/freebsd/contrib/libpcap/ |
H A D | sockutils.c | 157 void sock_vfmterrmsg(char *errbuf, size_t errbuflen, int errcode, in sock_vfmterrmsg() argument 160 if (errbuf == NULL) in sock_vfmterrmsg() 164 pcapint_vfmt_errmsg_for_win32_err(errbuf, errbuflen, errcode, in sock_vfmterrmsg() 167 pcapint_vfmt_errmsg_for_errno(errbuf, errbuflen, errcode, in sock_vfmterrmsg() 172 void sock_fmterrmsg(char *errbuf, size_t errbuflen, int errcode, in sock_fmterrmsg() argument 178 sock_vfmterrmsg(errbuf, errbuflen, errcode, fmt, ap); in sock_fmterrmsg() 185 void sock_geterrmsg(char *errbuf, size_t errbuflen, const char *fmt, ...) in sock_geterrmsg() argument 190 sock_vfmterrmsg(errbuf, errbuflen, sock_geterrcode(), fmt, ap); in sock_geterrmsg() 324 int sock_init(char *errbuf, int errbuflen) in sock_init() argument 333 if (errbuf) in sock_init() [all …]
|
H A D | pcap-rpcap.c | 173 static int rpcap_recv_msg_header(PCAP_SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf… 174 …ck_msg_ver(PCAP_SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf); 175 …OCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 176 …PCAP_SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 177 …c int rpcap_recv(PCAP_SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf); 179 static int rpcap_discard(PCAP_SOCKET sock, SSL *, uint32 len, char *errbuf); 299 rpcap_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr **sockaddrout, char *errbuf) in rpcap_deseraddr() argument 314 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr() 344 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr() 441 sock_geterrmsg(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote() [all …]
|
H A D | savefile.c | 107 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setnonblock() 125 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats() 134 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats_ex() 142 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setbuff() 150 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmode() 158 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmintocopy() 166 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in sf_getevent() 175 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_get_request() 184 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_set_request() 192 pcapint_strlcpy(p->errbuf, "Sending packets isn't supported on savefiles", in sf_sendqueue_transmit() [all …]
|
H A D | pcap-new.c | 73 …ap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) in pcap_findalldevs_ex() argument 90 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly."); in pcap_findalldevs_ex() 103 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex() 109 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex() 116 if (pcap_findalldevs(alldevs, errbuf) == -1) in pcap_findalldevs_ex() 121 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_ex() 135 if (pcap_createsrcstr(tmpstring, PCAP_SRC_IFLOCAL, NULL, NULL, dev->name, errbuf) == -1) in pcap_findalldevs_ex() 145 pcapint_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex() 163 pcapint_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex() 189 if (pcap_parsesrcstr(source, &type, NULL, NULL, name, errbuf) == -1) in pcap_findalldevs_ex() [all …]
|
H A D | sf-pcapng.c | 257 char *errbuf) in read_bytes() argument 264 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 269 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 279 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) in read_block() argument 290 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf); in read_block() 305 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 319 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 336 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length, in read_block() 342 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in read_block() 355 if (read_bytes(fp, bdata, data_remaining, 1, errbuf) == -1) in read_block() [all …]
|
H A D | sockutils.h | 132 int sock_init(char *errbuf, int errbuflen); 135 void sock_vfmterrmsg(char *errbuf, size_t errbuflen, int errcode, 137 void sock_fmterrmsg(char *errbuf, size_t errbuflen, int errcode, 139 void sock_geterrmsg(char *errbuf, size_t errbuflen, 142 struct addrinfo *hints, char *errbuf, int errbuflen); 144 int receiveall, char *errbuf, int errbuflen); 146 char *errbuf, int errbuflen); 148 int nconn, char *errbuf, int errbuflen); 149 int sock_close(PCAP_SOCKET sock, char *errbuf, int errbuflen); 152 char *errbuf, int errbuflen); [all …]
|
