/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | send_recv.c | 41 krb5_data msg, out; local 49 ret = krb5_data_alloc(&msg, len); 55 krb5_storage_read(sp, msg.data, msg.length); 57 ret = krb5_mk_priv(context->context, context->ac, &msg, &out, NULL); 58 krb5_data_free(&msg);
|
/freebsd-current/contrib/llvm-project/llvm/include/llvm/Support/ |
H A D | ErrorHandling.h | 121 llvm_unreachable_internal(const char *msg = nullptr, const char *file = nullptr, 143 #define llvm_unreachable(msg) \ 144 ::llvm::llvm_unreachable_internal(msg, __FILE__, __LINE__) 146 #define llvm_unreachable(msg) ::llvm::llvm_unreachable_internal() 148 #define llvm_unreachable(msg) LLVM_BUILTIN_UNREACHABLE 150 #define llvm_unreachable(msg) \
|
/freebsd-current/lib/libc/stdlib/ |
H A D | set_constraint_handler_s.c | 69 __throw_constraint_handler_s(const char * restrict msg, errno_t error) argument 79 ch(msg, NULL, error); 83 abort_handler_s(const char * restrict msg, void * restrict ptr __unused, argument 89 (void) _write(STDERR_FILENO, msg, strlen(msg)); 95 ignore_handler_s(const char * restrict msg __unused,
|
/freebsd-current/sys/netgraph/bluetooth/socket/ |
H A D | ng_btsocket_l2cap_raw.c | 281 struct ng_mesg *msg = NGI_MSG(item); /* item still has message */ local 284 if (msg != NULL && msg->header.typecookie == NGM_L2CAP_COOKIE) { 291 if (msg->header.cmd != NGM_L2CAP_NODE_HOOK_INFO) { 292 if (msg->header.token == 0 || 293 !(msg->header.flags & NGF_RESP)) { 352 struct ng_mesg *msg = NULL; local 365 NGI_GET_MSG(item, msg); 369 switch (msg->header.cmd) { 374 msg 790 struct ng_mesg *msg = NULL; local 1296 struct ng_mesg *msg = NULL; local 1319 struct ng_mesg *msg = NULL; local [all...] |
/freebsd-current/contrib/llvm-project/libcxx/src/filesystem/ |
H A D | format_string.h | 32 inline _LIBCPP_ATTRIBUTE_FORMAT(__printf__, 1, 0) string vformat_string(const char* msg, va_list ap) { argument 37 int ret = ::vsnprintf(buf.data(), buf.size(), msg, apcopy); 49 ret = ::vsnprintf(&result[0], size_with_null, msg, ap); 55 inline _LIBCPP_ATTRIBUTE_FORMAT(__printf__, 1, 2) string format_string(const char* msg, ...) { argument 58 va_start(ap, msg); 62 ret = detail::vformat_string(msg, ap);
|
/freebsd-current/usr.bin/gencat/ |
H A D | gencat.c | 183 warning(const char *cptr, const char *msg) argument 185 fprintf(stderr, "%s: %s on line %ld\n", getprogname(), msg, lineno); 199 error(const char *msg) argument 201 warning(NULL, msg); 303 static char *msg = NULL; local 315 msg = xrealloc(msg, clen); 317 msg = xmalloc(clen); 320 tptr = msg; 341 i = tptr - msg; 487 struct _msgT *msg; local 658 struct _msgT *msg; local 680 struct _msgT *msg; local [all...] |
/freebsd-current/usr.bin/finger/ |
H A D | net.c | 107 struct msghdr msg; local 118 msg.msg_name = (void *)ai->ai_addr; 119 msg.msg_namelen = ai->ai_addrlen; 120 msg.msg_iov = iov; 121 msg.msg_iovlen = 0; 122 msg.msg_control = 0; 123 msg.msg_controllen = 0; 124 msg.msg_flags = 0; 128 iov[msg.msg_iovlen].iov_base = slash_w; 129 iov[msg [all...] |
/freebsd-current/tests/sys/netlink/ |
