestat *fst, struct freebsd11_semstat *sem, char *errbuf);
97 struct filestat *fst, struct freebsd11_shmstat *shm, char *errbuf);
99 struct filestat *fst, struct freebsd11_sockstat *sock, char *errbuf);
101 struct filestat *fst, struct freebsd11_vnstat *vn, char *errbuf);
103 struct filestat *fst, struct freebsd12_vnstat *vn_compat, char *errbuf);
109 struct filestat *fst, struct freebsd11_ptsstat *pts_compat, char *errbuf)
114 r = procstat_get_pts_info(procstat, fst, &pts, errbuf);
128 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf)
108 freebsd11_procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_ptsstat *pts_compat, char *errbuf) argument
127 freebsd12_procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf) argument
146 freebsd11_procstat_get_sem_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_semstat *sem_compat, char *errbuf) argument
161 freebsd11_procstat_get_shm_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_shmstat *shm_compat, char *errbuf) argument
176 freebsd11_procstat_get_socket_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_sockstat *sock_compat, char *errbuf) argument
201 freebsd11_procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_vnstat *vn_compat, char *errbuf) argument
226 freebsd12_procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, struct freebsd12_vnstat *vn_compat, char *errbuf) argument
[all...]
/freebsd-current/contrib/libpcap/
H A Dcharconv.c157 utf_8_to_acp_truncated(char *errbuf) argument
176 utf_16_errbuf = cp_to_utf_16le(CP_UTF8, errbuf, 0);
181 snprintf(errbuf, PCAP_ERRBUF_SIZE,
203 errbuf, PCAP_ERRBUF_SIZE, NULL, NULL);
208 snprintf(errbuf, PCAP_ERRBUF_SIZE,
211 snprintf(errbuf, PCAP_ERRBUF_SIZE,
H A Dpcap-rpcap.c67 * Best practice is to define the errbuf variable as a char of size
175 static int rpcap_recv_msg_header(SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf);
176 static int rpcap_check_msg_ver(SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf);
177 static int rpcap_check_msg_type(SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf);
178 static int rpcap_process_msg_header(SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf);
179 static int rpcap_recv(SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf);
181 static int rpcap_discard(SOCKET sock, SSL *, uint32 len, char *errbuf);
257 * \param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
262 * The error message is returned in the 'errbuf' variable, while the deserialized address
298 rpcap_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr_storage **sockaddrout, char *errbuf) argument
1020 rpcap_remoteact_getsock(const char *host, int *error, char *errbuf) argument
1970 rpcap_doauth(SOCKET sockctrl, SSL *ssl, uint8 *ver, int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf) argument
2260 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *uses_sslp, SSL **sslp, int rmt_flags, uint8 *protocol_versionp, int *byte_swappedp, char *host, char *port, char *iface, char *errbuf) argument
2438 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument
2612 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument
2920 pcap_remoteact_accept_ex(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, int uses_ssl, char *errbuf) argument
3113 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument
3118 pcap_remoteact_close(const char *host, char *errbuf) argument
3255 pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf) argument
3303 rpcap_recv_msg_header(SOCKET sock, SSL *ssl, struct rpcap_header *header, char *errbuf) argument
3323 rpcap_check_msg_ver(SOCKET sock, SSL *ssl, uint8 expected_ver, struct rpcap_header *header, char *errbuf) argument
3354 rpcap_check_msg_type(SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf) argument
3424 rpcap_process_msg_header(SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf) argument
3456 rpcap_recv(SOCKET sock, SSL *ssl, void *buffer, size_t toread, uint32 *plen, char *errbuf) argument
3481 char errbuf[PCAP_ERRBUF_SIZE]; local
3550 rpcap_discard(SOCKET sock, SSL *ssl, uint32 len, char *errbuf) argument
[all...]
H A Dpcap-bpf.c110 static int bpf_load(char *errbuf);
371 pcap_fmt_errmsg_for_errno(p->errbuf,
399 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
418 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
474 * On failure, returns a PCAP_ERROR_ value, and sets p->errbuf.