H A D | pcap-bpf.c | 108 static int bpf_load(char *errbuf); 370 pcapint_fmt_errmsg_for_errno(p->errbuf, in pcap_next_zbuf() 398 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 417 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 476 bpf_open(char *errbuf) in bpf_open() argument 490 if (bpf_load(errbuf) == PCAP_ERROR) in bpf_open() 507 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 512 pcapint_fmt_errmsg_for_errno(errbuf, in bpf_open() 563 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 573 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() [all …]
|
H A D | pcap.c | 176 internal_wsockinit(char *errbuf) in internal_wsockinit() argument 195 if (errbuf != NULL) { in internal_wsockinit() 196 pcapint_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in internal_wsockinit() 251 pcap_init(unsigned int opts, char *errbuf) in pcap_init() argument 267 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 278 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 287 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified"); in pcap_init() 311 if (internal_wsockinit(errbuf) == -1) { in pcap_init() 343 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() 348 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() [all …]
|
H A D | sf-pcap.c | 219 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, in pcap_check_header() argument 260 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 263 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 284 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 298 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 309 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 320 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf); in pcap_check_header() 380 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 483 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in pcap_check_header() 504 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in grow_buffer() [all …]
|
H A D | sslutils.c | 60 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen) in ssl_init_once() argument 76 …snprintf(errbuf, errbuflen, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), … in ssl_init_once() 87 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once() 94 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once() 104 snprintf(errbuf, errbuflen, "Cannot read CA list from %s", ssl_rootfile); in ssl_init_once() 117 snprintf(errbuf, errbuflen, "Cannot init random"); in ssl_init_once() 134 SSL *ssl_promotion(int is_server, PCAP_SOCKET s, char *errbuf, size_t errbuflen) in ssl_promotion() argument 136 if (ssl_init_once(is_server, 1, errbuf, errbuflen) < 0) { in ssl_promotion() 145 snprintf(errbuf, errbuflen, "SSL_accept(): %s", in ssl_promotion() 151 snprintf(errbuf, errbuflen, "SSL_connect(): %s", in ssl_promotion() [all …]
|
H A D | pcap-haiku.c | 82 pcapint_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_haiku() 139 dgram_socket(const int af, char *errbuf) in dgram_socket() argument 143 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, errno, in dgram_socket() 153 struct ifreq *ifreq, char *errbuf) in ioctl_ifreq() argument 156 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, errno, in ioctl_ifreq() 170 &handlep->ifreq, handle->errbuf) < 0) in get_promisc() 186 &handlep->ifreq, handle->errbuf); in set_promisc() 215 strlcpy(handle->errbuf, "Sending packets isn't supported yet", in pcap_inject_haiku() 229 &handlep->ifreq, handle->errbuf) < 0) in pcap_stats_haiku() 246 if ((handlep->aux_socket = dgram_socket(AF_INET, handle->errbuf)) < 0) in pcap_activate_haiku() [all …]
|
H A D | fmtutils.c | 267 pcapint_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, in pcapint_fmt_errmsg_for_errno() argument 273 pcapint_vfmt_errmsg_for_errno(errbuf, errbuflen, errnum, fmt, ap); in pcapint_fmt_errmsg_for_errno() 278 pcapint_vfmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, in pcapint_vfmt_errmsg_for_errno() argument 285 (void)vsnprintf(errbuf, errbuflen, fmt, ap); in pcapint_vfmt_errmsg_for_errno() 286 msglen = strlen(errbuf); in pcapint_vfmt_errmsg_for_errno() 296 p = errbuf + msglen; in pcapint_vfmt_errmsg_for_errno() 334 utf_8_to_acp_truncated(errbuf); in pcapint_vfmt_errmsg_for_errno() 350 pcapint_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, in pcapint_fmt_errmsg_for_win32_err() argument 356 pcapint_vfmt_errmsg_for_win32_err(errbuf, errbuflen, errnum, fmt, ap); in pcapint_fmt_errmsg_for_win32_err() 361 pcapint_vfmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, in pcapint_vfmt_errmsg_for_win32_err() argument [all …]
|
