Symbol: fn
bin/csh/file.c
755
int (*fn)(struct cmdline *, int);
bin/csh/file.c
802
ret = keys[i].fn(&cl, c);
bin/ed/io.c
149
write_file(char *fn, char *mode, int n, int m)
bin/ed/io.c
154
fp = (*fn == '!') ? popen(fn+1, "w") : fopen(strip_escapes(fn), mode);
bin/ed/io.c
156
perror(fn);
bin/ed/io.c
161
else if ((*fn == '!') ? pclose(fp) == -1 : fclose(fp) == EOF) {
bin/ed/io.c
162
perror(fn);
bin/ed/io.c
46
read_file(char *fn, int n)
bin/ed/io.c
52
fp = (*fn == '!') ? popen(fn + 1, "r") : fopen(strip_escapes(fn), "r");
bin/ed/io.c
54
perror(fn);
bin/ed/io.c
59
else if ((*fn == '!') ? pclose(fp) == -1 : fclose(fp) == EOF) {
bin/ed/io.c
60
perror(fn);
bin/ps/keyword.c
68
#define UID(n1, n2, fn, off) \
bin/ps/keyword.c
69
{ n1, n2, NULL, 0, fn, UIDLEN, 0, off, UINT32, UIDFMT }
bin/ps/keyword.c
70
#define GID(n1, n2, fn, off) UID(n1, n2, fn, off)
bin/ps/keyword.c
74
#define PID(n1, n2, fn, off) \
bin/ps/keyword.c
75
{ n1, n2, NULL, 0, fn, PIDLEN, 0, off, INT32, PIDFMT }
bin/ps/keyword.c
79
#define TID(n1, n2, fn, off) \
bin/ps/keyword.c
80
{ n1, n2, NULL, 0, fn, TIDLEN, 0, off, INT32, TIDFMT }
games/hack/hack.h
373
int ggetobj(char *, int (*fn)(struct obj *), int);
games/hack/hack.h
374
int askchain(struct obj *, char *, int, int (*fn)(struct obj *),
games/hack/hack.invent.c
520
ggetobj(char *word, int (*fn)(struct obj *), int max)
games/hack/hack.invent.c
567
(*fn)(mkgoldobj(u.ugold));
games/hack/hack.invent.c
586
return(askchain(invent, olets, allflag, fn, ckfn, max));
games/hack/hack.invent.c
597
askchain(struct obj *objchn, char *olets, int allflag, int (*fn)(struct obj *),
games/hack/hack.invent.c
621
cnt += (*fn)(otmp);
games/hunt/huntd/conf.c
279
int fn;
games/hunt/huntd/conf.c
286
for (fn = 0; fnms[fn]; fn++) {
games/hunt/huntd/conf.c
287
snprintf(nm, sizeof nm, fnms[fn], home);
include/stdio.h
299
#define fropen(cookie, fn) funopen(cookie, fn, 0, 0, 0)
include/stdio.h
300
#define fwopen(cookie, fn) funopen(cookie, 0, fn, 0, 0)
include/tgmath.h
72
#define __tg_impl_simple(x, y, z, fn, fnf, fnl, ...) \
include/tgmath.h
76
fn(__VA_ARGS__), fnf(__VA_ARGS__)))
include/tgmath.h
78
#define __tg_impl_full(x, y, z, fn, fnf, fnl, cfn, cfnf, cfnl, ...) \
include/tgmath.h
81
__tg_impl_simple(x, y, z, fn, fnf, fnl, __VA_ARGS__))
include/tgmath.h
88
#define __tg_simple(x, fn) \
include/tgmath.h
89
__tg_impl_simple(x, x, x, fn, fn##f, fn##l, x)
include/tgmath.h
90
#define __tg_simple2(x, y, fn) \
include/tgmath.h
91
__tg_impl_simple(x, x, y, fn, fn##f, fn##l, x, y)
include/tgmath.h
92
#define __tg_simplev(x, fn, ...) \
include/tgmath.h
93
__tg_impl_simple(x, x, x, fn, fn##f, fn##l, __VA_ARGS__)
include/tgmath.h
94
#define __tg_full(x, fn) \
include/tgmath.h
95
__tg_impl_full(x, x, x, fn, fn##f, fn##l, c##fn, c##fn##f, c##fn##l, x)
lib/csu/crtbeginS.c
75
atexit(void (*fn)(void))
lib/csu/crtbeginS.c
77
return (__cxa_atexit((void (*)(void *))fn, NULL, &__dso_handle));
lib/libc/gen/ftw.c
31
ftw(const char *path, int (*fn)(const char *, const struct stat *, int),
lib/libc/gen/ftw.c
78
error = fn(cur->fts_path, cur->fts_statp, fnflag);
lib/libc/gen/glob.c
1001
g_lstat(Char *fn, struct stat *sb, glob_t *pglob)
lib/libc/gen/glob.c
1005
if (g_Ctoc(fn, buf, sizeof(buf)))
lib/libc/gen/glob.c
1013
g_stat(Char *fn, struct stat *sb, glob_t *pglob)
lib/libc/gen/glob.c
1017
if (g_Ctoc(fn, buf, sizeof(buf)))
lib/libc/gen/nftw.c
30
nftw(const char *path, int (*fn)(const char *, const struct stat *, int,
lib/libc/gen/nftw.c
96
error = fn(cur->fts_path, cur->fts_statp, fnflag, &ftw);
lib/libc/include/thread_private.h
420
void (*fn)(void *);
lib/libc/include/thread_private.h
433
void *(*fn)(void *);
lib/libc/stdlib/atexit.c
120
atexit(void (*fn)(void))
lib/libc/stdlib/atexit.c
122
return (__cxa_atexit((void (*)(void *))fn, NULL, NULL));
lib/libc/stdlib/atexit.c
148
struct atexit_fn fn;
lib/libc/stdlib/atexit.c
171
fn = p->fns[n];
lib/libc/stdlib/atexit.c
177
(*fn.fn_ptr)(fn.fn_arg);
lib/libc/stdlib/malloc.c
1497
#define PROLOGUE(p, fn) \
lib/libc/stdlib/malloc.c
1504
d->func = fn; \
lib/libc/thread/rthread.c
368
oclfn->fn(oclfn->arg);
lib/libcrypto/asn1/a_strex.c
434
ASN1_OBJECT *fn;
lib/libcrypto/asn1/a_strex.c
516
fn = X509_NAME_ENTRY_get_object(ent);
lib/libcrypto/asn1/a_strex.c
518
fn_nid = OBJ_obj2nid(fn);
lib/libcrypto/asn1/a_strex.c
523
OBJ_obj2txt(objtmp, sizeof objtmp, fn, 1);
lib/libcrypto/evp/evp.h
754
void EVP_CIPHER_do_all(void (*fn)(const EVP_CIPHER *ciph, const char *from,
lib/libcrypto/evp/evp.h
756
void EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *ciph,
lib/libcrypto/evp/evp.h
759
void EVP_MD_do_all(void (*fn)(const EVP_MD *ciph, const char *from,
lib/libcrypto/evp/evp.h
761
void EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *ciph, const char *from,
lib/libcrypto/evp/evp_names.c
1471
EVP_CIPHER_do_all_sorted(void (*fn)(const EVP_CIPHER *, const char *,
lib/libcrypto/evp/evp_names.c
1487
fn(NULL, cipher->name, cipher->alias, arg);
lib/libcrypto/evp/evp_names.c
1489
fn(evp_cipher, cipher->name, NULL, arg);
lib/libcrypto/evp/evp_names.c
1495
EVP_CIPHER_do_all(void (*fn)(const EVP_CIPHER *, const char *, const char *,
lib/libcrypto/evp/evp_names.c
1498
EVP_CIPHER_do_all_sorted(fn, arg);
lib/libcrypto/evp/evp_names.c
1503
EVP_MD_do_all_sorted(void (*fn)(const EVP_MD *, const char *, const char *,
lib/libcrypto/evp/evp_names.c
1519
fn(NULL, digest->name, digest->alias, arg);
lib/libcrypto/evp/evp_names.c
1521
fn(evp_md, digest->name, NULL, arg);
lib/libcrypto/evp/evp_names.c
1527
EVP_MD_do_all(void (*fn)(const EVP_MD *, const char *, const char *, void *),
lib/libcrypto/evp/evp_names.c
1530
EVP_MD_do_all_sorted(fn, arg);
lib/libcrypto/evp/evp_names.c
1562
OBJ_NAME_do_all_ciphers(void (*fn)(const OBJ_NAME *, void *), void *arg)
lib/libcrypto/evp/evp_names.c
1571
fn(&name, arg);
lib/libcrypto/evp/evp_names.c
1597
OBJ_NAME_do_all_digests(void (*fn)(const OBJ_NAME *, void *), void *arg)
lib/libcrypto/evp/evp_names.c
1606
fn(&name, arg);
lib/libcrypto/evp/evp_names.c
1611
OBJ_NAME_do_all_sorted(int type, void (*fn)(const OBJ_NAME *, void *), void *arg)
lib/libcrypto/evp/evp_names.c
1617
OBJ_NAME_do_all_ciphers(fn, arg);
lib/libcrypto/evp/evp_names.c
1619
OBJ_NAME_do_all_digests(fn, arg);
lib/libcrypto/evp/evp_names.c
1624
OBJ_NAME_do_all(int type, void (*fn)(const OBJ_NAME *, void *), void *arg)
lib/libcrypto/evp/evp_names.c
1626
OBJ_NAME_do_all_sorted(type, fn, arg);
lib/libcrypto/lhash/lhash.h
166
#define LHM_lh_doall(type, lh,fn) lh_doall(CHECKED_LHASH_OF(type, lh), fn)
lib/libcrypto/lhash/lhash.h
167
#define LHM_lh_doall_arg(type, lh, fn, arg_type, arg) \
lib/libcrypto/lhash/lhash.h
168
lh_doall_arg(CHECKED_LHASH_OF(type, lh), fn, CHECKED_PTR_OF(arg_type, arg))
lib/libcrypto/objects/objects.h
89
void OBJ_NAME_do_all(int type, void (*fn)(const OBJ_NAME *, void *arg),
lib/libcrypto/objects/objects.h
91
void OBJ_NAME_do_all_sorted(int type, void (*fn)(const OBJ_NAME *, void *arg),
lib/libcrypto/stack/safestack.h
1644
#define lh_ADDED_OBJ_doall(lh,fn) LHM_lh_doall(ADDED_OBJ,lh,fn)
lib/libcrypto/stack/safestack.h
1645
#define lh_ADDED_OBJ_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1646
LHM_lh_doall_arg(ADDED_OBJ,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1655
#define lh_CONF_VALUE_doall(lh,fn) LHM_lh_doall(CONF_VALUE,lh,fn)
lib/libcrypto/stack/safestack.h
1656
#define lh_CONF_VALUE_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1657
LHM_lh_doall_arg(CONF_VALUE,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1666
#define lh_ERR_STATE_doall(lh,fn) LHM_lh_doall(ERR_STATE,lh,fn)
lib/libcrypto/stack/safestack.h
1667
#define lh_ERR_STATE_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1668
LHM_lh_doall_arg(ERR_STATE,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1677
#define lh_ERR_STRING_DATA_doall(lh,fn) LHM_lh_doall(ERR_STRING_DATA,lh,fn)
lib/libcrypto/stack/safestack.h
1678
#define lh_ERR_STRING_DATA_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1679
LHM_lh_doall_arg(ERR_STRING_DATA,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1688
#define lh_EX_CLASS_ITEM_doall(lh,fn) LHM_lh_doall(EX_CLASS_ITEM,lh,fn)
lib/libcrypto/stack/safestack.h
1689
#define lh_EX_CLASS_ITEM_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1690
LHM_lh_doall_arg(EX_CLASS_ITEM,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1699
#define lh_FUNCTION_doall(lh,fn) LHM_lh_doall(FUNCTION,lh,fn)
lib/libcrypto/stack/safestack.h
1700
#define lh_FUNCTION_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1701
LHM_lh_doall_arg(FUNCTION,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1710
#define lh_OBJ_NAME_doall(lh,fn) LHM_lh_doall(OBJ_NAME,lh,fn)
lib/libcrypto/stack/safestack.h
1711
#define lh_OBJ_NAME_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1712
LHM_lh_doall_arg(OBJ_NAME,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1721
#define lh_OPENSSL_STRING_doall(lh,fn) LHM_lh_doall(OPENSSL_STRING,lh,fn)
lib/libcrypto/stack/safestack.h
1722
#define lh_OPENSSL_STRING_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1723
LHM_lh_doall_arg(OPENSSL_STRING,lh,fn,arg_type,arg)
lib/libcrypto/stack/safestack.h
1732
#define lh_SSL_SESSION_doall(lh,fn) LHM_lh_doall(SSL_SESSION,lh,fn)
lib/libcrypto/stack/safestack.h
1733
#define lh_SSL_SESSION_doall_arg(lh,fn,arg_type,arg) \
lib/libcrypto/stack/safestack.h
1734
LHM_lh_doall_arg(SSL_SESSION,lh,fn,arg_type,arg)
lib/libedit/hist.c
209
hist_convert(EditLine *el, int fn, void *arg)
lib/libedit/hist.c
212
if ((*(el)->el_history.fun)((el)->el_history.ref, &ev, fn, arg) == -1)
lib/libedit/hist.h
56
#define HIST_FUN_INTERNAL(el, fn, arg) \
lib/libedit/hist.h
58
fn, arg)) == -1) ? NULL : (el)->el_history.ev.str)
lib/libedit/hist.h
59
#define HIST_FUN(el, fn, arg) \
lib/libedit/hist.h
60
(((el)->el_flags & NARROW_HISTORY) ? hist_convert(el, fn, arg) : \
lib/libedit/hist.h
61
HIST_FUN_INTERNAL(el, fn, arg))
lib/libevent/event-internal.h
75
void (*fn)(int));
lib/libkvm/kvm_ntfs.c
55
struct fnode fn;
lib/libkvm/kvm_ntfs.c
63
if (KREAD(kd, (u_long)VTOF(vp), &fn)) {
lib/libkvm/kvm_ntfs.c
67
if (KREAD(kd, (u_long)FTONT(&fn), &ntnode)) {
lib/libkvm/kvm_ntfs.c
68
_kvm_err(kd, kd->program, "can't read ntnode at %p", FTONT(&fn));
lib/libkvm/kvm_ntfs.c
80
kf->va_size = fn.f_size;
lib/libm/src/e_rem_pio2.c
106
w = fn*pio2_2;
lib/libm/src/e_rem_pio2.c
108
w = fn*pio2_2t-((t-r)-w);
lib/libm/src/e_rem_pio2.c
114
w = fn*pio2_3;
lib/libm/src/e_rem_pio2.c
116
w = fn*pio2_3t-((t-r)-w);
lib/libm/src/e_rem_pio2.c
56
double z,w,t,r,fn;
lib/libm/src/e_rem_pio2.c
93
fn = (double)n;
lib/libm/src/e_rem_pio2.c
94
r = t-fn*pio2_1;
lib/libm/src/e_rem_pio2.c
95
w = fn*pio2_1t; /* 1st round good to 85 bit */
lib/libm/src/e_rem_pio2f.c
125
fn = (float)n;
lib/libm/src/e_rem_pio2f.c
126
r = t-fn*pio2_1;
lib/libm/src/e_rem_pio2f.c
127
w = fn*pio2_1t; /* 1st round good to 40 bit */
lib/libm/src/e_rem_pio2f.c
138
w = fn*pio2_2;
lib/libm/src/e_rem_pio2f.c
140
w = fn*pio2_2t-((t-r)-w);
lib/libm/src/e_rem_pio2f.c
146
w = fn*pio2_3;
lib/libm/src/e_rem_pio2f.c
148
w = fn*pio2_3t-((t-r)-w);
lib/libm/src/e_rem_pio2f.c
89
float z,w,t,r,fn;
lib/libm/src/e_scalb.c
24
scalb(double x, int fn)
lib/libm/src/e_scalb.c
26
return scalbn(x, fn);
lib/libm/src/e_scalb.c
33
scalb(double x, double fn)
lib/libm/src/e_scalb.c
35
if (isnan(x)||isnan(fn)) return x*fn;
lib/libm/src/e_scalb.c
36
if (!isfinite(fn)) {
lib/libm/src/e_scalb.c
37
if(fn>0.0) return x*fn;
lib/libm/src/e_scalb.c
38
else return x/(-fn);
lib/libm/src/e_scalb.c
40
if (rint(fn)!=fn) return (fn-fn)/(fn-fn);
lib/libm/src/e_scalb.c
41
if ( fn > 65000.0) return scalbn(x, 65000);
lib/libm/src/e_scalb.c
42
if (-fn > 65000.0) return scalbn(x,-65000);
lib/libm/src/e_scalb.c
43
return scalbn(x,(int)fn);
lib/libm/src/e_scalbf.c
21
scalbf(float x, int fn)
lib/libm/src/e_scalbf.c
23
return scalbnf(x,fn);
lib/libm/src/e_scalbf.c
30
scalbf(float x, float fn)
lib/libm/src/e_scalbf.c
32
if (isnan(x)||isnan(fn)) return x*fn;
lib/libm/src/e_scalbf.c
33
if (!isfinite(fn)) {
lib/libm/src/e_scalbf.c
34
if(fn>(float)0.0) return x*fn;
lib/libm/src/e_scalbf.c
35
else return x/(-fn);
lib/libm/src/e_scalbf.c
37
if (rintf(fn)!=fn) return (fn-fn)/(fn-fn);
lib/libm/src/e_scalbf.c
38
if ( fn > (float)65000.0) return scalbnf(x, 65000);
lib/libm/src/e_scalbf.c
39
if (-fn > (float)65000.0) return scalbnf(x,-65000);
lib/libm/src/e_scalbf.c
40
return scalbnf(x,(int)fn);
lib/libm/src/s_fdim.c
31
#define DECL(type, fn) \
lib/libm/src/s_fdim.c
33
fn(type x, type y) \
lib/libm/src/s_lrint.c
59
DEF_STD(fn);
lib/libm/src/s_lrint.c
60
LDBL_MAYBE_CLONE(fn);
lib/libm/src/s_lrintf.c
59
DEF_STD(fn);
lib/librthread/rthread.c
369
thread->fn = start_routine;
lib/librthread/rthread.c
507
pthread_cleanup_push(void (*fn)(void *), void *arg)
lib/librthread/rthread.c
515
clfn->fn = fn;
lib/librthread/rthread.c
531
clfn->fn(clfn->arg);
lib/librthread/rthread.c
99
retval = thread->fn(thread->arg);
libexec/login_yubikey/login_yubikey.c
187
char fn[PATH_MAX];
libexec/login_yubikey/login_yubikey.c
195
snprintf(fn, sizeof(fn), "%s/%s.uid", path, username);
libexec/login_yubikey/login_yubikey.c
196
if ((f = fopen(fn, "r")) == NULL) {
libexec/login_yubikey/login_yubikey.c
197
syslog(LOG_ERR, "user %s: fopen: %s: %m", username, fn);
libexec/login_yubikey/login_yubikey.c
201
syslog(LOG_ERR, "user %s: fscanf: %s: %m", username, fn);
libexec/login_yubikey/login_yubikey.c
207
snprintf(fn, sizeof(fn), "%s/%s.key", path, username);
libexec/login_yubikey/login_yubikey.c
208
if ((f = fopen(fn, "r")) == NULL) {
libexec/login_yubikey/login_yubikey.c
209
syslog(LOG_ERR, "user %s: fopen: %s: %m", username, fn);
libexec/login_yubikey/login_yubikey.c
213
syslog(LOG_ERR, "user %s: fscanf: %s: %m", username, fn);
libexec/login_yubikey/login_yubikey.c
223
snprintf(fn, sizeof(fn), "%s/%s.ctr", path, username);
libexec/login_yubikey/login_yubikey.c
224
if ((f = fopen(fn, "r")) != NULL) {
libexec/login_yubikey/login_yubikey.c
291
if ((f = fopen(fn, "w")) == NULL) {
libexec/login_yubikey/login_yubikey.c
292
syslog(LOG_ERR, "user %s: fopen: %s: %m", username, fn);
regress/lib/libc/explicit_bzero/explicit_bzero.c
102
.sa_handler = fn,
regress/lib/libc/explicit_bzero/explicit_bzero.c
89
call_on_stack(void (*fn)(int))
regress/lib/libc/regex/split.c
101
if (fn == nfields+1)
regress/lib/libc/regex/split.c
103
fn--;
regress/lib/libc/regex/split.c
106
return(fn);
regress/lib/libc/regex/split.c
110
fn = 0;
regress/lib/libc/regex/split.c
112
if (fn < nfields)
regress/lib/libc/regex/split.c
114
fn++;
regress/lib/libc/regex/split.c
118
return(fn);
regress/lib/libc/regex/split.c
125
if (fn < nfields)
regress/lib/libc/regex/split.c
20
register int fn;
regress/lib/libc/regex/split.c
200
register int fn;
regress/lib/libc/regex/split.c
205
for (fn = 0; fn < bound; fn++)
regress/lib/libc/regex/split.c
206
printf("\"%s\"%s", fields[fn], (fn+1 < nf) ? ", " : "\n");
regress/lib/libc/regex/split.c
43
fn = nfields;
regress/lib/libc/regex/split.c
46
fn--;
regress/lib/libc/regex/split.c
47
if (fn == 0)
regress/lib/libc/regex/split.c
51
return(nfields - fn);
regress/lib/libc/regex/split.c
