Symbol: message
bin/sh/memalloc.c
46
badalloc(const char *message)
bin/sh/memalloc.c
48
write(2, message, strlen(message));
cddl/usr.sbin/zfsd/tests/libmocks.c
45
void syslog(int priority, const char* message, ...) {
cddl/usr.sbin/zfsd/tests/libmocks.c
49
va_start(ap, message);
cddl/usr.sbin/zfsd/tests/libmocks.c
50
vsnprintf(syslog_last_message, 4096, message, ap);
cddl/usr.sbin/zfsd/tests/libmocks.h
46
void syslog(int priority, const char* message, ...);
crypto/heimdal/appl/gssmask/gssmask.c
73
char *message;
crypto/heimdal/appl/gssmask/gssmask.c
78
vasprintf(&message, fmt, ap);
crypto/heimdal/appl/gssmask/gssmask.c
82
fprintf(logfile, "%s:%u: %d %s\n", file, lineno, level, message);
crypto/heimdal/appl/gssmask/gssmask.c
91
if (krb5_store_string(c->logging, message) != 0)
crypto/heimdal/appl/gssmask/gssmask.c
96
free(message);
crypto/heimdal/appl/kf/kf.c
126
char *message, size_t len)
crypto/heimdal/appl/kf/kf.c
272
memcpy(message, data.data, len);
crypto/heimdal/appl/kf/kf.c
273
message[len - 1] = '\0';
crypto/heimdal/appl/kf/kf.c
275
memcpy(message, data.data, data.length);
crypto/heimdal/appl/kf/kf.c
276
message[data.length] = '\0';
crypto/heimdal/appl/kf/kf.c
280
return(strcmp(message, "ok"));
crypto/heimdal/appl/kf/kf.c
285
char *message, size_t len)
crypto/heimdal/appl/kf/kf.c
315
return proto (s, hostname, service, message, len);
crypto/heimdal/appl/kf/kf.c
338
char message[128];
crypto/heimdal/appl/kf/kf.c
339
ret = doit (argv[i], port, service, message, sizeof(message));
crypto/heimdal/appl/kf/kf.c
343
warnx ("%s: failed: %s", argv[i], message);
crypto/heimdal/lib/ipc/hi_locl.h
71
typedef boolean_t (*dispatch_mig_callback_t)(mach_msg_header_t *message, mach_msg_header_t *reply);
crypto/heimdal/lib/kadm5/kadm5-pwcheck.h
58
char *message,
crypto/heimdal/lib/kadm5/password_quality.c
108
strlcpy(message, "out of memory", length);
crypto/heimdal/lib/kadm5/password_quality.c
121
snprintf(message, length,
crypto/heimdal/lib/kadm5/password_quality.c
138
char *message,
crypto/heimdal/lib/kadm5/password_quality.c
150
snprintf(message, length, "password contains newline, "
crypto/heimdal/lib/kadm5/password_quality.c
160
snprintf(message, length, "external password quality "
crypto/heimdal/lib/kadm5/password_quality.c
167
strlcpy(message, "out of memory", length);
crypto/heimdal/lib/kadm5/password_quality.c
173
snprintf(message, length, "external password quality "
crypto/heimdal/lib/kadm5/password_quality.c
189
snprintf(message, length, "external password quality "
crypto/heimdal/lib/kadm5/password_quality.c
194
snprintf(message, length, "External password quality "
crypto/heimdal/lib/kadm5/password_quality.c
211
snprintf(message, length, "external program failed: %s", reply);
crypto/heimdal/lib/kadm5/password_quality.c
217
snprintf(message, length, "%s", reply);
crypto/heimdal/lib/kadm5/password_quality.c
49
char *message,
crypto/heimdal/lib/kadm5/password_quality.c
58
strlcpy(message, "Password too short", length);
crypto/heimdal/lib/kadm5/password_quality.c
69
static char message[1024];
crypto/heimdal/lib/kadm5/password_quality.c
72
message[0] = '\0';
crypto/heimdal/lib/kadm5/password_quality.c
75
message, sizeof(message));
crypto/heimdal/lib/kadm5/password_quality.c
77
return message;
crypto/heimdal/lib/kadm5/password_quality.c
87
char *message,
crypto/heimdal/lib/krb5/rd_cred.c
40
const char *message)
crypto/heimdal/lib/krb5/rd_cred.c
51
"%s: %s != %s", message, b_str, a_str);
crypto/krb5/src/appl/simple/client/sim_client.c
111
message = optarg;
crypto/krb5/src/appl/simple/client/sim_client.c
255
inbuf.data = message;
crypto/krb5/src/appl/simple/client/sim_client.c
256
inbuf.length = strlen(message);
crypto/krb5/src/appl/simple/client/sim_client.c
79
char *message = MSG;
crypto/krb5/src/appl/simple/server/sim_server.c
235
&message, NULL))) {
crypto/krb5/src/appl/simple/server/sim_server.c
239
printf("Safe message is: '%.*s'\n", (int) message.length, message.data);
crypto/krb5/src/appl/simple/server/sim_server.c
241
krb5_free_data_contents(context, &message);
crypto/krb5/src/appl/simple/server/sim_server.c
258
&message, NULL))) {
crypto/krb5/src/appl/simple/server/sim_server.c
262
printf("Decrypted message is: '%.*s'\n", (int) message.length,
crypto/krb5/src/appl/simple/server/sim_server.c
263
message.data);
crypto/krb5/src/appl/simple/server/sim_server.c
83
krb5_data packet, message;
crypto/krb5/src/ccapi/test/pingtest.c
72
char* message = "Hello, RPC!";
crypto/krb5/src/ccapi/test/pingtest.c
82
err = krb5int_ipc_stream_write(send_stream, message,
crypto/krb5/src/ccapi/test/pingtest.c
83
1+strlen(message));
crypto/krb5/src/clients/kpasswd/kpasswd.c
161
if (krb5_chpw_message(context, &result_string, &message) != 0)
crypto/krb5/src/clients/kpasswd/kpasswd.c
162
message = NULL;
crypto/krb5/src/clients/kpasswd/kpasswd.c
165
message ? ": " : "", message ? message : NULL);
crypto/krb5/src/clients/kpasswd/kpasswd.c
166
krb5_free_string(context, message);
crypto/krb5/src/clients/kpasswd/kpasswd.c
53
char *pname, *message;
crypto/krb5/src/lib/gssapi/krb5/gssapiP_krb5.h
350
struct k5input *in, gss_buffer_t message);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
119
if (SIZE_MAX - 300 < message->length) {
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
123
ec_max = SIZE_MAX - message->length - 300;
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
132
err = alloc_data(&plain, message->length + 16 + ec);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
163
memcpy(plain.data, message->value, message->length);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
165
memset(plain.data + message->length, 'x', ec);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
166
memcpy(plain.data + message->length + ec, outbuf, 16);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
195
err = alloc_data(&plain, message->length + 16);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
233
memcpy(plain.data, message->value, message->length);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
234
memcpy(plain.data + message->length, outbuf, 16);
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
272
message = message2 = &empty_message;
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
63
const gss_buffer_desc * message,
crypto/krb5/src/lib/gssapi/krb5/k5sealv3.c
72
const gss_buffer_desc *message2 = message;
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
127
flags, seqnum, message->value, message->length,
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
136
gss_buffer_t message, gss_buffer_t token,
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
160
&unwrapped, message);
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
163
message);
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
38
struct k5input *in, gss_buffer_t message)
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
75
message->value, message->length,
crypto/krb5/src/lib/gssapi/krb5/verify_mic.c
91
gss_buffer_t message)
crypto/krb5/src/lib/krb5/ccache/cc_file.c
1433
static unsigned int message = 0;
crypto/krb5/src/lib/krb5/ccache/cc_file.c
1435
if (message == 0)
crypto/krb5/src/lib/krb5/ccache/cc_file.c
1436
message = RegisterWindowMessage(WM_KERBEROS5_CHANGED);
crypto/krb5/src/lib/krb5/ccache/cc_file.c
1438
return message;
crypto/krb5/src/lib/krb5/ccache/ccapi/stdcc.c
106
static unsigned int message = 0;
crypto/krb5/src/lib/krb5/ccache/ccapi/stdcc.c
108
if (message == 0)
crypto/krb5/src/lib/krb5/ccache/ccapi/stdcc.c
109
message = RegisterWindowMessage(WM_KERBEROS5_CHANGED);
crypto/krb5/src/lib/krb5/ccache/ccapi/stdcc.c
111
PostMessage(HWND_BROADCAST, message, 0, 0);
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
194
char *message;
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
307
if (krb5_chpw_message(context, &result_string, &message) != 0)
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
308
message = NULL;
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
313
if (message != NULL && strlen(message) > (sizeof(banner) - 100))
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
314
message[sizeof(banner) - 100] = '\0';
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
319
message ? ": " : "", message ? message : "");
crypto/krb5/src/lib/krb5/krb/gic_pwd.c
321
free(message);
crypto/krb5/src/lib/krb5/krb/recvauth.c
152
const char *message;
crypto/krb5/src/lib/krb5/krb/recvauth.c
168
message = error_message(problem);
crypto/krb5/src/lib/krb5/krb/recvauth.c
169
error.text.length = strlen(message) + 1;
crypto/krb5/src/lib/krb5/krb/recvauth.c
170
error.text.data = strdup(message);
crypto/krb5/src/lib/krb5/os/changepw.c
101
kpasswd_sendto_msg_cleanup(void *data, krb5_data *message)
crypto/krb5/src/lib/krb5/os/changepw.c
105
krb5_free_data_contents(ctx->context, message);
crypto/krb5/src/lib/krb5/os/changepw.c
110
kpasswd_sendto_msg_callback(SOCKET fd, void *data, krb5_data *message)
crypto/krb5/src/lib/krb5/os/changepw.c
120
memset (message, 0, sizeof(krb5_data));
crypto/krb5/src/lib/krb5/os/changepw.c
189
message->length = output.length;
crypto/krb5/src/lib/krb5/os/changepw.c
190
message->data = output.data;
crypto/krb5/src/lib/krb5/os/os-proto.h
199