H A D | pcap-npf.c | 201 char *errbuf) in oid_get_request() argument 214 snprintf(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request() 225 pcapint_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request() 264 pcapint_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_npf() 321 pcapint_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_ex_npf() 347 …snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: not enough memory to allocate the kernel buff… in pcap_setbuff_npf() 361 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: working mode not recognized"); in pcap_setmode_npf() 376 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: unable to set the requested mintocopy size"); in pcap_setmintocopy_npf() 395 return (oid_get_request(pw->adapter, oid, data, lenp, p->errbuf)); in pcap_oid_get_request_npf() 414 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_oid_set_request_npf() [all …]
|
H A D | pcap-pf.c | 125 pcapint_fmt_errmsg_for_errno(pc->errbuf, in pcap_read_pf() 126 sizeof(pc->errbuf), errno, "pf read"); in pcap_read_pf() 161 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf() 171 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf() 231 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_pf() 330 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 336 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 361 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 373 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 380 pcapint_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() [all …]
|
/freebsd/contrib/libpcap/rpcapd/ |
H A D | rpcapd.c | 185 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in main() local 198 memset(errbuf, 0, sizeof(errbuf)); in main() 334 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1) in main() 336 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 341 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in main() 343 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 362 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, in main() 364 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 373 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, in main() 375 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() [all …]
|
H A D | daemon.c | 128 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 143 …packapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf); 219 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop() local 247 *errbuf = 0; // Initialize errbuf in daemon_serviceloop() 262 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop() 266 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); in daemon_serviceloop() 327 "TLS is required by this server", errbuf) == -1) in daemon_serviceloop() 330 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop() 337 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop() 341 errbuf); in daemon_serviceloop() [all …]
|
/freebsd/usr.sbin/traceroute/ |
H A D | findsaddr-socket.c | 96 static char errbuf[512]; in findsaddr() local 100 sprintf(errbuf, "socket: %.128s", strerror(errno)); in findsaddr() 101 return (errbuf); in findsaddr() 120 sprintf(errbuf, "write: %.128s", strerror(errno)); in findsaddr() 122 return (errbuf); in findsaddr() 125 sprintf(errbuf, "short write (%d != %d)", cc, size); in findsaddr() 127 return (errbuf); in findsaddr() 135 sprintf(errbuf, "read: %.128s", strerror(errno)); in findsaddr() 137 return (errbuf); in findsaddr() 146 sprintf(errbuf, "bad version %d", rp->rtm_version); in findsaddr() [all …]
|
/freebsd/usr.bin/wall/ |
H A D | ttymsg.c | 62 static char errbuf[1024]; in ttymsg() local 76 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 78 return (errbuf); in ttymsg() 88 (void) snprintf(errbuf, sizeof(errbuf), "%s: %s", device, in ttymsg() 90 return (errbuf); in ttymsg() 127 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 130 return (errbuf); in ttymsg() 154 (void) snprintf(errbuf, sizeof(errbuf), in ttymsg() 156 return (errbuf); in ttymsg()
|
/freebsd/lib/libprocstat/ |
H A D | libprocstat_compat.c | 91 struct filestat *fst, struct freebsd11_ptsstat *pts, char *errbuf); 93 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf); 95 struct filestat *fst, struct freebsd11_semstat *sem, char *errbuf); 97 struct filestat *fst, struct freebsd11_shmstat *shm, char *errbuf); 99 struct filestat *fst, struct freebsd11_sockstat *sock, char *errbuf); 101 struct filestat *fst, struct freebsd11_vnstat *vn, char *errbuf); 103 struct filestat *fst, struct freebsd12_vnstat *vn_compat, char *errbuf); 109 struct filestat *fst, struct freebsd11_ptsstat *pts_compat, char *errbuf) in freebsd11_procstat_get_pts_info() argument 114 r = procstat_get_pts_info(procstat, fst, &pts, errbuf); in freebsd11_procstat_get_pts_info() 128 struct filestat *fst, struct freebsd12_ptsstat *pts_compat, char *errbuf) in freebsd12_procstat_get_pts_info() argument [all …]