55
fn = nfields;
regress/lib/libc/regex/split.c
59
return(fn);
regress/lib/libc/regex/split.c
60
fn++;
regress/lib/libc/regex/split.c
67
fn = nfields;
regress/lib/libc/regex/split.c
70
fn--;
regress/lib/libc/regex/split.c
74
fn++;
regress/lib/libc/regex/split.c
75
return(nfields - fn);
regress/lib/libc/regex/split.c
77
if (fn == 0)
regress/lib/libc/regex/split.c
85
fn = nfields;
regress/lib/libc/regex/split.c
90
fn++;
regress/lib/libc/sys/atf-c.h
36
#define ATF_TC_FUNCTIONS(fn) \
regress/lib/libc/sys/atf-c.h
37
void atf_head_##fn(void); \
regress/lib/libc/sys/atf-c.h
38
void atf_body_##fn(void); \
regress/lib/libc/sys/atf-c.h
39
void atf_cleanup_##fn(void);
regress/lib/libc/sys/atf-c.h
41
#define ATF_TC(fn) \
regress/lib/libc/sys/atf-c.h
42
ATF_TC_FUNCTIONS(fn) \
regress/lib/libc/sys/atf-c.h
43
void atf_cleanup_##fn(void) { return; }
regress/lib/libc/sys/atf-c.h
45
#define ATF_TC_WITH_CLEANUP(fn) \
regress/lib/libc/sys/atf-c.h
46
ATF_TC_FUNCTIONS(fn)
regress/lib/libc/sys/atf-c.h
48
#define ATF_TC_HEAD(fn, tc) void atf_head_##fn(void)
regress/lib/libc/sys/atf-c.h
49
#define ATF_TC_BODY(fn, tc) void atf_body_##fn(void)
regress/lib/libc/sys/atf-c.h
50
#define ATF_TC_CLEANUP(fn, tc) void atf_cleanup_##fn(void)
regress/lib/libc/sys/atf-c.h
53
#define ATF_TP_ADD_TC(tp, fn) tst--; \
regress/lib/libc/sys/atf-c.h
56
atf_head_##fn(); \
regress/lib/libc/sys/atf-c.h
58
atf_body_##fn(); \
regress/lib/libc/sys/atf-c.h
60
atf_cleanup_##fn(); \
regress/lib/libc/sys/t_fork.c
275
nested_raw(const char *fn, volatile int flags)
regress/lib/libc/sys/t_fork.c
296
if (strcmp(fn, "fork") == 0)
regress/lib/libc/sys/t_fork.c
298
else if (strcmp(fn, "vfork") == 0)
regress/lib/libc/sys/t_fork.c
301
else if (strcmp(fn, "clone") == 0)
regress/lib/libc/sys/t_fork.c
309
if ((strcmp(fn, "fork") == 0) || (strcmp(fn, "vfork") == 0)) {
regress/lib/libc/sys/t_fork.c
334
#define NESTED(test, fn, flags) \
regress/lib/libc/sys/t_fork.c
340
"Test nested " #fn " in a child"); \
regress/lib/libc/sys/t_fork.c
346
nested_raw(#fn, flags); \
regress/lib/libcrypto/bio/bio_chain.c
212
size_t i, size_t j, const char *fn, const char *description,
regress/lib/libcrypto/bio/bio_chain.c
217
fn, i, j, description, direction, last_name);
regress/lib/libcrypto/bio/bio_chain.c
223
fn, i, j, description, direction, expected_len, len);
regress/lib/libcrypto/bio/bio_chain.c
232
size_t i, size_t j, const char *fn, const char *description)
regress/lib/libcrypto/bio/bio_chain.c
240
i, j, fn, description, "forward", "end");
regress/lib/libcrypto/bio/bio_chain.c
245
size_t i, size_t j, const char *fn, const char *description)
regress/lib/libcrypto/bio/bio_chain.c
253
i, j, fn, description, "backward", "start");
regress/lib/libcrypto/bio/bio_chain.c
258
const char *fn, const char *description)
regress/lib/libcrypto/bio/bio_chain.c
260
if (!walk_forward(start, end, expected_len, i, j, fn, description))
regress/lib/libcrypto/bio/bio_chain.c
263
if (!walk_backward(start, end, expected_len, i, j, fn, description))
regress/lib/libcrypto/bio/bio_chain.c
314
const char *fn = use_bio_push ? "BIO_push" : "BIO_set_next";
regress/lib/libcrypto/bio/bio_chain.c
377
"%zu + %zu != %zu + %zu + %zu\n", fn, i, j,
regress/lib/libcrypto/bio/bio_chain.c
400
if (!check_chain(new_start, new_end, new_len, i, j, fn, "new chain"))
regress/lib/libcrypto/bio/bio_chain.c
403
if (!check_chain(oldhead_start, oldhead_end, oldhead_len, i, j, fn,
regress/lib/libcrypto/bio/bio_chain.c
407
if (!check_chain(oldtail_start, oldtail_end, oldtail_len, i, j, fn,
regress/lib/libcrypto/bn/bn_ffdh.c
330
get_p_fn fn;
regress/lib/libcrypto/bn/bn_ffdh.c
335
.fn = BN_get_rfc2409_prime_768,
regress/lib/libcrypto/bn/bn_ffdh.c
340
.fn = BN_get_rfc2409_prime_1024,
regress/lib/libcrypto/bn/bn_ffdh.c
345
.fn = BN_get_rfc3526_prime_1536,
regress/lib/libcrypto/bn/bn_ffdh.c
350
.fn = BN_get_rfc3526_prime_2048,
regress/lib/libcrypto/bn/bn_ffdh.c
355
.fn = BN_get_rfc3526_prime_3072,
regress/lib/libcrypto/bn/bn_ffdh.c
360
.fn = BN_get_rfc3526_prime_4096,
regress/lib/libcrypto/bn/bn_ffdh.c
365
.fn = BN_get_rfc3526_prime_6144,
regress/lib/libcrypto/bn/bn_ffdh.c
370
.fn = BN_get_rfc3526_prime_8192,
regress/lib/libcrypto/bn/bn_ffdh.c
375
.fn = BN_get_rfc7919_prime_2048,
regress/lib/libcrypto/bn/bn_ffdh.c
380
.fn = BN_get_rfc7919_prime_3072,
regress/lib/libcrypto/bn/bn_ffdh.c
385
.fn = BN_get_rfc7919_prime_4096,
regress/lib/libcrypto/bn/bn_ffdh.c
390
.fn = BN_get_rfc7919_prime_6144,
regress/lib/libcrypto/bn/bn_ffdh.c
395
.fn = BN_get_rfc7919_prime_8192,
regress/lib/libcrypto/bn/bn_ffdh.c
416
if (t->fn(papi) == NULL)
regress/lib/libcrypto/bn/bn_gcd.c
31
int (*fn)(BIGNUM *, const BIGNUM *, const BIGNUM *, BN_CTX *);
regress/lib/libcrypto/bn/bn_gcd.c
3497
if (!test->fn(got, a, b, ctx)) {
regress/lib/libcrypto/bn/bn_gcd.c
3561
if (!test->fn(gcd, a, b, ctx)) {
regress/lib/libcrypto/bn/bn_gcd.c
36
.fn = BN_gcd,
regress/lib/libcrypto/bn/bn_gcd.c
40
.fn = BN_gcd_ct,
regress/lib/libcrypto/bn/bn_primes.c
108
if ((prime = tc->fn(NULL)) == NULL) {
regress/lib/libcrypto/bn/bn_primes.c
83
#define BN_PRIME_FN_INIT(a) { .fn = a, .name = #a }
regress/lib/libcrypto/bn/bn_primes.c
86
BIGNUM *(*fn)(BIGNUM *);
regress/lib/libcrypto/bn/bn_unit.c
141
bn_check_expected_flags(const BIGNUM *bn, int expected, const char *fn,
regress/lib/libcrypto/bn/bn_unit.c
151
fn, descr, expected, got);
regress/lib/libcrypto/bn/bn_unit.c
157
fn, descr, 0, got);
regress/lib/libcrypto/mlkem/mlkem_tests.c
272
mlkem_decap_tests(const char *fn, int rank, enum test_type test_type)
regress/lib/libcrypto/mlkem/mlkem_tests.c
279
return parse_test_file(fn, &decap_parse, &decap);
regress/lib/libcrypto/mlkem/mlkem_tests.c
281
return parse_test_file(fn, &nist_decap_parse, &decap);
regress/lib/libcrypto/mlkem/mlkem_tests.c
430
mlkem_encap_tests(const char *fn, int rank)
regress/lib/libcrypto/mlkem/mlkem_tests.c
436
return parse_test_file(fn, &encap_parse, &encap);
regress/lib/libcrypto/mlkem/mlkem_tests.c
671
mlkem_keygen_tests(const char *fn, int rank, enum test_type test_type)
regress/lib/libcrypto/mlkem/mlkem_tests.c
678
return parse_test_file(fn, &keygen_parse, &keygen);
regress/lib/libcrypto/mlkem/mlkem_tests.c
680
return parse_test_file(fn, &nist_keygen_parse, &keygen);
regress/lib/libcrypto/mlkem/mlkem_tests.c
686
run_mlkem_test(const char *test, const char *fn)
regress/lib/libcrypto/mlkem/mlkem_tests.c
689
return mlkem_decap_tests(fn, MLKEM768_RANK, TEST_TYPE_NORMAL);
regress/lib/libcrypto/mlkem/mlkem_tests.c
691
return mlkem_decap_tests(fn, MLKEM768_RANK, TEST_TYPE_NIST);
regress/lib/libcrypto/mlkem/mlkem_tests.c
693
return mlkem_decap_tests(fn, MLKEM1024_RANK, TEST_TYPE_NORMAL);
regress/lib/libcrypto/mlkem/mlkem_tests.c
695
return mlkem_decap_tests(fn, MLKEM1024_RANK, TEST_TYPE_NIST);
regress/lib/libcrypto/mlkem/mlkem_tests.c
698
return mlkem_encap_tests(fn, MLKEM768_RANK);
regress/lib/libcrypto/mlkem/mlkem_tests.c
700
return mlkem_encap_tests(fn, MLKEM1024_RANK);
regress/lib/libcrypto/mlkem/mlkem_tests.c
703
return mlkem_keygen_tests(fn, MLKEM768_RANK, TEST_TYPE_NORMAL);
regress/lib/libcrypto/mlkem/mlkem_tests.c
705
return mlkem_keygen_tests(fn, MLKEM768_RANK, TEST_TYPE_NIST);
regress/lib/libcrypto/mlkem/mlkem_tests.c
707
return mlkem_keygen_tests(fn, MLKEM1024_RANK, TEST_TYPE_NORMAL);
regress/lib/libcrypto/mlkem/mlkem_tests.c
709
return mlkem_keygen_tests(fn, MLKEM1024_RANK, TEST_TYPE_NIST);
regress/lib/libcrypto/mlkem/mlkem_tests.c
711
errx(1, "unknown test %s (test file %s)", test, fn);
regress/lib/libcrypto/mlkem/parse_test_file.c
183
const char *fn;
regress/lib/libcrypto/mlkem/parse_test_file.c
295
p->fn, line(p), test(p), name(p));
regress/lib/libcrypto/mlkem/parse_test_file.c
692
parse_init(struct parse *p, const char *fn, const struct test_parse *tctx,
regress/lib/libcrypto/mlkem/parse_test_file.c
699
if ((fp = fopen(fn, "r")) == NULL)
regress/lib/libcrypto/mlkem/parse_test_file.c
700
err(1, "error opening %s", fn);
regress/lib/libcrypto/mlkem/parse_test_file.c
703
if ((p->fn = strrchr(fn, '/')) != NULL)
regress/lib/libcrypto/mlkem/parse_test_file.c
704
p->fn++;
regress/lib/libcrypto/mlkem/parse_test_file.c
706
p->fn = fn;
regress/lib/libcrypto/mlkem/parse_test_file.c
747
err(1, "%s", p->fn);
regress/lib/libcrypto/mlkem/parse_test_file.c
752
parse_test_file(const char *fn, const struct test_parse *tctx, void *ctx)
regress/lib/libcrypto/mlkem/parse_test_file.c
757
parse_init(&p, fn, tctx, ctx);
regress/lib/libcrypto/mlkem/parse_test_file.h
59
int parse_test_file(const char *fn, const struct test_parse *lctx, void *ctx);
regress/lib/libcrypto/test/test.c
190
test_run(struct test *pt, const char *name, test_run_func *fn, const void *arg)
regress/lib/libcrypto/test/test.c
200
fn(t, arg);
regress/lib/libm/msun/atf-c.h
39
#define ATF_TC_FUNCTIONS(fn) \
regress/lib/libm/msun/atf-c.h
40
void atf_head_##fn(void); \
regress/lib/libm/msun/atf-c.h
41
void atf_body_##fn(void); \
regress/lib/libm/msun/atf-c.h
42
void atf_cleanup_##fn(void);
regress/lib/libm/msun/atf-c.h
44
#define ATF_TC(fn) \
regress/lib/libm/msun/atf-c.h
45
ATF_TC_FUNCTIONS(fn) \
regress/lib/libm/msun/atf-c.h
46
void atf_cleanup_##fn(void) { return; }
regress/lib/libm/msun/atf-c.h
48
#define ATF_TC_WITH_CLEANUP(fn) \
regress/lib/libm/msun/atf-c.h
49
ATF_TC_FUNCTIONS(fn)
regress/lib/libm/msun/atf-c.h
51
#define ATF_TC_WITHOUT_HEAD(fn) void atf_cleanup_##fn(void) {} \
regress/lib/libm/msun/atf-c.h
52
void atf_head_##fn(void) {}
regress/lib/libm/msun/atf-c.h
53
#define ATF_TC_HEAD(fn, tc) void atf_head_##fn(void)
regress/lib/libm/msun/atf-c.h
54
#define ATF_TC_BODY(fn, tc) void atf_body_##fn(void)
regress/lib/libm/msun/atf-c.h
55
#define ATF_TC_CLEANUP(fn, tc) void atf_cleanup_##fn(void)
regress/lib/libm/msun/atf-c.h
58
#define ATF_TP_ADD_TC(tp, fn) tst--; \
regress/lib/libm/msun/atf-c.h
61
atf_head_##fn(); \
regress/lib/libm/msun/atf-c.h
63
atf_body_##fn(); \
regress/lib/libm/msun/atf-c.h
65
atf_cleanup_##fn(); \
regress/lib/libradius/incs.h
18
void add_test(testfunc fn, const char *name);
regress/lib/libradius/incs.h
23
#define ADD_TEST(fn) \
regress/lib/libradius/incs.h
24
extern void fn(void); \
regress/lib/libradius/incs.h
26
void fn ## _add(void) \
regress/lib/libradius/incs.h
28
add_test(fn, #fn); \
regress/lib/libradius/main.c
40
void add_test(testfunc fn, const char *name)
regress/lib/libradius/main.c
42
entries[ntests].func = fn;
regress/sys/dev/kcov/kcov.c
161
error = tests[i].fn(&ctx);
regress/sys/dev/kcov/kcov.c
70
int (*fn)(struct context *);
regress/sys/kern/ptrace2/atf-c.h
36
#define ATF_TC_FUNCTIONS(fn) \
regress/sys/kern/ptrace2/atf-c.h
37
void atf_head_##fn(void); \
regress/sys/kern/ptrace2/atf-c.h
38
void atf_body_##fn(void); \
regress/sys/kern/ptrace2/atf-c.h
39
void atf_cleanup_##fn(void);
regress/sys/kern/ptrace2/atf-c.h
41
#define ATF_TC(fn) \
regress/sys/kern/ptrace2/atf-c.h
42
ATF_TC_FUNCTIONS(fn) \
regress/sys/kern/ptrace2/atf-c.h
43
void atf_cleanup_##fn(void) { return; }
regress/sys/kern/ptrace2/atf-c.h
45
#define ATF_TC_WITH_CLEANUP(fn) \
regress/sys/kern/ptrace2/atf-c.h
46
ATF_TC_FUNCTIONS(fn)
regress/sys/kern/ptrace2/atf-c.h
48
#define ATF_TC_WITHOUT_HEAD(fn) ATF_TC_HEAD(fn, NULL)
regress/sys/kern/ptrace2/atf-c.h
49
#define ATF_TC_HEAD(fn, tc) void atf_head_##fn(void)
regress/sys/kern/ptrace2/atf-c.h
50
#define ATF_TC_BODY(fn, tc) void atf_body_##fn(void)
regress/sys/kern/ptrace2/atf-c.h
51
#define ATF_TC_CLEANUP(fn, tc) void atf_cleanup_##fn(void)
regress/sys/kern/ptrace2/atf-c.h
55
#define ATF_TP_ADD_TC(tp, fn) tst--; \
regress/sys/kern/ptrace2/atf-c.h
58
atf_body_##fn(); \
regress/usr.sbin/rpki-client/constraints-dummy.c
9
constraints_validate(const char *fn, const struct cert *cert)
sbin/unwind/libunbound/validator/autotrust.c
1118
autr_write_contents(FILE* out, char* fn, struct trust_anchor* tp)
sbin/unwind/libunbound/validator/autotrust.c
1126
log_err("could not write to %s: %s", fn, strerror(errno));
sbin/unwind/libunbound/validator/autotrust.c
1136
log_err("could not write to %s: %s", fn, strerror(errno));
sbin/unwind/libunbound/validator/autotrust.c
1140
if(!print_id(out, fn, tp->name, tp->namelen, tp->dclass)) {
sbin/unwind/libunbound/validator/autotrust.c
1156
log_err("could not write to %s: %s", fn, strerror(errno));
sbin/unwind/libunbound/validator/autotrust.c
1174
log_err("malloc failure writing %s", fn);
sbin/unwind/libunbound/validator/autotrust.c
1183
log_err("could not write to %s: %s", fn, strerror(errno));
sys/arch/alpha/dev/shared_intr.c
125
int type, int level, int (*fn)(void *), void *arg, const char *basename)
sys/arch/alpha/dev/shared_intr.c
173
ih->ih_fn = fn;
sys/arch/alpha/include/cpuconf.h
97
#define cpu_init(st, fn, opt) { fn, st, opt }
sys/arch/alpha/pci/pci_machdep.c
101
if (fn != NULL)
sys/arch/alpha/pci/pci_machdep.c
102
(*fn)(iot, memt, pc, bus, device, function);
sys/arch/alpha/pci/pci_machdep.c
73
int (*fn)(bus_space_tag_t, bus_space_tag_t, pci_chipset_tag_t,
sys/arch/alpha/pci/pci_machdep.c
84
fn = NULL;
sys/arch/alpha/pci/pci_machdep.c
90
fn = vga_pci_cnattach;
sys/arch/alpha/pci/pci_machdep.c
97
fn = tga_cnattach;
sys/arch/alpha/pci/sio_pic.c
450
sio_intr_establish(void *v, int irq, int type, int level, int (*fn)(void *),
sys/arch/alpha/pci/sio_pic.c
466
cookie = alpha_shared_intr_establish(sio_intr, irq, type, level, fn,
sys/arch/amd64/amd64/cacheinfo.c
227
intel_print_cacheinfo(struct cpu_info *ci, u_int fn)
sys/arch/amd64/amd64/cacheinfo.c
238
CPUID_LEAF(fn, leaf, eax, ebx, ecx, dummy);
sys/arch/amd64/amd64/cacheinfo.c
260
CPUID_LEAF(fn, leaf, eax, ebx, ecx, dummy);
sys/arch/amd64/amd64/machdep.c
2226
delay_init(void(*fn)(int), int fn_quality)
sys/arch/amd64/amd64/machdep.c
2229
delay_func = fn;
sys/arch/amd64/amd64/machdep.c
2235
delay_fini(void (*fn)(int))
sys/arch/amd64/amd64/machdep.c
2237
if (fn == delay_func) {
sys/arch/amd64/amd64/pctr.c
128
pctrsel(int fflag, uint32_t cmd, uint32_t fn)
sys/arch/amd64/amd64/pctr.c
147
if (fn & 0x380000)
sys/arch/amd64/amd64/pctr.c
150
if (fn != 0)
sys/arch/amd64/amd64/pctr.c
154
changed = fn != pctr_fn[cmd];
sys/arch/amd64/amd64/pctr.c
156
pctr_fn[cmd] = fn;
sys/arch/amd64/amd64/pctr.c
158
wrmsr(msrsel, fn);
sys/arch/amd64/amd64/pctr.c
200
uint32_t fn;
sys/arch/amd64/amd64/pctr.c
217
fn = rdmsr(msrsel + i);
sys/arch/amd64/amd64/pctr.c
218
if (fn != pctr_fn[i]) {
sys/arch/amd64/amd64/pctr.c
223
if (fn)
sys/arch/arm64/dev/aplpcie.c
951
int bus, dev, fn;
sys/arch/arm64/dev/aplpcie.c
954
aplpcie_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/arch/arm64/dev/aplpcie.c
956
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/arch/armv7/marvell/mvpcie.c
735
int bus, dev, fn;
sys/arch/armv7/marvell/mvpcie.c
737
mvpcie_decompose_tag(NULL, tag, &bus, &dev, &fn);
sys/arch/armv7/marvell/mvpcie.c
747
PCIE_CONF_FUNC(fn) | PCIE_CONF_REG(reg) | PCIE_CONF_ADDR_EN);
sys/arch/armv7/marvell/mvpcie.c
755
int bus, dev, fn;
sys/arch/armv7/marvell/mvpcie.c
757
mvpcie_decompose_tag(NULL, tag, &bus, &dev, &fn);
sys/arch/armv7/marvell/mvpcie.c
768
PCIE_CONF_FUNC(fn) | PCIE_CONF_REG(reg) | PCIE_CONF_ADDR_EN);
sys/arch/armv7/marvell/mvpcie.c
830
int bus, dev, fn;