H A D | netlink_socket.c | 167 cmsg_check(struct msghdr *msg) argument 173 ATF_REQUIRE((cmsg = CMSG_FIRSTHDR(msg)) != NULL); 184 ATF_REQUIRE(CMSG_NXTHDR(msg, cmsg) == NULL); 185 ATF_REQUIRE((msg->msg_flags & MSG_CTRUNC) == 0); 195 struct msghdr msg = { local 218 ss = recvmsg(fd, &msg, MSG_WAITALL | MSG_PEEK | MSG_TRUNC); 222 cmsg_check(&msg); 239 ATF_REQUIRE(recvmsg(fd, &msg, 0) == sizeof(hdr)); 240 ATF_REQUIRE(msg.msg_flags & MSG_TRUNC); 245 cmsg_check(&msg); 286 } reply, msg = { local [all...] |
/freebsd-current/lib/libpam/modules/pam_echo/ |
H A D | pam_echo.c | 50 char msg[PAM_MAX_MSG_SIZE]; local 58 for (i = 0, len = 0; i < argc && len < sizeof(msg) - 1; ++i) { 60 msg[len++] = ' '; 61 for (p = argv[i]; *p != '\0' && len < sizeof(msg) - 1; ++p) { 63 msg[len++] = *p; 88 msg[len++] = *p; 98 for (q = str; *q != '\0' && len < sizeof(msg) - 1; ++q) 99 msg[len++] = *q; 102 msg[len] = '\0'; 103 return (pam_info(pamh, "%s", msg)); [all...] |
/freebsd-current/tests/sys/netinet/ |
H A D | udp_io.c | 72 struct msghdr msg = { local 81 ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf)); 85 ATF_REQUIRE(recvmsg(s[0], &msg, 0) == (ssize_t)n); 86 ATF_REQUIRE(msg.msg_flags == MSG_TRUNC); 89 ATF_REQUIRE(recvmsg(s[0], &msg, MSG_DONTWAIT) == -1); 107 struct msghdr msg = { local 116 ATF_REQUIRE(sendmsg(s[1], &msg, 0) == sizeof(sbuf)); 121 ATF_REQUIRE(recvmsg(s[0], &msg, MSG_PEEK) == (ssize_t)n); 123 ATF_REQUIRE(msg.msg_flags == (MSG_PEEK | MSG_TRUNC)); 125 ATF_REQUIRE(msg [all...] |
/freebsd-current/contrib/wpa/src/p2p/ |
H A D | p2p_dev_disc.c | 164 struct p2p_message msg; local 170 if (p2p_parse(data, len, &msg)) 173 if (msg.dialog_token == 0) { 175 p2p_send_dev_disc_resp(p2p, msg.dialog_token, sa, rx_freq, 177 p2p_parse_free(&msg); 181 if (msg.device_id == NULL) { 183 p2p_send_dev_disc_resp(p2p, msg.dialog_token, sa, rx_freq, 185 p2p_parse_free(&msg); 190 if (p2p_group_go_discover(p2p->groups[g], msg.device_id, sa, 199 p2p->pending_dev_disc_dialog_token = msg 217 struct p2p_message msg; local [all...] |
/freebsd-current/contrib/netbsd-tests/lib/libc/sys/ |
H A D | t_msgrcv.c | 34 #include <sys/msg.h> 57 struct msg { struct 81 struct msg msg1 = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; 82 struct msg msg2 = { MSG_MTYPE_1, { 'x', 'y', 'z' } }; 111 struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; local 123 if (msgrcv(id, &msg, MSG_LEN, MSG_MTYPE_1, 0) < 0) 134 (void)msgsnd(id, &msg, MSG_LEN, IPC_NOWAIT); 158 struct msg msg local 247 struct msg msg = { MSG_MTYPE_1, { 'a', 'b', 'c' } }; local [all...] |
/freebsd-current/contrib/llvm-project/lld/include/lld/Common/ |
H A D | ErrorHandler.h | 110 void error(const Twine &msg); 111 void error(const Twine &msg, ErrorTag tag, ArrayRef<StringRef> args); 112 [[noreturn]] void fatal(const Twine &msg); 113 void log(const Twine &msg); 114 void message(const Twine &msg, llvm::raw_ostream &s); 115 void warn(const Twine &msg); 126 std::string getLocation(const Twine &msg); 128 const Twine &msg); 147 void error(const Twine &msg); 148 void error(const Twine &msg, ErrorTa [all...] |
/freebsd-current/crypto/openssl/fuzz/ |