|
/freebsd/sys/contrib/openzfs/lib/libzfs/ |
H A D | libzfs_pool.c | 527 nvlist_t *props, uint64_t version, prop_flags_t flags, char *errbuf) in zpool_valid_proplist() argument 556 errbuf); in zpool_valid_proplist() 561 retprops, &strval, &intval, errbuf) != 0) in zpool_valid_proplist() 574 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 589 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 596 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 606 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 615 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 633 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() 641 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zpool_valid_proplist() [all …]
|
H A D | libzfs_diff.c | 92 (void) snprintf(di->errbuf, sizeof (di->errbuf), in get_stats_for_obj() 98 (void) snprintf(di->errbuf, sizeof (di->errbuf), in get_stats_for_obj() 103 (void) snprintf(di->errbuf, sizeof (di->errbuf), in get_stats_for_obj() 287 zfs_error(di->zhp->zfs_hdl, di->zerr, di->errbuf); in write_inuse_diffs_one() 302 zfs_error(di->zhp->zfs_hdl, di->zerr, di->errbuf); in write_inuse_diffs_one() 425 (void) snprintf(di->errbuf, sizeof (di->errbuf), in write_free_diffs() 448 strlcpy(di->errbuf, zfs_strerror(errno), sizeof (di->errbuf)); in differ() 494 (void) snprintf(di->errbuf, sizeof (di->errbuf), in differ() 516 (void) snprintf(di->errbuf, sizeof (di->errbuf), in make_temp_snapshot() 520 return (zfs_error(hdl, EZFS_DIFF, di->errbuf)); in make_temp_snapshot() [all …]
|
H A D | libzfs_dataset.c | 709 char errbuf[ERRBUFLEN]; in zfs_open() local 712 (void) snprintf(errbuf, sizeof (errbuf), in zfs_open() 719 (void) zfs_error(hdl, EZFS_INVALIDNAME, errbuf); in zfs_open() 735 (void) zfs_standard_error(hdl, errno, errbuf); in zfs_open() 756 (void) zfs_standard_error(hdl, errno, errbuf); in zfs_open() 766 (void) zfs_error(hdl, EZFS_NOENT, errbuf); in zfs_open() 772 (void) zfs_standard_error(hdl, errno, errbuf); in zfs_open() 785 (void) zfs_error(hdl, EZFS_BADTYPE, errbuf); in zfs_open() 1032 boolean_t key_params_ok, const char *errbuf) in zfs_valid_proplist() argument 1065 (void) zfs_error(hdl, EZFS_BADPROP, errbuf); in zfs_valid_proplist() [all …]
|
/freebsd/sys/contrib/openzfs/lib/libzfs/os/linux/ |
H A D | libzfs_util_os.c | 172 (void) snprintf(di->errbuf, sizeof (di->errbuf), in find_shares_object() 174 return (zfs_error(di->zhp->zfs_hdl, EZFS_DIFF, di->errbuf)); in find_shares_object() 222 char errbuf[1024]; in zfs_userns() local 227 (void) snprintf(errbuf, sizeof (errbuf), in zfs_userns() 231 (void) snprintf(errbuf, sizeof (errbuf), in zfs_userns() 240 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); in zfs_userns() 244 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); in zfs_userns() 248 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); in zfs_userns() 252 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); in zfs_userns() 256 return (zfs_error(hdl, EZFS_BADTYPE, errbuf)); in zfs_userns() [all …]
|
/freebsd/lib/libkvm/tests/ |
H A D | kvm_open2_test.c | 47 ATF_CHECK(!errbuf_has_error(errbuf)); in ATF_TC_BODY() 50 errbuf, NULL) == NULL); in ATF_TC_BODY() 51 ATF_CHECK(errbuf_has_error(errbuf)); in ATF_TC_BODY() 61 ATF_CHECK(strlen(errbuf) == 0); in ATF_TC_BODY() 64 errbuf, NULL) == NULL); in ATF_TC_BODY() 65 ATF_CHECK(errbuf_has_error(errbuf)); in ATF_TC_BODY() 81 kd = kvm_open2(NULL, "some-file", O_RDONLY, errbuf, NULL); in ATF_TC_BODY() 82 ATF_CHECK(errbuf_has_error(errbuf)); in ATF_TC_BODY() 99 kd = kvm_open2("some-file", "/bin/sh", O_RDONLY, errbuf, NULL); in ATF_TC_BODY() 100 ATF_CHECK(errbuf_has_error(errbuf)); in ATF_TC_BODY()
|
/freebsd/contrib/libpcap/testprogs/ |
H A D | findalldevstest.c | 38 static char errbuf[ERRBUF_SIZE+1]; in win32_strerror() local 41 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf, in win32_strerror() 48 errlen = strlen(errbuf); in win32_strerror() 50 errbuf[errlen - 1] = '\0'; in win32_strerror() 51 errbuf[errlen - 2] = '\0'; in win32_strerror() 54 return errbuf; in win32_strerror() 106 char errbuf[PCAP_ERRBUF_SIZE+1]; in main() local 117 if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1) in main() 132 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1) in main() 134 fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf); in main() [all …]
|