/freebsd/contrib/tcsh/ |
H A D | tw.comp.c | 249 const Char *estr; in tw_match() local 250 int rv = exact ? Gmatch(estr = str, pat) : Gnmatch(str, pat, &estr); in tw_match() 254 xprintf("%s) = %d [%" TCSH_PTRDIFF_T_FMT "d]\n", short2str(estr), rv, in tw_match() 255 estr - str); in tw_match() 257 return (int) (rv ? estr - str : -1); in tw_match()
|
H A D | sh.glob.c | 941 t_pmatch(const Char *string, const Char *pattern, const Char **estr, int cs) in t_pmatch() argument 952 *estr = string; in t_pmatch() 960 *estr = Strend(string); in t_pmatch() 966 switch(t_pmatch(string, pattern, estr, cs)) { in t_pmatch() 970 pestr = *estr;/*FIXME: does not guarantee longest match */ in t_pmatch() 983 *estr = pestr; in t_pmatch()
|
H A D | sh.set.c | 1300 const Char *estr; in autoset_dspmbyte() local 1301 if (dspmc[i].n[0] && t_pmatch(pcp, dspmc[i].n, &estr, 0) > 0) { in autoset_dspmbyte() 1314 const Char *estr; in autoset_dspmbyte() local 1315 if (dspmt[i].n[0] && t_pmatch(pcp, dspmt[i].n, &estr, 0) > 0) { in autoset_dspmbyte()
|
/freebsd/crypto/heimdal/lib/kafs/ |
H A D | common.c | 350 const char *estr = (*data->get_error)(data, ret); in _kafs_try_get_cred() local 354 cell ? cell : "", realm, estr ? estr : "unknown", ret); in _kafs_try_get_cred() 356 if (estr) in _kafs_try_get_cred() 357 (*data->free_error)(data, estr); in _kafs_try_get_cred()
|
/freebsd/usr.sbin/ypldap/ |
H A D | yp.c | 320 const char *estr; in ypproc_match_2_svc() local 359 ukey.ue_uid = strtonum(key, 0, UID_MAX, &estr); in ypproc_match_2_svc() 360 if (estr) { in ypproc_match_2_svc() 374 gkey.ge_gid = strtonum(key, 0, GID_MAX, &estr); in ypproc_match_2_svc() 375 if (estr) { in ypproc_match_2_svc() 422 ukey.ue_uid = strtonum(cp, 0, UID_MAX, &estr); in ypproc_match_2_svc() 423 if (estr) { in ypproc_match_2_svc()
|
H A D | aldap.c | 1235 aldap_get_errno(struct aldap *a, const char **estr) in aldap_get_errno() argument 1239 *estr = "success"; in aldap_get_errno() 1242 *estr = "parser failed"; in aldap_get_errno() 1245 *estr = "invalid filter"; in aldap_get_errno() 1248 *estr = "operation failed"; in aldap_get_errno() 1251 *estr = "unknown"; in aldap_get_errno()
|
/freebsd/crypto/heimdal/appl/rsh/ |
H A D | rshd.c | 196 char *estr; in krb5_start_session() local 200 estr = krb5_get_error_string(context); in krb5_start_session() 203 estr ? estr : krb5_get_err_text(context, ret)); in krb5_start_session() 204 free(estr); in krb5_start_session() 211 estr = krb5_get_error_string(context); in krb5_start_session() 213 estr ? estr : krb5_get_err_text(context, ret)); in krb5_start_session() 214 free(estr); in krb5_start_session()
|
/freebsd/contrib/nvi/common/ |
H A D | exf.c | 1028 char *bp, *estr, *p, *pct, *slash, *t, *wfname, buf[8192]; local 1035 bp = estr = wfname = NULL; 1047 estr = name; 1126 estr, nlen); 1164 estr = bname; 1172 estr = wfname; 1176 estr = name; 1181 estr = name; 1185 estr = wfname; 1200 if (estr) [all …]
|
/freebsd/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 1216 char *estr; in _kdc_as_rep() local 1219 if(krb5_enctype_to_string(context, enc_data.etype, &estr)) in _kdc_as_rep() 1220 estr = NULL; in _kdc_as_rep() 1221 if(estr == NULL) in _kdc_as_rep() 1228 estr, client_name); in _kdc_as_rep() 1229 free(estr); in _kdc_as_rep()
|
/freebsd/contrib/file/src/ |
H A D | apprentice.c | 2612 check_format_type(const char *ptr, int type, const char **estr) in check_format_type() argument 2618 *estr = "missing format spec"; in check_format_type() 2794 *estr = "not valid"; in check_format_type() 2797 *estr = "too long"; in check_format_type() 2809 const char *estr; in check_format() local 2833 if (check_format_type(ptr, m->type, &estr) == -1) { in check_format() 2839 "`%s' in description `%s'", estr, in check_format()
|
/freebsd/sbin/routed/ |
H A D | parms.c | 539 bad_str(const char *estr) in bad_str() argument 543 sprintf(buf, "bad \"%.100s\"", estr); in bad_str()
|