/freebsd-current/contrib/libpcap/rpcapd/ |
H A D | rpcapd.c | 187 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 199 // Initialize errbuf 200 memset(errbuf, 0, sizeof(errbuf)); 336 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1) 338 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 343 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) 345 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 364 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, 366 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 558 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 735 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 857 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1136 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1330 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local [all...] |
H A D | daemon.c | 130 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 145 static int daemon_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf); 221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 249 *errbuf = 0; // Initialize errbuf 264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); 268 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); 329 "TLS is required by this server", errbuf) == -1) 332 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); 339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZ 1143 char errbuf[PCAP_ERRBUF_SIZE]; local 1222 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1421 daemon_AuthUserPwd(char *username, char *password, char *errbuf) argument 1606 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1857 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 1960 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2297 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2420 char errbuf[PCAP_ERRBUF_SIZE]; local 2474 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2534 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2606 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer local 2914 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2946 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors local 2974 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local [all...] |
/freebsd-current/lib/libprocstat/ |
H A D | libprocstat_compat.c | 91 struct filestat *fst, struct freebsd11_ptsstat *pts, char *errbuf); 93 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf); 95 struct filestat *fst, struct freebsd11_semstat *sem, char *errbuf); 97 struct filestat *fst, struct freebsd11_shmstat *shm, char *errbuf); 99 struct filestat *fst, struct freebsd11_sockstat *sock, char *errbuf); 101 struct filestat *fst, struct freebsd11_vnstat *vn, char *errbuf); 103 struct filestat *fst, struct freebsd12_vnstat *vn_compat, char *errbuf); 109 struct filestat *fst, struct freebsd11_ptsstat *pts_compat, char *errbuf) 114 r = procstat_get_pts_info(procstat, fst, &pts, errbuf); 128 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf) 108 freebsd11_procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_ptsstat *pts_compat, char *errbuf) argument 127 freebsd12_procstat_get_pts_info(struct procstat *procstat, struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf) argument 146 freebsd11_procstat_get_sem_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_semstat *sem_compat, char *errbuf) argument 161 freebsd11_procstat_get_shm_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_shmstat *shm_compat, char *errbuf) argument 176 freebsd11_procstat_get_socket_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_sockstat *sock_compat, char *errbuf) argument 201 freebsd11_procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, struct freebsd11_vnstat *vn_compat, char *errbuf) argument 226 freebsd12_procstat_get_vnode_info(struct procstat *procstat, struct filestat *fst, struct freebsd12_vnstat *vn_compat, char *errbuf) argument [all...] |
/freebsd-current/contrib/libpcap/ |
H A D | charconv.c | 157 utf_8_to_acp_truncated(char *errbuf) argument 176 utf_16_errbuf = cp_to_utf_16le(CP_UTF8, errbuf, 0); 181 snprintf(errbuf, PCAP_ERRBUF_SIZE, 203 errbuf, PCAP_ERRBUF_SIZE, NULL, NULL); 208 snprintf(errbuf, PCAP_ERRBUF_SIZE, 211 snprintf(errbuf, PCAP_ERRBUF_SIZE,
|