H A D | cmp.c | 40 OSSL_CMP_severity level, const char *msg) 51 static void cmp_client_process_response(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg) argument 68 (void)OSSL_CMP_CTX_set_transfer_cb_arg(ctx, msg); 71 switch (msg->body != NULL ? msg->body->type : -1) { 94 (void)ossl_cmp_msg_check_update(ctx, msg, allow_unprotected, 0); 160 OSSL_CMP_MSG *msg; local 168 msg = d2i_OSSL_CMP_MSG_bio(in, NULL); 169 if (msg != NULL) { 174 i2d_OSSL_CMP_MSG_bio(out, msg); 39 print_noop(const char *func, const char *file, int line, OSSL_CMP_severity level, const char *msg) argument [all...] |
/freebsd-current/contrib/wpa/src/drivers/ |
H A D | driver_macsec_linux.c | 83 static int dump_callback(struct nl_msg *msg, void *argp); 90 struct nl_msg *msg; local 92 msg = nlmsg_alloc(); 93 if (!msg) { 98 if (!genlmsg_put(msg, 0, 0, ctx->macsec_genl_id, 0, 0, cmd, 0)) { 103 NLA_PUT_U32(msg, MACSEC_ATTR_IFINDEX, ifindex); 105 return msg; 108 nlmsg_free(msg); 113 static int nla_put_rxsc_config(struct nl_msg *msg, u64 sci) argument 115 struct nlattr *nest = nla_nest_start(msg, MACSEC_ATTR_RXSC_CONFI 508 dump_callback(struct nl_msg *msg, void *argp) argument 609 nl_send_recv(struct nl_sock *sk, struct nl_msg *msg) argument 634 struct nl_msg *msg; local 703 struct nl_msg *msg; local 770 struct nl_msg *msg; local 822 struct nl_msg *msg; local 860 struct nl_msg *msg; local 896 struct nl_msg *msg; local 955 struct nl_msg *msg; local 994 struct nl_msg *msg; local 1213 struct nl_msg *msg; local 1268 struct nl_msg *msg; local 1304 struct nl_msg *msg; local [all...] |
/freebsd-current/contrib/wpa/src/wps/ |
H A D | wps_common.c | 272 void wps_fail_event(struct wps_context *wps, enum wps_msg_type msg, argument 281 data.fail.msg = msg; 437 struct wpabuf msg; local 445 wpabuf_set(&msg, attr->cred[i], attr->cred_len[i]); 446 if (wps_parse_msg(&msg, &cattr) < 0 || 577 struct wpabuf *msg; local 581 msg = wpabuf_alloc(1000); 582 if (msg == NULL) 585 if (wps_build_version(msg) || 600 struct wpabuf *msg; local 706 struct wpabuf *msg; local 740 wps_build_ssid(struct wpabuf *msg, struct wps_context *wps) argument 752 wps_build_ap_freq(struct wpabuf *msg, int freq) argument 787 struct wpabuf *msg; local 826 struct wpabuf *msg; local 865 struct wpabuf *msg; local [all...] |
/freebsd-current/contrib/wpa/src/eap_common/ |
H A D | eap_ikev2_common.c | 53 struct wpabuf *msg; local 55 msg = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_IKEV2, 0, code, id); 56 if (msg == NULL) { 64 return msg; 69 int initiator, const struct wpabuf *msg, 97 wpabuf_head(msg), 98 wpabuf_len(msg) - icv_len, icv) < 0) { 68 eap_ikev2_validate_icv(int integ_alg, struct ikev2_keys *keys, int initiator, const struct wpabuf *msg, const u8 *pos, const u8 *end) argument
|