477 bpf_open(char *errbuf) argument
491 if (bpf_load(errbuf) == PCAP_ERROR)
508 snprintf(errbuf, PCAP_ERRBUF_SIZE,
513 pcap_fmt_errmsg_for_errno(errbuf,
564 snprintf(errbuf, PCAP_ERRBUF_SIZ
635 bpf_bind(int fd, const char *name, char *errbuf) argument
713 bpf_open_and_bind(const char *name, char *errbuf) argument
750 device_exists(int fd, const char *name, char *errbuf) argument
1378 bpf_odminit(char *errbuf) argument
1405 bpf_odmcleanup(char *errbuf) argument
1435 bpf_load(char *errbuf) argument
2724 char errbuf[PCAP_ERRBUF_SIZE]; local
2809 finddevs_usb(pcap_if_list_t *devlistp, char *errbuf) argument
2889 get_if_flags(const char *name, bpf_u_int32 *flags, char *errbuf) argument
3008 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument
[all...]
H A Dsf-pcap.c158 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, argument
199 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
202 snprintf(errbuf, PCAP_ERRBUF_SIZE,
223 snprintf(errbuf, PCAP_ERRBUF_SIZE,
237 snprintf(errbuf, PCAP_ERRBUF_SIZE,
248 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf);
308 snprintf(errbuf, PCAP_ERRBUF_SIZE,
411 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory");
432 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory");
464 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZ
[all...]
H A Drpcap-protocol.c75 * \param errbuf: a pointer to a user-allocated buffer (of size
80 * error message is returned in the 'errbuf' variable.
83 rpcap_senderror(SOCKET sock, SSL *ssl, uint8 ver, unsigned short errcode, const char *error, char *errbuf) argument
97 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE))
101 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE))
104 if (sock_send(sock, ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) < 0)
H A Dsf-pcapng.c259 char *errbuf)
266 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
271 snprintf(errbuf, PCAP_ERRBUF_SIZE,
281 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) argument
292 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf);
307 snprintf(errbuf, PCAP_ERRBUF_SIZE,
321 snprintf(errbuf, PCAP_ERRBUF_SIZE,
338 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length,
344 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory");
357 if (read_bytes(fp, bdata, data_remaining, 1, errbuf)
258 read_bytes(FILE *fp, void *buf, size_t bytes_to_read, int fail_on_eof, char *errbuf) argument
390 get_from_block_data(struct block_cursor *cursor, size_t chunk_size, char *errbuf) argument
416 get_opthdr_from_block_data(pcap_t *p, struct block_cursor *cursor, char *errbuf) argument
440 get_optvalue_from_block_data(struct block_cursor *cursor, struct option_header *opthdr, char *errbuf) argument
462 process_idb_options(pcap_t *p, struct block_cursor *cursor, uint64_t *tsresol, uint64_t *tsoffset, int *is_binary, char *errbuf) argument
593 add_interface(pcap_t *p, struct interface_description_block *idbp, struct block_cursor *cursor, char *errbuf) argument
770 pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, int *err) argument
[all...]
H A Dfmtutils.c269 pcap_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, argument
275 pcap_vfmt_errmsg_for_errno(errbuf, errbuflen, errnum, fmt, ap);
280 pcap_vfmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, argument
287 (void)vsnprintf(errbuf, errbuflen, fmt, ap);
288 msglen = strlen(errbuf);
298 p = errbuf + msglen;
332 * Now, if we're not in UTF-8 mode, convert errbuf to the
336 utf_8_to_acp_truncated(errbuf);
385 pcap_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, argument
391 pcap_vfmt_errmsg_for_win32_err(errbuf, errbufle
396 pcap_vfmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, const char *fmt, va_list ap) argument
[all...]
H A Dpcap-libdlpi.c117 p->errbuf[0] = '\0';
121 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
127 p->errbuf);
145 pcap_libdlpi_err(p->opt.device, "dlpi_bind", retv, p->errbuf);
210 pcap_libdlpi_err(p->opt.device, "dlpi_info", retv, p->errbuf);
232 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
280 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
285 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
294 retv, p->errbuf);
313 get_if_flags(const char *name _U_, bpf_u_int32 *flags _U_, char *errbuf _U
341 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument
491 pcap_libdlpi_err(const char *linkname, const char *func, int err, char *errbuf) argument
[all...]