H A D | pcap-rpcap.c | 67 * Best practice is to define the errbuf variable as a char of size 175 static int rpcap_recv_msg_header(SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf); 176 static int rpcap_check_msg_ver(SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf); 177 static int rpcap_check_msg_type(SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 178 static int rpcap_process_msg_header(SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 179 static int rpcap_recv(SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf); 181 static int rpcap_discard(SOCKET sock, SSL *, uint32 len, char *errbuf); 257 * \param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE) 262 * The error message is returned in the 'errbuf' variable, while the deserialized address 298 rpcap_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr_storage **sockaddrout, char *errbuf) argument 1020 rpcap_remoteact_getsock(const char *host, int *error, char *errbuf) argument 1970 rpcap_doauth(SOCKET sockctrl, SSL *ssl, uint8 *ver, int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf) argument 2260 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *uses_sslp, SSL **sslp, int rmt_flags, uint8 *protocol_versionp, int *byte_swappedp, char *host, char *port, char *iface, char *errbuf) argument 2438 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument 2612 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 2920 pcap_remoteact_accept_ex(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, int uses_ssl, char *errbuf) argument 3113 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument 3118 pcap_remoteact_close(const char *host, char *errbuf) argument 3255 pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf) argument 3303 rpcap_recv_msg_header(SOCKET sock, SSL *ssl, struct rpcap_header *header, char *errbuf) argument 3323 rpcap_check_msg_ver(SOCKET sock, SSL *ssl, uint8 expected_ver, struct rpcap_header *header, char *errbuf) argument 3354 rpcap_check_msg_type(SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf) argument 3424 rpcap_process_msg_header(SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf) argument 3456 rpcap_recv(SOCKET sock, SSL *ssl, void *buffer, size_t toread, uint32 *plen, char *errbuf) argument 3481 char errbuf[PCAP_ERRBUF_SIZE]; local 3550 rpcap_discard(SOCKET sock, SSL *ssl, uint32 len, char *errbuf) argument [all...] |
H A D | pcap-bpf.c | 110 static int bpf_load(char *errbuf); 371 pcap_fmt_errmsg_for_errno(p->errbuf, 399 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, 418 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, 474 * On failure, returns a PCAP_ERROR_ value, and sets p->errbuf. 477 bpf_open(char *errbuf) argument 491 if (bpf_load(errbuf) == PCAP_ERROR) 508 snprintf(errbuf, PCAP_ERRBUF_SIZE, 513 pcap_fmt_errmsg_for_errno(errbuf, 564 snprintf(errbuf, PCAP_ERRBUF_SIZ 635 bpf_bind(int fd, const char *name, char *errbuf) argument 713 bpf_open_and_bind(const char *name, char *errbuf) argument 750 device_exists(int fd, const char *name, char *errbuf) argument 1378 bpf_odminit(char *errbuf) argument 1405 bpf_odmcleanup(char *errbuf) argument 1435 bpf_load(char *errbuf) argument 2724 char errbuf[PCAP_ERRBUF_SIZE]; local 2809 finddevs_usb(pcap_if_list_t *devlistp, char *errbuf) argument 2889 get_if_flags(const char *name, bpf_u_int32 *flags, char *errbuf) argument 3008 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument [all...] |
H A D | sf-pcap.c | 158 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, argument 199 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, 202 snprintf(errbuf, PCAP_ERRBUF_SIZE, 223 snprintf(errbuf, PCAP_ERRBUF_SIZE, 237 snprintf(errbuf, PCAP_ERRBUF_SIZE, 248 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf); 308 snprintf(errbuf, PCAP_ERRBUF_SIZE, 411 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); 432 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory"); 464 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZ [all...] |
H A D | rpcap-protocol.c | 75 * \param errbuf: a pointer to a user-allocated buffer (of size 80 * error message is returned in the 'errbuf' variable. 83 rpcap_senderror(SOCKET sock, SSL *ssl, uint8 ver, unsigned short errcode, const char *error, char *errbuf) argument 97 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) 101 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) 104 if (sock_send(sock, ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) < 0)
|