krb5_error_code k5_sendto(krb5_context context, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/os-proto.h
210
krb5_error_code k5_sendto_kdc(krb5_context context, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/os-proto.h
85
int (*pfn_callback)(SOCKET fd, void *data, krb5_data *message);
crypto/krb5/src/lib/krb5/os/os-proto.h
86
void (*pfn_cleanup)(void *data, krb5_data *message);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1006
return start_connection(context, conn, message, selstate,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1499
k5_sendto(krb5_context context, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1542
retval = resolve_server(context, realm, servers, s, strategy, message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1551
if (maybe_send(context, state, message, sel_state, realm,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1565
if (maybe_send(context, state, message, sel_state, realm,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
1582
if (maybe_send(context, state, message, sel_state, realm,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
447
k5_sendto_kdc(krb5_context context, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
472
TRACE_SENDTO_KDC(context, message->length, realm, use_primary, no_udp);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
493
else if (message->length <= (unsigned int) context->udp_pref_limit)
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
504
realm, message, &hook_message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
516
message = hook_message;
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
520
retval = k5_sendto(context, message, realm, &servers, strategy, NULL,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
536
retval, realm, message, &reply,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
568
krb5_sendto_kdc(krb5_context context, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
572
return k5_sendto_kdc(context, message, realm, *use_primary, no_udp,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
605
const krb5_data *message, char **req_out, size_t *len_out)
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
622
ret = alloc_data(&pm.kerb_message, message->length + 4);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
625
store_32_be(message->length, pm.kerb_message.data);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
626
memcpy(pm.kerb_message.data + 4, message->data, message->length);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
662
const krb5_data *message)
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
669
if (message == NULL || message->length == 0)
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
673
store_32_be(message->length, out->msg_len_buf);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
675
SG_SET(&out->sgbuf[1], message->data, message->length);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
679
ret = make_proxy_request(state, realm, message, &req, &reqlen);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
689
SG_SET(&out->sgbuf[0], message->data, message->length);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
807
k5_transport_strategy strategy, const krb5_data *message,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
886
const krb5_data *message, struct select_state *selstate,
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
947
message = &state->callback_buffer;
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
950
e = set_transport_message(state, realm, message);
crypto/krb5/src/lib/krb5/os/sendto_kdc.c
998
const krb5_data *message, struct select_state *selstate,
crypto/krb5/src/lib/krb5/os/trace.c
414
info.message = msg;
crypto/krb5/src/lib/krb5/os/trace.c
446
(void) write(*fd, info->message, strlen(info->message));
crypto/krb5/src/lib/rpc/clnt_perror.c
186
char *message;
crypto/krb5/src/lib/rpc/clnt_perror.c
239
return (rpc_errlist[i].message);
crypto/krb5/src/lib/rpc/clnt_perror.c
316
char *message;
crypto/krb5/src/lib/rpc/clnt_perror.c
345
return(auth_errlist[i].message);
crypto/krb5/src/windows/leash/KrbListTickets.cpp
57
char message[256];
crypto/krb5/src/windows/leash/KrbListTickets.cpp
61
_snprintf(message, sizeof(message),
crypto/krb5/src/windows/leash/KrbListTickets.cpp
66
message[sizeof(message)-1] = 0;
crypto/krb5/src/windows/leash/KrbListTickets.cpp
68
MessageBox(NULL, message, "Kerberos Five", MB_OK | MB_ICONERROR |
crypto/krb5/src/windows/leash/LeashView.cpp
1940
BOOL CLeashView::PostWarningMessage(const CString& message)
crypto/krb5/src/windows/leash/LeashView.cpp
1946
m_pWarningMessage = new CString(message);
crypto/krb5/src/windows/leash/LeashView.cpp
1963
if ( pMsg->message == ID_OBTAIN_TGT_WITH_LPARAM )
crypto/krb5/src/windows/leash/LeashView.cpp
1968
if ( pMsg->message == WM_TIMER ) {
crypto/krb5/src/windows/leash/LeashView.h
217
BOOL PostWarningMessage(const CString& message);
crypto/krb5/src/windows/leash/MainFrm.cpp
410
LRESULT CMainFrame::WindowProc(UINT message, WPARAM wParam, LPARAM lParam)
crypto/krb5/src/windows/leash/MainFrm.cpp
414
switch(message)
crypto/krb5/src/windows/leash/MainFrm.cpp
442
return CLeashFrame::WindowProc(message, wParam, lParam);
crypto/krb5/src/windows/leash/MainFrm.h
69
virtual LRESULT WindowProc(UINT message, WPARAM wParam, LPARAM lParam);
crypto/krb5/src/windows/leashdll/krb5routines.c
458
char message[256];
crypto/krb5/src/windows/leashdll/krb5routines.c
462
_snprintf(message, sizeof(message),
crypto/krb5/src/windows/leashdll/krb5routines.c
467
message[sizeof(message)-1] = 0;
crypto/krb5/src/windows/leashdll/krb5routines.c
469
MessageBox(NULL, message, "Kerberos Five", MB_OK | MB_ICONERROR |
crypto/krb5/src/windows/leashdll/krb5routines.c
507
MultiInputDialogProc( HWND hDialog, UINT message, WPARAM wParam, LPARAM lParam)
crypto/krb5/src/windows/leashdll/krb5routines.c
511
switch ( message ) {
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1236
UINT message,
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1263
switch (message) {
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1664
UINT message,
crypto/krb5/src/windows/leashdll/lsh_pwd.c
1680
switch (message) {
crypto/krb5/src/windows/leashdll/lsh_pwd.c
498
UINT message,
crypto/krb5/src/windows/leashdll/lsh_pwd.c
541
switch (message) {
crypto/krb5/src/windows/leashdll/lshfunc.c
102
MessageBox(NULL, message, "MIT Kerberos",
crypto/krb5/src/windows/leashdll/lshfunc.c
59
char message[2048];
crypto/krb5/src/windows/leashdll/lshfunc.c
60
char *p = message;
crypto/krb5/src/windows/leashdll/lshfunc.c
61
int size = sizeof(message) - 1; /* -1 to leave room for NULL terminator */
crypto/krb5/src/windows/leashdll/winutil.c
24
UINT message,
crypto/krb5/src/windows/leashdll/winutil.c
32
if (message > WM_USER && message < 0x7FFF)
crypto/krb5/src/windows/leashdll/winutil.c
35
switch(message)
crypto/krb5/src/windows/leashdll/winutil.c
90
return SendMessage(GetDlgItem(hWnd, 1), message, wParam, lParam);
crypto/krb5/src/windows/leashdll/winutil.c
91
return DefWindowProc(hWnd, message, wParam, lParam);
crypto/libecc/src/sig/eddsa.c
1052
ATTRIBUTE_WARN_UNUSED_RET static int eddsa_compute_pre_hash(const u8 *message, u32 message_size,
crypto/libecc/src/sig/eddsa.c
1061
MUST_HAVE((message != NULL) && (digest != NULL) && (digest_size != NULL), ret, err);
crypto/libecc/src/sig/eddsa.c
1075
ret = hash->hfunc_update(&hash_ctx, message, message_size); EG(ret, err);
crypto/openssh/blocklist.c
62
im_log(int priority, const char *message, va_list args)
crypto/openssh/blocklist.c
79
do_log2(imlevel, message, args);
crypto/openssh/libcrux_mlkem768_sha3.h
10435
libcrux_ml_kem_polynomial_PolynomialRingElement_f0 *message,
crypto/openssh/libcrux_mlkem768_sha3.h
10446
&message->coefficients[i0]);
crypto/openssh/libcrux_mlkem768_sha3.h
10470
libcrux_ml_kem_polynomial_PolynomialRingElement_f0 *message) {
crypto/openssh/libcrux_mlkem768_sha3.h
10482
error_2, message, result);
crypto/openssh/libcrux_mlkem768_sha3.h
10810
uint8_t message[32U],
crypto/openssh/libcrux_mlkem768_sha3.h
10856
memcpy(copy_of_message, message, (size_t)32U * sizeof(uint8_t));
crypto/openssh/libcrux_mlkem768_sha3.h
9248
libcrux_ml_kem_polynomial_PolynomialRingElement_f0 message =
crypto/openssh/libcrux_mlkem768_sha3.h
9252
libcrux_ml_kem_serialize_compress_then_serialize_message_aa(message, ret0);
crypto/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc
23
struct sshbuf *message = sshbuf_from(data, strlen(data));
crypto/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc
29
sshsig_verifyb(signature, message, "castle", &k, &details);
crypto/openssh/regress/misc/fuzz-harness/sshsig_fuzz.cc
33
sshbuf_free(message);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
308
sig_ecdsa(const uint8_t *message, size_t message_len,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
349
dump("message", message, message_len);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
364
SHA256Update(&ctx, message, message_len);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
404
sig_ed25519(const uint8_t *message, size_t message_len,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
428
dump("message", message, message_len);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