sys/arch/armv7/marvell/mvpcie.c
834
mvpcie_decompose_tag(NULL, ih->ih_tag, &bus, &dev, &fn);
sys/arch/armv7/marvell/mvpcie.c
836
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/arch/armv7/omap/omgpio.c
391
omgpio_get_function(unsigned int gpio, unsigned int fn)
sys/arch/armv7/omap/omgpio.c
397
omgpio_set_function(unsigned int gpio, unsigned int fn)
sys/arch/armv7/omap/omgpiovar.h
24
unsigned int omgpio_get_function(unsigned int gpio, unsigned int fn);
sys/arch/armv7/omap/omgpiovar.h
25
void omgpio_set_function(unsigned int gpio, unsigned int fn);
sys/arch/armv7/vexpress/pciecam.c
295
int bus, dev, fn;
sys/arch/armv7/vexpress/pciecam.c
297
pciecam_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/arch/armv7/vexpress/pciecam.c
299
return HREAD4(sc, PCIE_ADDR_OFFSET(bus, dev, fn, reg & ~0x3));
sys/arch/armv7/vexpress/pciecam.c
306
int bus, dev, fn;
sys/arch/armv7/vexpress/pciecam.c
308
pciecam_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/arch/armv7/vexpress/pciecam.c
310
HWRITE4(sc, PCIE_ADDR_OFFSET(bus, dev, fn, reg & ~0x3), data);
sys/arch/armv7/vexpress/pciecam.c
420
int bus, dev, fn;
sys/arch/armv7/vexpress/pciecam.c
423
pciecam_decompose_tag(sc, ih->ih_tag, &bus, &dev, &fn);
sys/arch/armv7/vexpress/pciecam.c
425
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/arch/hppa/stand/libsa/cmd_hppa.c
812
int dev, fn, nfuncs;
sys/arch/hppa/stand/libsa/cmd_hppa.c
830
for (fn = 0; fn < nfuncs; fn++) {
sys/arch/hppa/stand/libsa/cmd_hppa.c
833
path_shift(&dp, fn);
sys/arch/hppa/stand/libsa/cmd_hppa.c
835
if (fn != 0)
sys/arch/hppa/stand/libsa/cmd_hppa.c
836
id = (*conf_read)(memmap->hpa, dev, fn,
sys/arch/hppa/stand/libsa/cmd_hppa.c
838
class = (*conf_read)(memmap->hpa, dev, fn,
sys/arch/hppa/stand/libsa/cmd_hppa.c
895
dino_conf_read(u_int hpa, int dev, int fn, u_int reg)
sys/arch/hppa/stand/libsa/cmd_hppa.c
901
addr = (dev << 11) | (fn << 8) | reg;
sys/arch/hppa/stand/libsa/cmd_hppa.c
913
elroy_conf_read(u_int hpa, int dev, int fn, u_int reg)
sys/arch/hppa/stand/libsa/cmd_hppa.c
919
addr = (dev << 11) | (fn << 8) | reg;
sys/arch/i386/i386/machdep.c
4014
delay_init(void(*fn)(int), int fn_quality)
sys/arch/i386/i386/machdep.c
4017
delay_func = fn;
sys/arch/i386/i386/machdep.c
4023
delay_fini(void (*fn)(int))
sys/arch/i386/i386/machdep.c
4025
if (delay_func == fn) {
sys/arch/i386/i386/pctr.c
118
p5ctrsel(int fflag, u_int cmd, u_int fn)
sys/arch/i386/i386/pctr.c
131
if (fn >= 0x200)
sys/arch/i386/i386/pctr.c
136
msr11 |= fn << shift;
sys/arch/i386/i386/pctr.c
144
pctrsel(int fflag, u_int cmd, u_int fn)
sys/arch/i386/i386/pctr.c
163
if (fn & 0x380000)
sys/arch/i386/i386/pctr.c
167
wrmsr(msrsel, fn);
sys/arch/i386/i386/pctr.c
36
static int p5ctrsel(int fflag, u_int cmd, u_int fn);
sys/arch/i386/i386/pctr.c
37
static int pctrsel(int fflag, u_int cmd, u_int fn);
sys/arch/loongson/dev/bonito.c
945
int bus, dev, fn, pin;
sys/arch/loongson/dev/bonito.c
959
pci_decompose_tag(pa->pa_pc, pa->pa_tag, &bus, &dev, &fn);
sys/arch/loongson/dev/bonito.c
965
*ihp = (*bc->bc_intr_map)(dev, fn, pa->pa_intrpin);
sys/arch/loongson/dev/glx.c
161
int bus, dev, fn;
sys/arch/loongson/dev/glx.c
169
pci_decompose_tag(pc, tag, &bus, &dev, &fn);
sys/arch/loongson/dev/glx.c
175
switch (fn) {
sys/arch/loongson/dev/glx.c
206
int bus, dev, fn;
sys/arch/loongson/dev/glx.c
214
pci_decompose_tag(pc, tag, &bus, &dev, &fn);
sys/arch/loongson/dev/glx.c
218
switch (fn) {
sys/arch/loongson/loongson/gdium_machdep.c
153
gdium_intr_map(int dev, int fn, int pin)
sys/arch/loongson/loongson/generic2e_machdep.c
182
generic2e_intr_map(int dev, int fn, int pin)
sys/arch/loongson/loongson/generic2e_machdep.c
185
switch (fn) {
sys/arch/loongson/loongson/yeeloong_machdep.c
264
lemote_intr_map(int dev, int fn, int pin)
sys/arch/loongson/loongson/yeeloong_machdep.c
282
switch (fn) {
sys/arch/mips64/mips64/db_disasm.c
76
#define db_printsym(addr,flags,fn) (fn)("%p",addr)
sys/arch/octeon/dev/octeon_pcibus.c
114
int octeon_pcibus_intr_map(int dev, int fn, int pin);
sys/arch/octeon/dev/octeon_pcibus.c
379
int bus, dev, fn, pin;
sys/arch/octeon/dev/octeon_pcibus.c
393
pci_decompose_tag(pa->pa_pc, pa->pa_tag, &bus, &dev, &fn);
sys/arch/octeon/dev/octeon_pcibus.c
399
*ihp = octeon_pcibus_intr_map(dev, fn, pa->pa_intrpin);
sys/arch/octeon/dev/octeon_pcibus.c
507
octeon_pcibus_intr_map(int dev, int fn, int pin)
sys/arch/powerpc64/dev/phb.c
679
int bus, dev, fn;
sys/arch/powerpc64/dev/phb.c
683
phb_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/arch/powerpc64/dev/phb.c
685
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/arch/riscv64/dev/stfpcie.c
933
int bus, dev, fn;
sys/arch/riscv64/dev/stfpcie.c
936
stfpcie_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/arch/riscv64/dev/stfpcie.c
938
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/arch/sparc64/dev/iommu.c
596
#define BUS_DMA_FIND_PARENT(t, fn) \
sys/arch/sparc64/dev/iommu.c
598
panic("null bus_dma parent (" #fn ")"); \
sys/arch/sparc64/dev/iommu.c
599
for (t = t->_parent; t->fn == NULL; t = t->_parent) \
sys/arch/sparc64/dev/iommu.c
601
panic("no bus_dma " #fn " located");
sys/arch/sparc64/dev/viommu.c
209
#define BUS_DMA_FIND_PARENT(t, fn) \
sys/arch/sparc64/dev/viommu.c
211
panic("null bus_dma parent (" #fn ")"); \
sys/arch/sparc64/dev/viommu.c
212
for (t = t->_parent; t->fn == NULL; t = t->_parent) \
sys/arch/sparc64/dev/viommu.c
214
panic("no bus_dma " #fn " located");
sys/arch/sparc64/dev/vpci.c
519
#define BUS_DMA_FIND_PARENT(t, fn) \
sys/arch/sparc64/dev/vpci.c
521
panic("null bus_dma parent (" #fn ")"); \
sys/arch/sparc64/dev/vpci.c
522
for (t = t->_parent; t->fn == NULL; t = t->_parent) \
sys/arch/sparc64/dev/vpci.c
524
panic("no bus_dma " #fn " located");
sys/dev/acpi/acpidmar.c
768
const char *fn)
sys/dev/acpi/dsdt.c
1667
void (*fn)(struct aml_value *, void *), void *arg)
sys/dev/acpi/dsdt.c
1674
fn(pkg->v_package[idx], arg);
sys/dev/acpi/dsdt.c
266
_aml_die(const char *fn, int line, const char *fmt, ...)
sys/dev/acpi/dsdt.c
302
panic("aml_die %s:%d", fn, line);
sys/dev/acpi/dsdt.c
388
const char *fn;
sys/dev/acpi/dsdt.c
410
sptr->sig, sptr->size, sptr->fn, sptr->line);
sys/dev/acpi/dsdt.c
417
_acpi_os_malloc(size_t size, const char *fn, int line)
sys/dev/acpi/dsdt.c
422
dnprintf(99, "alloc: %p %s:%d\n", sptr, fn, line);
sys/dev/acpi/dsdt.c
427
sptr->fn = fn;
sys/dev/acpi/dsdt.c
437
_acpi_os_free(void *ptr, const char *fn, int line)
sys/dev/acpi/dsdt.c
449
dnprintf(99, "free: %p %s:%d\n", sptr, fn, line);
sys/dev/acpi/dsdt.c
96
__dead void _aml_die(const char *fn, int line, const char *fmt, ...);
sys/dev/acpi/dsdt.h
319
void (*fn)(struct aml_value *, void *), void *);
sys/dev/fdt/bcm2711_pcie.c
1048
int bus, dev, fn;
sys/dev/fdt/bcm2711_pcie.c
1051
bcmpcie_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/dev/fdt/bcm2711_pcie.c
1053
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/dev/fdt/bcm2711_pcie.c
898
int bus, dev, fn;
sys/dev/fdt/bcm2711_pcie.c
900
bcmpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/bcm2711_pcie.c
914
int bus, dev, fn;
sys/dev/fdt/bcm2711_pcie.c
916
bcmpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/cdpcie.c
464
int bus, dev, fn;
sys/dev/fdt/cdpcie.c
466
cdpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/cdpcie.c
468
KASSERT(dev == 0 && fn == 0);
sys/dev/fdt/cdpcie.c
487
int bus, dev, fn;
sys/dev/fdt/cdpcie.c
489
cdpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/cdpcie.c
491
KASSERT(dev == 0 && fn == 0);
sys/dev/fdt/dwpcie.c
1874
int bus, dev, fn;
sys/dev/fdt/dwpcie.c
1877
dwpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/dwpcie.c
1880
tag = dwpcie_make_tag(sc, 0, dev, fn);
sys/dev/fdt/dwpcie.c
1911
int bus, dev, fn;
sys/dev/fdt/dwpcie.c
1913
dwpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/dwpcie.c
1916
tag = dwpcie_make_tag(sc, 0, dev, fn);
sys/dev/fdt/dwpcie.c
2165
int bus, dev, fn;
sys/dev/fdt/dwpcie.c
2168
dwpcie_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/dev/fdt/dwpcie.c
2170
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/dev/fdt/mvkpcie.c
659
int bus, dev, fn;
sys/dev/fdt/mvkpcie.c
663
mvkpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/mvkpcie.c
701
int bus, dev, fn;
sys/dev/fdt/mvkpcie.c
705
mvkpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/mvkpcie.c
804
int bus, dev, fn;
sys/dev/fdt/mvkpcie.c
807
mvkpcie_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/dev/fdt/mvkpcie.c
809
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/dev/fdt/pciecam.c
321
int bus, dev, fn;
sys/dev/fdt/pciecam.c
323
pciecam_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/pciecam.c
325
return HREAD4(sc, PCIE_ADDR_OFFSET(bus, dev, fn, reg & ~0x3));
sys/dev/fdt/pciecam.c
332
int bus, dev, fn;
sys/dev/fdt/pciecam.c
334
pciecam_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/pciecam.c
336
HWRITE4(sc, PCIE_ADDR_OFFSET(bus, dev, fn, reg & ~0x3), data);
sys/dev/fdt/pciecam.c
435
int bus, dev, fn;
sys/dev/fdt/pciecam.c
438
pciecam_decompose_tag(sc, ih.ih_tag, &bus, &dev, &fn);
sys/dev/fdt/pciecam.c
440
reg[0] = bus << 16 | dev << 11 | fn << 8;
sys/dev/fdt/rkpcie.c
527
int bus, dev, fn;
sys/dev/fdt/rkpcie.c
529
rkpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/fdt/rkpcie.c
546
int bus, dev, fn;
sys/dev/fdt/rkpcie.c
548
rkpcie_decompose_tag(sc, tag, &bus, &dev, &fn);
sys/dev/hid/hidkbd.c
700
hidkbd_hookup_bell(void (*fn)(void *, u_int, u_int, u_int, int), void *arg)
sys/dev/hid/hidkbd.c
703
hidkbd_bell_fn = fn;
sys/dev/ic/i82596.c
470
i82596_rx_errors(struct ie_softc *sc, int fn, int status)
sys/dev/ic/i82596.c
472
log(LOG_ERR, "%s: rx error (frame# %d): %b\n", sc->sc_dev.dv_xname, fn,
sys/dev/microcode/siop/ncr53cxxx.c
1483
char *fn;
sys/dev/microcode/siop/ncr53cxxx.c
1486
fn = malloc (len);
sys/dev/microcode/siop/ncr53cxxx.c
1487
strlcpy (fn, base, len);
sys/dev/microcode/siop/ncr53cxxx.c
1488
base = strrchr(fn, '.');
sys/dev/microcode/siop/ncr53cxxx.c
1491
strlcat (fn, ".", len);
sys/dev/microcode/siop/ncr53cxxx.c
1492
strlcat (fn, sub, len);
sys/dev/microcode/siop/ncr53cxxx.c
1493
return (fn);
sys/dev/pci/drm/display/drm_hdmi_audio_helper.c
104
connector->hdmi_audio.plugged_cb = fn;
sys/dev/pci/drm/display/drm_hdmi_audio_helper.c
107
if (fn)
sys/dev/pci/drm/display/drm_hdmi_audio_helper.c
108
fn(codec_dev, connector->hdmi_audio.last_state);
sys/dev/pci/drm/display/drm_hdmi_audio_helper.c
97
hdmi_codec_plugged_cb fn,
sys/dev/pci/drm/drm_gpuvm.c
1336
if (vm_exec->extra.fn) {
sys/dev/pci/drm/drm_gpuvm.c
1337
ret = vm_exec->extra.fn(vm_exec);
sys/dev/pci/drm/drm_gpuvm.c
1388
vm_exec->extra.fn = fn_lock_array;
sys/dev/pci/drm/drm_gpuvm.c
2124
op_map_cb(const struct drm_gpuvm_ops *fn, void *priv,
sys/dev/pci/drm/drm_gpuvm.c
2138
return fn->sm_step_map(&op, priv);
sys/dev/pci/drm/drm_gpuvm.c
2142
op_remap_cb(const struct drm_gpuvm_ops *fn, void *priv,
sys/dev/pci/drm/drm_gpuvm.c
2156
return fn->sm_step_remap(&op, priv);
sys/dev/pci/drm/drm_gpuvm.c
2160
op_unmap_cb(const struct drm_gpuvm_ops *fn, void *priv,
sys/dev/pci/drm/drm_gpuvm.c
2172
return fn->sm_step_unmap(&op, priv);
sys/dev/pci/drm/drm_gpuvm.c
2621
const struct drm_gpuvm_ops *fn = gpuvm->ops;
sys/dev/pci/drm/drm_gpuvm.c
2624
if (fn && fn->op_alloc)
sys/dev/pci/drm/drm_gpuvm.c
2625
op = fn->op_alloc();
sys/dev/pci/drm/drm_gpuvm.c
2639
const struct drm_gpuvm_ops *fn = gpuvm->ops;
sys/dev/pci/drm/drm_gpuvm.c
2641
if (fn && fn->op_free)
sys/dev/pci/drm/drm_gpuvm.c
2642
fn->op_free(op);
sys/dev/pci/drm/drm_ioc32.c
330
drm_ioctl_compat_t *fn;
sys/dev/pci/drm/drm_ioc32.c
333
#define DRM_IOCTL32_DEF(n, f) [DRM_IOCTL_NR(n##32)] = {.fn = f, .name = #n}
sys/dev/pci/drm/drm_ioc32.c
367
drm_ioctl_compat_t *fn;
sys/dev/pci/drm/drm_ioc32.c
377
fn = drm_compat_ioctls[nr].fn;
sys/dev/pci/drm/drm_ioc32.c
378
if (!fn)
sys/dev/pci/drm/drm_ioc32.c
386
ret = (*fn)(filp, cmd, arg);
sys/dev/pci/drm/i915/display/intel_overlay.c
236
alloc_request(struct intel_overlay *overlay, void (*fn)(struct intel_overlay *))
sys/dev/pci/drm/i915/display/intel_overlay.c
241
overlay->flip_complete = fn;
sys/dev/pci/drm/i915/gem/selftests/huge_pages.c
1377
igt_create_fn fn;
sys/dev/pci/drm/i915/gem/selftests/huge_pages.c
1401
obj = backends[i].fn(i915, size, 0);
sys/dev/pci/drm/i915/gem/selftests/huge_pages.c
1462
igt_create_fn fn;
sys/dev/pci/drm/i915/gem/selftests/huge_pages.c
1503
obj = backends[i].fn(i915, size, backends[i].flags);
sys/dev/pci/drm/i915/gem/selftests/i915_gem_context.c
293
void (* const *fn)(struct kthread_work *);
sys/dev/pci/drm/i915/gem/selftests/i915_gem_context.c
382
for (fn = func; !err && *fn; fn++) {
sys/dev/pci/drm/i915/gem/selftests/i915_gem_context.c
394
kthread_init_work(&data[n].work, *fn);
sys/dev/pci/drm/i915/gt/gen8_ppgtt.c
409
void (*fn)(struct i915_address_space *vm,
sys/dev/pci/drm/i915/gt/gen8_ppgtt.c
427
fn, data);
sys/dev/pci/drm/i915/gt/gen8_ppgtt.c
429
fn(vm, pt, data);
sys/dev/pci/drm/i915/gt/gen8_ppgtt.c
441
void (*fn)(struct i915_address_space *vm,
sys/dev/pci/drm/i915/gt/gen8_ppgtt.c
451
fn, data);
sys/dev/pci/drm/i915/gt/intel_ggtt_fencing.c
333
struct i915_fence_reg *fence, *fn;
sys/dev/pci/drm/i915/gt/intel_ggtt_fencing.c
335
list_for_each_entry_safe(fence, fn, &ggtt->fence_list, link) {
sys/dev/pci/drm/i915/gt/intel_gt_irq.h
52
void (*fn)(struct intel_engine_cs *engine,
sys/dev/pci/drm/i915/gt/intel_gt_irq.h
62
smp_store_mb(engine->irq_handler, fn);
sys/dev/pci/drm/i915/gt/intel_gtt.h
350
void (*fn)(struct i915_address_space *vm,
sys/dev/pci/drm/i915/gt/intel_lrc.c
1563
u32 *(*fn)(const struct intel_context *ce, u32 *cs);
sys/dev/pci/drm/i915/gt/intel_lrc.c
1565
fn = gen12_emit_indirect_ctx_xcs;
sys/dev/pci/drm/i915/gt/intel_lrc.c
1567
fn = gen12_emit_indirect_ctx_rcs;
sys/dev/pci/drm/i915/gt/intel_lrc.c
1571
setup_indirect_ctx_bb(ce, engine, fn);
sys/dev/pci/drm/i915/gt/selftest_engine_heartbeat.c
118
err = fn(engine);
sys/dev/pci/drm/i915/gt/selftest_engine_heartbeat.c
91
int (*fn)(struct intel_engine_cs *cs))
sys/dev/pci/drm/i915/gt/selftest_hangcheck.c
1428
int (*fn)(void *),
sys/dev/pci/drm/i915/gt/selftest_hangcheck.c
1533
tsk = kthread_run(fn, &arg, "igt/evict_vma");
sys/dev/pci/drm/i915/gt/selftest_migrate.c
109
pr_err("%ps timed out, size: %u\n", fn, sz);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
120
fn, sz, x * sizeof(u32));
sys/dev/pci/drm/i915/gt/selftest_migrate.c
256
int (*fn)(struct intel_migrate *migrate,
sys/dev/pci/drm/i915/gt/selftest_migrate.c
308
fn, sz);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
318
err = fn(migrate, &ww, obj, val, &rq);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
321
pr_err("%ps timed out, size: %u\n", fn, sz);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
339
fn, vaddr[x], val, x * sizeof(u32));
sys/dev/pci/drm/i915/gt/selftest_migrate.c
359
fn, sz);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
37
int (*fn)(struct intel_migrate *migrate,
sys/dev/pci/drm/i915/gt/selftest_migrate.c
381
fn, i * PAGE_SIZE + x * sizeof(u32), ccs_bytes);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
397
pr_err("%ps failed, size: %u\n", fn, sz);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