H A D | eap_sim_common.c | 189 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Verify MAC - msg", 204 void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac, argument 211 addr[0] = msg; 218 wpa_hexdump(MSG_MSGDUMP, "EAP-SIM: Add MAC - msg", msg, msg_len); 383 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Verify MAC - msg", 398 void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len, argument 405 addr[0] = msg; 412 wpa_hexdump(MSG_MSGDUMP, "EAP-AKA': Add MAC - msg", msg, msg_le 982 struct eap_sim_msg *msg; local 1009 eap_sim_msg_finish(struct eap_sim_msg *msg, int type, const u8 *k_aut, const u8 *extra, size_t extra_len) argument 1043 eap_sim_msg_free(struct eap_sim_msg *msg) argument 1052 eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr, const u8 *data, size_t len) argument 1076 eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr, u16 value, const u8 *data, size_t len) argument 1104 eap_sim_msg_add_mac(struct eap_sim_msg *msg, u8 attr) argument 1113 eap_sim_msg_add_encr_start(struct eap_sim_msg *msg, u8 attr_iv, u8 attr_encr) argument 1137 eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr, int attr_pad) argument [all...] |
/freebsd-current/crypto/openssh/openbsd-compat/ |
H A D | port-aix.c | 179 char *authmsg = NULL, *msg = NULL, *name = ctxt->pw->pw_name; local 205 expired = passwdexpired(name, &msg); 206 if (msg && *msg) { 208 msg, strlen(msg))) != 0) 211 aix_remove_embedded_newlines(msg); 213 debug3("AIX/passwdexpired returned %d msg %.100s", expired, msg); 223 name, msg); 243 char *msg = NULL; local 286 char *msg = NULL; local 305 char *msg = lastlogin_msg; local [all...] |
/freebsd-current/tests/atf_python/ |
H A D | ktest.py | 86 msg = KtestInfoMessage(self.helper, self.family_id, KtestMsgType.KTEST_CMD_LIST) 87 msg.set_request() 88 msg.add_nla(NlAttrStr(KtestAttrType.KTEST_ATTR_MOD_NAME, self.module_name)) 89 self.nlsock.write_message(msg, verbose=False) 90 nlmsg_seq = msg.nl_hdr.nlmsg_seq 121 def _get_record_time(self, msg) -> float: 122 timespec = msg.get_nla(KtestMsgAttrType.KTEST_MSG_ATTR_TS).ts 132 def _log_message(self, msg): 134 syslog_level = msg.get_nla(KtestMsgAttrType.KTEST_MSG_ATTR_LEVEL).u8 142 msg [all...] |
/freebsd-current/lib/libc/nameser/ |
H A D | ns_parse.c | 37 static void setsection(ns_msg *msg, ns_sect sect); 102 ns_initparse(const u_char *msg, int msglen, ns_msg *handle) { argument 103 const u_char *eom = msg + msglen; 106 handle->_msg = msg; 108 if (msg + NS_INT16SZ > eom) 110 NS_GET16(handle->_id, msg); 111 if (msg + NS_INT16SZ > eom) 113 NS_GET16(handle->_flags, msg); 115 if (msg + NS_INT16SZ > eom) 117 NS_GET16(handle->_counts[i], msg); 262 setsection(ns_msg *msg, ns_sect sect) argument [all...] |
/freebsd-current/tests/sys/net/routing/ |
H A D | test_rtsock_lladdr.c | 96 char buffer[2048], msg[512]; \ 154 ret = sa_equal_msg(sa, (struct sockaddr *)&sin6, msg, sizeof(msg)); 155 RTSOCK_ATF_REQUIRE_MSG(rtm, ret != 0, "DST sa diff: %s", msg); 159 ret = sa_equal_msg_flags(sa, (struct sockaddr *)ðer, msg, sizeof(msg), sa_flags); 160 RTSOCK_ATF_REQUIRE_MSG(rtm, ret != 0, "GATEWAY sa diff: %s", msg); 206 ret = sa_equal_msg(sa, (struct sockaddr *)&sin6, msg, sizeof(msg)); 207 RTSOCK_ATF_REQUIRE_MSG(rtm, ret != 0, "DST sa diff: %s", msg); [all...] |
/freebsd-current/contrib/unbound/iterator/ |