441
memcpy(signbuf + o, message, message_len);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
490
uint8_t message[32];
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
505
SHA256Final(message, &ctx);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
510
if (sig_ecdsa(message, sizeof(message), application,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
516
if (sig_ed25519(message, sizeof(message), application,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
529
explicit_bzero(message, sizeof(message));
crypto/openssh/sk-usbhid.c
394
uint8_t message[32];
crypto/openssh/sk-usbhid.c
396
memset(message, '\0', sizeof(message));
crypto/openssh/sk-usbhid.c
402
if ((r = fido_assert_set_clientdata(assert, message,
crypto/openssh/sk-usbhid.c
403
sizeof(message))) != FIDO_OK) {
crypto/openssh/sk-usbhid.c
779
uint8_t message[32];
crypto/openssh/sk-usbhid.c
784
memset(message, '\0', sizeof(message));
crypto/openssh/sk-usbhid.c
790
if ((r = fido_assert_set_clientdata(assert, message,
crypto/openssh/sk-usbhid.c
791
sizeof(message))) != FIDO_OK) {
crypto/openssh/ssh-sk-helper.c
104
(r = sshbuf_get_string_direct(req, &message, &msglen)) != 0 ||
crypto/openssh/ssh-sk-helper.c
126
message, msglen, compat, pin)) != 0) {
crypto/openssh/ssh-sk-helper.c
97
const u_char *message;
crypto/openssh/ssh-sk.c
72
int (*sk_sign)(int alg, const uint8_t *message, size_t message_len,
crypto/openssh/ssh-sk.c
88
int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
crypto/openssh/ssh.c
530
check_load(int r, struct sshkey **k, const char *path, const char *message)
crypto/openssh/ssh.c
538
error_r(r, "load %s \"%s\"", message, path);
crypto/openssh/ssh.c
545
fatal_r(r, "load %s \"%s\"", message, path);
crypto/openssh/ssh.c
552
error_r(r, "load %s \"%s\"", message, path);
crypto/openssh/sshsig.c
450
const struct sshbuf *message, const char *sig_namespace,
crypto/openssh/sshsig.c
460
if ((r = hash_buffer(message, hashalg, &b)) != 0) {
crypto/openssh/sshsig.c
475
sshsig_verifyb(struct sshbuf *signature, const struct sshbuf *message,
crypto/openssh/sshsig.c
490
if ((r = hash_buffer(message, hashalg, &b)) != 0) {
crypto/openssh/sshsig.h
38
const char *sk_provider, const char *sk_pin, const struct sshbuf *message,
crypto/openssh/sshsig.h
48
const struct sshbuf *message, const char *sig_namespace,
crypto/openssl/crypto/bn/bn_rand.c
295
const unsigned char *message,
crypto/openssl/crypto/bn/bn_rand.c
354
|| !EVP_DigestUpdate(mdctx, message, message_len)
crypto/openssl/crypto/bn/bn_rand.c
398
const BIGNUM *priv, const unsigned char *message,
crypto/openssl/crypto/bn/bn_rand.c
403
ret = ossl_bn_gen_dsa_nonce_fixed_top(out, range, priv, message,
crypto/openssl/crypto/cryptlib.c
253
void OPENSSL_die(const char *message, const char *file, int line)
crypto/openssl/crypto/cryptlib.c
256
file, line, message);
crypto/openssl/crypto/ec/curve448/ed448.h
123
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/ed448.h
68
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/eddsa.c
159
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/eddsa.c
194
|| !EVP_DigestUpdate(hashctx, message, message_len)) {
crypto/openssl/crypto/ec/curve448/eddsa.c
235
|| !EVP_DigestUpdate(hashctx, message, message_len)
crypto/openssl/crypto/ec/curve448/eddsa.c
291
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/eddsa.c
343
|| !EVP_DigestUpdate(hashctx, message, message_len)
crypto/openssl/crypto/ec/curve448/eddsa.c
381
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/eddsa.c
386
return ossl_c448_ed448_sign(ctx, out_sig, private_key, public_key, message,
crypto/openssl/crypto/ec/curve448/eddsa.c
403
const uint8_t *message, size_t message_len,
crypto/openssl/crypto/ec/curve448/eddsa.c
408
return ossl_c448_ed448_verify(ctx, signature, public_key, message,
crypto/openssl/crypto/ml_kem/ml_kem.c
1479
const uint8_t message[DEGREE / 8],
crypto/openssl/crypto/ml_kem/ml_kem.c
1520
scalar_decode_decompress_add(&v, message);
crypto/openssl/demos/digest/EVP_MD_xof.c
30
static const char message[] = "This is a test message.";
crypto/openssl/demos/digest/EVP_MD_xof.c
92
if (EVP_DigestUpdate(ctx, message, sizeof(message)) == 0) {
crypto/openssl/include/crypto/bn.h
99
const unsigned char *message,
crypto/openssl/include/crypto/ecx.h
110
const uint8_t *message, size_t message_len,
crypto/openssl/include/crypto/ecx.h
116
const uint8_t *message, size_t message_len,
crypto/openssl/include/internal/deterministic_nonce.h
18
const unsigned char *message,
crypto/openssl/include/openssl/bn.h
557
const BIGNUM *priv, const unsigned char *message,
crypto/openssl/include/openssl/macros.h
44
#define OSSL_DEPRECATED_FOR(since, message) \
crypto/openssl/include/openssl/macros.h
45
__declspec(deprecated("Since OpenSSL " #since ";" message))
crypto/openssl/include/openssl/macros.h
48
#define OSSL_DEPRECATED_FOR(since, message) __declspec(deprecated)
crypto/openssl/include/openssl/macros.h
58
#define OSSL_DEPRECATED_FOR(since, message) \
crypto/openssl/include/openssl/macros.h
59
__attribute__((deprecated("Since OpenSSL " #since ";" message)))
crypto/openssl/include/openssl/macros.h
62
#define OSSL_DEPRECATED_FOR(since, message) __attribute__((deprecated))
crypto/openssl/include/openssl/macros.h
67
#define OSSL_DEPRECATED_FOR(since, message) __attribute__((deprecated))
crypto/openssl/include/openssl/macros.h
79
#define OSSL_DEPRECATED_FOR(since, message) extern
crypto/openssl/test/ecdsatest.c
106
|| !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len))
crypto/openssl/test/ecdsatest.c
108
|| !TEST_true(EVP_DigestUpdate(mctx, message, msg_len))
crypto/openssl/test/ecdsatest.c
147
OPENSSL_free(message);
crypto/openssl/test/ecdsatest.c
77
unsigned char *pbuf = NULL, *qbuf = NULL, *message = NULL;
crypto/openssl/test/sm2_internal_test.c
136
const char *message,
crypto/openssl/test/sm2_internal_test.c
139
const size_t msg_len = strlen(message);
crypto/openssl/test/sm2_internal_test.c
175
(const uint8_t *)message, msg_len,
crypto/openssl/test/sm2_internal_test.c
194
|| !TEST_mem_eq(recovered, recovered_len, message, msg_len))
crypto/openssl/test/sm2_internal_test.c
302
const char *message,
crypto/openssl/test/sm2_internal_test.c
308
const size_t msg_len = strlen(message);
crypto/openssl/test/sm2_internal_test.c
338
strlen(userid), (const uint8_t *)message, msg_len);
crypto/openssl/test/sm2_internal_test.c
354
strlen(userid), (const uint8_t *)message, msg_len);
crypto/openssl/test/threadstest.c
851
const char *message = "Hello World";
crypto/openssl/test/threadstest.c
852
size_t messlen = strlen(message);
crypto/openssl/test/threadstest.c
880
|| !TEST_true(EVP_DigestUpdate(mdctx, message, messlen))
crypto/openssl/test/threadstest.c
887
(unsigned char *)message,
kerberos5/lib/libroken/fbsd_ossl_provider_load.c
33
print_dlerror(char *message)
kerberos5/lib/libroken/fbsd_ossl_provider_load.c
39
message, errstr);
lib/libbe/be.c
1384
be_log_history(libbe_handle_t *lbh, const char *message)
lib/libbe/be.c
1388
err = zpool_log_history(lbh->lzh, message);
lib/libc/rpc/getnetconfig.c
613
const char *message;
lib/libc/rpc/getnetconfig.c
617
message = _nc_errors[0];
lib/libc/rpc/getnetconfig.c
620
message = _nc_errors[1];
lib/libc/rpc/getnetconfig.c
623
message = _nc_errors[2];
lib/libc/rpc/getnetconfig.c
626
message = _nc_errors[3];
lib/libc/rpc/getnetconfig.c
629
message = _nc_errors[4];
lib/libc/rpc/getnetconfig.c
632
message = "Unknown network selection error";
lib/libc/rpc/getnetconfig.c
635
return ((char *)message);
lib/libc/softfloat/timesoftfloat.c
45
static void fail( const char *message, ... )
lib/libc/softfloat/timesoftfloat.c
50
va_start( varArgs, message );
lib/libc/softfloat/timesoftfloat.c
51
vfprintf( stderr, message, varArgs );
lib/libc/tests/stdio/gets_s_test.c
112
message = NULL;
lib/libc/tests/stdio/gets_s_test.c
116
ATF_CHECK_MSG(strcmp(message, "gets_s : n > RSIZE_MAX") == 0, "gets_s(): incorrect error message");
lib/libc/tests/stdio/gets_s_test.c
126
message = NULL;
lib/libc/tests/stdio/gets_s_test.c
130
ATF_CHECK_MSG(strcmp(message, "gets_s : n == 0") == 0, "gets_s(): incorrect error message");
lib/libc/tests/stdio/gets_s_test.c
37
static const char * message;
lib/libc/tests/stdio/gets_s_test.c
43
message = msg;
lib/libcasper/services/cap_syslog/cap_syslog.c
62
char message[CAP_SYSLOG_LIMIT];
lib/libcasper/services/cap_syslog/cap_syslog.c
64
(void)vsnprintf(message, sizeof(message), fmt, ap);
lib/libcasper/services/cap_syslog/cap_syslog.c
69
nvlist_add_string(nvl, "message", message);
lib/libomp/omp-tools.h
1147
const char *message, size_t length,
lib/libomp/omp-tools.h
1153
const char *message;
libexec/tftpd/tftp-utils.c
147
tftp_log(int priority, const char *message, ...)
libexec/tftpd/tftp-utils.c
154
va_start(ap, message);
libexec/tftpd/tftp-utils.c
156
vasprintf(&s, message, ap);
libexec/tftpd/tftp-utils.c
159
vprintf(message, ap);
libexec/tftpd/tftp-utils.h
114
void tftp_log(int priority, const char *message, ...) __printflike(2, 3);
sbin/camcontrol/modeedit.c
865
#define ABORT_READ(message, param) do { \
sbin/camcontrol/modeedit.c
866
warnx(message, param); \
sbin/devd/devd.cc
158
static void devdlog(int priority, const char* message, ...)