683
int (*fn)(void *arg),
sys/dev/pci/drm/i915/gt/selftest_migrate.c
703
tsk = kthread_run(fn, &thread[i], "igt-%d", i);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
90
err = fn(migrate, &ww, src, dst, &rq);
sys/dev/pci/drm/i915/gt/selftest_migrate.c
95
pr_err("%ps failed, size: %u\n", fn, sz);
sys/dev/pci/drm/i915/gt/selftest_workarounds.c
1022
bool (*fn)(struct intel_engine_cs *engine,
sys/dev/pci/drm/i915/gt/selftest_workarounds.c
1047
if (!fn(engine, a[i], b[i], wa->reg))
sys/dev/pci/drm/i915/i915_active.c
621
int (*fn)(void *arg, struct dma_fence *fence),
sys/dev/pci/drm/i915/i915_active.c
633
err = fn(arg, fence);
sys/dev/pci/drm/i915/i915_active.c
686
int (*fn)(void *arg, struct dma_fence *fence),
sys/dev/pci/drm/i915/i915_active.c
696
err = __await_active(&ref->excl, fn, arg);
sys/dev/pci/drm/i915/i915_active.c
705
err = __await_active(&it->base, fn, arg);
sys/dev/pci/drm/i915/i915_active.h
65
dma_fence_func_t fn)
sys/dev/pci/drm/i915/i915_active.h
68
active->cb.func = fn ?: i915_active_noop;
sys/dev/pci/drm/i915/i915_ioc32.c
79
drm_ioctl_compat_t *fn = NULL;
sys/dev/pci/drm/i915/i915_ioc32.c
86
fn = i915_compat_ioctls[nr - DRM_COMMAND_BASE];
sys/dev/pci/drm/i915/i915_ioc32.c
88
if (fn != NULL)
sys/dev/pci/drm/i915/i915_ioc32.c
89
ret = (*fn) (filp, cmd, arg);
sys/dev/pci/drm/i915/i915_request.c
206
__notify_execute_cb(struct i915_request *rq, bool (*fn)(struct irq_work *wrk))
sys/dev/pci/drm/i915/i915_request.c
216
fn(&cb->work);
sys/dev/pci/drm/i915/i915_sw_fence.c
131
return fence->fn(fence, state);
sys/dev/pci/drm/i915/i915_sw_fence.c
240
i915_sw_fence_notify_t fn,
sys/dev/pci/drm/i915/i915_sw_fence.c
245
fence->fn = fn;
sys/dev/pci/drm/i915/i915_sw_fence.c
39
return (void *)(((struct i915_sw_fence *)addr)->fn);
sys/dev/pci/drm/i915/i915_sw_fence.h
32
i915_sw_fence_notify_t fn;
sys/dev/pci/drm/i915/i915_sw_fence.h
43
i915_sw_fence_notify_t fn,
sys/dev/pci/drm/i915/i915_sw_fence.h
47
#define i915_sw_fence_init(fence, fn) \
sys/dev/pci/drm/i915/i915_sw_fence.h
51
BUILD_BUG_ON((fn) == NULL); \
sys/dev/pci/drm/i915/i915_sw_fence.h
52
__i915_sw_fence_init((fence), (fn), #fence, &__key); \
sys/dev/pci/drm/i915/i915_sw_fence.h
55
#define i915_sw_fence_init(fence, fn) \
sys/dev/pci/drm/i915/i915_sw_fence.h
57
BUILD_BUG_ON((fn) == NULL); \
sys/dev/pci/drm/i915/i915_sw_fence.h
58
__i915_sw_fence_init((fence), (fn), NULL, NULL); \
sys/dev/pci/drm/i915/selftests/i915_request.c
1619
void (* const *fn)(struct kthread_work *);
sys/dev/pci/drm/i915/selftests/i915_request.c
1631
for (fn = func; !err && *fn; fn++) {
sys/dev/pci/drm/i915/selftests/i915_request.c
1636
snprintf(name, sizeof(name), "%ps", *fn);
sys/dev/pci/drm/i915/selftests/i915_request.c
1658
kthread_init_work(&threads[idx].work, *fn);
sys/dev/pci/drm/i915/selftests/i915_request.c
2832
int (* const *fn)(void *arg);
sys/dev/pci/drm/i915/selftests/i915_request.c
2874
for (fn = func; *fn && !err; fn++) {
sys/dev/pci/drm/i915/selftests/i915_request.c
2878
snprintf(name, sizeof(name), "%ps", *fn);
sys/dev/pci/drm/i915/selftests/i915_request.c
2899
err = (*fn)(ps);
sys/dev/pci/drm/i915/selftests/i915_request.c
3189
void (* const *fn)(struct kthread_work *);
sys/dev/pci/drm/i915/selftests/i915_request.c
3201
for (fn = func; *fn; fn++) {
sys/dev/pci/drm/i915/selftests/i915_request.c
3206
snprintf(name, sizeof(name), "%ps", *fn);
sys/dev/pci/drm/i915/selftests/i915_request.c
3233
kthread_init_work(&engines[idx].work, *fn);
sys/dev/pci/drm/i915/selftests/lib_sw_fence.c
44
fence->fn = nop_fence_notify;
sys/dev/pci/drm/i915/selftests/lib_sw_fence.c
49
if (!fence->fn)
sys/dev/pci/drm/include/drm/drm_gpuvm.h
557
int (*fn)(struct drm_gpuvm_exec *vm_exec);
sys/dev/pci/drm/include/linux/cleanup.h
11
__free_##fn(void *p) \
sys/dev/pci/drm/include/linux/cleanup.h
6
#define __free(fn) __cleanup(__free_##fn)
sys/dev/pci/drm/include/linux/cleanup.h
9
#define DEFINE_FREE(fn, type, body) \
sys/dev/pci/drm/include/linux/compiler.h
29
#define __cleanup(fn) __attribute__((__cleanup__(fn)))
sys/dev/pci/drm/include/linux/rcupdate.h
39
call_rcu(struct rcu_head *head, void (*fn)(struct rcu_head *))
sys/dev/pci/drm/include/linux/rcupdate.h
41
fn(head);
sys/dev/pci/drm/include/linux/stop_machine.h
11
stop_machine(cpu_stop_fn_t fn, void *arg, void *cpus)
sys/dev/pci/drm/include/linux/stop_machine.h
15
r = (*fn)(arg);
sys/dev/pci/drm/include/linux/wait.h
327
#define DEFINE_WAIT_FUNC(name, fn) \
sys/dev/pci/drm/include/linux/wait.h
330
.func = fn, \
sys/dev/pci/drm/include/linux/wait_bit.h
33
#define ___wait_var_event(var, condition, state, ex, ret, fn) \
sys/dev/pci/drm/include/linux/workqueue.h
154
#define __DELAYED_WORK_INITIALIZER(dw, fn, flags) { \
sys/dev/pci/drm/include/linux/workqueue.h
158
.work.task = TASK_INITIALIZER((void (*)(void *))(fn), &(dw).work) \
sys/dev/pci/if_ixl.c
3634
void (*fn)(struct ixl_softc *, void *), void *arg)
sys/dev/pci/if_ixl.c
3636
iatq->iatq_fn = fn;
sys/dev/pckbc/pckbd.c
1230
pckbd_hookup_bell(void (*fn)(void *, u_int, u_int, u_int, int), void *arg)
sys/dev/pckbc/pckbd.c
1234
pckbd_bell_fn = fn;
sys/dev/pckbc/pckbdvar.h
5
void pckbd_hookup_bell(void (*fn)(void *, u_int, u_int, u_int, int),
sys/dev/pv/virtiovar.h
218
#define virtio_intr_establish(sc, va, v, ci, fn, a) (sc)->sc_ops->intr_establish(sc, va, v, ci, fn, a)
sys/dev/usb/dwc2/dwc2.h
271
INIT_DELAYED_WORK(struct delayed_work *dw, void (*fn)(void *), void *arg)
sys/dev/usb/dwc2/dwc2.h
273
dw->dw_fn = fn;
sys/dev/usb/ukbd.c
527
int fn;
sys/dev/usb/ukbd.c
559
fn = 0;
sys/dev/usb/ukbd.c
562
fn = 1;
sys/dev/usb/ukbd.c
572
if (fn != 0)
sys/isofs/cd9660/cd9660_util.c
100
isofncmp(const u_char *fn, int fnlen, const u_char *isofn, int isolen,
sys/isofs/cd9660/cd9660_util.c
105
const u_char *fnend = fn + fnlen, *isoend = isofn + isolen;
sys/isofs/cd9660/cd9660_util.c
107
for (; fn != fnend; fn++) {
sys/isofs/cd9660/cd9660_util.c
109
return *fn;
sys/isofs/cd9660/cd9660_util.c
112
if (*fn++ != ';')
sys/isofs/cd9660/cd9660_util.c
113
return fn[-1];
sys/isofs/cd9660/cd9660_util.c
114
for (i = 0; fn != fnend; i = i * 10 + *fn++ - '0') {
sys/isofs/cd9660/cd9660_util.c
115
if (*fn < '0' || *fn > '9') {
sys/isofs/cd9660/cd9660_util.c
124
if (((u_char) c) != *fn) {
sys/isofs/cd9660/cd9660_util.c
126
if (c + ('a' - 'A') != *fn) {
sys/isofs/cd9660/cd9660_util.c
127
if (*fn >= 'a' && *fn <= 'z')
sys/isofs/cd9660/cd9660_util.c
128
return *fn - ('a' - 'A') - c;
sys/isofs/cd9660/cd9660_util.c
130
return *fn - c;
sys/isofs/cd9660/cd9660_util.c
133
return *fn - c;
sys/kern/kern_subr.c
265
hook_establish(struct hook_desc_head *head, int tail, void (*fn)(void *),
sys/kern/kern_subr.c
274
hdp->hd_fn = fn;
sys/kern/kern_sysctl.c
238
sysctlfn *fn;
sys/kern/kern_sysctl.c
264
fn = kern_sysctl;
sys/kern/kern_sysctl.c
268
fn = hw_sysctl;
sys/kern/kern_sysctl.c
272
fn = net_sysctl;
sys/kern/kern_sysctl.c
276
fn = uvm_sysctl;
sys/kern/kern_sysctl.c
279
fn = vfs_sysctl;
sys/kern/kern_sysctl.c
283
fn = cpu_sysctl;
sys/kern/kern_sysctl.c
287
fn = debug_sysctl;
sys/kern/kern_sysctl.c
292
fn = ddb_sysctl;
sys/kern/kern_sysctl.c
309
error = (*fn)(&name[1], SCARG(uap, namelen) - 1, SCARG(uap, old),
sys/kern/kern_task.c
341
task_set(struct task *t, void (*fn)(void *), void *arg)
sys/kern/kern_task.c
343
t->t_func = fn;
sys/kern/kern_timeout.c
288
timeout_set(struct timeout *new, void (*fn)(void *), void *arg)
sys/kern/kern_timeout.c
290
timeout_set_flags(new, fn, arg, KCLOCK_NONE, 0);
sys/kern/kern_timeout.c
294
timeout_set_flags(struct timeout *to, void (*fn)(void *), void *arg, int kclock,
sys/kern/kern_timeout.c
300
to->to_func = fn;
sys/kern/kern_timeout.c
311
timeout_set_proc(struct timeout *new, void (*fn)(void *), void *arg)
sys/kern/kern_timeout.c
313
timeout_set_flags(new, fn, arg, KCLOCK_NONE, TIMEOUT_PROC);
sys/kern/kern_timeout.c
674
void (*fn)(void *);
sys/kern/kern_timeout.c
683
fn = to->to_func;
sys/kern/kern_timeout.c
696
fn(arg);
sys/kern/subr_autoconf.c
149
if (m->fn != NULL)
sys/kern/subr_autoconf.c
150
pri = (*m->fn)(m->parent, match, m->aux);
sys/kern/subr_autoconf.c
187
config_search(cfmatch_t fn, struct device *parent, void *aux)
sys/kern/subr_autoconf.c
193
m.fn = fn;
sys/kern/subr_autoconf.c
250
config_scan(cfscan_t fn, struct device *parent)
sys/kern/subr_autoconf.c
275
(*fn)(parent, match);
sys/kern/subr_autoconf.c
285
config_rootsearch(cfmatch_t fn, char *rootname, void *aux)
sys/kern/subr_autoconf.c
291
m.fn = fn;
sys/kern/subr_autoconf.c
72
cfmatch_t fn;
sys/kern/subr_hibernate.c
562
void *fn;
sys/kern/subr_hibernate.c
604
fn = printf;
sys/kern/subr_hibernate.c
605
SHA256Update(&ctx, &fn, sizeof(fn));
sys/kern/subr_hibernate.c
606
fn = malloc;
sys/kern/subr_hibernate.c
607
SHA256Update(&ctx, &fn, sizeof(fn));
sys/kern/subr_hibernate.c
608
fn = km_alloc;
sys/kern/subr_hibernate.c
609
SHA256Update(&ctx, &fn, sizeof(fn));
sys/kern/subr_hibernate.c
610
fn = strlen;
sys/kern/subr_hibernate.c
611
SHA256Update(&ctx, &fn, sizeof(fn));
sys/kern/uipc_mbuf.c
483
mextfree_register(void (*fn)(caddr_t, u_int, void *))
sys/kern/uipc_mbuf.c
486
mextfree_fns[num_extfree_fns] = fn;
sys/ntfs/ntfs_vfsops.c
647
struct fnode *fn;
sys/ntfs/ntfs_vfsops.c
652
fn = VTOF(vp);
sys/ntfs/ntfs_vfsops.c
657
ntfhp->ntfid_attr = fn->f_attrtype;
sys/sys/systm.h
322
#define startuphook_establish(fn, arg) \
sys/sys/systm.h
323
hook_establish(&startuphook_list, 1, (fn), (arg))
sys/uvm/uvm_map.c
1606
int (*fn)(vm_map_entry_t), u_long serial)
sys/uvm/uvm_map.c
1624
ret = (*fn)(entry);
sys/uvm/uvm_map.c
1641
const char *fmt, int (*fn)(vm_map_entry_t), u_long serial)
sys/uvm/uvm_map.c
1647
ok = uvm_map_inentry_fix(p, ie, addr, fn, serial);
sys/uvm/uvm_map.h
371
const char *fmt, int (*fn)(vm_map_entry_t), u_long serial);
usr.bin/awk/main.c
156
char *fn, *vn;
usr.bin/awk/main.c
207
fn = getarg(&argc, &argv, "no program filename");
usr.bin/awk/main.c
214
pfile[npfile++] = fn;
usr.bin/cvs/rcs.c
283
char numbuf[CVS_REV_BUFSZ], *fn, tmpdir[PATH_MAX];
usr.bin/cvs/rcs.c
306
(void)xasprintf(&fn, "%s/rcs.XXXXXXXXXX", dirname(tmpdir));
usr.bin/cvs/rcs.c
308
if ((fd = mkstemp(fn)) == -1)
usr.bin/cvs/rcs.c
309
fatal("%s", fn);
usr.bin/cvs/rcs.c
313
(void)unlink(fn);
usr.bin/cvs/rcs.c
314
fatal("fdopen %s: %s", fn, strerror(saved_errno));
usr.bin/cvs/rcs.c
317
worklist_add(fn, &temp_files);
usr.bin/cvs/rcs.c
421
(void)unlink(fn);
usr.bin/cvs/rcs.c
422
fatal("fchmod %s: %s", fn, strerror(saved_errno));
usr.bin/cvs/rcs.c
427
if (rename(fn, rfp->rf_path) == -1) {
usr.bin/cvs/rcs.c
429
(void)unlink(fn);
usr.bin/cvs/rcs.c
430
fatal("rename(%s, %s): %s", fn, rfp->rf_path,
usr.bin/cvs/rcs.c
435
free(fn);
usr.bin/dig/lib/dns/include/dns/fixedname.h
72
#define dns_fixedname_init(fn) \
usr.bin/dig/lib/dns/include/dns/fixedname.h
74
dns_name_init(&((fn)->name), (fn)->offsets); \
usr.bin/dig/lib/dns/include/dns/fixedname.h
75
isc_buffer_init(&((fn)->buffer), (fn)->data, \
usr.bin/dig/lib/dns/include/dns/fixedname.h
77
dns_name_setbuffer(&((fn)->name), &((fn)->buffer)); \
usr.bin/dig/lib/dns/include/dns/fixedname.h
80
#define dns_fixedname_invalidate(fn) \
usr.bin/dig/lib/dns/include/dns/fixedname.h
81
dns_name_invalidate(&((fn)->name))
usr.bin/dig/lib/dns/include/dns/fixedname.h
83
#define dns_fixedname_name(fn) (&((fn)->name))
usr.bin/dig/lib/dns/name.c
1680
dns_fixedname_t fn;
usr.bin/dig/lib/dns/name.c
1690
dns_fixedname_init(&fn);
usr.bin/dig/lib/dns/name.c
1691
name = dns_fixedname_name(&fn);
usr.bin/getent/getent.c
109
exit(curdb->fn(argc, argv));
usr.bin/getent/getent.c
77
int (*fn)(int, char *[]);
usr.bin/grep/grep.c
228
read_patterns(const char *fn)
usr.bin/grep/grep.c
235
if ((f = fopen(fn, "r")) == NULL)
usr.bin/grep/grep.c
236
err(2, "%s", fn);
usr.bin/grep/grep.c
242
err(2, "%s", fn);
usr.bin/grep/grep.h
88
int procfile(char *fn);
usr.bin/grep/util.c
105
procfile(char *fn)
usr.bin/grep/util.c
114
if (fn == NULL) {
usr.bin/grep/util.c
115
fn = "(standard input)";
usr.bin/grep/util.c
118
f = grep_open(fn);
usr.bin/grep/util.c
125
warn("%s", fn);
usr.bin/grep/util.c
135
ln.file = fn;
usr.bin/grep/util.c
179
printf("%s%c", fn, nullflag ? '\0' : '\n');
usr.bin/grep/util.c
181
printf("%s%c", fn, nullflag ? '\0' : '\n');
usr.bin/grep/util.c
184
printf("Binary file %s matches\n", fn);
usr.bin/lndir/lndir.c
114
fn = argv[0];
usr.bin/lndir/lndir.c
129
if (stat(fn, &fs) == -1)
usr.bin/lndir/lndir.c
130
err(1, "%s", fn);
usr.bin/lndir/lndir.c
132
errc(2, ENOTDIR, "%s", fn);
usr.bin/lndir/lndir.c
134
exit(dodir(fn, &fs, &ts, 0));
usr.bin/lndir/lndir.c
177
char *fn; /* name of "from" directory, either absolute or
usr.bin/lndir/lndir.c
183
dodir(char *fn, struct stat *fs, struct stat *ts, int rel)
usr.bin/lndir/lndir.c
195
warnx("%s: From and to directories are identical!", fn);
usr.bin/lndir/lndir.c
203
strlcat(buf, fn, sizeof(buf));
usr.bin/lndir/lndir.c
86
char *fn, *tn;
usr.bin/mail/collect.c
509
forward(char *ms, FILE *fp, char *fn, int f)
usr.bin/mail/collect.c
540
warn("%s", fn);
usr.bin/mandoc/mandoc_msg.c
309
mandoc_msg_setinfilename(const char *fn)
usr.bin/mandoc/mandoc_msg.c
311
filename = fn;
usr.bin/mg/buffer.c
1073
findbuffer(char *fn)
usr.bin/mg/buffer.c
1078
if (strlcpy(fname, fn, sizeof(fname)) >= sizeof(fname)) {
usr.bin/mg/buffer.c
731
augbname(char *bn, const char *fn, size_t bs)
usr.bin/mg/buffer.c
736
if ((len = xbasename(bn, fn, bs)) >= bs)
usr.bin/mg/dired.c
1033
fnlen = strlen(d1->fn);
usr.bin/mg/dired.c
1035
(strncmp(p, d1->fn, plen) == 0)) {
usr.bin/mg/dired.c
1052
free(d1->fn);
usr.bin/mg/dired.c
1084
if ((d1->fn = strdup(p)) == NULL) {
usr.bin/mg/dired.c
1092
free(d1->fn);
usr.bin/mg/dired.c
1096
if ((d2->fn = strdup(p)) == NULL) {
usr.bin/mg/dired.c
1097
free(d1->fn);
usr.bin/mg/dired.c
1216
findfname(struct line *lp, char *fn)
usr.bin/mg/dired.c
1223
fn = &lp->l_text[start];
usr.bin/mg/dired.c
1224
return fn;
usr.bin/mg/dired.c
75
char *fn;
usr.bin/mg/dired.c
841
d_makename(struct line *lp, char *fn, size_t len)
usr.bin/mg/dired.c
851
ret = snprintf(fn, len, "%s%.*s", curbp->b_fname, nlen, namep);
usr.bin/mg/file.c
109
do_filevisitalt(char *fn)
usr.bin/mg/file.c
119
adjf = adjustname(fn, TRUE);
usr.bin/mg/file.c
660
writeout(FILE ** ffp, struct buffer *bp, char *fn)
usr.bin/mg/file.c
667
if (stat(fn, &statbuf) == -1 && errno == ENOENT) {
usr.bin/mg/file.c
669
(void)xdirname(dp, fn, sizeof(dp));
usr.bin/mg/file.c
689
if ((s = ffwopen(ffp, fn, bp)) != FIOSUC)
usr.bin/mg/file.c
696
ewprintf("Wrote %s", fn);
usr.bin/mg/file.c
701
ewprintf("Unable to write %s", fn);
usr.bin/mg/fileio.c
107
fd = open(fn, O_RDWR | O_CREAT | O_TRUNC, fmode);
usr.bin/mg/fileio.c
210
fbackupfile(const char *fn)
usr.bin/mg/fileio.c
219
if (stat(fn, &sb) == -1) {
usr.bin/mg/fileio.c
221
ewprintf("Can't stat %s : %s", fn, strerror(errno));
usr.bin/mg/fileio.c
225
if ((bkpth = bkuplocation(fn)) == NULL)
usr.bin/mg/fileio.c
243
if ((from = open(fn, O_RDONLY)) == -1) {
usr.bin/mg/fileio.c
296
adjustname(const char *fn, int slashslash)
usr.bin/mg/fileio.c
303
cp = fn + strlen(fn) - 1;
usr.bin/mg/fileio.c
304
for (; cp >= fn; cp--) {
usr.bin/mg/fileio.c
306
fn = ep;
usr.bin/mg/fileio.c
315
