/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/ |
H A D | ftpserver.pl | 199 # logmsg is general message logging subroutine for our test servers. 201 sub logmsg { subroutine 226 logmsg "failed to open log/server$idstr.input\n"; 258 logmsg "Error: eXsysread() failure: " . 263 logmsg "Error: eXsysread() failure: " . 284 logmsg "Error: eXsysread() failure: timed out\n"; 292 logmsg "Error: eXsysread() failure: signalled to die\n"; 297 logmsg "Warning: retrying sysread() interrupted system call\n"; 301 logmsg "Warning: retrying sysread() due to EAGAIN\n"; 305 logmsg "Warnin [all...] |
H A D | sshserver.pl | 64 logmsg 204 logmsg $error; 214 logmsg "cannot find $sshdexe"; 225 logmsg $sshderror if($verbose); 226 logmsg 'SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later'; 229 logmsg "ssh server found $sshd is $sshdverstr" if($verbose); 255 logmsg 'SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later'; 265 logmsg "cannot find $sftpsrvexe"; 268 logmsg "sftp server plugin found $sftpsrv" if($verbose); 276 logmsg "canno [all...] |
H A D | runtests.pl | 295 # logmsg is our general message logging subroutine. 297 sub logmsg { subroutine 318 logmsg "runtests.pl received SIG$signame, exiting\n"; 391 logmsg "startnew: $cmd\n" if ($verbose); 397 logmsg "startnew: fork() failure detected\n"; 418 logmsg "startnew: $pidfile faked with pid=$child\n" if($verbose); 421 logmsg "startnew: failed to write fake $pidfile with pid=$child\n"; 426 logmsg "startnew: child process has failed to start\n" if($verbose); 446 logmsg "startnew: child process has died, server might start up\n" 539 logmsg " CM [all...] |
H A D | sshhelp.pm | 101 logmsg 219 sub logmsg { subroutine
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/tests/server/ |
H A D | rtspd.c | 264 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); 269 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); 274 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); 279 logmsg("cannot install SIGINT handler: %s", strerror(errno)); 286 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); 293 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); 340 logmsg("ProcessRequest() called with testno %ld and line [%s]", 363 logmsg("got unknown protocol %s", prot_str); 383 logmsg("%s", logbuf); 386 logmsg("Ar [all...] |
H A D | fake_ntlm.c | 161 logmsg("fake_ntlm (user: %s) (proto: %s) (domain: %s) (cached creds: %s)", 170 logmsg("Test number not valid in CURL_NTLM_AUTH_TESTNUM"); 175 logmsg("Test number not specified in CURL_NTLM_AUTH_TESTNUM"); 188 logmsg("fopen() failed with error: %d %s", error, strerror(error)); 189 logmsg("Error opening file: %s", filename); 190 logmsg("Couldn't open test file %ld", testnum); 198 logmsg("getpart() type 1 input failed with error: %d", error); 206 logmsg("fopen() failed with error: %d %s", error, strerror(error)); 207 logmsg("Error opening file: %s", filename); 208 logmsg("Could [all...] |
H A D | sws.c | 259 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); 264 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); 269 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); 274 logmsg("cannot install SIGINT handler: %s", strerror(errno)); 281 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); 288 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); 334 logmsg("fopen() failed with error: %d %s", error, strerror(error)); 335 logmsg(" [1] Error opening file: %s", filename); 336 logmsg(" Couldn't open test file %ld", req->testno); 350 logmsg("getpar [all...] |
H A D | sockfilt.c | 207 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); 212 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); 217 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); 222 logmsg("cannot install SIGINT handler: %s", strerror(errno)); 229 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); 236 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); 356 logmsg("signalled to die"); 364 logmsg("reading from file descriptor: %d,", filedes); 365 logmsg("unrecoverable read() failure: (%d) %s", 371 logmsg("go [all...] |
H A D | tftpd.c | 333 logmsg("alarm!"); 380 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); 385 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); 390 logmsg("cannot install SIGINT handler: %s", strerror(errno)); 397 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); 404 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); 579 logmsg("Couldn't create and/or open file %s for upload!", outfile); 774 logmsg("Error creating socket: (%d) %s", 784 logmsg("setsockopt(SO_REUSEADDR) failed with error: (%d) %s", 810 logmsg("Erro [all...] |
H A D | util.h | 27 void logmsg(const char *msg, ...);
|
H A D | util.c | 89 void logmsg(const char *msg, ...) function 164 logmsg("Error initialising winsock -- aborting"); 173 logmsg("No suitable winsock.dll found -- aborting"); 259 logmsg("Couldn't write pid file: %s %s", filename, strerror(errno)); 264 logmsg("Wrote pid %ld to %s", pid, filename); 278 logmsg("Error creating lock file %s error: %d %s", 287 logmsg("Error closing lock file %s error: %d %s", 306 logmsg("Error removing lock file %s error: %d %s",
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/nsswitch/ |
H A D | winbind_nss_solaris.c | 108 char logmsg[80]; local 115 snprintf(logmsg, 79, "_nss_winbind_getpwent_solwrap: Returning user: %s\n", 117 NSS_DEBUG(logmsg); 120 snprintf(logmsg, 79, "_nss_winbind_getpwent_solwrap: Returning error: %d.\n",ret); 121 NSS_DEBUG(logmsg); 223 char logmsg[80]; local 230 snprintf(logmsg, 79, "_nss_winbind_getgrent_solwrap: Returning group: %s\n", result->gr_name); 231 NSS_DEBUG(logmsg); 234 snprintf(logmsg, 79, "_nss_winbind_getgrent_solwrap: Returning error: %d.\n", ret); 235 NSS_DEBUG(logmsg); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/transmission/libevent-2.0.20-stable/test/ |
H A D | regress_util.c | 435 static char *logmsg = NULL; variable 443 if (logmsg) 444 free(logmsg); 445 logmsg = strdup(msg); 455 !logmsg || 456 strcmp(logmsg, fatal_want_message)) 521 if (logmsg) free(logmsg); \ 522 logmsg = NULL; \ 526 tt_assert(logmsg ! [all...] |