H A Dpcap.c160 internal_wsockinit(char *errbuf) argument
179 if (errbuf != NULL) {
180 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE,
235 pcap_init(unsigned int opts, char *errbuf) argument
251 snprintf(errbuf, PCAP_ERRBUF_SIZE,
262 snprintf(errbuf, PCAP_ERRBUF_SIZE,
271 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified");
295 if (internal_wsockinit(errbuf) == -1) {
327 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf),
706 pcap_findalldevs(pcap_if_t **alldevsp, char *errbuf) argument
1010 find_or_add_if(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 if_flags, get_if_flags_func get_flags_func, char *errbuf) argument
1067 add_addr_to_if(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 if_flags, get_if_flags_func get_flags_func, struct sockaddr *addr, size_t addr_size, struct sockaddr *netmask, size_t netmask_size, struct sockaddr *broadaddr, size_t broadaddr_size, struct sockaddr *dstaddr, size_t dstaddr_size, char *errbuf) argument
1113 add_addr_to_dev(pcap_if_t *curdev, struct sockaddr *addr, size_t addr_size, struct sockaddr *netmask, size_t netmask_size, struct sockaddr *broadaddr, size_t broadaddr_size, struct sockaddr *dstaddr, size_t dstaddr_size, char *errbuf) argument
1228 find_or_add_dev(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 flags, get_if_flags_func get_flags_func, const char *description, char *errbuf) argument
1303 add_dev(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 flags, const char *description, char *errbuf) argument
1486 pcap_lookupdev(char *errbuf) argument
1566 pcap_lookupnet(const char *device, bpf_u_int32 *netp, bpf_u_int32 *maskp, char *errbuf) argument
2057 pcap_createsrcstr_ex(char *source, int type, const char *host, const char *port, const char *name, unsigned char uses_ssl, char *errbuf) argument
2124 pcap_createsrcstr(char *source, int type, const char *host, const char *port, const char *name, char *errbuf) argument
2131 pcap_parsesrcstr_ex(const char *source, int *type, char *host, char *port, char *name, unsigned char *uses_ssl, char *errbuf) argument
2239 pcap_parsesrcstr(const char *source, int *type, char *host, char *port, char *name, char *errbuf) argument
2247 pcap_create(const char *device, char *errbuf) argument
2757 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *errbuf) argument
3530 pcap_getnonblock(pcap_t *p, char *errbuf) argument
3574 pcap_setnonblock(pcap_t *p, int nonblock, char *errbuf) argument
3692 static char errbuf[PCAP_ERRBUF_SIZE]; local
[all...]
H A Dpcap-dlpi.c235 pcap_fmt_errmsg_for_errno(p->errbuf,
236 sizeof(p->errbuf), errno, "getmsg");
259 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
265 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
271 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE,
304 pcap_strlcpy(p->errbuf, "send: Not supported on this version of this OS",
342 open_dlpi_device(const char *name, u_int *ppa, char *errbuf) argument
368 cp = split_dname(dname, &unit, errbuf);
392 snprintf(errbuf, PCAP_ERRBUF_SIZE,
397 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZ
1041 char errbuf[PCAP_ERRBUF_SIZE]; local
1103 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument
1263 dlstrerror(char *errbuf, size_t errbufsize, bpf_u_int32 dl_errno) argument
[all...]
H A Dpcap-septel.c174 pcap_strlcpy(handle->errbuf, "Sending packets isn't supported on Septel cards",
265 septel_findalldevs(pcap_if_list_t *devlistp, char *errbuf) argument
270 if (add_dev(devlistp,"septel",0,"Intel/Septel device",errbuf) == NULL)
285 fprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices");
292 fprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices");
306 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument
315 pcap_create_interface(const char *device, char *errbuf) argument
317 snprintf(errbuf, PCAP_ERRBUF_SIZE,
/freebsd-current/tools/tools/ether_reflect/
H A Dether_reflect.c47 char errbuf[PCAP_ERRBUF_SIZE]; variable
110 &errbuf[0])) == NULL)
111 usage(errbuf);
115 if (pcap_lookupnet(interface, &localnet, &netmask, errbuf) < 0)
116 usage(errbuf);
119 usage(errbuf);
122 usage(errbuf);
125 usage(errbuf);
/freebsd-current/contrib/libpcap/testprogs/
H A Dfindalldevstest.c40 static char errbuf[ERRBUF_SIZE+1]; local
43 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf,
50 errlen = strlen(errbuf);
52 errbuf[errlen - 1] = '\0';
53 errbuf[errlen - 2] = '\0';
56 return errbuf;
108 char errbuf[PCAP_ERRBUF_SIZE+1]; local
119 if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1)
134 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1)
136 fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf);
[all...]