sbin/dump/dump.h
90
void broadcast(const char *message);
sbin/dump/optr.c
155
broadcast(const char *message)
sbin/dump/optr.c
170
if (message[0])
sbin/dump/optr.c
171
(void) fputs(message, fp);
sbin/ggate/shared/ggate.c
101
g_gate_log(int priority, const char *message, ...)
sbin/ggate/shared/ggate.c
105
va_start(ap, message);
sbin/ggate/shared/ggate.c
106
g_gate_vlog(priority, message, ap);
sbin/ggate/shared/ggate.c
111
g_gate_xvlog(const char *message, va_list ap)
sbin/ggate/shared/ggate.c
114
g_gate_vlog(LOG_ERR, message, ap);
sbin/ggate/shared/ggate.c
120
g_gate_xlog(const char *message, ...)
sbin/ggate/shared/ggate.c
124
va_start(ap, message);
sbin/ggate/shared/ggate.c
125
g_gate_xvlog(message, ap);
sbin/ggate/shared/ggate.c
65
g_gate_vlog(int priority, const char *message, va_list ap)
sbin/ggate/shared/ggate.c
92
vprintf(message, ap);
sbin/ggate/shared/ggate.c
96
vsyslog(priority, message, ap);
sbin/ggate/shared/ggate.h
100
void g_gate_vlog(int priority, const char *message, va_list ap);
sbin/ggate/shared/ggate.h
101
void g_gate_log(int priority, const char *message, ...);
sbin/ggate/shared/ggate.h
102
void g_gate_xvlog(const char *message, va_list ap) __dead2;
sbin/ggate/shared/ggate.h
103
void g_gate_xlog(const char *message, ...) __dead2;
sbin/init/init.c
139
static void write_stderr(const char *message);
sbin/init/init.c
457
stall(const char *message, ...)
sbin/init/init.c
460
va_start(ap, message);
sbin/init/init.c
462
vsyslog(LOG_ALERT, message, ap);
sbin/init/init.c
473
warning(const char *message, ...)
sbin/init/init.c
476
va_start(ap, message);
sbin/init/init.c
478
vsyslog(LOG_ALERT, message, ap);
sbin/init/init.c
487
emergency(const char *message, ...)
sbin/init/init.c
490
va_start(ap, message);
sbin/init/init.c
492
vsyslog(LOG_EMERG, message, ap);
sbin/init/init.c
625
write_stderr(const char *message)
sbin/init/init.c
628
write(STDERR_FILENO, message, strlen(message));
share/examples/sunrpc/msg/printmsg.c
11
char *message;
share/examples/sunrpc/msg/printmsg.c
17
message = argv[1];
share/examples/sunrpc/msg/printmsg.c
19
if (!printmessage(message)) {
share/examples/sunrpc/msg/rprintmsg.c
15
char *message;
share/examples/sunrpc/msg/rprintmsg.c
26
message = argv[2];
share/examples/sunrpc/msg/rprintmsg.c
46
result = printmessage_1(&message, cl);
stand/efi/libefi/efihttp.c
388
EFI_HTTP_MESSAGE message;
stand/efi/libefi/efihttp.c
462
token.Message = &message;
stand/efi/libefi/efihttp.c
463
message.Data.Request = &request;
stand/efi/libefi/efihttp.c
464
message.HeaderCount = 3;
stand/efi/libefi/efihttp.c
465
message.Headers = headers;
stand/efi/libefi/efihttp.c
466
message.BodyLength = 0;
stand/efi/libefi/efihttp.c
467
message.Body = NULL;
stand/efi/libefi/efihttp.c
508
token.Message = &message;
stand/efi/libefi/efihttp.c
509
message.Data.Response = &response;
stand/efi/libefi/efihttp.c
510
message.HeaderCount = 0;
stand/efi/libefi/efihttp.c
511
message.Headers = NULL;
stand/efi/libefi/efihttp.c
512
message.BodyLength = 0;
stand/efi/libefi/efihttp.c
513
message.Body = NULL;
stand/efi/libefi/efihttp.c
534
BS->FreePool(message.Headers);
stand/efi/libefi/efihttp.c
538
BS->FreePool(message.Headers);
stand/efi/libefi/efihttp.c
543
for (i = 0; i < message.HeaderCount; i++) {
stand/efi/libefi/efihttp.c
544
if (strcasecmp((const char *)message.Headers[i].FieldName,
stand/efi/libefi/efihttp.c
547
message.Headers[i].FieldValue, NULL, 10);
stand/efi/libefi/efihttp.c
548
else if (strcasecmp((const char *)message.Headers[i].FieldName,
stand/efi/libefi/efihttp.c
550
if (strncmp((const char *)message.Headers[i].FieldValue,
stand/efi/libefi/efihttp.c
604
EFI_HTTP_MESSAGE message;
stand/efi/libefi/efihttp.c
630
token.Message = &message;
stand/efi/libefi/efihttp.c
631
message.Data.Request = NULL;
stand/efi/libefi/efihttp.c
632
message.HeaderCount = 0;
stand/efi/libefi/efihttp.c
633
message.Headers = NULL;
stand/efi/libefi/efihttp.c
634
message.BodyLength = size;
stand/efi/libefi/efihttp.c
635
message.Body = buf;
stand/efi/libefi/efihttp.c
664
*resid = size - message.BodyLength;
stand/efi/libefi/efihttp.c
665
fh->offset += message.BodyLength;
sys/compat/linuxkpi/common/include/linux/usb.h
74
int (*suspend)(struct usb_interface *intf, pm_message_t message);
sys/dev/aic7xxx/aic79xx.c
169
char *message, int verbose_level);
sys/dev/aic7xxx/aic79xx.c
5062
u_int lun, cam_status status, char *message,
sys/dev/aic7xxx/aic79xx.c
5118
if (message != NULL
sys/dev/aic7xxx/aic79xx.c
5122
message, devinfo->channel, devinfo->target, found);
sys/dev/aic7xxx/aic7xxx.c
196
cam_status status, char *message,
sys/dev/aic7xxx/aic7xxx.c
3786
cam_status status, char *message, int verbose_level)
sys/dev/aic7xxx/aic7xxx.c
3832
if (message != NULL
sys/dev/aic7xxx/aic7xxx.c
3835
message, devinfo->channel, devinfo->target, found);
sys/dev/bxe/bxe.c
8388
uint32_t cid = elem->message.data.eth_event.echo & BXE_SWCID_MASK;
sys/dev/bxe/bxe.c
8394
switch (le32toh(elem->message.data.eth_event.echo) >> BXE_SWCID_SHIFT) {
sys/dev/bxe/bxe.c
8411
elem->message.data.eth_event.echo);
sys/dev/bxe/bxe.c
8487
cid = SW_CID(elem->message.data.cfc_del_event.cid);
sys/dev/bxe/bxe.c
8488
opcode = elem->message.opcode;
sys/dev/bxe/bxe.c
8526
echo = elem->message.data.function_update_event.echo;
sys/dev/bxe/bxe.c
8566
cid = elem->message.data.eth_event.echo & BXE_SWCID_MASK;
sys/dev/bxe/bxe.c
8598
elem->message.opcode, sc->state);
sys/dev/bxe/ecore_hsi.h
11624
struct event_ring_msg message /* event ring message */;
sys/dev/bxe/ecore_sp.c
1815
if (cqe->message.error)
sys/dev/ciss/ciss.c
3752
if (cn->message[0] != 0)
sys/dev/ciss/ciss.c
3753
ciss_printf(sc, "*** %.80s\n", cn->message);
sys/dev/ciss/cissreg.h
379
char message[80];
sys/dev/dpaa/bman.c
51
const char *message;
sys/dev/dpaa/bman.c
57
message = "Invalid Command Verb";
sys/dev/dpaa/bman.c
60
message = "FBPR pool exhaused. Consider increasing "
sys/dev/dpaa/bman.c
64
message = "Single bit ECC error";
sys/dev/dpaa/bman.c
67
message = "Multi bit ECC error";
sys/dev/dpaa/bman.c
70
message = "Unknown error";
sys/dev/dpaa/bman.c
73
device_printf(sc->sc_dev, "BMAN Exception: %s.\n", message);
sys/dev/dpaa/qman.c
101
message = "Invalid Enqueue State Interrupt";
sys/dev/dpaa/qman.c
104
message = "Invalid Enqueue Channel Interrupt";
sys/dev/dpaa/qman.c
107
message = "Invalid Enqueue Queue Interrupt";
sys/dev/dpaa/qman.c
110
message = "CG change state notification";
sys/dev/dpaa/qman.c
113
message = "Unknown error";
sys/dev/dpaa/qman.c
116
device_printf(sc->sc_dev, "QMan Exception: %s.\n", message);
sys/dev/dpaa/qman.c
56
const char *message;
sys/dev/dpaa/qman.c
62
message = "Initiator Data Error";
sys/dev/dpaa/qman.c
65
message = "CoreNet Target Data Error";
sys/dev/dpaa/qman.c
68
message = "Invalid Target Transaction";
sys/dev/dpaa/qman.c
71
message = "PFDR Low Watermark Interrupt";
sys/dev/dpaa/qman.c
74
message = "PFDR Enqueues Blocked Interrupt";
sys/dev/dpaa/qman.c
77
message = "Single Bit ECC Error Interrupt";
sys/dev/dpaa/qman.c
80
message = "Multi Bit ECC Error Interrupt";
sys/dev/dpaa/qman.c
83
message = "Invalid Command Verb Interrupt";
sys/dev/dpaa/qman.c
86
message = "Invalid Dequeue Direct Connect Portal Interrupt";
sys/dev/dpaa/qman.c
89
message = "Invalid Dequeue FQ Interrupt";
sys/dev/dpaa/qman.c
92
message = "Invalid Dequeue Source Interrupt";
sys/dev/dpaa/qman.c
95
message = "Invalid Dequeue Queue Interrupt";
sys/dev/dpaa/qman.c
98
message = "Invalid Enqueue Overflow Interrupt";
sys/dev/hyperv/pcib/vmbus_pcib.c
1061
version_req = (struct pci_version_request *)&ctxt.pkt.message;
sys/dev/hyperv/pcib/vmbus_pcib.c
1110
struct pci_message message;
sys/dev/hyperv/pcib/vmbus_pcib.c
1113
message.type = PCI_QUERY_BUS_RELATIONS;
sys/dev/hyperv/pcib/vmbus_pcib.c
1115
&message, sizeof(message), 0);
sys/dev/hyperv/pcib/vmbus_pcib.c
1141
d0_entry = (struct pci_bus_d0_entry *)&ctxt.pkt.message;
sys/dev/hyperv/pcib/vmbus_pcib.c
1201
(struct pci_resources_assigned *)&pkt->message;
sys/dev/hyperv/pcib/vmbus_pcib.c
1207
(struct pci_resources_assigned2 *)&pkt->message;
sys/dev/hyperv/pcib/vmbus_pcib.c
1215
&pkt->message, size_res,
sys/dev/hyperv/pcib/vmbus_pcib.c
310
struct pci_message message[0];
sys/dev/hyperv/pcib/vmbus_pcib.c
621
int_pkt = (struct pci_delete_interrupt *)&ctxt.pkt.message;
sys/dev/hyperv/pcib/vmbus_pcib.c
684
res_req = (struct pci_child_message *)&ctxt.pkt.message;
sys/dev/hyperv/pcib/vmbus_pcib.c
899
eject_pkt = (struct pci_eject_response *)&ctxt.pkt.message;
sys/dev/hyperv/vmbus/vmbus.c
654
msg = VMBUS_PCPU_GET(sc, message, curcpu) + VMBUS_SINT_MESSAGE;