H A D | sf-pcapng.c | 259 char *errbuf) 266 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, 271 snprintf(errbuf, PCAP_ERRBUF_SIZE, 281 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) argument 292 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf); 307 snprintf(errbuf, PCAP_ERRBUF_SIZE, 321 snprintf(errbuf, PCAP_ERRBUF_SIZE, 338 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length, 344 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); 357 if (read_bytes(fp, bdata, data_remaining, 1, errbuf) 258 read_bytes(FILE *fp, void *buf, size_t bytes_to_read, int fail_on_eof, char *errbuf) argument 390 get_from_block_data(struct block_cursor *cursor, size_t chunk_size, char *errbuf) argument 416 get_opthdr_from_block_data(pcap_t *p, struct block_cursor *cursor, char *errbuf) argument 440 get_optvalue_from_block_data(struct block_cursor *cursor, struct option_header *opthdr, char *errbuf) argument 462 process_idb_options(pcap_t *p, struct block_cursor *cursor, uint64_t *tsresol, uint64_t *tsoffset, int *is_binary, char *errbuf) argument 593 add_interface(pcap_t *p, struct interface_description_block *idbp, struct block_cursor *cursor, char *errbuf) argument 770 pcap_ng_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, int *err) argument [all...] |
H A D | fmtutils.c | 269 pcap_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, argument 275 pcap_vfmt_errmsg_for_errno(errbuf, errbuflen, errnum, fmt, ap); 280 pcap_vfmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, argument 287 (void)vsnprintf(errbuf, errbuflen, fmt, ap); 288 msglen = strlen(errbuf); 298 p = errbuf + msglen; 332 * Now, if we're not in UTF-8 mode, convert errbuf to the 336 utf_8_to_acp_truncated(errbuf); 385 pcap_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, argument 391 pcap_vfmt_errmsg_for_win32_err(errbuf, errbufle 396 pcap_vfmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, const char *fmt, va_list ap) argument [all...] |
H A D | pcap-libdlpi.c | 117 p->errbuf[0] = '\0'; 121 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 127 p->errbuf); 145 pcap_libdlpi_err(p->opt.device, "dlpi_bind", retv, p->errbuf); 210 pcap_libdlpi_err(p->opt.device, "dlpi_info", retv, p->errbuf); 232 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, 280 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 285 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 294 retv, p->errbuf); 313 get_if_flags(const char *name _U_, bpf_u_int32 *flags _U_, char *errbuf _U 341 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument 491 pcap_libdlpi_err(const char *linkname, const char *func, int err, char *errbuf) argument [all...] |
H A D | pcap.c | 160 internal_wsockinit(char *errbuf) argument 179 if (errbuf != NULL) { 180 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, 235 pcap_init(unsigned int opts, char *errbuf) argument 251 snprintf(errbuf, PCAP_ERRBUF_SIZE, 262 snprintf(errbuf, PCAP_ERRBUF_SIZE, 271 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified"); 295 if (internal_wsockinit(errbuf) == -1) { 327 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), 706 pcap_findalldevs(pcap_if_t **alldevsp, char *errbuf) argument 1010 find_or_add_if(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 if_flags, get_if_flags_func get_flags_func, char *errbuf) argument 1067 add_addr_to_if(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 if_flags, get_if_flags_func get_flags_func, struct sockaddr *addr, size_t addr_size, struct sockaddr *netmask, size_t netmask_size, struct sockaddr *broadaddr, size_t broadaddr_size, struct sockaddr *dstaddr, size_t dstaddr_size, char *errbuf) argument 1113 add_addr_to_dev(pcap_if_t *curdev, struct sockaddr *addr, size_t addr_size, struct sockaddr *netmask, size_t netmask_size, struct sockaddr *broadaddr, size_t broadaddr_size, struct sockaddr *dstaddr, size_t dstaddr_size, char *errbuf) argument 1228 find_or_add_dev(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 flags, get_if_flags_func get_flags_func, const char *description, char *errbuf) argument 1303 add_dev(pcap_if_list_t *devlistp, const char *name, bpf_u_int32 flags, const char *description, char *errbuf) argument 1486 pcap_lookupdev(char *errbuf) argument 1566 pcap_lookupnet(const char *device, bpf_u_int32 *netp, bpf_u_int32 *maskp, char *errbuf) argument 2057 pcap_createsrcstr_ex(char *source, int type, const char *host, const char *port, const