if ((path = expandtilde(fn)) == NULL)
usr.bin/mg/fileio.c
40
ffropen(FILE ** ffp, const char *fn, struct buffer *bp)
usr.bin/mg/fileio.c
42
if ((*ffp = fopen(fn, "r")) == NULL) {
usr.bin/mg/fileio.c
49
if (fisdir(fn) == TRUE)
usr.bin/mg/fileio.c
600
bkuplocation(const char *fn)
usr.bin/mg/fileio.c
606
S_ISDIR(sb.st_mode) && !bkupleavetmp(fn)) {
usr.bin/mg/fileio.c
611
c = fn;
usr.bin/mg/fileio.c
636
} else if ((ret = strndup(fn, NFILEN)) == NULL)
usr.bin/mg/fileio.c
683
bkupleavetmp(const char *fn)
usr.bin/mg/fileio.c
688
if (strncmp(fn, "/tmp", 4) == 0)
usr.bin/mg/fileio.c
701
expandtilde(const char *fn)
usr.bin/mg/fileio.c
712
if (fn[0] != '~' || stat(fn, &statbuf) == 0) {
usr.bin/mg/fileio.c
713
if ((ret = strndup(fn, NFILEN)) == NULL)
usr.bin/mg/fileio.c
717
cp = strchr(fn, '/');
usr.bin/mg/fileio.c
719
cp = fn + strlen(fn); /* point to the NUL byte */
usr.bin/mg/fileio.c
720
ulen = cp - &fn[1];
usr.bin/mg/fileio.c
722
if ((ret = strndup(fn, NFILEN)) == NULL)
usr.bin/mg/fileio.c
729
memcpy(user, &fn[1], ulen);
usr.bin/mg/fileio.c
742
fn = cp;
usr.bin/mg/fileio.c
743
if (*fn == '/')
usr.bin/mg/fileio.c
744
fn++;
usr.bin/mg/fileio.c
746
if (strlcat(path, fn, sizeof(path)) >= sizeof(path)) {
usr.bin/mg/fileio.c
99
ffwopen(FILE ** ffp, const char *fn, struct buffer *bp)
usr.bin/mg/funmap.c
244
struct funmap *fn;
usr.bin/mg/funmap.c
246
for (fn = functnames; fn->fn_name != NULL; fn++) {
usr.bin/mg/funmap.c
247
fn->fn_next = funs;
usr.bin/mg/funmap.c
248
funs = fn;
usr.bin/mg/funmap.c
255
struct funmap *fn;
usr.bin/mg/funmap.c
257
if ((fn = malloc(sizeof(*fn))) == NULL)
usr.bin/mg/funmap.c
260
fn->fn_funct = fun;
usr.bin/mg/funmap.c
261
fn->fn_name = fname;
usr.bin/mg/funmap.c
262
fn->fn_nparams = fparams;
usr.bin/mg/funmap.c
263
fn->fn_next = funs;
usr.bin/mg/funmap.c
265
funs = fn;
usr.bin/mg/funmap.c
275
struct funmap *fn;
usr.bin/mg/funmap.c
277
for (fn = funs; fn != NULL; fn = fn->fn_next) {
usr.bin/mg/funmap.c
278
if (strcmp(fn->fn_name, fname) == 0)
usr.bin/mg/funmap.c
279
return (fn->fn_funct);
usr.bin/mg/funmap.c
287
struct funmap *fn;
usr.bin/mg/funmap.c
289
for (fn = funs; fn != NULL; fn = fn->fn_next) {
usr.bin/mg/funmap.c
290
if (fn->fn_funct == fun)
usr.bin/mg/funmap.c
291
return (fn->fn_name);
usr.bin/mg/funmap.c
302
struct funmap *fn;
usr.bin/mg/funmap.c
308
for (fn = funs; fn != NULL; fn = fn->fn_next) {
usr.bin/mg/funmap.c
309
if (memcmp(fname, fn->fn_name, len) == 0) {
usr.bin/mg/funmap.c
314
if ((el->l_name = strdup(fn->fn_name)) == NULL) {
usr.bin/mg/funmap.c
332
struct funmap *fn;
usr.bin/mg/funmap.c
334
for (fn = funs; fn != NULL; fn = fn->fn_next) {
usr.bin/mg/funmap.c
335
if (fn->fn_funct == fun)
usr.bin/mg/funmap.c
336
return (fn->fn_nparams);
usr.bin/mg/tags.c
259
loadtags(const char *fn)
usr.bin/mg/tags.c
265
if ((fd = fopen(fn, "r")) == NULL) {
usr.bin/mg/tags.c
267
ewprintf("Unable to open tags file: %s", fn);
usr.bin/pctr/pctr.c
238
if (cfnp[i].fn == func)
usr.bin/pctr/pctr.c
249
u_int32_t fn;
usr.bin/pctr/pctr.c
257
fn = sel & 0x3f;
usr.bin/pctr/pctr.c
258
if ((ind = pctr_ctrfn_index(p5fn, fn)) < 0)
usr.bin/pctr/pctr.c
266
fn, msg);
usr.bin/pctr/pctr.c
273
fn = sel & 0xff;
usr.bin/pctr/pctr.c
274
if ((ind = pctr_ctrfn_index(cfnp, fn)) < 0)
usr.bin/pctr/pctr.c
295
fn, (sel >> PCTR_UM_SHIFT) & 0xff, th, um, msg);
usr.bin/pctr/pctr.c
298
fn = sel & 0xff;
usr.bin/pctr/pctr.c
307
fn, (sel >> PCTR_UM_SHIFT) & 0xff, th);
usr.bin/pctr/pctr.c
410
printf("%02x %s", cfnp->fn, cfnp->name);
usr.bin/pctr/pctrvar.h
66
u_int32_t fn;
usr.bin/rcs/rcs.c
208
char numbuf[RCS_REV_BUFSZ], *fn;
usr.bin/rcs/rcs.c
217
fn = NULL;
usr.bin/rcs/rcs.c
226
(void)xasprintf(&fn, "%s/rcs.XXXXXXXXXX", rcs_tmpdir);
usr.bin/rcs/rcs.c
228
if ((fd = mkstemp(fn)) == -1)
usr.bin/rcs/rcs.c
229
err(1, "%s", fn);
usr.bin/rcs/rcs.c
235
(void)unlink(fn);
usr.bin/rcs/rcs.c
237
err(1, "%s", fn);
usr.bin/rcs/rcs.c
240
worklist_add(fn, &temp_files);
usr.bin/rcs/rcs.c
343
if (rcs_movefile(fn, rfp->rf_path, rfp->rf_mode, rfp->rf_flags) == -1) {
usr.bin/rcs/rcs.c
344
(void)unlink(fn);
usr.bin/rcs/rcs.c
350
free(fn);
usr.bin/rsync/flist.c
262
const char *fn;
usr.bin/rsync/flist.c
272
fn = f->wpath;
usr.bin/rsync/flist.c
304
fn, (intmax_t)f->st.size,
usr.bin/rsync/flist.c
316
} else if (!io_write_buf(sess, fdout, fn, sz)) {
usr.bin/rsync/flist.c
372
fn = f->link;
usr.bin/rsync/flist.c
379
if (!io_write_buf(sess, fdout, fn, sz)) {
usr.bin/sort/bwstring.c
1060
bws_disorder_warnx(struct bwstring *s, const char *fn, size_t pos)
usr.bin/sort/bwstring.c
1063
warnx("%s:%zu: disorder: %s", fn, pos + 1, s->data.cstr);
usr.bin/sort/bwstring.c
1065
warnx("%s:%zu: disorder: %ls", fn, pos + 1, s->data.wstr);
usr.bin/sort/bwstring.h
81
void bws_disorder_warnx(struct bwstring *s, const char *fn, size_t pos);
usr.bin/sort/file.c
121
item->fn = sort_strdup(tmp_file);
usr.bin/sort/file.c
138
if (item != NULL && item->fn != NULL)
usr.bin/sort/file.c
139
unlink(item->fn);
usr.bin/sort/file.c
147
file_is_tmp(const char *fn)
usr.bin/sort/file.c
152
if (item->fn != NULL && strcmp(item->fn, fn) == 0)
usr.bin/sort/file.c
192
file_list_add(struct file_list *fl, char *fn, bool allocate)
usr.bin/sort/file.c
199
fl->fns[fl->count] = allocate ? sort_strdup(fn) : fn;
usr.bin/sort/file.c
308
sort_list_dump(struct sort_list *l, const char *fn)
usr.bin/sort/file.c
312
f = openfile(fn, "w");
usr.bin/sort/file.c
314
err(2, "%s", fn);
usr.bin/sort/file.c
337
closefile(f, fn);
usr.bin/sort/file.c
345
check(const char *fn)
usr.bin/sort/file.c
356
fr = file_reader_init(fn);
usr.bin/sort/file.c
363
err(2, "%s", fn);
usr.bin/sort/file.c
401
bws_disorder_warnx(s2, fn, posdisorder);
usr.bin/sort/file.c
404
bws_disorder_warnx(s1, fn, posdisorder);
usr.bin/sort/file.c
443
if (fn == NULL || *fn == 0 || strcmp(fn, "-") == 0) {
usr.bin/sort/file.c
462
openfile(const char *fn, const char *mode)
usr.bin/sort/file.c
466
if (strcmp(fn, "-") == 0)
usr.bin/sort/file.c
469
if (file_is_tmp(fn) && (compress_program != NULL)) {
usr.bin/sort/file.c
476
compress_program, fn);
usr.bin/sort/file.c
479
compress_program, fn);
usr.bin/sort/file.c
488
} else if ((file = fopen(fn, mode)) == NULL)
usr.bin/sort/file.c
489
err(2, "%s", fn);
usr.bin/sort/file.c
498
closefile(FILE *f, const char *fn)
usr.bin/sort/file.c
507
if (file_is_tmp(fn) && compress_program != NULL) {
usr.bin/sort/file.c
733
char *fn;
usr.bin/sort/file.c
735
fn = new_tmp_file_name();
usr.bin/sort/file.c
736
sort_list_to_file(list, fn);
usr.bin/sort/file.c
737
file_list_add(fl, fn, false);
usr.bin/sort/file.c
772
file_header_init(struct file_header **fh, const char *fn, size_t file_pos)
usr.bin/sort/file.c
778
(*fh)->fr = file_reader_init(fn);
usr.bin/sort/file.c
781
strcmp(fn, "-") == 0 ? "stdin" : fn);
usr.bin/sort/file.c
93
char *fn;
usr.bin/sort/file.h
106
void file_list_add(struct file_list *fl, char *fn, bool allocate);
usr.bin/sort/file.h
114
int procfile(const char *fn, struct sort_list *list, struct file_list *fl);
usr.bin/sort/file.h
119
void sort_list_dump(struct sort_list *l, const char *fn);
usr.bin/sort/sort.c
167
read_fns_from_file0(const char *fn)
usr.bin/sort/sort.c
174
f = fopen(fn, "r");
usr.bin/sort/sort.c
176
err(2, "%s", fn);
usr.bin/sort/sort.c
193
err(2, "%s: getdelim", fn);
usr.bin/sort/sort.c
195
closefile(f, fn);
usr.bin/ssh/channels.c
1228
channel_open_fn *fn, void *ctx)
usr.bin/ssh/channels.c
1236
c->open_confirm = fn;
usr.bin/ssh/channels.c
1242
channel_callback_fn *fn, int do_close)
usr.bin/ssh/channels.c
1250
c->detach_user = fn;
usr.bin/ssh/dispatch.c
67
ssh_dispatch_range(struct ssh *ssh, u_int from, u_int to, dispatch_fn *fn)
usr.bin/ssh/dispatch.c
74
ssh->dispatch[i] = fn;
usr.bin/ssh/dispatch.c
79
ssh_dispatch_set(struct ssh *ssh, int type, dispatch_fn *fn)
usr.bin/ssh/dispatch.c
81
ssh->dispatch[type] = fn;
usr.bin/stat/stat.c
158
int lsF, fmtchar, usestat, fn, nonl, quiet;
usr.bin/stat/stat.c
211
fn = 1;
usr.bin/stat/stat.c
274
output(&st, argv[0], statfmt, fn, nonl);
usr.bin/stat/stat.c
278
fn++;
usr.bin/stat/stat.c
297
const char *statfmt, int fn, int nonl)
usr.bin/stat/stat.c
342
snprintf(num, sizeof(num), "%d", fn);
usr.bin/unifdef/unifdef.c
1078
lt = op->fn(valp, lt, *valp, rt, val);
usr.bin/unifdef/unifdef.c
1458
defundefile(const char *fn)
usr.bin/unifdef/unifdef.c
1460
filename = fn;
usr.bin/unifdef/unifdef.c
1461
input = fopen(fn, "rb");
usr.bin/unifdef/unifdef.c
1463
err(2, "can't open %s", fn);
usr.bin/unifdef/unifdef.c
936
Linetype (*fn)(long *, Linetype, long, Linetype, long);
usr.bin/vi/ex/ex.c
1371
if (ecp->cmd->fn(sp, ecp) || INTERRUPTED(sp)) {
usr.bin/vi/ex/ex.c
471
ecp->rcmd.fn = ex_subagain;
usr.bin/vi/ex/ex.c
734
ecp->rcmd.fn = ex_subagain;
usr.bin/vi/ex/ex.h
18
int (*fn)(SCR *, EXCMD *);
usr.bin/vi/vi/v_ex.c
346
rval = exp->cmd->fn(sp, exp);
usr.sbin/amd/amd/clock.c
107
timeout(unsigned int secs, void (*fn)(void *), void *closure)
usr.sbin/amd/amd/clock.c
117
cpnew->c_fn = fn;
usr.sbin/amd/amd/clock.c
208
void (*fn)(void *) = cp->c_fn;
usr.sbin/amd/amd/clock.c
216
(*fn)(closure);
usr.sbin/amd/amd/info_file.c
146
if (fn || (*key == *kp && strcmp(key, kp) == 0)) {
usr.sbin/amd/amd/info_file.c
155
if (fn) {
usr.sbin/amd/amd/info_file.c
156
(*fn)(m, strdup(kp), dc);
usr.sbin/amd/amd/info_file.c
163
if (!fn)
usr.sbin/amd/amd/info_file.c
184
return fn ? 0 : ENOENT;
usr.sbin/amd/amd/info_file.c
216
file_reload(mnt_map *m, char *map, void (*fn)(mnt_map *, char *, char *))
usr.sbin/amd/amd/info_file.c
221
int error = search_or_reload_file(mapf, map, 0, 0, m, fn);
usr.sbin/amd/amd/info_file.c
86
void (*fn)(mnt_map *m, char *, char *))
usr.sbin/amd/amd/info_nis.c
136
nis_reload(mnt_map *m, char *map, void (*fn)(mnt_map *, char *, char *))
usr.sbin/amd/amd/info_nis.c
150
data.ncd_fn = fn;
usr.sbin/amd/amd/info_union.c
119
(*fn)(m, strdup(dp->d_name), val);
usr.sbin/amd/amd/info_union.c
131
(*fn)(m, strdup("*"), val);
usr.sbin/amd/amd/info_union.c
81
union_reload(mnt_map *m, char *map, void (*fn)(mnt_map *, char *, char *))
usr.sbin/amd/amd/info_union.c
90
(*fn)(m, strdup("/defaults"),
usr.sbin/amd/amd/mapc.c
745
mapc_keyiter(mnt_map *m, void (*fn)(char *,void *), void *arg)
usr.sbin/amd/amd/mapc.c
753
(*fn)(k->key, arg);
usr.sbin/amd/amd/mapc.c
769
root_keyiter(void (*fn)(char *,void *), void *arg)
usr.sbin/amd/amd/mapc.c
772
int c = mapc_keyiter(root_map, fn, arg);
usr.sbin/amd/amd/mapc.c
800
error_reload(mnt_map *m, char *map, add_fn *fn)
usr.sbin/amd/include/am.h
312
extern int timeout(unsigned int, void (*fn)(void *), void *);
usr.sbin/authpf/authpf.c
751
char *rsn = NULL, *fn = NULL;
usr.sbin/authpf/authpf.c
783
if (asprintf(&fn, "%s/%s/authpf.rules",
usr.sbin/authpf/authpf.c
786
if (stat(fn, &sb) == -1) {
usr.sbin/authpf/authpf.c
787
free(fn);
usr.sbin/authpf/authpf.c
788
if(asprintf(&fn, "%s/%s/authpf.rules", PATH_GROUP_DIR,
usr.sbin/authpf/authpf.c
791
if(stat(fn, &sb) == -1) {
usr.sbin/authpf/authpf.c
792
free(fn);
usr.sbin/authpf/authpf.c
793
if ((fn = strdup(PATH_PFRULES)) == NULL)
usr.sbin/authpf/authpf.c
802
pargv[11] = fn;
usr.sbin/authpf/authpf.c
805
pargv[9] = fn;
usr.sbin/authpf/authpf.c
848
free(fn);
usr.sbin/config/files.c
394
expr_eval(struct nvlist *expr, int (*fn)(const char *, void *), void *context)
usr.sbin/config/files.c
401
return ((*fn)(expr->nv_name, context));
usr.sbin/config/files.c
404
return (!expr_eval(expr->nv_next, fn, context));
usr.sbin/config/files.c
407
lhs = expr_eval(expr->nv_ptr, fn, context);
usr.sbin/config/files.c
408
rhs = expr_eval(expr->nv_next, fn, context);
usr.sbin/config/files.c
412
lhs = expr_eval(expr->nv_ptr, fn, context);
usr.sbin/config/files.c
413
rhs = expr_eval(expr->nv_next, fn, context);
usr.sbin/config/mkmakefile.c
104
fn = emitobjs;
usr.sbin/config/mkmakefile.c
106
fn = emitcfiles;
usr.sbin/config/mkmakefile.c
108
fn = emitsfiles;
usr.sbin/config/mkmakefile.c
110
fn = emitrules;
usr.sbin/config/mkmakefile.c
112
fn = emitload;
usr.sbin/config/mkmakefile.c
118
if ((*fn)(ofp))
usr.sbin/config/mkmakefile.c
75
int (*fn)(FILE *);
usr.sbin/httpd/httpd.c
505
void (*fn)(int, short, void *),
usr.sbin/httpd/httpd.c
520
event_set(ev, fd, event, fn, arg);
usr.sbin/ldapd/conn.c
103
int (*fn)(struct request *);
usr.sbin/ldapd/conn.c
127
for (i = 0; requests[i].fn != NULL; i++) {
usr.sbin/ldapd/conn.c
129
requests[i].fn(req);
usr.sbin/ldapd/conn.c
134
if (requests[i].fn == NULL) {
usr.sbin/ldapd/ldape.c
309
int (*fn)(struct request *);
usr.sbin/ldapd/ldape.c
323
rc = extended_ops[i].fn(req);
usr.sbin/ldapd/ldape.c
328
if (extended_ops[i].fn == NULL)
usr.sbin/ldpd/l2vpn.c
238
struct fec_node *fn;
usr.sbin/ldpd/l2vpn.c
270
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/l2vpn.c
271
if (fn == NULL || fn->local_label == NO_LABEL)
usr.sbin/ldpd/l2vpn.c
277
LIST_FOREACH(fnh, &fn->nexthops, entry)
usr.sbin/ldpd/l2vpn.c
285
l2vpn_pw_negotiate(struct lde_nbr *ln, struct fec_node *fn, struct map *map)
usr.sbin/ldpd/l2vpn.c
292
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/l2vpn.c
301
if (fec_find(&ln->sent_map, &fn->fec)) {
usr.sbin/ldpd/l2vpn.c
312
lde_send_labelwithdraw(ln, fn, NULL, &st);
usr.sbin/ldpd/l2vpn.c
315
lde_send_labelmapping(ln, fn, 1);
usr.sbin/ldpd/l2vpn.c
327
if (fec_find(&ln->recv_map, &fn->fec) == NULL &&
usr.sbin/ldpd/l2vpn.c
373
struct fec_node *fn;
usr.sbin/ldpd/l2vpn.c
384
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/l2vpn.c
385
if (fn == NULL)
usr.sbin/ldpd/l2vpn.c
389
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/l2vpn.c
393
fnh = fec_nh_find(fn, AF_INET, (union ldpd_addr *)&ln->id, 0);
usr.sbin/ldpd/l2vpn.c
403
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
405
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
413
struct fec_node *fn;
usr.sbin/ldpd/l2vpn.c
419
fn = (struct fec_node *)f;
usr.sbin/ldpd/l2vpn.c
420
if (fn->fec.type != FEC_TYPE_PWID)
usr.sbin/ldpd/l2vpn.c
423
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/l2vpn.c
430
wcard->fec.twcard.u.pw_type != fn->fec.u.pwid.type)
usr.sbin/ldpd/l2vpn.c
434
if (wcard->fec.pwid.type != fn->fec.u.pwid.type)
usr.sbin/ldpd/l2vpn.c
441
fnh = fec_nh_find(fn, AF_INET, (union ldpd_addr *)&ln->id, 0);
usr.sbin/ldpd/l2vpn.c
451
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
453
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
463
struct fec_node *fn;
usr.sbin/ldpd/l2vpn.c
472
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/l2vpn.c
473
if (fn == NULL)
usr.sbin/ldpd/l2vpn.c
475
fnh = fec_nh_find(fn, AF_INET, (union ldpd_addr *)
usr.sbin/ldpd/l2vpn.c
481
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
483
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/l2vpn.c
513
struct fec_node *fn;
usr.sbin/ldpd/l2vpn.c
522
fn = (struct fec_node *)f;
usr.sbin/ldpd/l2vpn.c
523
if (fn->local_label == NO_LABEL &&
usr.sbin/ldpd/l2vpn.c
524
LIST_EMPTY(&fn->downstream))
usr.sbin/ldpd/l2vpn.c
532
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/l2vpn.c
534
pwctl.local_label = fn->local_label;
usr.sbin/ldpd/l2vpn.c
540
LIST_FOREACH(me, &fn->downstream, entry)
usr.sbin/ldpd/lde.c
1086
struct fec_node *fn;
usr.sbin/ldpd/lde.c
1095
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde.c