sys/dev/hyperv/vmbus/vmbus.c
693
msg_base = VMBUS_PCPU_GET(sc, message, cpu);
sys/dev/hyperv/vmbus/vmbus.c
771
val = pmap_kextract((vm_offset_t)VMBUS_PCPU_GET(sc, message, cpu)) &
sys/dev/hyperv/vmbus/vmbus.c
867
VMBUS_PCPU_GET(sc, message, cpu) = ptr;
sys/dev/hyperv/vmbus/vmbus.c
918
if (VMBUS_PCPU_GET(sc, message, cpu) != NULL) {
sys/dev/hyperv/vmbus/vmbus.c
919
free(VMBUS_PCPU_GET(sc, message, cpu), M_DEVBUF);
sys/dev/hyperv/vmbus/vmbus.c
920
VMBUS_PCPU_GET(sc, message, cpu) = NULL;
sys/dev/hyperv/vmbus/vmbus_var.h
73
struct vmbus_message *message; /* shared messages */
sys/dev/ice/ice_fw_logging.c
423
SDT_PROBE2(ice_fwlog, , , message, (const u8 *)buf, desc->datalen);
sys/dev/ice/ice_fw_logging.c
54
SDT_PROBE_DEFINE2(ice_fwlog, , , message, "uint8_t *", "int");
sys/dev/isci/scil/scic_sds_remote_device.c
1334
#define scic_sds_emit_event_log_message(device, event_code, message, state)
sys/dev/pms/RefTisa/tisa/sassata/common/ossa.h
74
#define ossaAssert(agRoot, expr, message) \
sys/dev/pms/RefTisa/tisa/sassata/common/ossa.h
78
printk("ossaAssert: %s", (message)); \
sys/dev/pms/freebsd/driver/common/osdebug.h
44
#define OS_ASSERT(expr, message) \
sys/dev/pms/freebsd/driver/common/osdebug.h
48
printf("ASSERT: %s", message); \
sys/dev/pms/freebsd/driver/common/osdebug.h
55
#define OS_ASSERT(expr, message) \
sys/dev/pms/freebsd/driver/common/osdebug.h
59
printf("ASSERT: %s", message); \
sys/dev/qat/qat_api/include/icp_sal_user.h
561
CpaStatus icp_sal_userSendMsgToVf(Cpa32U accelId, Cpa32U vfNum, Cpa32U message);
sys/dev/qat/qat_api/include/icp_sal_user.h
581
CpaStatus icp_sal_userSendMsgToPf(Cpa32U accelId, Cpa32U message);
sys/dev/qat/qat_api/include/icp_sal_user.h
603
Cpa32U *message,
sys/dev/qat/qat_api/include/icp_sal_user.h
625
Cpa32U *message,
sys/dev/sfxge/common/ef10_impl.h
172
__in unsigned int message,
sys/dev/sfxge/common/ef10_intr.c
167
__in unsigned int message,
sys/dev/sfxge/common/ef10_intr.c
174
_NOTE(ARGUNUSED(enp, message))
sys/dev/sfxge/common/efx.h
366
__in unsigned int message,
sys/dev/sfxge/common/efx_intr.c
275
__in unsigned int message,
sys/dev/sfxge/common/efx_intr.c
284
eiop->eio_status_message(enp, message, fatalp);
sys/dev/sfxge/common/efx_intr.c
505
__in unsigned int message,
sys/dev/sfxge/common/efx_intr.c
513
if (message == eip->ei_level)
sys/dev/sfxge/common/efx_intr.c
75
__in unsigned int message,
sys/dev/syscons/daemon/daemon_saver.c
238
clear_string(sc, txpos, typos, toff, message, tlen);
sys/dev/syscons/daemon/daemon_saver.c
344
draw_string(sc, txpos, typos, toff, message, tlen);
sys/dev/syscons/daemon/daemon_saver.c
363
message = malloc(messagelen + 1, M_DEVBUF, M_WAITOK);
sys/dev/syscons/daemon/daemon_saver.c
366
free(message, M_DEVBUF);
sys/dev/syscons/daemon/daemon_saver.c
371
sprintf(message, "%s - %s %s", prison0.pr_hostname, ostype, osrelease);
sys/dev/syscons/daemon/daemon_saver.c
382
free(message, M_DEVBUF);
sys/dev/syscons/daemon/daemon_saver.c
50
static u_char *message;
sys/dev/syscons/snake/snake_saver.c
144
messagelen = sprintf(message, "%s %s", ostype, osrelease);
sys/dev/syscons/snake/snake_saver.c
147
messagelen = snprintf(message, MSGBUF_LEN,
sys/dev/syscons/snake/snake_saver.c
158
message = malloc(MSGBUF_LEN, M_DEVBUF, M_WAITOK);
sys/dev/syscons/snake/snake_saver.c
167
free(message, M_DEVBUF);
sys/dev/syscons/snake/snake_saver.c
48
static u_char *message;
sys/dev/syscons/snake/snake_saver.c
73
#define save message
sys/dev/xen/netfront/netfront.c
526
const char *message;
sys/dev/xen/netfront/netfront.c
548
message = "writing tx ring-ref";
sys/dev/xen/netfront/netfront.c
553
message = "writing rx ring-ref";
sys/dev/xen/netfront/netfront.c
559
message = "writing event-channel";
sys/dev/xen/netfront/netfront.c
569
xenbus_dev_fatal(dev, err, "%s", message);
sys/dev/xen/netfront/netfront.c
578
const char *message;
sys/dev/xen/netfront/netfront.c
621
message = "writing multi-queue-num-queues";
sys/dev/xen/netfront/netfront.c
635
message = "writing request-rx-copy";
sys/dev/xen/netfront/netfront.c
640
message = "writing feature-rx-notify";
sys/dev/xen/netfront/netfront.c
645
message = "writing feature-sg";
sys/dev/xen/netfront/netfront.c
651
message = "writing feature-gso-tcpv4";
sys/dev/xen/netfront/netfront.c
658
message = "writing feature-no-csum-offload";
sys/dev/xen/netfront/netfront.c
674
xenbus_dev_fatal(dev, err, "%s", message);
sys/kern/kern_boottrace.c
428
boottrace_parse_message(char *message, char **eventname, char **tdname)
sys/kern/kern_boottrace.c
432
delim = strchr(message, ':');
sys/kern/kern_boottrace.c
435
*tdname = message;
sys/kern/kern_boottrace.c
439
*eventname = message;
sys/kern/kern_boottrace.c
447
char message[BT_MSGLEN];
sys/kern/kern_boottrace.c
454
message[0] = '\0';
sys/kern/kern_boottrace.c
455
error = sysctl_handle_string(oidp, message, sizeof(message), req);
sys/kern/kern_boottrace.c
459
boottrace_parse_message(message, &eventname, &tdname);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
227
struct mbuf *results, *message, *mic;
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
235
message = NULL;
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
244
message = results;
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
247
m_freem(message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
256
m_freem(message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
264
m_freem(message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
273
message, mic, &qop_state);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
277
m_freem(message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
289
message = results;
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
291
m_trim(message, len);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
292
maj_stat = gss_unwrap_mbuf(&min_stat, ctx, &message,
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
308
seq_num = get_uint32(&message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
309
if (!message)
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
315
m_freem(message);
sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
319
*resultsp = message;
tests/sys/capsicum/capability-fd.cc
295
const char* message = "Hello capability world";
tests/sys/capsicum/capability-fd.cc
296
EXPECT_OK(write(fd, message, strlen(message)));
tests/sys/capsicum/capsicum-test.h
262
#define SEND_INT_MESSAGE(fd, message) \
tests/sys/capsicum/capsicum-test.h
264
int _msg = message; \
tests/sys/capsicum/linux.cc
1368
const char* message = "Saved text";
tests/sys/capsicum/linux.cc
1369
EXPECT_OK(write(fd, message, strlen(message)));
tests/sys/capsicum/linux.cc
1382
EXPECT_EQ(std::string(message), std::string(buffer, len));
tests/sys/capsicum/mqueue.cc
73
const char* message = "xyzzy";
tests/sys/capsicum/mqueue.cc
77
EXPECT_OK(mq_timedsend_(cap_write_mq, message, strlen(message) + 1, kPriority, &ts));
tests/sys/capsicum/mqueue.cc
78
EXPECT_NOTCAPABLE(mq_timedsend_(cap_read_mq, message, strlen(message) + 1, kPriority, &ts));
tests/sys/capsicum/mqueue.cc
92
EXPECT_EQ(std::string(message), std::string(buffer));
tests/sys/fs/fusefs/fifo.cc
102
r = read(fd, message + recvd, bufsize - recvd);
tests/sys/fs/fusefs/fifo.cc
107
ASSERT_STREQ(message, MESSAGE);
tests/sys/fs/fusefs/fifo.cc
155
char message[bufsize];
tests/sys/fs/fusefs/fifo.cc
203
r = read(connected, message + recvd, bufsize - recvd);
tests/sys/fs/fusefs/fifo.cc
208
ASSERT_STREQ(message, MESSAGE);
tests/sys/fs/fusefs/fifo.cc
90
char message[bufsize];
tests/sys/fs/fusefs/release.cc
206
char message[CMSG_SPACE(sizeof(int))];
tests/sys/fs/fusefs/release.cc
225
memset(&message, 0, sizeof(message));
tests/sys/fs/fusefs/write.cc
1419
char message[CMSG_SPACE(sizeof(int))];
tests/sys/fs/fusefs/write.cc
1454
memset(&message, 0, sizeof(message));
tests/sys/kern/unix_passfd_test.c
1006
cm = message;
tests/sys/kern/unix_passfd_test.c
1014
msghdr.msg_control = message;
tests/sys/kern/unix_passfd_test.c
166
char message[CMSG_SPACE(sizeof(int))];
tests/sys/kern/unix_passfd_test.c
170
bzero(&message, sizeof(message));
tests/sys/kern/unix_passfd_test.c
172
msghdr.msg_control = message;
tests/sys/kern/unix_passfd_test.c
173
msghdr.msg_controllen = sizeof(message);
tests/sys/kern/unix_passfd_test.c
181
putfds(message, send_fd, 1);
tests/sys/kern/unix_passfd_test.c
218
char *message;
tests/sys/kern/unix_passfd_test.c
223
message = malloc(cmsgsz);
tests/sys/kern/unix_passfd_test.c
224
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
226
msghdr.msg_control = message;
tests/sys/kern/unix_passfd_test.c
818
char *message;