H A D | iter_scrub.c | 63 remove_rrset(const char* str, sldns_buffer* pkt, struct msg_parse* msg, argument 75 else msg->rrset_first = (*rrset)->rrset_all_next; 76 if(msg->rrset_last == *rrset) 77 msg->rrset_last = prev; 78 msg->rrset_count --; 80 case LDNS_SECTION_ANSWER: msg->an_rrsets--; break; 81 case LDNS_SECTION_AUTHORITY: msg->ns_rrsets--; break; 82 case LDNS_SECTION_ADDITIONAL: msg->ar_rrsets--; break; 85 msgparse_bucket_remove(msg, *rrset); 151 mark_additional_rrset(sldns_buffer* pkt, struct msg_parse* msg, argument 252 synth_cname_rrset(uint8_t** sname, size_t* snamelen, uint8_t* alias, size_t aliaslen, struct regional* region, struct msg_parse* msg, struct rrset_parse* rrset, struct rrset_parse* prev, struct rrset_parse* nx, sldns_buffer* pkt) argument 340 soa_in_auth(struct msg_parse* msg) argument 383 scrub_normalize(sldns_buffer* pkt, struct msg_parse* msg, struct query_info* qinfo, struct regional* region, struct module_env* env) argument 655 store_rrset(sldns_buffer* pkt, struct msg_parse* msg, struct module_env* env, struct rrset_parse* rrset) argument 723 scrub_sanitize_rr_length(sldns_buffer* pkt, struct msg_parse* msg, struct rrset_parse* prev, struct rrset_parse** rrset, int* added_ede, struct module_qstate* qstate) argument 786 scrub_sanitize(sldns_buffer* pkt, struct msg_parse* msg, struct query_info* qinfo, uint8_t* zonename, struct module_env* env, struct iter_env* ie, struct module_qstate* qstate) argument 916 scrub_message(sldns_buffer* pkt, struct msg_parse* msg, struct query_info* qinfo, uint8_t* zonename, struct regional* region, struct module_env* env, struct module_qstate* qstate, struct iter_env* ie) argument [all...] |
/freebsd-current/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 549 /* msg | Nr | prf(SK_pi,IDi') */ 822 struct wpabuf *msg, u8 exchange_type, 830 hdr = wpabuf_put(msg, sizeof(*hdr)); 842 struct wpabuf *msg, u8 next_payload) 852 phdr = wpabuf_put(msg, sizeof(*phdr)); 856 p = wpabuf_put(msg, sizeof(*p)); 861 t = wpabuf_put(msg, sizeof(*t)); 867 wpabuf_put_be16(msg, 0x800e); /* AF=1, AttrType=14 */ 868 wpabuf_put_be16(msg, 128); /* 128-bit key */ 870 plen = (u8 *) wpabuf_put(msg, 821 ikev2_build_hdr(struct ikev2_responder_data *data, struct wpabuf *msg, u8 exchange_type, u8 next_payload, u32 message_id) argument 841 ikev2_build_sar1(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 900 ikev2_build_ker(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 936 ikev2_build_nr(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 955 ikev2_build_idr(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 981 ikev2_build_auth(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 1021 ikev2_build_notification(struct ikev2_responder_data *data, struct wpabuf *msg, u8 next_payload) argument 1071 struct wpabuf *msg; local 1143 struct wpabuf *msg, *plain; local 1179 struct wpabuf *msg; local [all...] |
/freebsd-current/contrib/netbsd-tests/kernel/ |
H A D | t_ptrace.c | 150 uint8_t msg = 0xde; /* dummy message for IPC based on pipe(2) */ local 168 rv = write(fds_toparent[1], &msg, sizeof(msg)); 169 FORKEE_ASSERTX(rv == sizeof(msg)); 174 rv = read(fds_fromparent[0], &msg, sizeof(msg)); 175 FORKEE_ASSERTX(rv == sizeof(msg)); 183 rv = read(fds_toparent[0], &msg, sizeof(msg)); 184 ATF_REQUIRE(rv == sizeof(msg)); [all...] |