/freebsd-current/sys/contrib/openzfs/lib/libzfs/os/linux/
H A Dlibzfs_util_os.c172 (void) snprintf(di->errbuf, sizeof (di->errbuf),
174 return (zfs_error(di->zhp->zfs_hdl, EZFS_DIFF, di->errbuf));
222 char errbuf[1024]; local
227 (void) snprintf(errbuf, sizeof (errbuf),
231 (void) snprintf(errbuf, sizeof (errbuf),
240 return (zfs_error(hdl, EZFS_BADTYPE, errbuf));
244 return (zfs_error(hdl, EZFS_BADTYPE, errbuf));
[all...]
/freebsd-current/usr.sbin/traceroute/
H A Difaddrlist.c63 ifaddrlist(register struct ifaddrlist **ipaddrp, register char *errbuf) argument
78 (void)sprintf(errbuf, "socket: %s", strerror(errno));
87 (void)sprintf(errbuf,
91 (void)sprintf(errbuf, "SIOCGIFCONF: %s",
119 (void)sprintf(errbuf, "SIOCGIFFLAGS: %.*s: %s",
138 (void)sprintf(errbuf, "SIOCGIFADDR: %s: %s",
145 (void)sprintf(errbuf, "Too many interfaces (%d)",
/freebsd-current/lib/libnetbsd/
H A Dstrsuftoll.c215 char errbuf[100]; local
217 result = strsuftollx(desc, val, min, max, errbuf, sizeof(errbuf));
218 if (*errbuf != '\0')
219 errx(1, "%s", errbuf);
/freebsd-current/sys/contrib/openzfs/lib/libzfs/
H A Dlibzfs_pool.c489 nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf)
517 errbuf);
522 retprops, &strval, &intval, errbuf) != 0)
535 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
550 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
557 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
567 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
576 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
594 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
602 (void) zfs_error(hdl, EZFS_BADPROP, errbuf);
488 zpool_valid_proplist(libzfs_handle_t *hdl, const char *poolname, nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) argument
853 char errbuf[ERRBUFLEN]; local
1471 char errbuf[ERRBUFLEN]; local
1646 char errbuf[ERRBUFLEN]; local
1687 char errbuf[ERRBUFLEN]; local
1708 char errbuf[ERRBUFLEN]; local
1732 char errbuf[ERRBUFLEN]; local
2116 char errbuf[ERRBUFLEN]; local
2627 char errbuf[ERRBUFLEN]; local
2655 char errbuf[ERRBUFLEN]; local
3134 char errbuf[ERRBUFLEN]; local
3222 char errbuf[ERRBUFLEN]; local
3276 char errbuf[ERRBUFLEN]; local
3306 char errbuf[ERRBUFLEN]; local
3342 char errbuf[ERRBUFLEN]; local
3417 char errbuf[ERRBUFLEN]; local
3639 char errbuf[ERRBUFLEN]; local
3737 char errbuf[ERRBUFLEN]; local
3978 char errbuf[ERRBUFLEN]; local
4056 char errbuf[ERRBUFLEN]; local
4075 char errbuf[ERRBUFLEN]; local
4108 char errbuf[ERRBUFLEN]; local
4176 char errbuf[ERRBUFLEN]; local
4199 char errbuf[ERRBUFLEN]; local
5144 char errbuf[ERRBUFLEN]; local
5152 char errbuf[ERRBUFLEN]; local
5377 char errbuf[ERRBUFLEN]; local
5415 char errbuf[ERRBUFLEN]; local
5456 char errbuf[ERRBUFLEN]; local
[all...]