tests/sys/kern/unix_passfd_test.c
828
message = malloc(CMSG_SPACE(sizeof(int)));
tests/sys/kern/unix_passfd_test.c
829
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
830
putfds(message, putfd, 1);
tests/sys/kern/unix_passfd_test.c
831
send_cmsg(fd[0], message, CMSG_LEN(sizeof(int)));
tests/sys/kern/unix_passfd_test.c
832
recv_cmsg(fd[1], message, CMSG_LEN(0), MSG_CTRUNC);
tests/sys/kern/unix_passfd_test.c
834
free(message);
tests/sys/kern/unix_passfd_test.c
841
message = malloc(CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
842
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
843
putfds(message, putfd, 1);
tests/sys/kern/unix_passfd_test.c
844
putfds(message + CMSG_SPACE(sizeof(int)), putfd, 1);
tests/sys/kern/unix_passfd_test.c
845
send_cmsg(fd[0], message, CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
846
recv_cmsg(fd[1], message, CMSG_SPACE(sizeof(int)), MSG_CTRUNC);
tests/sys/kern/unix_passfd_test.c
847
rc = close(*(int *)CMSG_DATA(message));
tests/sys/kern/unix_passfd_test.c
850
free(message);
tests/sys/kern/unix_passfd_test.c
856
message = malloc(CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
857
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
858
putfds(message, putfd, 1);
tests/sys/kern/unix_passfd_test.c
859
putfds(message + CMSG_SPACE(sizeof(int)), putfd, 1);
tests/sys/kern/unix_passfd_test.c
860
send_cmsg(fd[0], message, CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
861
recv_cmsg(fd[1], message, CMSG_SPACE(0), MSG_CTRUNC);
tests/sys/kern/unix_passfd_test.c
863
free(message);
tests/sys/kern/unix_passfd_test.c
870
message = malloc(CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
871
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
872
putfds(message, putfd, 1);
tests/sys/kern/unix_passfd_test.c
873
putfds(message + CMSG_SPACE(sizeof(int)), putfd, 1);
tests/sys/kern/unix_passfd_test.c
874
send_cmsg(fd[0], message, CMSG_SPACE(sizeof(int)) * 2);
tests/sys/kern/unix_passfd_test.c
875
recv_cmsg(fd[1], message, CMSG_SPACE(sizeof(int)) + CMSG_SPACE(0),
tests/sys/kern/unix_passfd_test.c
877
rc = close(*(int *)CMSG_DATA(message));
tests/sys/kern/unix_passfd_test.c
880
free(message);
tests/sys/kern/unix_passfd_test.c
886
message = malloc(CMSG_SPACE(sizeof(int) * 3));
tests/sys/kern/unix_passfd_test.c
887
ATF_REQUIRE(message != NULL);
tests/sys/kern/unix_passfd_test.c
888
putfds(message, putfd, 3);
tests/sys/kern/unix_passfd_test.c
889
send_cmsg(fd[0], message, CMSG_SPACE(sizeof(int) * 3));
tests/sys/kern/unix_passfd_test.c
890
recv_cmsg(fd[1], message, CMSG_SPACE(sizeof(int)), MSG_CTRUNC);
tests/sys/kern/unix_passfd_test.c
892
free(message);
tests/sys/kern/unix_passfd_test.c
951
char *cm, message[CMSG_SPACE(0) + CMSG_SPACE(sizeof(int))];
tests/sys/kern/unix_passfd_test.c
986
cm = message;
tests/sys/kern/unix_passfd_test.c
990
msghdr.msg_control = message;
tests/sys/kern/unix_passfd_test.c
991
msghdr.msg_controllen = sizeof(message);
tests/sys/netgraph/basic.c
104
ATF_TC(message);
tests/sys/netgraph/basic.c
105
ATF_TC_HEAD(message, conf)
tests/sys/netgraph/basic.c
110
ATF_TC_BODY(message, dummy)
tests/sys/netgraph/basic.c
186
ATF_TP_ADD_TC(basic, message);
tools/regression/netinet/arphold/arphold.c
114
if (sendto(sock, message, sizeof(message), 0,
tools/regression/netinet/arphold/arphold.c
141
if (sendto(sock, message, sizeof(message), 0,
tools/regression/netinet/arphold/arphold.c
66
char message[MSG_SIZE];
tools/regression/netinet/arphold/arphold.c
71
memset(&message, 1, sizeof(message));
tools/regression/netinet/msocket/msocket.c
355
char message;
tools/regression/netinet/msocket/msocket.c
398
message = 'A';
tools/regression/netinet/msocket/msocket.c
399
len = sizeof(message);
tools/regression/netinet/msocket/msocket.c
400
len = sendto(sock, &message, len, 0, (struct sockaddr *)&sin,
tools/regression/netinet/msocket/msocket.c
405
if (len != sizeof(message))
tools/regression/netinet/msocket/msocket.c
407
sizeof(message), len);
tools/regression/netinet/msocket/msocket.c
409
message = 'B';
tools/regression/netinet/msocket/msocket.c
411
len = recvfrom(sock, &message, sizeof(message), 0,
tools/regression/netinet/msocket/msocket.c
416
if (len != sizeof(message))
tools/regression/netinet/msocket/msocket.c
418
len, sizeof(message));
tools/regression/netinet/msocket/msocket.c
420
if (message != 'A')
tools/regression/netinet/msocket/msocket.c
422
message);
tools/regression/security/access/testaccess.c
120
reportprivilege(char *message)
tools/regression/security/access/testaccess.c
138
if (message)
tools/regression/security/access/testaccess.c
139
printf("%s: ", message);
tools/regression/security/cap_test/cap_test_capabilities.c
55
#define SYSCALL_FAIL(syscall, message) \
tools/regression/security/cap_test/cap_test_capabilities.c
56
FAIL("%s:\t%s (rights 0x%jx)", #syscall, message, rights)
tools/tools/ether_reflect/ether_reflect.c
49
void usage(char* message) {
tools/tools/ether_reflect/ether_reflect.c
50
if (message != NULL)
tools/tools/ether_reflect/ether_reflect.c
51
printf ("error: %s\n", message);
tools/tools/mcgrab/mcgrab.cc
72
void usage(string message)
tools/tools/mcgrab/mcgrab.cc
75
cerr << message << endl;
tools/tools/mctest/mctest.cc
74
void usage(string message)
tools/tools/mctest/mctest.cc
77
cerr << message << endl;
usr.bin/banner/banner.c
1009
static char *message;
usr.bin/banner/banner.c
1050
if ((message = malloc((size_t)j)) == NULL)
usr.bin/banner/banner.c
1052
strlcpy(message, *argv, j);
usr.bin/banner/banner.c
1054
strlcat(message, " ", j);
usr.bin/banner/banner.c
1055
strlcat(message, *argv, j);
usr.bin/banner/banner.c
1057
nchars = strlen(message);
usr.bin/banner/banner.c
1059
if ((message = malloc((size_t)MAXMSG)) == NULL)
usr.bin/banner/banner.c
1062
if (fgets(message, MAXMSG, stdin) == NULL) {
usr.bin/banner/banner.c
1064
message[0] = '\0';
usr.bin/banner/banner.c
1066
nchars = strlen(message);
usr.bin/banner/banner.c
1069
if (message[nchars - 1] == '\n')
usr.bin/banner/banner.c
1070
message[--nchars] = '\0';
usr.bin/banner/banner.c
1100
if ((u_char) message[i] >= NCHARS ||
usr.bin/banner/banner.c
1101
asc_ptr[(u_char) message[i]] == 0) {
usr.bin/banner/banner.c
1103
message[i]);
usr.bin/banner/banner.c
1110
printf("Message '%s' is OK\n",message);
usr.bin/banner/banner.c
1115
printf("Char #%d: %c\n", i, message[i]);
usr.bin/banner/banner.c
1117
pc = asc_ptr[(u_char) message[i]];
usr.bin/banner/banner.c
1159
free(message);
usr.bin/mail/cmd1.c
151
dot = &message[*ip - 1];
usr.bin/mail/cmd1.c
162
struct message *mp;
usr.bin/mail/cmd1.c
169
mp = &message[mesg-1];
usr.bin/mail/cmd1.c
208
printf("%td\n", dot - &message[0] + 1);
usr.bin/mail/cmd1.c
289
struct message *mp;
usr.bin/mail/cmd1.c
301
nlines += message[*ip - 1].m_lines;
usr.bin/mail/cmd1.c
321
mp = &message[*ip - 1];
usr.bin/mail/cmd1.c
362
struct message *mp;
usr.bin/mail/cmd1.c
376
mp = &message[*ip - 1];
usr.bin/mail/cmd1.c
406
dot = &message[*ip-1];
usr.bin/mail/cmd1.c
423
dot = &message[*ip-1];
usr.bin/mail/cmd1.c
464
dot = &message[mdot - 1];
usr.bin/mail/cmd1.c
53
struct message *mp;
usr.bin/mail/cmd1.c
61
mp = &message[screen * size];
usr.bin/mail/cmd1.c
62
if (mp >= &message[msgCount])
usr.bin/mail/cmd1.c
63
mp = &message[msgCount - size];
usr.bin/mail/cmd1.c
64
if (mp < &message[0])
usr.bin/mail/cmd1.c
65
mp = &message[0];
usr.bin/mail/cmd1.c
67
mesg = mp - &message[0];
usr.bin/mail/cmd1.c
68
if (dot != &message[n-1])
usr.bin/mail/cmd1.c
70
for (; mp < &message[msgCount]; mp++) {
usr.bin/mail/cmd2.c
105
for (mp = dot+1; mp < &message[msgCount]; mp++)
usr.bin/mail/cmd2.c
108
if (mp >= &message[msgCount]) {
usr.bin/mail/cmd2.c
118
list[0] = dot - &message[0] + 1;
usr.bin/mail/cmd2.c
153
struct message *mp;
usr.bin/mail/cmd2.c
185
mp = &message[*ip - 1];
usr.bin/mail/cmd2.c
279
lastdot = dot - &message[0] + 1;
usr.bin/mail/cmd2.c
281
list[0] = dot - &message[0] + 1;
usr.bin/mail/cmd2.c
301
struct message *mp;
usr.bin/mail/cmd2.c
306
mp = &message[*ip - 1];
usr.bin/mail/cmd2.c
313
dot = &message[last-1];
usr.bin/mail/cmd2.c
316
dot = &message[last-1];
usr.bin/mail/cmd2.c
320
dot = &message[0];
usr.bin/mail/cmd2.c
340
struct message *mp;
usr.bin/mail/cmd2.c
343
mp = &message[*ip - 1];
usr.bin/mail/cmd2.c
52
struct message *mp;
usr.bin/mail/cmd2.c
64
mdot = dot - &message[0] + 1;
usr.bin/mail/cmd2.c
78
mp = &message[*ip2 - 1];
usr.bin/mail/cmd3.c
197
struct message *mp;
usr.bin/mail/cmd3.c
207
mp = &message[msgvec[0] - 1];
usr.bin/mail/cmd3.c
284
struct message *mp;
usr.bin/mail/cmd3.c
292
mp = &message[mesg-1];
usr.bin/mail/cmd3.c
