/freebsd-11-stable/contrib/libpcap/ |
H A D | pcap-sita.h | 7 extern int acn_parse_hosts_file(char *errbuf); 8 extern int acn_findalldevs(char *errbuf);
|
H A D | pcap-netmap.h | 2 int pcap_netmap_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-dag.h | 12 int dag_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-snf.h | 2 int snf_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-dbus.h | 2 int dbus_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-septel.h | 13 int septel_findalldevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-rpcap.h | 41 int read_timeout, struct pcap_rmtauth *auth, char *errbuf); 47 struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf);
|
H A D | sockutils.h | 124 int sock_init(char *errbuf, int errbuflen); 126 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen); 127 void sock_geterror(const char *caller, char *errbuf, int errbufsize); 130 char *errbuf, int errbuflen); 132 char *errbuf, int errbuflen); 134 char *errbuf, int errbuflen); 135 SOCKET sock_open(struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen); 136 int sock_close(SOCKET sock, char *errbuf, int errbuflen); 139 char *errbuf, int errbuflen); 140 int sock_bufferize(const char *buffer, int size, char *tempbuf, int *offset, int totsize, int checkonly, char *errbuf, in [all...] |
H A D | pcap-null.c | 40 pcap_platform_finddevs(pcap_if_list_t *devlistp _U_, char *errbuf _U_) 51 bpf_u_int32 *maskp _U_, char *errbuf) 53 (void)pcap_strlcpy(errbuf, nosup, PCAP_ERRBUF_SIZE); 50 pcap_lookupnet(const char *device _U_, bpf_u_int32 *netp _U_, bpf_u_int32 *maskp _U_, char *errbuf) argument
|
H A D | sf-pcapng.h | 30 u_int precision, char *errbuf, int *err);
|
H A D | sf-pcap.h | 35 u_int precision, char *errbuf, int *err);
|
H A D | sockutils.c | 131 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen) argument 133 if (errbuf == NULL) 137 pcap_fmt_errmsg_for_win32_err(errbuf, errbuflen, errcode, 140 pcap_fmt_errmsg_for_errno(errbuf, errbuflen, errcode, 156 * \param errbuf: a pointer to an user-allocated buffer that will contain the complete 165 void sock_geterror(const char *caller, char *errbuf, int errbuflen) argument 168 sock_fmterror(caller, GetLastError(), errbuf, errbuflen); 170 sock_fmterror(caller, errno, errbuf, errbuflen); 182 * \param errbuf: a pointer to an user-allocated buffer that will contain 191 * error message is returned in the buffer pointed to by 'errbuf' variabl 194 sock_init(char *errbuf, int errbuflen) argument 296 sock_open(struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen) argument 489 sock_close(SOCKET sock, char *errbuf, int errbuflen) argument 524 get_gai_errstring(char *errbuf, int errbuflen, const char *prefix, int err, const char *hostname, const char *portname) argument 697 sock_initaddress(const char *host, const char *port, struct addrinfo *hints, struct addrinfo **addrinfo, char *errbuf, int errbuflen) argument 778 sock_send(SOCKET sock, const char *buffer, size_t size, char *errbuf, int errbuflen) argument 910 sock_bufferize(const char *buffer, int size, char *tempbuf, int *offset, int totsize, int checkonly, char *errbuf, int errbuflen) argument 973 sock_recv(SOCKET sock, void *buffer, size_t size, int flags, char *errbuf, int errbuflen) argument 1061 sock_recv_dgram(SOCKET sock, void *buffer, size_t size, char *errbuf, int errbuflen) argument 1195 sock_discard(SOCKET sock, int size, char *errbuf, int errbuflen) argument 1258 sock_check_hostlist(char *hostlist, const char *sep, struct sockaddr_storage *from, char *errbuf, int errbuflen) argument 1452 sock_getmyinfo(SOCKET sock, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, int errbuflen) argument 1518 sock_getascii_addrport(const struct sockaddr_storage *sockaddr, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, int errbuflen) argument 1608 sock_present2network(const char *address, struct sockaddr_storage *sockaddr, int addr_family, char *errbuf, int errbuflen) argument [all...] |
H A D | pcap-new.c | 74 int pcap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 91 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly."); 104 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) 110 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) 117 if (pcap_findalldevs(alldevs, errbuf) == -1) 122 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, 136 if (pcap_createsrcstr(tmpstring, PCAP_SRC_IFLOCAL, NULL, NULL, dev->name, errbuf) == -1) 146 pcap_fmt_errmsg_for_errno(errbuf, 164 pcap_fmt_errmsg_for_errno(errbuf, 190 if (pcap_parsesrcstr(source, &type, NULL, NULL, name, errbuf) 354 pcap_open(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument [all...] |
H A D | savefile.c | 109 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 117 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 126 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 134 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 142 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 150 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 158 (void)pcap_snprintf(pcap->errbuf, sizeof(pcap->errbuf), 167 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 176 pcap_snprintf(p->errbuf, PCAP_ERRBUF_SIZ 251 pcap_open_offline_with_tstamp_precision(const char *fname, u_int precision, char *errbuf) argument 296 pcap_open_offline(const char *fname, char *errbuf) argument 303 pcap_hopen_offline_with_tstamp_precision(intptr_t osfd, u_int precision, char *errbuf) argument 330 pcap_hopen_offline(intptr_t osfd, char *errbuf) argument 375 pcap_fopen_offline_with_tstamp_precision(FILE *fp, u_int precision, char *errbuf) argument 487 pcap_fopen_offline(FILE *fp, char *errbuf) argument [all...] |