1097
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde.c
1108
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde.c
1116
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde.c
1181
struct fec_node *fn;
usr.sbin/ldpd/lde.c
1186
fn = (struct fec_node *)fec_find(&ft, fec);
usr.sbin/ldpd/lde.c
1200
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde.c
1206
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde.c
1211
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/lde.c
1219
lde_map_add(struct lde_nbr *ln, struct fec_node *fn, int sent)
usr.sbin/ldpd/lde.c
1227
me->fec = fn->fec;
usr.sbin/ldpd/lde.c
1231
LIST_INSERT_HEAD(&fn->upstream, me, entry);
usr.sbin/ldpd/lde.c
1237
LIST_INSERT_HEAD(&fn->downstream, me, entry);
usr.sbin/ldpd/lde.c
1301
lde_wdraw_add(struct lde_nbr *ln, struct fec_node *fn)
usr.sbin/ldpd/lde.c
1309
lw->fec = fn->fec;
usr.sbin/ldpd/lde.c
1330
struct fec_node *fn;
usr.sbin/ldpd/lde.c
1347
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde.c
1348
if (fn->local_label > MPLS_LABEL_RESERVED_MAX)
usr.sbin/ldpd/lde.c
1353
if (fn->fec.type != FEC_TYPE_IPV4)
usr.sbin/ldpd/lde.c
1357
if (fn->fec.type != FEC_TYPE_IPV6)
usr.sbin/ldpd/lde.c
1364
fn->local_label = egress_label(fn->fec.type);
usr.sbin/ldpd/lde.c
1365
lde_send_labelmapping(ln, fn, 0);
usr.sbin/ldpd/lde.c
585
lde_send_change_klabel(struct fec_node *fn, struct fec_nh *fnh)
usr.sbin/ldpd/lde.c
591
switch (fn->fec.type) {
usr.sbin/ldpd/lde.c
595
kr.prefix.v4 = fn->fec.u.ipv4.prefix;
usr.sbin/ldpd/lde.c
596
kr.prefixlen = fn->fec.u.ipv4.prefixlen;
usr.sbin/ldpd/lde.c
598
kr.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
605
if (fn->fec.u.ipv4.prefixlen == 32)
usr.sbin/ldpd/lde.c
607
&fn->fec.u.ipv4.prefix);
usr.sbin/ldpd/lde.c
612
kr.prefix.v6 = fn->fec.u.ipv6.prefix;
usr.sbin/ldpd/lde.c
613
kr.prefixlen = fn->fec.u.ipv6.prefixlen;
usr.sbin/ldpd/lde.c
615
kr.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
622
if (fn->fec.u.ipv6.prefixlen == 128)
usr.sbin/ldpd/lde.c
624
&fn->fec.u.ipv6.prefix);
usr.sbin/ldpd/lde.c
627
if (fn->local_label == NO_LABEL ||
usr.sbin/ldpd/lde.c
631
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde.c
636
kpw.pw_type = fn->fec.u.pwid.type;
usr.sbin/ldpd/lde.c
639
kpw.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
650
lde_send_delete_klabel(struct fec_node *fn, struct fec_nh *fnh)
usr.sbin/ldpd/lde.c
656
switch (fn->fec.type) {
usr.sbin/ldpd/lde.c
660
kr.prefix.v4 = fn->fec.u.ipv4.prefix;
usr.sbin/ldpd/lde.c
661
kr.prefixlen = fn->fec.u.ipv4.prefixlen;
usr.sbin/ldpd/lde.c
663
kr.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
670
if (fn->fec.u.ipv4.prefixlen == 32)
usr.sbin/ldpd/lde.c
672
&fn->fec.u.ipv4.prefix);
usr.sbin/ldpd/lde.c
677
kr.prefix.v6 = fn->fec.u.ipv6.prefix;
usr.sbin/ldpd/lde.c
678
kr.prefixlen = fn->fec.u.ipv6.prefixlen;
usr.sbin/ldpd/lde.c
680
kr.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
687
if (fn->fec.u.ipv6.prefixlen == 128)
usr.sbin/ldpd/lde.c
689
&fn->fec.u.ipv6.prefix);
usr.sbin/ldpd/lde.c
692
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde.c
699
kpw.pw_type = fn->fec.u.pwid.type;
usr.sbin/ldpd/lde.c
702
kpw.local_label = fn->local_label;
usr.sbin/ldpd/lde.c
773
lde_send_labelmapping(struct lde_nbr *ln, struct fec_node *fn, int single)
usr.sbin/ldpd/lde.c
786
lde_fec2map(&fn->fec, &map);
usr.sbin/ldpd/lde.c
787
switch (fn->fec.type) {
usr.sbin/ldpd/lde.c
797
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde.c
813
map.label = fn->local_label;
usr.sbin/ldpd/lde.c
816
lre = (struct lde_req *)fec_find(&ln->recv_req, &fn->fec);
usr.sbin/ldpd/lde.c
834
me = (struct lde_map *)fec_find(&ln->sent_map, &fn->fec);
usr.sbin/ldpd/lde.c
836
me = lde_map_add(ln, fn, 1);
usr.sbin/ldpd/lde.c
841
lde_send_labelwithdraw(struct lde_nbr *ln, struct fec_node *fn,
usr.sbin/ldpd/lde.c
849
if (fn) {
usr.sbin/ldpd/lde.c
850
lde_fec2map(&fn->fec, &map);
usr.sbin/ldpd/lde.c
851
switch (fn->fec.type) {
usr.sbin/ldpd/lde.c
861
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde.c
870
map.label = fn->local_label;
usr.sbin/ldpd/lde.c
887
if (fn) {
usr.sbin/ldpd/lde.c
888
lw = (struct lde_wdraw *)fec_find(&ln->sent_wdraw, &fn->fec);
usr.sbin/ldpd/lde.c
890
lw = lde_wdraw_add(ln, fn);
usr.sbin/ldpd/lde.c
896
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde.c
897
me = (struct lde_map *)fec_find(&ln->sent_map, &fn->fec);
usr.sbin/ldpd/lde.c
898
if (lde_wildcard_apply(wcard, &fn->fec, me) == 0)
usr.sbin/ldpd/lde.c
902
&fn->fec);
usr.sbin/ldpd/lde.c
904
lw = lde_wdraw_add(ln, fn);
usr.sbin/ldpd/lde.c
965
lde_send_labelrelease(struct lde_nbr *ln, struct fec_node *fn,
usr.sbin/ldpd/lde.c
971
if (fn) {
usr.sbin/ldpd/lde.c
972
lde_fec2map(&fn->fec, &map);
usr.sbin/ldpd/lde.c
973
switch (fn->fec.type) {
usr.sbin/ldpd/lde.c
983
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde_lib.c
144
lde_nbr_is_nexthop(struct fec_node *fn, struct lde_nbr *ln)
usr.sbin/ldpd/lde_lib.c
148
LIST_FOREACH(fnh, &fn->nexthops, entry)
usr.sbin/ldpd/lde_lib.c
159
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
164
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde_lib.c
165
if (fn->local_label == NO_LABEL &&
usr.sbin/ldpd/lde_lib.c
166
LIST_EMPTY(&fn->downstream))
usr.sbin/ldpd/lde_lib.c
169
switch (fn->fec.type) {
usr.sbin/ldpd/lde_lib.c
172
rtctl.prefix.v4 = fn->fec.u.ipv4.prefix;
usr.sbin/ldpd/lde_lib.c
173
rtctl.prefixlen = fn->fec.u.ipv4.prefixlen;
usr.sbin/ldpd/lde_lib.c
177
rtctl.prefix.v6 = fn->fec.u.ipv6.prefix;
usr.sbin/ldpd/lde_lib.c
178
rtctl.prefixlen = fn->fec.u.ipv6.prefixlen;
usr.sbin/ldpd/lde_lib.c
184
rtctl.local_label = fn->local_label;
usr.sbin/ldpd/lde_lib.c
185
LIST_FOREACH(me, &fn->downstream, entry) {
usr.sbin/ldpd/lde_lib.c
186
rtctl.in_use = lde_nbr_is_nexthop(fn, me->nexthop);
usr.sbin/ldpd/lde_lib.c
193
if (LIST_EMPTY(&fn->downstream)) {
usr.sbin/ldpd/lde_lib.c
208
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
211
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde_lib.c
212
if (fn->local_label == NO_LABEL)
usr.sbin/ldpd/lde_lib.c
215
lde_send_labelmapping(ln, fn, 0);
usr.sbin/ldpd/lde_lib.c
240
struct fec_node *fn = arg;
usr.sbin/ldpd/lde_lib.c
243
while ((fnh = LIST_FIRST(&fn->nexthops)))
usr.sbin/ldpd/lde_lib.c
245
if (!LIST_EMPTY(&fn->downstream))
usr.sbin/ldpd/lde_lib.c
247
log_fec(&fn->fec));
usr.sbin/ldpd/lde_lib.c
248
if (!LIST_EMPTY(&fn->upstream))
usr.sbin/ldpd/lde_lib.c
250
log_fec(&fn->fec));
usr.sbin/ldpd/lde_lib.c
252
free(fn);
usr.sbin/ldpd/lde_lib.c
264
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
266
fn = calloc(1, sizeof(*fn));
usr.sbin/ldpd/lde_lib.c
267
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
270
fn->fec = *fec;
usr.sbin/ldpd/lde_lib.c
271
fn->local_label = NO_LABEL;
usr.sbin/ldpd/lde_lib.c
272
LIST_INIT(&fn->upstream);
usr.sbin/ldpd/lde_lib.c
273
LIST_INIT(&fn->downstream);
usr.sbin/ldpd/lde_lib.c
274
LIST_INIT(&fn->nexthops);
usr.sbin/ldpd/lde_lib.c
276
if (fec_insert(&ft, &fn->fec))
usr.sbin/ldpd/lde_lib.c
278
log_fec(&fn->fec));
usr.sbin/ldpd/lde_lib.c
280
return (fn);
usr.sbin/ldpd/lde_lib.c
284
fec_nh_find(struct fec_node *fn, int af, union ldpd_addr *nexthop,
usr.sbin/ldpd/lde_lib.c
289
LIST_FOREACH(fnh, &fn->nexthops, entry)
usr.sbin/ldpd/lde_lib.c
299
fec_nh_add(struct fec_node *fn, int af, union ldpd_addr *nexthop,
usr.sbin/ldpd/lde_lib.c
312
LIST_INSERT_HEAD(&fn->nexthops, fnh, entry);
usr.sbin/ldpd/lde_lib.c
347
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
352
fn = (struct fec_node *)fec_find(&ft, fec);
usr.sbin/ldpd/lde_lib.c
353
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
354
fn = fec_add(fec);
usr.sbin/ldpd/lde_lib.c
355
if (fec_nh_find(fn, af, nexthop, priority) != NULL)
usr.sbin/ldpd/lde_lib.c
359
log_fec(&fn->fec), log_addr(af, nexthop));
usr.sbin/ldpd/lde_lib.c
361
if (fn->fec.type == FEC_TYPE_PWID)
usr.sbin/ldpd/lde_lib.c
362
fn->data = data;
usr.sbin/ldpd/lde_lib.c
364
if (fn->local_label == NO_LABEL) {
usr.sbin/ldpd/lde_lib.c
366
fn->local_label = egress_label(fn->fec.type);
usr.sbin/ldpd/lde_lib.c
368
fn->local_label = lde_assign_label();
usr.sbin/ldpd/lde_lib.c
372
lde_send_labelmapping(ln, fn, 1);
usr.sbin/ldpd/lde_lib.c
375
fnh = fec_nh_add(fn, af, nexthop, priority);
usr.sbin/ldpd/lde_lib.c
376
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
378
switch (fn->fec.type) {
usr.sbin/ldpd/lde_lib.c
384
ln = lde_nbr_find_by_lsrid(fn->fec.u.pwid.lsr_id);
usr.sbin/ldpd/lde_lib.c
393
me = (struct lde_map *)fec_find(&ln->recv_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
404
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
408
fn = (struct fec_node *)fec_find(&ft, fec);
usr.sbin/ldpd/lde_lib.c
409
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
412
fnh = fec_nh_find(fn, af, nexthop, priority);
usr.sbin/ldpd/lde_lib.c
418
log_fec(&fn->fec), log_addr(af, nexthop));
usr.sbin/ldpd/lde_lib.c
420
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
422
if (LIST_EMPTY(&fn->nexthops)) {
usr.sbin/ldpd/lde_lib.c
424
lde_send_labelwithdraw(ln, fn, NULL, NULL);
usr.sbin/ldpd/lde_lib.c
425
fn->local_label = NO_LABEL;
usr.sbin/ldpd/lde_lib.c
426
if (fn->fec.type == FEC_TYPE_PWID)
usr.sbin/ldpd/lde_lib.c
427
fn->data = NULL;
usr.sbin/ldpd/lde_lib.c
435
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
443
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/lde_lib.c
444
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
445
fn = fec_add(&fec);
usr.sbin/ldpd/lde_lib.c
448
lre = (struct lde_req *)fec_find(&ln->sent_req, &fn->fec);
usr.sbin/ldpd/lde_lib.c
454
if (map->type == MAP_TYPE_PWID && l2vpn_pw_negotiate(ln, fn, map))
usr.sbin/ldpd/lde_lib.c
463
me = (struct lde_map *)fec_find(&ln->recv_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
468
lde_send_labelrelease(ln, fn, NULL, me->map.label);
usr.sbin/ldpd/lde_lib.c
474
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde_lib.c
479
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
489
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde_lib.c
498
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
501
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde_lib.c
512
lde_send_change_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
522
me = lde_map_add(ln, fn, 0);
usr.sbin/ldpd/lde_lib.c
541
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
554
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/lde_lib.c
555
if (fn == NULL || LIST_EMPTY(&fn->nexthops)) {
usr.sbin/ldpd/lde_lib.c
563
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde_lib.c
580
lre = (struct lde_req *)fec_find(&ln->recv_req, &fn->fec);
usr.sbin/ldpd/lde_lib.c
586
lre = lde_req_add(ln, &fn->fec, 0);
usr.sbin/ldpd/lde_lib.c
591
lde_send_labelmapping(ln, fn, 1);
usr.sbin/ldpd/lde_lib.c
604
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
608
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde_lib.c
611
if (lde_wildcard_apply(map, &fn->fec, NULL) == 0)
usr.sbin/ldpd/lde_lib.c
615
if (LIST_EMPTY(&fn->nexthops))
usr.sbin/ldpd/lde_lib.c
619
lre = (struct lde_req *)fec_find(&ln->recv_req, &fn->fec);
usr.sbin/ldpd/lde_lib.c
625
lre = lde_req_add(ln, &fn->fec, 0);
usr.sbin/ldpd/lde_lib.c
630
lde_send_labelmapping(ln, fn, 1);
usr.sbin/ldpd/lde_lib.c
664
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
677
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/lde_lib.c
679
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
683
lw = (struct lde_wdraw *)fec_find(&ln->sent_wdraw, &fn->fec);
usr.sbin/ldpd/lde_lib.c
690
me = (struct lde_map *)fec_find(&ln->sent_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
704
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
709
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde_lib.c
710
me = (struct lde_map *)fec_find(&ln->sent_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
713
if (lde_wildcard_apply(map, &fn->fec, me) == 0)
usr.sbin/ldpd/lde_lib.c
717
lw = (struct lde_wdraw *)fec_find(&ln->sent_wdraw, &fn->fec);
usr.sbin/ldpd/lde_lib.c
739
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
753
fn = (struct fec_node *)fec_find(&ft, &fec);
usr.sbin/ldpd/lde_lib.c
754
if (fn == NULL)
usr.sbin/ldpd/lde_lib.c
755
fn = fec_add(&fec);
usr.sbin/ldpd/lde_lib.c
758
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde_lib.c
766
pw = (struct l2vpn_pw *) fn->data;
usr.sbin/ldpd/lde_lib.c
776
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
781
lde_send_labelrelease(ln, fn, NULL, map->label);
usr.sbin/ldpd/lde_lib.c
784
me = (struct lde_map *)fec_find(&ln->recv_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
794
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
802
fn = (struct fec_node *)f;
usr.sbin/ldpd/lde_lib.c
803
me = (struct lde_map *)fec_find(&ln->recv_map, &fn->fec);
usr.sbin/ldpd/lde_lib.c
805
if (lde_wildcard_apply(map, &fn->fec, me) == 0)
usr.sbin/ldpd/lde_lib.c
809
LIST_FOREACH(fnh, &fn->nexthops, entry) {
usr.sbin/ldpd/lde_lib.c
828
lde_send_delete_klabel(fn, fnh);
usr.sbin/ldpd/lde_lib.c
892
struct fec_node *fn;
usr.sbin/ldpd/lde_lib.c
896
fn = (struct fec_node *) fec;
usr.sbin/ldpd/lde_lib.c
898
if (!LIST_EMPTY(&fn->nexthops) ||
usr.sbin/ldpd/lde_lib.c
899
!LIST_EMPTY(&fn->downstream) ||
usr.sbin/ldpd/lde_lib.c
900
!LIST_EMPTY(&fn->upstream))
usr.sbin/ldpd/lde_lib.c
903
fec_remove(&ft, &fn->fec);
usr.sbin/ldpd/lde_lib.c
904
free(fn);
usr.sbin/lpr/lpd/recvjob.c
304
read_number(char *fn)
usr.sbin/lpr/lpd/recvjob.c
309
if ((fp = fopen(fn, "r")) == NULL)
usr.sbin/npppd/npppd/fsm.h
134
#define TIMEOUT(fn, f, t) \
usr.sbin/npppd/npppd/fsm.h
143
(f)->timerctx.func = fn; \
usr.sbin/npppd/npppd/fsm.h
148
#define UNTIMEOUT(fn, f) evtimer_del(&(f)->timerctx.ev)
usr.sbin/nsd/server.c
3875
void (*fn)(int, short, void*);
usr.sbin/nsd/server.c
3879
fn = handle_tls_reading;
usr.sbin/nsd/server.c
3880
else fn = handle_tls_writing;
usr.sbin/nsd/server.c
3883
fn = handle_tls_reading;
usr.sbin/nsd/server.c
3884
else fn = handle_tls_writing;
usr.sbin/nsd/server.c
3888
fn = handle_tcp_reading;
usr.sbin/nsd/server.c
3889
else fn = handle_tcp_writing;
usr.sbin/nsd/server.c
3903
fn, p);
usr.sbin/nsd/server.c
4362
tcp_handler_setup_event(struct tcp_handler_data* data, void (*fn)(int, short, void *),
usr.sbin/nsd/server.c
4374
event_set(&data->event, fd, event, fn, data);
usr.sbin/nsd/udb.c
1075
udb_void fn = alloc->disk->nextgrow+fsz;
usr.sbin/nsd/udb.c
1076
assert(fn <= alloc->udb->base_size);
usr.sbin/nsd/udb.c
1080
alloc->disk->nextgrow = fn;
usr.sbin/nsd/util.c
1188
const char* fn;
usr.sbin/nsd/util.c
1221
if(!(fn = nsd->options->cookie_secret_file))
usr.sbin/nsd/util.c
1224
else if((f = fopen(fn, "r")) != NULL)
usr.sbin/nsd/util.c
1231
, fn, strerror(errno));
usr.sbin/nsd/util.c
1240
&& (f = fopen((fn = CONFIGDIR"/nsd_cookiesecrets.txt"),"r")))
usr.sbin/nsd/util.c
1246
, fn, strerror(errno));
usr.sbin/nsd/util.c
1264
, fn);
usr.sbin/nsd/util.c
1277
, fn);
usr.sbin/nsd/util.c
1289
, &nsd->cookie_secrets_filename, fn );
usr.sbin/relayd/check_icmp.c
89
void (*fn)(int, short, void *))
usr.sbin/relayd/check_icmp.c
98
event_set(&cie->ev, cie->s, EV_TIMEOUT|flags, fn, cie);