310
dot = &message[*ip-1];
usr.bin/mail/cmd3.c
324
struct message *mp;
usr.bin/mail/cmd3.c
329
mp = &message[mesg-1];
usr.bin/mail/cmd3.c
588
struct message *mp;
usr.bin/mail/cmd3.c
594
mp = &message[*ap - 1];
usr.bin/mail/cmd3.c
604
mp = &message[msgvec[0] - 1];
usr.bin/mail/collect.c
637
struct message *mp = message + *msgvec - 1;
usr.bin/mail/edit.c
72
struct message *mp;
usr.bin/mail/edit.c
95
dot = mp = &message[msgvec[i] - 1];
usr.bin/mail/extern.h
210
int sendmessage(struct message *, FILE *, struct ignoretab *, char *);
usr.bin/mail/extern.h
224
void statusput(struct message *, FILE *, char *);
usr.bin/mail/extern.h
230
void touch(struct message *);
usr.bin/mail/extern.h
51
char *hfield(const char *, struct message *);
usr.bin/mail/extern.h
54
char *name1(struct message *, int);
usr.bin/mail/extern.h
55
char *nameof(struct message *, int);
usr.bin/mail/extern.h
62
FILE *setinput(struct message *);
usr.bin/mail/extern.h
81
int append(struct message *, FILE *);
usr.bin/mail/fio.c
199
setinput(struct message *mp)
usr.bin/mail/fio.c
217
struct message *nmessage;
usr.bin/mail/fio.c
219
size = (msgCount + 1) * sizeof(struct message);
usr.bin/mail/fio.c
220
nmessage = (struct message *)realloc(message, size);
usr.bin/mail/fio.c
224
if (omsgCount == 0 || message == NULL)
usr.bin/mail/fio.c
227
dot = nmessage + (dot - message);
usr.bin/mail/fio.c
228
message = nmessage;
usr.bin/mail/fio.c
229
size -= (omsgCount + 1) * sizeof(struct message);
usr.bin/mail/fio.c
231
(void)lseek(fileno(f), (off_t)sizeof(*message), 0);
usr.bin/mail/fio.c
232
if (read(fileno(f), (void *)&message[omsgCount], size) != size)
usr.bin/mail/fio.c
234
message[msgCount].m_size = 0;
usr.bin/mail/fio.c
235
message[msgCount].m_lines = 0;
usr.bin/mail/fio.c
244
append(struct message *mp, FILE *f)
usr.bin/mail/fio.c
57
struct message this;
usr.bin/mail/glob.h
63
extern struct message *dot; /* Pointer to current message */
usr.bin/mail/glob.h
64
extern struct message *message; /* The actual message structure */
usr.bin/mail/lex.c
451
muvec[0] = dot - &message[0] + 1;
usr.bin/mail/lex.c
581
dot = &message[mdot - 1];
usr.bin/mail/lex.c
596
struct message *mp;
usr.bin/mail/lex.c
600
for (mp = &message[omsgCount]; mp < &message[msgCount]; mp++)
usr.bin/mail/lex.c
603
if (mp >= &message[msgCount])
usr.bin/mail/lex.c
604
for (mp = &message[omsgCount]; mp < &message[msgCount]; mp++)
usr.bin/mail/lex.c
607
if (mp < &message[msgCount])
usr.bin/mail/lex.c
608
mdot = mp - &message[0] + 1;
usr.bin/mail/lex.c
612
for (mp = &message[0], n = 0, u = 0; mp < &message[msgCount]; mp++) {
usr.bin/mail/list.c
110
struct message *mp;
usr.bin/mail/list.c
114
valdot = dot - &message[0] + 1;
usr.bin/mail/list.c
140
if (f == MDELETED || (message[i - 1].m_flag & MDELETED) == 0)
usr.bin/mail/list.c
168
} while ((message[i - 1].m_flag & MDELETED) != f);
usr.bin/mail/list.c
181
} while ((message[i - 1].m_flag & MDELETED) != f);
usr.bin/mail/list.c
231
if ((message[i].m_flag & MDELETED) == f) {
usr.bin/mail/list.c
250
if ((message[i-1].m_flag & MDELETED) == f)
usr.bin/mail/list.c
283
if (message[i-1].m_flag & MMARK) {
usr.bin/mail/list.c
306
mp = &message[i - 1];
usr.bin/mail/list.c
314
for (mp = &message[0]; mp < &message[msgCount]; mp++)
usr.bin/mail/list.c
317
if (mp >= &message[msgCount]) {
usr.bin/mail/list.c
356
struct message *mp;
usr.bin/mail/list.c
362
mp = &message[mesg-1];
usr.bin/mail/list.c
52
struct message *mp;
usr.bin/mail/list.c
61
for (mp = &message[0]; mp < &message[msgCount]; mp++)
usr.bin/mail/list.c
626
struct message *mp;
usr.bin/mail/list.c
63
*ip++ = mp - &message[0] + 1;
usr.bin/mail/list.c
632
for (mp = dot; mp < &message[msgCount]; mp++)
usr.bin/mail/list.c
634
return (mp - message + 1);
usr.bin/mail/list.c
635
for (mp = dot-1; mp >= &message[0]; mp--)
usr.bin/mail/list.c
637
return (mp - message + 1);
usr.bin/mail/list.c
654
cp = nameof(&message[mesg - 1], 0);
usr.bin/mail/list.c
668
struct message *mp;
usr.bin/mail/list.c
677
mp = &message[mesg - 1];
usr.bin/mail/list.c
704
struct message *mp;
usr.bin/mail/list.c
712
mp = &message[mesg-1];
usr.bin/mail/list.c
747
message[i-1].m_flag |= MMARK;
usr.bin/mail/list.c
761
message[i-1].m_flag &= ~MMARK;
usr.bin/mail/list.c
771
struct message *mp;
usr.bin/mail/list.c
779
for (mp = &message[0]; mp < &message[msgCount]; mp++)
usr.bin/mail/list.c
781
return (mp - &message[0] + 1);
usr.bin/mail/list.c
789
for (mp = &message[msgCount-1]; mp >= &message[0]; mp--)
usr.bin/mail/list.c
791
return (mp - &message[0] + 1);
usr.bin/mail/list.c
799
m = dot - &message[0] + 1;
usr.bin/mail/main.c
67
struct message *dot;
usr.bin/mail/main.c
68
struct message *message;
usr.bin/mail/quit.c
138
for (mp = &message[0]; mp < &message[msgCount]; mp++) {
usr.bin/mail/quit.c
155
for (c = 0, p = 0, mp = &message[0]; mp < &message[msgCount]; mp++) {
usr.bin/mail/quit.c
242
for (mp = &message[0]; mp < &message[msgCount]; mp++)
usr.bin/mail/quit.c
332
struct message *mp;
usr.bin/mail/quit.c
346
for (mp = &message[0]; mp < &message[msgCount]; mp++)
usr.bin/mail/quit.c
386
struct message *mp;
usr.bin/mail/quit.c
398
for (mp = &message[0], gotcha = 0; mp < &message[msgCount]; mp++) {
usr.bin/mail/quit.c
457
for (mp = &message[0]; mp < &message[msgCount]; mp++) {
usr.bin/mail/quit.c
67
struct message *mp;
usr.bin/mail/send.c
221
statusput(struct message *mp, FILE *obuf, char *prefix)
usr.bin/mail/send.c
49
sendmessage(struct message *mp, FILE *obuf, struct ignoretab *doign,
usr.bin/mail/util.c
127
hfield(const char *field, struct message *mp)
usr.bin/mail/util.c
334
nameof(struct message *mp, int reptype)
usr.bin/mail/util.c
492
name1(struct message *mp, int reptype)
usr.bin/mail/util.c
87
touch(struct message *mp)
usr.bin/talk/init_disp.c
156
message("Connection closing. Exiting");
usr.bin/talk/invite.c
119
message("Ringing your party again");
usr.bin/talk/invite.c
155
message(answers[response.answer]);
usr.bin/talk/invite.c
86
message("Waiting for your party to respond");
usr.bin/talk/io.c
129
message("Connection closed. Exiting");
usr.bin/talk/io.c
92
message((char *)buf);
usr.bin/talk/msgs.c
52
message(current_state);
usr.bin/talk/msgs.c
60
message(current_state);
usr.bin/talk/talk.h
78
extern void message(const char *);
usr.bin/tip/tip/log.c
44
logent(char *group, char *num, char *acu, char *message)
usr.bin/tip/tip/log.c
72
acu, message);
usr.sbin/bhyve/rfb.c
1044
unsigned const char *message;
usr.sbin/bhyve/rfb.c
1111
message = "Auth failed: authentication type mismatch";
usr.sbin/bhyve/rfb.c
1174
message = "Auth Failed: Invalid Password.";
usr.sbin/bhyve/rfb.c
1198
be32enc(buf, strlen(message));
usr.sbin/bhyve/rfb.c
1201
if (stream_write(cfd, message, strlen(message)) <= 0)
usr.sbin/bluetooth/bthidd/parser.y
273
yyerror(char const *message)
usr.sbin/bluetooth/bthidd/parser.y
275
SYSLOG(LOGERR, "%s in line %d" EOL, message, yylineno);
usr.sbin/bluetooth/hcsecd/parser.y
191
yyerror(char const *message)
usr.sbin/bluetooth/hcsecd/parser.y
193
syslog(LOG_ERR, "%s in line %d", message, yylineno);
usr.sbin/bluetooth/sdpd/log.c
100
log_notice(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
104
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
105
vsyslog(LOG_NOTICE, message, ap);
usr.sbin/bluetooth/sdpd/log.c
110
log_info(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
114
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
115
vsyslog(LOG_INFO, message, ap);
usr.sbin/bluetooth/sdpd/log.c
120
log_debug(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
124
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
125
vsyslog(LOG_DEBUG, message, ap);
usr.sbin/bluetooth/sdpd/log.c
50
log_emerg(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
54
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
55
vsyslog(LOG_EMERG, message, ap);
usr.sbin/bluetooth/sdpd/log.c
60
log_alert(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
64
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
65
vsyslog(LOG_ALERT, message, ap);
usr.sbin/bluetooth/sdpd/log.c
70
log_crit(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
74
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
75
vsyslog(LOG_CRIT, message, ap);
usr.sbin/bluetooth/sdpd/log.c
80
log_err(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
84
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
85
vsyslog(LOG_ERR, message, ap);
usr.sbin/bluetooth/sdpd/log.c
90
log_warning(char const *message, ...)
usr.sbin/bluetooth/sdpd/log.c
94
va_start(ap, message);
usr.sbin/bluetooth/sdpd/log.c
95
vsyslog(LOG_WARNING, message, ap);