char *name, unsigned char uses_ssl, char *errbuf) argument 2124 pcap_createsrcstr(char *source, int type, const char *host, const char *port, const char *name, char *errbuf) argument 2131 pcap_parsesrcstr_ex(const char *source, int *type, char *host, char *port, char *name, unsigned char *uses_ssl, char *errbuf) argument 2239 pcap_parsesrcstr(const char *source, int *type, char *host, char *port, char *name, char *errbuf) argument 2247 pcap_create(const char *device, char *errbuf) argument 2757 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *errbuf) argument 3530 pcap_getnonblock(pcap_t *p, char *errbuf) argument 3574 pcap_setnonblock(pcap_t *p, int nonblock, char *errbuf) argument 3692 static char errbuf[PCAP_ERRBUF_SIZE]; local [all...] |
H A D | pcap-dlpi.c | 235 pcap_fmt_errmsg_for_errno(p->errbuf, 236 sizeof(p->errbuf), errno, "getmsg"); 259 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, 265 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 271 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, 304 pcap_strlcpy(p->errbuf, "send: Not supported on this version of this OS", 342 open_dlpi_device(const char *name, u_int *ppa, char *errbuf) argument 368 cp = split_dname(dname, &unit, errbuf); 392 snprintf(errbuf, PCAP_ERRBUF_SIZE, 397 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZ 1041 char errbuf[PCAP_ERRBUF_SIZE]; local 1103 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument 1263 dlstrerror(char *errbuf, size_t errbufsize, bpf_u_int32 dl_errno) argument [all...] |
H A D | pcap-septel.c | 174 pcap_strlcpy(handle->errbuf, "Sending packets isn't supported on Septel cards", 265 septel_findalldevs(pcap_if_list_t *devlistp, char *errbuf) argument 270 if (add_dev(devlistp,"septel",0,"Intel/Septel device",errbuf) == NULL) 285 fprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices"); 292 fprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Non-blocking mode not supported on Septel devices"); 306 pcap_platform_finddevs(pcap_if_list_t *devlistp, char *errbuf) argument 315 pcap_create_interface(const char *device, char *errbuf) argument 317 snprintf(errbuf, PCAP_ERRBUF_SIZE,
|
/freebsd-current/tools/tools/ether_reflect/ |
H A D | ether_reflect.c | 47 char errbuf[PCAP_ERRBUF_SIZE]; variable 110 &errbuf[0])) == NULL) 111 usage(errbuf); 115 if (pcap_lookupnet(interface, &localnet, &netmask, errbuf) < 0) 116 usage(errbuf); 119 usage(errbuf); 122 usage(errbuf); 125 usage(errbuf);
|
/freebsd-current/contrib/libpcap/testprogs/ |
H A D | findalldevstest.c | 40 static char errbuf[ERRBUF_SIZE+1]; local 43 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf, 50 errlen = strlen(errbuf); 52 errbuf[errlen - 1] = '\0'; 53 errbuf[errlen - 2] = '\0'; 56 return errbuf; 108 char errbuf[PCAP_ERRBUF_SIZE+1]; local 119 if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1) 134 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1) 136 fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf); [all...] |
/freebsd-current/sys/contrib/openzfs/lib/libzfs/os/linux/ |
H A D | libzfs_util_os.c | 172 (void) snprintf(di->errbuf, sizeof (di->errbuf), 174 return (zfs_error(di->zhp->zfs_hdl, EZFS_DIFF, di->errbuf)); 222 char errbuf[1024]; local 227 (void) snprintf(errbuf, sizeof (errbuf), 231 (void) snprintf(errbuf, sizeof (errbuf), 240 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); 244 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); [all...] |
/freebsd-current/usr.sbin/traceroute/ |
H A D | ifaddrlist.c | 63 ifaddrlist(register struct ifaddrlist **ipaddrp, register char *errbuf) argument 78 (void)sprintf(errbuf, "socket: %s", strerror(errno)); 87 (void)sprintf(errbuf, 91 (void)sprintf(errbuf, "SIOCGIFCONF: %s", 119 (void)sprintf(errbuf, "SIOCGIFFLAGS: %.*s: %s", 138 (void)sprintf(errbuf, "SIOCGIFADDR: %s: %s", 145 (void)sprintf(errbuf, "Too many interfaces (%d)",
|
/freebsd-current/lib/libnetbsd/ |
H A D | strsuftoll.c | 215 char errbuf[100]; local 217 result = strsuftollx(desc, val, min, max, errbuf, sizeof(errbuf)); 218 if (*errbuf != '\0') 219 errx(1, "%s", errbuf);
|
/freebsd-current/sys/contrib/openzfs/lib/libzfs/ |