H A D | pcap-rpcap-int.h | 49 * Best practice is to define the errbuf variable as a char of size 'PCAP_ERRBUF_SIZE+1' 73 int rpcap_senderror(SOCKET sock, char *error, unsigned short errcode, char *errbuf);
|
H A D | pcap-tc.h | 52 TcFindAllDevs(pcap_if_list_t *devlistp, char *errbuf);
|
H A D | pcap-rpcap.c | 56 * Best practice is to define the errbuf variable as a char of size 158 static int rpcap_recv_msg_header(SOCKET sock, struct rpcap_header *header, char *errbuf); 159 static int rpcap_check_msg_ver(SOCKET sock, uint8 expected_ver, struct rpcap_header *header, char *errbuf); 160 static int rpcap_check_msg_type(SOCKET sock, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 161 static int rpcap_process_msg_header(SOCKET sock, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 162 static int rpcap_recv(SOCKET sock, void *buffer, size_t toread, uint32 *plen, char *errbuf); 164 static int rpcap_discard(SOCKET sock, uint32 len, char *errbuf); 240 * \param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE) 245 * The error message is returned in the 'errbuf' variable, while the deserialized address 281 rpcap_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr_storage **sockaddrout, char *errbuf) argument 948 rpcap_remoteact_getsock(const char *host, int *error, char *errbuf) argument 1834 rpcap_doauth(SOCKET sockctrl, uint8 *ver, struct pcap_rmtauth *auth, char *errbuf) argument 2051 rpcap_setup_session(const char *source, struct pcap_rmtauth *auth, int *activep, SOCKET *sockctrlp, uint8 *protocol_versionp, char *host, char *port, char *iface, char *errbuf) argument 2186 pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf) argument 2343 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) argument 2629 pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf) argument 2767 pcap_remoteact_close(const char *host, char *errbuf) argument 2875 pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf) argument 2922 rpcap_recv_msg_header(SOCKET sock, struct rpcap_header *header, char *errbuf) argument 2942 rpcap_check_msg_ver(SOCKET sock, uint8 expected_ver, struct rpcap_header *header, char *errbuf) argument 2973 rpcap_check_msg_type(SOCKET sock, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf) argument 3043 rpcap_process_msg_header(SOCKET sock, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf) argument 3075 rpcap_recv(SOCKET sock, void *buffer, size_t toread, uint32 *plen, char *errbuf) argument 3100 char errbuf[PCAP_ERRBUF_SIZE]; local 3156 rpcap_discard(SOCKET sock, uint32 len, char *errbuf) argument [all...] |
/freebsd-11-stable/lib/libkvm/tests/ |
H A D | kvm_test_common.c | 34 char errbuf[_POSIX2_LINE_MAX]; variable 40 strcpy(errbuf, "");
|
H A D | kvm_test_common.h | 34 extern char errbuf[_POSIX2_LINE_MAX];
|
H A D | kvm_open2_test.c | 50 ATF_CHECK(!errbuf_has_error(errbuf)); 53 errbuf, NULL) == NULL); 54 ATF_CHECK(errbuf_has_error(errbuf)); 64 ATF_CHECK(strlen(errbuf) == 0); 67 errbuf, NULL) == NULL); 68 ATF_CHECK(errbuf_has_error(errbuf)); 84 kd = kvm_open2(NULL, "some-file", O_RDONLY, errbuf, NULL); 85 ATF_CHECK(errbuf_has_error(errbuf)); 102 kd = kvm_open2("some-file", "/bin/sh", O_RDONLY, errbuf, NULL); 103 ATF_CHECK(errbuf_has_error(errbuf)); [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | netdissect.c | 47 nd_init(char *errbuf, size_t errbuf_size) argument 60 strlcpy(errbuf, "Attempting to initialize Winsock failed", 78 strlcpy(errbuf, "", errbuf_size); 121 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) argument 125 snprintf(errbuf, errbuf_size, "could not load MIB module %s", 132 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support",
|
/freebsd-11-stable/usr.bin/wall/ |
H A D | ttymsg.c | 66 static char errbuf[1024]; local 80 (void) snprintf(errbuf, sizeof(errbuf), 82 return (errbuf); 92 (void) snprintf(errbuf, sizeof(errbuf), "%s: %s", device, 94 return (errbuf); 131 (void) snprintf(errbuf, sizeof(errbuf), 134 return (errbuf); [all...] |
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_serf/ |
H A D | util_error.c | 60 char errbuf[255]; /* Buffer for APR error message. */ local 71 apr_strerror(status, errbuf, sizeof(errbuf)); 72 utf8_err = svn_utf_cstring_to_utf8(&err_msg, errbuf, err->pool);
|
/freebsd-11-stable/contrib/traceroute/ |
H A D | findsaddr-socket.c | 115 static char errbuf[512]; local 119 sprintf(errbuf, "socket: %.128s", strerror(errno)); 120 return (errbuf); 139 sprintf(errbuf, "write: %.128s", strerror(errno)); 141 return (errbuf); 144 sprintf(errbuf, "short write (%d != %d)", cc, size); 146 return (errbuf); 154 sprintf(errbuf, "read: %.128s", strerror(errno)); 156 return (errbuf); 164 sprintf(errbuf, "ba [all...] |
/freebsd-11-stable/contrib/libpcap/rpcapd/ |
H A D | rpcapd.c | 171 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 180 // Initialize errbuf 181 memset(errbuf, 0, sizeof(errbuf)); 292 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) 294 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 313 sock_geterror("Can't create state change event", errbuf, 315 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 324 sock_geterror("Can't set control handler", errbuf, 326 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); 496 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 673 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 795 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1074 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local 1266 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed local [all...] |