usr.sbin/relayd/relayd.c
1452
void (*fn)(int, short, void *),
usr.sbin/relayd/relayd.c
1467
event_set(ev, fd, event, fn, arg);
usr.sbin/rpki-client/as.c
104
"cannot have overlapping ASnum", fn);
usr.sbin/rpki-client/as.c
140
as_warn(const char *fn, const char *msg, const struct cert_as *as)
usr.sbin/rpki-client/as.c
144
warnx("%s: %s: AS %u", fn, msg, as->id);
usr.sbin/rpki-client/as.c
147
warnx("%s: %s: AS range %u--%u", fn, msg, as->range.min,
usr.sbin/rpki-client/as.c
151
warnx("%s: %s: AS (inherit)", fn, msg);
usr.sbin/rpki-client/as.c
154
warnx("%s: corrupt cert", fn);
usr.sbin/rpki-client/as.c
47
as_check_overlap(const struct cert_as *as, const char *fn,
usr.sbin/rpki-client/as.c
59
"multiple inheritance", fn);
usr.sbin/rpki-client/aspa.c
108
warnx("%s: ASPA: invalid ProviderASSet", fn);
usr.sbin/rpki-client/aspa.c
120
aspa_parse_econtent(const char *fn, struct aspa *aspa, const unsigned char *d,
usr.sbin/rpki-client/aspa.c
129
warnx("%s: ASPA: failed to parse ASProviderAttestation", fn);
usr.sbin/rpki-client/aspa.c
133
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/aspa.c
138
if (!valid_econtent_version(fn, aspa_asn1->version, 1))
usr.sbin/rpki-client/aspa.c
142
warnx("%s: malformed CustomerASID", fn);
usr.sbin/rpki-client/aspa.c
146
if (!aspa_parse_providers(fn, aspa, aspa_asn1->providers))
usr.sbin/rpki-client/aspa.c
160
aspa_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/aspa.c
172
cms = cms_parse_validate(&cert, fn, talid, der, len, aspa_oid, &cmsz,
usr.sbin/rpki-client/aspa.c
182
warnx("%s: superfluous IP Resources extension present", fn);
usr.sbin/rpki-client/aspa.c
187
warnx("%s: inherit elements not allowed in EE cert", fn);
usr.sbin/rpki-client/aspa.c
191
if (!aspa_parse_econtent(fn, aspa, cms, cmsz))
usr.sbin/rpki-client/aspa.c
194
aspa->valid = valid_aspa(fn, cert, aspa);
usr.sbin/rpki-client/aspa.c
292
aspa_insert_vaps(char *fn, struct vap_tree *tree, struct aspa *aspa,
usr.sbin/rpki-client/aspa.c
358
"(more than %d)", fn, v->custasid, MAX_ASPA_PROVIDERS);
usr.sbin/rpki-client/aspa.c
55
aspa_parse_providers(const char *fn, struct aspa *aspa,
usr.sbin/rpki-client/aspa.c
62
warnx("%s: ASPA: ProviderASSet needs at least one entry", fn);
usr.sbin/rpki-client/aspa.c
67
warnx("%s: ASPA: too many providers (more than %d)", fn,
usr.sbin/rpki-client/aspa.c
82
warnx("%s: ASPA: malformed ProviderAS", fn);
usr.sbin/rpki-client/aspa.c
88
fn);
usr.sbin/rpki-client/aspa.c
95
fn);
usr.sbin/rpki-client/aspa.c
99
warnx("%s: ASPA: duplicate ProviderAS", fn);
usr.sbin/rpki-client/ccr.c
1000
warnx("%s: manifest instance #%d corrupted", fn, i);
usr.sbin/rpki-client/ccr.c
1006
warnx("%s: misordered ManifestInstances", fn);
usr.sbin/rpki-client/ccr.c
1013
warnx("%s: manifest instance #%d corrupted", fn, i);
usr.sbin/rpki-client/ccr.c
1018
warnx("%s: manifest instance #%d corrupted", fn, i);
usr.sbin/rpki-client/ccr.c
1022
warnx("%s: manifest instance #%d corrupted", fn, i);
usr.sbin/rpki-client/ccr.c
1027
ccr_mft->seqnum = x509_convert_seqnum(fn, "manifest number",
usr.sbin/rpki-client/ccr.c
1032
if (!x509_get_generalized_time(fn, "ManifestInstance "
usr.sbin/rpki-client/ccr.c
1037
warnx("%s: unexpected number of locations", fn);
usr.sbin/rpki-client/ccr.c
1043
if (!x509_location(fn, "SIA: signedObject", ad->location,
usr.sbin/rpki-client/ccr.c
1058
fn, i);
usr.sbin/rpki-client/ccr.c
1067
warnx("%s: manifest state corrupted", fn);
usr.sbin/rpki-client/ccr.c
1083
parse_manifeststate(const char *fn, struct ccr *ccr, const ManifestState *state)
usr.sbin/rpki-client/ccr.c
1087
ccr->mfts_hash = validate_asn1_hash(fn, "ManifestState", state->hash,
usr.sbin/rpki-client/ccr.c
1092
if (!x509_get_generalized_time(fn, "CCR mostRecentUpdate",
usr.sbin/rpki-client/ccr.c
1096
if (!parse_mft_instances(fn, ccr, state->mis))
usr.sbin/rpki-client/ccr.c
1105
parse_roa_addresses(const char *fn, struct ccr *ccr, int asid, enum afi afi,
usr.sbin/rpki-client/ccr.c
1114
warnx("%s: missing ROAIPAddress", fn);
usr.sbin/rpki-client/ccr.c
1128
if (!ip_addr_parse(r->address, afi, fn, &vrp->addr)) {
usr.sbin/rpki-client/ccr.c
1129
warnx("%s: invalid address in ROAPayload", fn);
usr.sbin/rpki-client/ccr.c
1136
warnx("%s: ASN1_INTEGER_get_uint64 failed", fn);
usr.sbin/rpki-client/ccr.c
1140
warnx("%s: invalid maxLength", fn);
usr.sbin/rpki-client/ccr.c
1144
warnx("%s: maxLength too large", fn);
usr.sbin/rpki-client/ccr.c
1152
warnx("%s: misordered ROAIPAddressFamily", fn);
usr.sbin/rpki-client/ccr.c
1158
warnx("%s: duplicate ROAIPAddress", fn);
usr.sbin/rpki-client/ccr.c
1173
parse_roa_ipaddrb(const char *fn, struct ccr *ccr, int asid,
usr.sbin/rpki-client/ccr.c
1183
warnx("%s: unexpected ipAddrBlocks count for AS %d", fn, asid);
usr.sbin/rpki-client/ccr.c
1190
if (!ip_addr_afi_parse(fn, ripaf->addressFamily, &afi)) {
usr.sbin/rpki-client/ccr.c
1191
warnx("%s: invalid afi for AS %d", fn, asid);
usr.sbin/rpki-client/ccr.c
1199
" %d", fn, asid);
usr.sbin/rpki-client/ccr.c
1204
" %d", fn, asid);
usr.sbin/rpki-client/ccr.c
1211
" %d", fn, asid);
usr.sbin/rpki-client/ccr.c
1217
if (!parse_roa_addresses(fn, ccr, asid, afi, ripaf->addresses))
usr.sbin/rpki-client/ccr.c
1227
parse_roa_payloads(const char *fn, struct ccr *ccr,
usr.sbin/rpki-client/ccr.c
1243
warnx("%s: malformed asID in ROAPayloadSet", fn);
usr.sbin/rpki-client/ccr.c
1247
if (!parse_roa_ipaddrb(fn, ccr, asid, rp->ipAddrBlocks))
usr.sbin/rpki-client/ccr.c
1257
parse_roastate(const char *fn, struct ccr *ccr, const ROAPayloadState *state)
usr.sbin/rpki-client/ccr.c
1261
ccr->vrps_hash = validate_asn1_hash(fn, "ROAPayloadState", state->hash,
usr.sbin/rpki-client/ccr.c
1266
if (!parse_roa_payloads(fn, ccr, state->rps))
usr.sbin/rpki-client/ccr.c
1275
parse_aspa_providers(const char *fn, struct ccr *ccr, int asid,
usr.sbin/rpki-client/ccr.c
1284
warnx("%s: AS %d ASPAPayloadSet providers missing", fn, asid);
usr.sbin/rpki-client/ccr.c
1301
warnx("%s: AS %d malformed ASPA provider", fn, asid);
usr.sbin/rpki-client/ccr.c
1307
warnx("%s: AS %d misordered providers", fn,
usr.sbin/rpki-client/ccr.c
1318
warnx("%s: duplicate ASPAPayloadSet", fn);
usr.sbin/rpki-client/ccr.c
1330
parse_aspa_payloads(const char *fn, struct ccr *ccr,
usr.sbin/rpki-client/ccr.c
1345
warnx("%s: malformed asID in ASPAPayloadSet", fn);
usr.sbin/rpki-client/ccr.c
1351
warnx("%s: ASPAPayloadState misordered", fn);
usr.sbin/rpki-client/ccr.c
1356
if (!parse_aspa_providers(fn, ccr, asid, a->providers))
usr.sbin/rpki-client/ccr.c
1368
parse_aspastate(const char *fn, struct ccr *ccr, const ASPAPayloadState *state)
usr.sbin/rpki-client/ccr.c
1372
ccr->vaps_hash = validate_asn1_hash(fn, "ASPAPayloadState", state->hash,
usr.sbin/rpki-client/ccr.c
1377
if (!parse_aspa_payloads(fn, ccr, state->aps))
usr.sbin/rpki-client/ccr.c
1386
parse_tas_skis(const char *fn, struct ccr *ccr,
usr.sbin/rpki-client/ccr.c
1394
warnx("%s: missing TrustAnchorState SubjectKeyIdentifier", fn);
usr.sbin/rpki-client/ccr.c
1408
warnx("%s: TAS SKI #%d corrupted", fn, i);
usr.sbin/rpki-client/ccr.c
1414
warnx("%s: misordered TrustAnchorState", fn);
usr.sbin/rpki-client/ccr.c
1420
warnx("%s: trust anchor state corrupted", fn);
usr.sbin/rpki-client/ccr.c
1435
parse_tastate(const char *fn, struct ccr *ccr, const TrustAnchorState *state)
usr.sbin/rpki-client/ccr.c
1439
ccr->tas_hash = validate_asn1_hash(fn, "TrustAnchorState", state->hash,
usr.sbin/rpki-client/ccr.c
1444
if (!parse_tas_skis(fn, ccr, state->skis))
usr.sbin/rpki-client/ccr.c
1453
parse_routerkeys(const char *fn, struct ccr *ccr, uint32_t asid,
usr.sbin/rpki-client/ccr.c
1461
warnx("%s: missing RouterKey", fn);
usr.sbin/rpki-client/ccr.c
1478
warnx("%s: AS%d RouterKey SKI corrupted", fn, asid);
usr.sbin/rpki-client/ccr.c
1486
warnx("%s: AS%d RouterKey SPKI corrupted", fn, asid);
usr.sbin/rpki-client/ccr.c
1497
warnx("%s: misordered RouterKey", fn);
usr.sbin/rpki-client/ccr.c
1503
warnx("%s; duplicate RouterKey", fn);
usr.sbin/rpki-client/ccr.c
1518
parse_rksets(const char *fn, struct ccr *ccr, STACK_OF(RouterKeySet) *rksets)
usr.sbin/rpki-client/ccr.c
1532
warnx("%s: malformed asID in RouterKeySet", fn);
usr.sbin/rpki-client/ccr.c
1538
warnx("%s: AS %d misordered routerkeyset", fn,
usr.sbin/rpki-client/ccr.c
1544
if (!parse_routerkeys(fn, ccr, asid, rkset->routerKeys))
usr.sbin/rpki-client/ccr.c
1556
parse_rkstate(const char *fn, struct ccr *ccr, const RouterKeyState *state)
usr.sbin/rpki-client/ccr.c
1560
ccr->brks_hash = validate_asn1_hash(fn, "RouterKeyState", state->hash,
usr.sbin/rpki-client/ccr.c
1565
if (!parse_rksets(fn, ccr, state->rksets))
usr.sbin/rpki-client/ccr.c
1574
ccr_parse(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/ccr.c
1588
warnx("%s: d2i_ContentInfo", fn);
usr.sbin/rpki-client/ccr.c
1592
warnx("%s: %td bytes trailing garbage", fn, oder + len - der);
usr.sbin/rpki-client/ccr.c
1601
fn, buf);
usr.sbin/rpki-client/ccr.c
1607
if (!valid_econtent_version(fn, ccr_asn1->version, 0))
usr.sbin/rpki-client/ccr.c
1613
"have %s with parameter type %d", fn, nid2str(nid), ptype);
usr.sbin/rpki-client/ccr.c
1620
if (!x509_get_generalized_time(fn, "CCR producedAt",
usr.sbin/rpki-client/ccr.c
1627
warnx("%s: must contain at least one state component", fn);
usr.sbin/rpki-client/ccr.c
1632
if (!parse_manifeststate(fn, ccr, ccr_asn1->mfts))
usr.sbin/rpki-client/ccr.c
1637
if (!parse_roastate(fn, ccr, ccr_asn1->vrps))
usr.sbin/rpki-client/ccr.c
1642
if (!parse_aspastate(fn, ccr, ccr_asn1->vaps))
usr.sbin/rpki-client/ccr.c
1647
if (!parse_tastate(fn, ccr, ccr_asn1->tas))
usr.sbin/rpki-client/ccr.c
1652
if (!parse_rkstate(fn, ccr, ccr_asn1->rks))
usr.sbin/rpki-client/ccr.c
236
validate_asn1_hash(const char *fn, const char *descr,
usr.sbin/rpki-client/ccr.c
248
warnx("%s: corrupted %s state", fn, descr);
usr.sbin/rpki-client/ccr.c
976
parse_mft_instances(const char *fn, struct ccr *ccr,
usr.sbin/rpki-client/cert.c
1006
"want 1 policy qualifier, got %d", fn,
usr.sbin/rpki-client/cert.c
1016
"want CPS, got %s", fn, nid2str(nid));
usr.sbin/rpki-client/cert.c
103
"must be marked critical", fn);
usr.sbin/rpki-client/cert.c
1031
append_ip(const char *fn, struct cert_ip *ips, size_t *num_ips,
usr.sbin/rpki-client/cert.c
1034
if (!ip_addr_check_overlap(ip, fn, ips, *num_ips, 0))
usr.sbin/rpki-client/cert.c
1045
sbgp_addr(const char *fn, struct cert_ip *ips, size_t *num_ips, enum afi afi,
usr.sbin/rpki-client/cert.c
1055
if (!ip_addr_parse(bs, afi, fn, &ip.ip)) {
usr.sbin/rpki-client/cert.c
1057
"invalid IP address", fn);
usr.sbin/rpki-client/cert.c
1063
"IP address range reversed", fn);
usr.sbin/rpki-client/cert.c
1067
return append_ip(fn, ips, num_ips, &ip);
usr.sbin/rpki-client/cert.c
1075
sbgp_addr_range(const char *fn, struct cert_ip *ips, size_t *num_ips,
usr.sbin/rpki-client/cert.c
108
"Constraint must be absent", fn);
usr.sbin/rpki-client/cert.c
1085
if (!ip_addr_parse(range->min, afi, fn, &ip.range.min)) {
usr.sbin/rpki-client/cert.c
1087
"invalid IP address", fn);
usr.sbin/rpki-client/cert.c
1091
if (!ip_addr_parse(range->max, afi, fn, &ip.range.max)) {
usr.sbin/rpki-client/cert.c
1093
"invalid IP address", fn);
usr.sbin/rpki-client/cert.c
1099
"IP address range reversed", fn);
usr.sbin/rpki-client/cert.c
1103
return append_ip(fn, ips, num_ips, &ip);
usr.sbin/rpki-client/cert.c
1107
sbgp_addr_inherit(const char *fn, struct cert_ip *ips, size_t *num_ips,
usr.sbin/rpki-client/cert.c
1117
return append_ip(fn, ips, num_ips, &ip);
usr.sbin/rpki-client/cert.c
1121
sbgp_parse_ipaddrblocks(const char *fn, const IPAddrBlocks *addrs,
usr.sbin/rpki-client/cert.c
1138
"ipAddrBlocks (got %d, expected 1 or 2)", fn, addrsz);
usr.sbin/rpki-client/cert.c
114
fn);
usr.sbin/rpki-client/cert.c
1156
fn, af->ipAddressChoice->type);
usr.sbin/rpki-client/cert.c
1161
"empty ipAddressesOrRanges", fn);
usr.sbin/rpki-client/cert.c
1171
if (!ip_addr_afi_parse(fn, af->addressFamily, &afi)) {
usr.sbin/rpki-client/cert.c
1172
warnx("%s: RFC 3779: invalid AFI", fn);
usr.sbin/rpki-client/cert.c
1180
"IPv4 appears twice", fn);
usr.sbin/rpki-client/cert.c
1187
"IPv6 appears twice", fn);
usr.sbin/rpki-client/cert.c
1194
if (!sbgp_addr_inherit(fn, ips, &num_ips, afi))
usr.sbin/rpki-client/cert.c
120
fn);
usr.sbin/rpki-client/cert.c
1203
if (!sbgp_addr(fn, ips, &num_ips, afi,
usr.sbin/rpki-client/cert.c
1208
if (!sbgp_addr_range(fn, ips, &num_ips, afi,
usr.sbin/rpki-client/cert.c
1214
"unknown type %d", fn, aor->type);
usr.sbin/rpki-client/cert.c
1237
sbgp_ipaddrblocks(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
1244
"extension not critical", fn);
usr.sbin/rpki-client/cert.c
1251
"failed extension parse", fn);
usr.sbin/rpki-client/cert.c
1255
if (!sbgp_parse_ipaddrblocks(fn, addrs, &cert->ips, &cert->num_ips))
usr.sbin/rpki-client/cert.c
1259
warnx("%s: RFC 6487 section 4.8.10: empty ipAddrBlocks", fn);
usr.sbin/rpki-client/cert.c
1275
append_as(const char *fn, struct cert_as *ases, size_t *num_ases,
usr.sbin/rpki-client/cert.c
1278
if (!as_check_overlap(as, fn, ases, *num_ases, 0))
usr.sbin/rpki-client/cert.c
1289
sbgp_as_range(const char *fn, struct cert_as *ases, size_t *num_ases,
usr.sbin/rpki-client/cert.c
1299
"malformed AS identifier", fn);
usr.sbin/rpki-client/cert.c
1305
"malformed AS identifier", fn);
usr.sbin/rpki-client/cert.c
1311
"range is singular", fn);
usr.sbin/rpki-client/cert.c
1315
"range is out of order", fn);
usr.sbin/rpki-client/cert.c
1319
return append_as(fn, ases, num_ases, &as);
usr.sbin/rpki-client/cert.c
1326
sbgp_as_id(const char *fn, struct cert_as *ases, size_t *num_ases,
usr.sbin/rpki-client/cert.c
1336
"malformed AS identifier", fn);
usr.sbin/rpki-client/cert.c
1341
"AS identifier zero is reserved", fn);
usr.sbin/rpki-client/cert.c
1345
return append_as(fn, ases, num_ases, &as);
usr.sbin/rpki-client/cert.c
1349
sbgp_as_inherit(const char *fn, struct cert_as *ases, size_t *num_ases)
usr.sbin/rpki-client/cert.c
1356
return append_as(fn, ases, num_ases, &as);
usr.sbin/rpki-client/cert.c
136
"self-issued cert with AKI-SKI mismatch", fn);
usr.sbin/rpki-client/cert.c
1378
sbgp_parse_asids(const char *fn, const ASIdentifiers *asidentifiers,
usr.sbin/rpki-client/cert.c
1390
"should not have RDI values", fn);
usr.sbin/rpki-client/cert.c
1396
"no AS number resource set", fn);
usr.sbin/rpki-client/cert.c
141
warnx("%s: Basic Constraints ext in non-CA cert", fn);
usr.sbin/rpki-client/cert.c
1410
"unknown type %d", fn, asidentifiers->asnum->type);
usr.sbin/rpki-client/cert.c
1415
warnx("%s: RFC 6487 section 4.8.11: empty asIdsOrRanges", fn);
usr.sbin/rpki-client/cert.c
1420
fn, MAX_AS_SIZE);
usr.sbin/rpki-client/cert.c
1428
if (!sbgp_as_inherit(fn, as, &num_ases))
usr.sbin/rpki-client/cert.c
1438
if (!sbgp_as_id(fn, as, &num_ases, aor->u.id))
usr.sbin/rpki-client/cert.c
1442
if (!sbgp_as_range(fn, as, &num_ases, aor->u.range))
usr.sbin/rpki-client/cert.c
1447
"unknown type %d", fn, aor->type);
usr.sbin/rpki-client/cert.c
146
warnx("%s: EE cert must not be self-issued or self-signed", fn);
usr.sbin/rpki-client/cert.c
1469
sbgp_asids(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
1476
"extension not critical", fn);
