/freebsd/contrib/tcsh/ |
H A D | tc.vers.c | 158 version = xasprintf( in fix_version() 167 version = xasprintf("%d.%.2d.%.2d", REV, VERS, PATCHLEVEL); in fix_version()
|
H A D | tc.prompt.c | 238 cz = xasprintf("%d", *(int *)info); in tprintf() 241 cz = xasprintf("%d", eventno + 1); in tprintf() 604 cz = xasprintf("%d", eventno + 1); in tprintf()
|
H A D | tc.decls.h | 232 extern char *xasprintf (const char *, ...)
|
H A D | tc.printf.c | 437 xasprintf(const char *fmt, ...) in xasprintf() function
|
/freebsd/crypto/openssh/regress/unittests/kex/ |
H A D | test_proposal.c | 76 xasprintf(&in, "a,%s,b", tests[i].in); in kex_proposal_tests() 80 xasprintf(&out, "a,%s,b", tests[i].out); in kex_proposal_tests()
|
/freebsd/crypto/openssh/ |
H A D | auth-rhosts.c | 215 xasprintf(&path, "%s/%s", in auth_rhosts2() 284 xasprintf(&path, "%s/%s", in auth_rhosts2()
|
H A D | xmalloc.h | 24 int xasprintf(char **, const char *, ...)
|
H A D | xmalloc.c | 109 xasprintf(char **ret, const char *fmt, ...) in xasprintf() function
|
H A D | auth2-pubkey.c | 82 xasprintf(&ret, "%s %s", sshkey_type(key), fp); in format_key() 203 xasprintf(&userstyle, "%s%s%s", authctxt->user, in userauth_pubkey() 708 xasprintf(&command, "%s %s", av[0], av[1]); in user_key_command_allowed2() 773 xasprintf(&conn_id, "%s %d %s %d", in user_key_allowed()
|
H A D | sshconnect.c | 96 xasprintf(&tmp, "exec %s", proxy_command); in expand_proxy_command() 716 xasprintf(&ret, "~/%s", path + l); in try_tilde_unexpand() 739 xasprintf(&ctx->names[ctx->nnames], "%s:%lu: %s", path, l->linenum, in hostkeys_find_by_key_cb() 828 xasprintf(&ret, "This host key is known by the following other " in other_hostkeys_message() 859 xasprintf(&tag, "KnownHostsCommand-%s", invocation); in load_hostkeys_command() 1154 xasprintf(&msg1, "The authenticity of host " in check_host_key()
|
H A D | session.c | 210 xasprintf(&auth_sock_name, "%s/agent.%ld", in auth_input_request_forwarding() 1227 xasprintf(&user_rc, "%s/%s", s->pw->pw_dir, _PATH_SSH_USER_RC); in do_rc_files() 1233 if (xasprintf(&cmd, "%s -c '%s %s'", shell, _PATH_BSHELL, in do_rc_files() 1271 if (xasprintf(&cmd, "%s -q -", options.xauth_location) == -1) in do_rc_files() 1999 xasprintf(&type, "session:subsystem:%s", in session_subsystem_req() 2411 xasprintf(¬e, "exit %d", WEXITSTATUS(status)); in session_exit_message() 2423 xasprintf(¬e, "signal %d%s", WTERMSIG(status), in session_exit_message()
|
H A D | mux.c | 536 xasprintf(&ret, "local forward %.200s:%d -> %.200s:%d", in format_forward() 545 xasprintf(&ret, "dynamic forward %.200s:%d -> *", in format_forward() 551 xasprintf(&ret, "remote forward %.200s:%d -> %.200s:%d", in format_forward() 615 xasprintf(&failmsg, "unknown forwarding id %d", fctx->fid); in mux_confirm_remote_forward() 652 xasprintf(&failmsg, "remote port forwarding failed for " in mux_confirm_remote_forward() 655 xasprintf(&failmsg, "remote port forwarding failed for " in mux_confirm_remote_forward() 1300 xasprintf(&options.control_path, "%s.%s", orig_control_path, rbuf); in muxserver_listen()
|
H A D | ssh-keygen.c | 1088 xasprintf(&prv_file, "%s%s", in do_gen_all_hostkeys() 1105 xasprintf(&prv_tmp, "%s%s.XXXXXXXXXX", in do_gen_all_hostkeys() 1107 xasprintf(&pub_tmp, "%s%s.pub.XXXXXXXXXX", in do_gen_all_hostkeys() 1109 xasprintf(&pub_file, "%s%s.pub", in do_gen_all_hostkeys() 1896 xasprintf(&out, "%s-cert.pub", tmp); in do_ca_sign() 2599 xasprintf(&prompt, "Enter PIN for %s key: ", in sign_one() 2633 xasprintf(&wfile, "%s.sig", filename); in sign_one() 3205 xasprintf(&path, "id_%s_rk%s%s", in do_download_sk() 3233 xasprintf(&pubpath, "%s.pub", path); in do_download_sk()
|
H A D | auth.c | 245 xasprintf(&ret, "%s %s ID %s (serial %llu) CA %s %s%s%s", in format_method_key() 258 xasprintf(&ret, "%s %s%s%s", sshkey_type(key), in format_method_key()
|
H A D | gss-genr.c | 236 xasprintf(&val, "host@%s", host); in ssh_gssapi_import_name()
|
H A D | ssh.c | 497 xasprintf(&fullhost, "%s.%s.", *hostp, in resolve_canonicalize() 1325 xasprintf(&options.proxy_command, in main() 1426 xasprintf(&cinfo->portstr, "%d", options.port); in main() 1427 xasprintf(&cinfo->uidstr, "%llu", in main() 2410 xasprintf(&cp, "%s-cert", filename); in load_public_identity_files()
|
H A D | sshconnect2.c | 202 xasprintf(&ret, "%s%s%s", first, in order_hostkeyalgs() 671 xasprintf(&ret, "%s %s%s%s%s%s%s", in format_identity() 1047 xasprintf(&prompt, "%s@%s's password: ", authctxt->server_user, host); in userauth_passwd() 1261 xasprintf(&prompt, "Enter PIN for %s key %s: ", in identity_sign() 2200 xasprintf(&chost, "%s.", lname); in userauth_hostbased()
|
/freebsd/cddl/contrib/opensolaris/tools/ctf/common/ |
H A D | memory.h | 42 int xasprintf(char **, const char *, ...);
|
H A D | memory.c | 48 xasprintf(char **s, const char *fmt, ...) in xasprintf() function
|
/freebsd/usr.bin/diff/ |
H A D | xmalloc.h | 26 int xasprintf(char **, const char *, ...)
|
H A D | xmalloc.c | 72 xasprintf(char **ret, const char *fmt, ...) in xasprintf() function
|
H A D | pr.c | 54 xasprintf(&header, "%s %s %s", diffargs, file1, file2); in start_pr()
|
/freebsd/crypto/openssh/regress/misc/fuzz-harness/ |
H A D | kex_fuzz.cc | 354 xasprintf(&path, "S2C-%s-%s", in main() 365 xasprintf(&path, "C2S-%s-%s", in main() 382 xasprintf(&path, "%s.priv", in main() 389 xasprintf(&path, "%s.pub", in main()
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | port-linux.c | 207 xasprintf(&newctx, "%.*s%s%s", (int)(cx - oldctx + 1), oldctx, in ssh_selinux_change_context()
|
H A D | port-aix.c | 402 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, in aix_krb5_get_principal_name()
|