usr.sbin/bluetooth/sdpd/log.h
38
void log_emerg (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
39
void log_alert (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
40
void log_crit (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
41
void log_err (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
42
void log_warning (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
43
void log_notice (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
44
void log_info (char const *message, ...);
usr.sbin/bluetooth/sdpd/log.h
45
void log_debug (char const *message, ...);
usr.sbin/bsdinstall/partedit/gpart_ops.c
1245
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
1247
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
1253
choice = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
1262
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
1264
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
1270
choice = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
266
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
268
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
274
button = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
303
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
305
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
311
button = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
470
char message[255], command[255];
usr.sbin/bsdinstall/partedit/gpart_ops.c
495
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
500
bsddialog_msgbox(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
53
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
65
snprintf(message, sizeof(message), "%s%s. %s",
usr.sbin/bsdinstall/partedit/gpart_ops.c
667
char message[512];
usr.sbin/bsdinstall/partedit/gpart_ops.c
669
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/gpart_ops.c
675
choice = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/gpart_ops.c
68
snprintf(message, sizeof(message), "%s%s", explanation,
usr.sbin/bsdinstall/partedit/gpart_ops.c
71
snprintf(message, sizeof(message), "%s%s", explanation, errmsg);
usr.sbin/bsdinstall/partedit/gpart_ops.c
76
bsddialog_msgbox(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/part_wizard.c
251
char message[512];
usr.sbin/bsdinstall/partedit/part_wizard.c
286
snprintf(message, sizeof(message), "Would you like to use this entire "
usr.sbin/bsdinstall/partedit/part_wizard.c
291
choice = bsddialog_yesno(&conf, message, 9, 45);
usr.sbin/bsdinstall/partedit/part_wizard.c
387
char availablestr[10], neededstr[10], message[512];
usr.sbin/bsdinstall/partedit/part_wizard.c
392
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/part_wizard.c
402
retval = bsddialog_yesno(&conf, message, 0, 0);
usr.sbin/bsdinstall/partedit/partedit.c
343
char message[512];
usr.sbin/bsdinstall/partedit/partedit.c
439
snprintf(message, sizeof(message),
usr.sbin/bsdinstall/partedit/partedit.c
443
bsddialog_msgbox(&conf, message, 0, 0);
usr.sbin/cron/cron/macros.h
85
# define Debug(mask, message) \
usr.sbin/cron/cron/macros.h
87
printf message;
usr.sbin/cron/cron/macros.h
89
# define Debug(mask, message) \
usr.sbin/nscd/log.c
38
__log_msg(int level, const char *sender, const char *message, ...)
usr.sbin/nscd/log.c
44
va_start(ap, message);
usr.sbin/nscd/log.c
45
vasprintf(&fmessage, message, ap);
usr.sbin/ppp/lqr.c
352
lqr_Dump(const char *link, const char *message, const struct lqrdata *lqr)
usr.sbin/ppp/lqr.c
355
log_Printf(LogLQM, "%s: %s:\n", link, message);
usr.sbin/ppp/pap.c
114
SendPapCode(struct authinfo *authp, int code, const char *message)
usr.sbin/ppp/pap.c
123
mlen = strlen(message);
usr.sbin/ppp/pap.c
135
memcpy(cp, message, mlen);
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
100
message("SDP failed to register: %s\n",
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
180
message("Accepted control connection, %d\n", c->cfg.hc);
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
215
message("Wrong chmode\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
220
message("SNDCTL_DSP_CHANNELS failed\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
225
message("SNDCTL_DSP_SETFMT failed\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
242
message("Wrong freq\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
247
message("SNDCTL_DSP_SETFMT failed\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
252
message("SNDCTL_DSP_SETFRAGMENT failed\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
259
message("Cannot open oss device %s\n", c->r->devname);
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
294
message("Handling packet: state = %d, ",
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
297
message("retval = %d\n", retval);
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
316
message("Could not get MTU size\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
323
message("Could not set send buffer size\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
329
message("Could not set low water mark\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
332
message("Accepted data connection, %d\n", c->cfg.fd);
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
348
message("Trying to open dsp\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
411
message("Not all written, closing dsp\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
475
message("Cannot set realtime priority\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
503
message("Starting to listen\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
505
message("Failed to initialize server socket\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
508
message("Registering service via SDP\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
510
message("Failed to register in SDP\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
514
message("Waiting for connection...\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
518
message("Failed to get connection\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
521
message("Got connection...\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
525
message("Connection finished...\n");
usr.sbin/virtual_oss/virtual_bt_speaker/bt_speaker.c
530
message("Unregistering service\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
128
message("Parse error: Nonincreasing sequence of frequencies.\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
132
message("Parse error.\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
173
message("\n\nReloading amplification specifications:\n%s\n", config);
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
209
message("%3.1lf Hz: requested %2.2lf, got %2.7lf (log10 = %.2lf), %3.7lfdb\n",
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
225
message("%.3lf ms: %.10lf\n", 1000.0 * i / eq->rate, eq->fftw_time[i]);
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
261
message("Usage: virtual_equalizer -d /dev/vdsp.ctl \n"
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
304
message("Wrong number of channels\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
311
message("Invalid part number\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
333
message("Bad -w argument not recognized\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
339
message("Can only specify one file\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
344
message("Cannot open specified file\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
365
message("Cannot open DSP device\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
369
message("Cannot get sample rate\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
373
message("Cannot get current FIR filter\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
380
message("Cannot disable FIR filter\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
393
message("Cannot read part information\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
396
message("Please enter EQ layout for %s, <freq> <gain>:\n", info.name);
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
401
message("Too much input data\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
413
message("Loading new EQ layout\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
416
message("Invalid equalizer data\n");
usr.sbin/virtual_oss/virtual_equalizer/equalizer.c
424
message("Cannot set FIR filter on channel\n");
usr.sbin/virtual_oss/virtual_oss_cmd/command.c
53
message("Usage: virtual_oss_cmd /dev/vdsp.ctl [command line arguments to pass to virtual_oss]\n");