H A Dlibzfs_dataset.c709 char errbuf[ERRBUFLEN]; local
712 (void) snprintf(errbuf, sizeof (errbuf),
719 (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf);
735 (void) zfs_standard_error(hdl, errno, errbuf);
756 (void) zfs_standard_error(hdl, errno, errbuf);
766 (void) zfs_error(hdl, EZFS_NOENT, errbuf);
772 (void) zfs_standard_error(hdl, errno, errbuf);
785 (void) zfs_error(hdl, EZFS_BADTYPE, errbuf);
1032 boolean_t key_params_ok, const char *errbuf)
1030 zfs_valid_proplist(libzfs_handle_t *hdl, zfs_type_t type, nvlist_t *nvl, uint64_t zoned, zfs_handle_t *zhp, zpool_handle_t *zpool_hdl, boolean_t key_params_ok, const char *errbuf) argument
1757 char errbuf[ERRBUFLEN]; local
1801 char errbuf[ERRBUFLEN]; local
1984 char errbuf[ERRBUFLEN]; local
3510 char errbuf[ERRBUFLEN]; local
3688 char errbuf[ERRBUFLEN]; local
3732 char errbuf[ERRBUFLEN]; local
4005 char errbuf[ERRBUFLEN]; local
4013 char errbuf[ERRBUFLEN]; local
4042 char errbuf[ERRBUFLEN]; local
4126 char errbuf[ERRBUFLEN]; local
4208 char errbuf[ERRBUFLEN]; local
4295 char errbuf[ERRBUFLEN]; local
4438 char errbuf[ERRBUFLEN]; local
4497 char errbuf[ERRBUFLEN]; local
5013 char errbuf[ERRBUFLEN]; local
5037 char errbuf[ERRBUFLEN]; local
5139 char errbuf[ERRBUFLEN]; local
5219 char errbuf[ERRBUFLEN]; local
5283 char errbuf[ERRBUFLEN]; local
5335 char errbuf[ERRBUFLEN]; local
[all...]
/freebsd-current/sys/contrib/openzfs/lib/libzfs/os/freebsd/
H A Dlibzfs_compat.c198 static __thread char errbuf[ERRBUFLEN]; variable
203 char *msg = errbuf;
204 size_t msglen = sizeof (errbuf);
217 return (errbuf);
288 (void) snprintf(errbuf, sizeof (errbuf),
291 (void) snprintf(errbuf, sizeof (errbuf),
299 return (zfs_error(hdl, EZFS_BADTYPE, errbuf));
303 return (zfs_error(hdl, EZFS_BADTYPE, errbuf));
[all...]
/freebsd-current/contrib/flex/src/
H A Dregex.c58 char *errbuf; local
61 errbuf = malloc(errbuf_sz * sizeof(char));
62 if (!errbuf)
64 n = snprintf(errbuf, errbuf_sz, "regcomp for \"%s\" failed: ", regex);
65 regerror(err, preg, errbuf+n, errbuf_sz-(size_t)n);
67 flexfatal (errbuf); /* never returns - no need to free(errbuf) */
/freebsd-current/contrib/tcpdump/
H A Dnetdissect.c48 nd_init(char *errbuf, size_t errbuf_size) argument
61 strlcpy(errbuf, "Attempting to initialize Winsock failed",
79 strlcpy(errbuf, "", errbuf_size);
122 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) argument
126 snprintf(errbuf, errbuf_size, "could not load MIB module %s",
133 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support",
/freebsd-current/lib/libkvm/tests/
H A Dkvm_geterr_test.c72 kd = kvm_open2(NULL, NULL, O_RDONLY, errbuf, NULL);
73 ATF_CHECK(!errbuf_has_error(errbuf));
74 ATF_REQUIRE_MSG(kd != NULL, "kvm_open2 failed: %s", errbuf);
107 kd = kvm_open2(NULL, NULL, O_RDONLY, errbuf, NULL);
108 ATF_CHECK(!errbuf_has_error(errbuf));
109 ATF_REQUIRE_MSG(kd != NULL, "kvm_open2 failed: %s", errbuf);

Completed in 371 milliseconds

1234567