H A D | libzfs_pool.c | 489 nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) 517 errbuf); 522 retprops, &strval, &intval, errbuf) != 0) 535 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 550 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 557 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 567 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 576 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 594 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 602 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); 488 zpool_valid_proplist(libzfs_handle_t *hdl, const char *poolname, nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) argument 853 char errbuf[ERRBUFLEN]; local 1471 char errbuf[ERRBUFLEN]; local 1646 char errbuf[ERRBUFLEN]; local 1687 char errbuf[ERRBUFLEN]; local 1708 char errbuf[ERRBUFLEN]; local 1732 char errbuf[ERRBUFLEN]; local 2116 char errbuf[ERRBUFLEN]; local 2627 char errbuf[ERRBUFLEN]; local 2655 char errbuf[ERRBUFLEN]; local 3134 char errbuf[ERRBUFLEN]; local 3222 char errbuf[ERRBUFLEN]; local 3276 char errbuf[ERRBUFLEN]; local 3306 char errbuf[ERRBUFLEN]; local 3342 char errbuf[ERRBUFLEN]; local 3417 char errbuf[ERRBUFLEN]; local 3639 char errbuf[ERRBUFLEN]; local 3737 char errbuf[ERRBUFLEN]; local 3978 char errbuf[ERRBUFLEN]; local 4056 char errbuf[ERRBUFLEN]; local 4075 char errbuf[ERRBUFLEN]; local 4108 char errbuf[ERRBUFLEN]; local 4176 char errbuf[ERRBUFLEN]; local 4199 char errbuf[ERRBUFLEN]; local 5144 char errbuf[ERRBUFLEN]; local 5152 char errbuf[ERRBUFLEN]; local 5377 char errbuf[ERRBUFLEN]; local 5415 char errbuf[ERRBUFLEN]; local 5456 char errbuf[ERRBUFLEN]; local [all...] |
H A D | libzfs_dataset.c | 709 char errbuf[ERRBUFLEN]; local 712 (void) snprintf(errbuf, sizeof (errbuf), 719 (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); 735 (void) zfs_standard_error(hdl, errno, errbuf); 756 (void) zfs_standard_error(hdl, errno, errbuf); 766 (void) zfs_error(hdl, EZFS_NOENT, errbuf); 772 (void) zfs_standard_error(hdl, errno, errbuf); 785 (void) zfs_error(hdl, EZFS_BADTYPE, errbuf); 1032 boolean_t key_params_ok, const char *errbuf) 1030 zfs_valid_proplist(libzfs_handle_t *hdl, zfs_type_t type, nvlist_t *nvl, uint64_t zoned, zfs_handle_t *zhp, zpool_handle_t *zpool_hdl, boolean_t key_params_ok, const char *errbuf) argument 1757 char errbuf[ERRBUFLEN]; local 1801 char errbuf[ERRBUFLEN]; local 1984 char errbuf[ERRBUFLEN]; local 3510 char errbuf[ERRBUFLEN]; local 3688 char errbuf[ERRBUFLEN]; local 3732 char errbuf[ERRBUFLEN]; local 4005 char errbuf[ERRBUFLEN]; local 4013 char errbuf[ERRBUFLEN]; local 4042 char errbuf[ERRBUFLEN]; local 4126 char errbuf[ERRBUFLEN]; local 4208 char errbuf[ERRBUFLEN]; local 4295 char errbuf[ERRBUFLEN]; local 4438 char errbuf[ERRBUFLEN]; local 4497 char errbuf[ERRBUFLEN]; local 5013 char errbuf[ERRBUFLEN]; local 5037 char errbuf[ERRBUFLEN]; local 5139 char errbuf[ERRBUFLEN]; local 5219 char errbuf[ERRBUFLEN]; local 5283 char errbuf[ERRBUFLEN]; local 5335 char errbuf[ERRBUFLEN]; local [all...] |
/freebsd-current/sys/contrib/openzfs/lib/libzfs/os/freebsd/ |
H A D | libzfs_compat.c | 198 static __thread char errbuf[ERRBUFLEN]; variable 203 char *msg = errbuf; 204 size_t msglen = sizeof (errbuf); 217 return (errbuf); 288 (void) snprintf(errbuf, sizeof (errbuf), 291 (void) snprintf(errbuf, sizeof (errbuf), 299 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); 303 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); [all...] |
/freebsd-current/contrib/flex/src/ |
H A D | regex.c | 58 char *errbuf; local 61 errbuf = malloc(errbuf_sz * sizeof(char)); 62 if (!errbuf) 64 n = snprintf(errbuf, errbuf_sz, "regcomp for \"%s\" failed: ", regex); 65 regerror(err, preg, errbuf+n, errbuf_sz-(size_t)n); 67 flexfatal (errbuf); /* never returns - no need to free(errbuf) */
|
/freebsd-current/contrib/tcpdump/ |
H A D | netdissect.c | 48 nd_init(char *errbuf, size_t errbuf_size) argument 61 strlcpy(errbuf, "Attempting to initialize Winsock failed", 79 strlcpy(errbuf, "", errbuf_size); 122 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) argument 126 snprintf(errbuf, errbuf_size, "could not load MIB module %s", 133 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support",
|
/freebsd-current/lib/libkvm/tests/ |
H A D | kvm_geterr_test.c | 72 kd = kvm_open2(NULL, NULL, O_RDONLY, errbuf, NULL); 73 ATF_CHECK(!errbuf_has_error(errbuf)); 74 ATF_REQUIRE_MSG(kd != NULL, "kvm_open2 failed: %s", errbuf); 107 kd = kvm_open2(NULL, NULL, O_RDONLY, errbuf, NULL); 108 ATF_CHECK(!errbuf_has_error(errbuf)); 109 ATF_REQUIRE_MSG(kd != NULL, "kvm_open2 failed: %s", errbuf);
|