usr.sbin/rpki-client/cert.c
1483
"failed extension parse", fn);
usr.sbin/rpki-client/cert.c
1487
if (!sbgp_parse_asids(fn, asidentifiers, &cert->ases, &cert->num_ases))
usr.sbin/rpki-client/cert.c
1509
cert_parse_extensions(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
152
fn);
usr.sbin/rpki-client/cert.c
1523
warnx("%s: certificate without X.509v3 extensions", fn);
usr.sbin/rpki-client/cert.c
1544
if (!cert_ski(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1550
if (!cert_aki(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1566
if (!cert_crldp(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1572
if (!cert_aia(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1578
if (!cert_sia(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1584
if (!cert_policies(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1590
if (!sbgp_ipaddrblocks(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1596
if (!sbgp_asids(fn, cert, ext))
usr.sbin/rpki-client/cert.c
1607
"%s (NID %d)", fn, objn, nid);
usr.sbin/rpki-client/cert.c
1611
fn, objn, nid);
usr.sbin/rpki-client/cert.c
163
warnx("%s: error parsing EKU", fn);
usr.sbin/rpki-client/cert.c
1630
"basic constraints", fn);
usr.sbin/rpki-client/cert.c
1638
"basic constraints", fn);
usr.sbin/rpki-client/cert.c
1644
warnx("%s: RFC 6487, 4.8.2: cert without SKI", fn);
usr.sbin/rpki-client/cert.c
1651
"AKI", fn);
usr.sbin/rpki-client/cert.c
1658
"mismatch between AKI and SKI", fn);
usr.sbin/rpki-client/cert.c
1664
"must not have matching AKI and SKI", fn);
usr.sbin/rpki-client/cert.c
1671
warnx("%s: RFC 6487, 4.8.4: cert without key usage", fn);
usr.sbin/rpki-client/cert.c
1678
"without extended key usage", fn);
usr.sbin/rpki-client/cert.c
1684
"extended key usage", fn);
usr.sbin/rpki-client/cert.c
169
warnx("%s: EKU: extension must not be marked critical", fn);
usr.sbin/rpki-client/cert.c
1692
"CRL Distribution Point", fn);
usr.sbin/rpki-client/cert.c
1698
"CRL Distribution Point", fn);
usr.sbin/rpki-client/cert.c
1706
"AIA", fn);
usr.sbin/rpki-client/cert.c
1711
warnx("%s: RFC 6487, 4.8.7: TA cert with AIA", fn);
usr.sbin/rpki-client/cert.c
1724
if (rtype_from_file_extension(fn) != RTYPE_RSC) {
usr.sbin/rpki-client/cert.c
1726
fn);
usr.sbin/rpki-client/cert.c
1730
warnx("%s: RFC 6487, 4.8.8: cert without SIA", fn);
usr.sbin/rpki-client/cert.c
1736
"with SIA", fn);
usr.sbin/rpki-client/cert.c
1742
warnx("%s: RFC 6487, 4.8.9: missing certificate policy", fn);
usr.sbin/rpki-client/cert.c
1748
"IP or AS resources", fn);
usr.sbin/rpki-client/cert.c
1755
"must not inherit", fn);
usr.sbin/rpki-client/cert.c
1760
"must not be empty", fn);
usr.sbin/rpki-client/cert.c
1768
"with IP resources", fn);
usr.sbin/rpki-client/cert.c
1773
"without AS resources", fn);
usr.sbin/rpki-client/cert.c
1778
"with inherit element", fn);
usr.sbin/rpki-client/cert.c
1784
"AS number are not supported", fn);
usr.sbin/rpki-client/cert.c
1792
warnx("%s: RFC 5280 section 4.2: duplicate extension: %s", fn,
usr.sbin/rpki-client/cert.c
1799
cert_parse_internal(const char *fn, X509 *x)
usr.sbin/rpki-client/cert.c
1813
if (!cert_check_purpose(fn, cert))
usr.sbin/rpki-client/cert.c
1817
warnx("%s: RFC 6487 4.1: X.509 version must be v3", fn);
usr.sbin/rpki-client/cert.c
1822
warnx("%s: RFC 6487 4.2: missing serialNumber", fn);
usr.sbin/rpki-client/cert.c
1825
if (!x509_valid_seqnum(fn, "RFC 6487 4.2: serialNumber", serial))
usr.sbin/rpki-client/cert.c
1828
if (!cert_check_sigalg(fn, cert))
usr.sbin/rpki-client/cert.c
1831
if (!cert_check_subject_and_issuer(fn, cert))
usr.sbin/rpki-client/cert.c
1834
if (!cert_check_validity_period(fn, cert))
usr.sbin/rpki-client/cert.c
1837
if (!cert_check_spki(fn, cert))
usr.sbin/rpki-client/cert.c
1847
fn);
usr.sbin/rpki-client/cert.c
185
warnx("%s: unknown certificate purpose", fn);
usr.sbin/rpki-client/cert.c
1851
if (!cert_parse_extensions(fn, cert))
usr.sbin/rpki-client/cert.c
1868
cert_parse_ee_cert(const char *fn, int talid, X509 *x)
usr.sbin/rpki-client/cert.c
1875
if ((cert = cert_parse_internal(fn, x)) == NULL)
usr.sbin/rpki-client/cert.c
1880
warnx("%s: expected EE cert, got %s", fn,
usr.sbin/rpki-client/cert.c
1885
if (!constraints_validate(fn, cert))
usr.sbin/rpki-client/cert.c
1901
cert_deserialize_and_parse(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/cert.c
1909
warnx("%s: d2i_X509", fn);
usr.sbin/rpki-client/cert.c
1913
warnx("%s: %td bytes trailing garbage", fn, oder + len - der);
usr.sbin/rpki-client/cert.c
1918
warnx("%s: X509_up_ref failed", fn);
usr.sbin/rpki-client/cert.c
1921
if ((cert = cert_parse_internal(fn, x)) == NULL)
usr.sbin/rpki-client/cert.c
1939
cert_parse_ca_or_brk(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/cert.c
1947
if ((cert = cert_deserialize_and_parse(fn, der, len)) == NULL)
usr.sbin/rpki-client/cert.c
195
cert_check_sigalg(const char *fn, const struct cert *cert)
usr.sbin/rpki-client/cert.c
1953
fn, purpose2str(cert->purpose));
usr.sbin/rpki-client/cert.c
1970
cert_parse_filemode(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/cert.c
1978
if ((cert = cert_deserialize_and_parse(fn, der, len)) == NULL)
usr.sbin/rpki-client/cert.c
1982
warnx("%s: unexpected EE cert", fn);
usr.sbin/rpki-client/cert.c
1999
ta_check_pubkey(const char *fn, struct cert *cert, const unsigned char *spki,
usr.sbin/rpki-client/cert.c
2012
warnx("%s: RFC 6487 (trust anchor): bad TAL pubkey", fn);
usr.sbin/rpki-client/cert.c
2016
warnx("%s: RFC 6487 (trust anchor): missing pubkey", fn);
usr.sbin/rpki-client/cert.c
2021
"pubkey does not match TAL pubkey", fn);
usr.sbin/rpki-client/cert.c
203
warnx("%s: missing signatureAlgorithm in certificate", fn);
usr.sbin/rpki-client/cert.c
2030
warnx("%s: failed to verify signature", fn);
usr.sbin/rpki-client/cert.c
2041
ta_check_validity(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
2046
warnx("%s: certificate not yet valid", fn);
usr.sbin/rpki-client/cert.c
2050
warnx("%s: certificate has expired", fn);
usr.sbin/rpki-client/cert.c
2064
ta_validate(const char *fn, struct cert *cert, const unsigned char *spki,
usr.sbin/rpki-client/cert.c
207
warnx("%s: missing signature in tbsCertificate", fn);
usr.sbin/rpki-client/cert.c
2071
warnx("%s: expected trust anchor purpose, got %s", fn,
usr.sbin/rpki-client/cert.c
2076
if (!ta_check_pubkey(fn, cert, spki, spkisz))
usr.sbin/rpki-client/cert.c
2078
if (!ta_check_validity(fn, cert))
usr.sbin/rpki-client/cert.c
2094
cert_parse_ta(const char *fn, const unsigned char *der, size_t len,
usr.sbin/rpki-client/cert.c
2103
if ((cert = cert_deserialize_and_parse(fn, der, len)) == NULL)
usr.sbin/rpki-client/cert.c
2106
return ta_validate(fn, cert, spki, spkisz);
usr.sbin/rpki-client/cert.c
214
"AlgorithmIdentifier mismatch", fn);
usr.sbin/rpki-client/cert.c
218
return x509_check_tbs_sigalg(fn, tbsalg);
usr.sbin/rpki-client/cert.c
222
cert_check_subject_and_issuer(const char *fn, const struct cert *cert)
usr.sbin/rpki-client/cert.c
227
warnx("%s: X509_get_subject_name", fn);
usr.sbin/rpki-client/cert.c
230
if (!x509_valid_subject_name(fn, name))
usr.sbin/rpki-client/cert.c
2304
auth_insert(const char *fn, struct auth_tree *auths, struct cert *cert,
usr.sbin/rpki-client/cert.c
2322
warnx("%s: too many certificates in store", fn);
usr.sbin/rpki-client/cert.c
2329
warnx("%s: maximum certificate chain depth exhausted", fn);
usr.sbin/rpki-client/cert.c
234
warnx("%s: X509_get_issuer_name", fn);
usr.sbin/rpki-client/cert.c
237
if (!x509_valid_issuer_name(fn, name))
usr.sbin/rpki-client/cert.c
244
cert_check_validity_period(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
249
warnx("%s: X509_get0_notBefore() failed", fn);
usr.sbin/rpki-client/cert.c
253
warnx("%s: x509_get_time() failed", fn);
usr.sbin/rpki-client/cert.c
258
warnx("%s: X509_get0_notAfter() failed", fn);
usr.sbin/rpki-client/cert.c
262
warnx("%s: x509_get_time() failed", fn);
usr.sbin/rpki-client/cert.c
267
warnx("%s: RFC 6487, 4.6: notAfter precedes notBefore", fn);
usr.sbin/rpki-client/cert.c
275
cert_compliant_rsa_key(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
282
warnx("%s: cert without public key", fn);
usr.sbin/rpki-client/cert.c
286
warnx("%s: expected RSA key", fn);
usr.sbin/rpki-client/cert.c
291
warnx("%s: missing RSA public key component", fn);
usr.sbin/rpki-client/cert.c
295
warnx("%s: RFC 7935, 3: want 2048-bit RSA modulus, have %d", fn,
usr.sbin/rpki-client/cert.c
300
warnx("%s: RFC 7935, 3: public RSA exponent not %d", fn, 65537);
usr.sbin/rpki-client/cert.c
308
cert_compliant_ec_key(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
314
warnx("%s: cert without public key", fn);
usr.sbin/rpki-client/cert.c
318
warnx("%s: expected EC key", fn);
usr.sbin/rpki-client/cert.c
322
warnx("%s: RFC 8608: 3.1 public key not uncompressed", fn);
usr.sbin/rpki-client/cert.c
326
warnx("%s: EC_KEY_check_key failed", fn);
usr.sbin/rpki-client/cert.c
336
warnx("%s: i2d_PUBKEY failed", fn);
usr.sbin/rpki-client/cert.c
348
cert_check_spki(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
363
warnx("%s: RFC 6487, 4.7: certificate without SPKI", fn);
usr.sbin/rpki-client/cert.c
373
warnx("%s: RFC 6487, 4.7: no AlgorithmIdentifier in SPKI", fn);
usr.sbin/rpki-client/cert.c
385
"parameters not NULL", fn);
usr.sbin/rpki-client/cert.c
388
if (!cert_compliant_rsa_key(fn, cert))
usr.sbin/rpki-client/cert.c
393
warnx("%s: RFC 7935, 3.1 SPKI not RSAPublicKey", fn);
usr.sbin/rpki-client/cert.c
401
"parameters not namedCurve", fn);
usr.sbin/rpki-client/cert.c
406
"P-256", fn);
usr.sbin/rpki-client/cert.c
409
if (!cert_compliant_ec_key(fn, cert))
usr.sbin/rpki-client/cert.c
413
warnx("%s: RFC 8608, 3.1, SPKI not an ecPublicKey", fn);
usr.sbin/rpki-client/cert.c
425
cert_ski(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
436
"SKI: extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
44
cert_check_purpose(const char *fn, struct cert *cert)
usr.sbin/rpki-client/cert.c
442
warnx("%s: RFC 6487 section 4.8.2: error parsing SKI", fn);
usr.sbin/rpki-client/cert.c
447
warnx("%s: X509_pubkey_digest", fn);
usr.sbin/rpki-client/cert.c
455
fn, md_len, length);
usr.sbin/rpki-client/cert.c
460
warnx("%s: SKI does not match SHA1 hash of SPK", fn);
usr.sbin/rpki-client/cert.c
473
cert_aki(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
482
"AKI extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
488
warnx("%s: RFC 6487 section 4.8.3: error parsing AKI", fn);
usr.sbin/rpki-client/cert.c
493
"authorityCertSerialNumber present", fn);
usr.sbin/rpki-client/cert.c
499
fn);
usr.sbin/rpki-client/cert.c
506
fn, SHA_DIGEST_LENGTH, length);
usr.sbin/rpki-client/cert.c
522
cert_crldp(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
534
"must be omitted from TA certificates", fn);
usr.sbin/rpki-client/cert.c
540
"extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
547
"failed extension parse", fn);
usr.sbin/rpki-client/cert.c
553
"want 1 element, have %d", fn, sk_DIST_POINT_num(crldp));
usr.sbin/rpki-client/cert.c
560
" disallowed", fn);
usr.sbin/rpki-client/cert.c
565
" disallowed", fn);
usr.sbin/rpki-client/cert.c
570
"no distribution point name", fn);
usr.sbin/rpki-client/cert.c
575
" disallowed", fn);
usr.sbin/rpki-client/cert.c
582
" expected fullName, have %d", fn, dp->distpoint->type);
usr.sbin/rpki-client/cert.c
592
if (!x509_location(fn, "CRL distribution point", name, &crl))
usr.sbin/rpki-client/cert.c
60
warnx("%s: could not cache X509v3 extensions", fn);
usr.sbin/rpki-client/cert.c
602
fn, crl);
usr.sbin/rpki-client/cert.c
608
"CRL distribution point", fn);
usr.sbin/rpki-client/cert.c
624
cert_aia(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
636
"a self-signed certificate", fn);
usr.sbin/rpki-client/cert.c
642
"extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
649
fn);
usr.sbin/rpki-client/cert.c
659
if (!x509_location(fn, "AIA: caIssuers", ad->location,
usr.sbin/rpki-client/cert.c
674
"ignoring location %s", fn, caissuers);
usr.sbin/rpki-client/cert.c
68
warnx("%s: RFC 6487, section 4.8.4: missing KeyUsage", fn);
usr.sbin/rpki-client/cert.c
682
" accessMethod: %s", fn, buf);
usr.sbin/rpki-client/cert.c
689
"accessMethod with rsync protocol", fn);
usr.sbin/rpki-client/cert.c
705
cert_ca_sia(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
718
"extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
72
warnx("%s: RFC 6487, section 4.8.4: missing KeyUsage", fn);
usr.sbin/rpki-client/cert.c
725
fn);
usr.sbin/rpki-client/cert.c
735
if (!x509_location(fn, "SIA: caRepository",
usr.sbin/rpki-client/cert.c
756
"ignoring location %s", fn, carepo);
usr.sbin/rpki-client/cert.c
76
warnx("%s: RFC 6487, section 4.8.4: KeyUsage not critical", fn);
usr.sbin/rpki-client/cert.c
760
if (!x509_location(fn, "SIA: rpkiManifest",
usr.sbin/rpki-client/cert.c
771
"ignoring location %s", fn, rpkimft);
usr.sbin/rpki-client/cert.c
775
if (!x509_location(fn, "SIA: rpkiNotify",
usr.sbin/rpki-client/cert.c
781
fn, cert->notify);
usr.sbin/rpki-client/cert.c
787
fn);
usr.sbin/rpki-client/cert.c
798
" accessMethod: %s", fn, buf);
usr.sbin/rpki-client/cert.c
805
"or rpkiManifest", fn);
usr.sbin/rpki-client/cert.c
811
warnx("%s: SIA: invalid rpkiManifest entry", fn);
usr.sbin/rpki-client/cert.c
817
"characters", fn);
usr.sbin/rpki-client/cert.c
824
"conflicting URIs for caRepository and rpkiManifest", fn);
usr.sbin/rpki-client/cert.c
829
warnx("%s: RFC 6487 section 4.8.8: SIA: not an MFT file", fn);
usr.sbin/rpki-client/cert.c
84
"no basic constraints, but keyCertSign set", fn);
usr.sbin/rpki-client/cert.c
845
cert_ee_sia(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
857
"extension not non-critical", fn);
usr.sbin/rpki-client/cert.c
86
warnx("%s: unexpected legacy certificate", fn);
usr.sbin/rpki-client/cert.c
864
fn);
usr.sbin/rpki-client/cert.c
882
" not contain rpkiNotify accessMethod", fn);
usr.sbin/rpki-client/cert.c
885
if (!x509_location(fn, "SIA: signedObject",
usr.sbin/rpki-client/cert.c
896
"ignoring location %s", fn, signedobj);
usr.sbin/rpki-client/cert.c
904
" accessMethod: %s", fn, buf);
usr.sbin/rpki-client/cert.c
910
warnx("%s: RFC 6487 section 4.8.8: SIA: no signedObject", fn);
usr.sbin/rpki-client/cert.c
918
fnlen = strlen(fn);
usr.sbin/rpki-client/cert.c
921
if (fnlen < plen || strcmp(p, fn + fnlen - plen) != 0) {
usr.sbin/rpki-client/cert.c
923
fn, cert->signedobj);
usr.sbin/rpki-client/cert.c
935
cert_sia(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
940
return cert_ca_sia(fn, cert, ext);
usr.sbin/rpki-client/cert.c
942
return cert_ee_sia(fn, cert, ext);
usr.sbin/rpki-client/cert.c
945
"BGPsec router certs", fn);
usr.sbin/rpki-client/cert.c
95
"error parsing basic constraints", fn);
usr.sbin/rpki-client/cert.c
957
cert_policies(const char *fn, struct cert *cert, const X509_EXTENSION *ext)
usr.sbin/rpki-client/cert.c
968
"extension not critical", fn);
usr.sbin/rpki-client/cert.c
975
"failed extension parse", fn);
usr.sbin/rpki-client/cert.c
98
"missing basic constraints", fn);
usr.sbin/rpki-client/cert.c
981
"want 1 policy, got %d", fn, sk_POLICYINFO_num(policies));
usr.sbin/rpki-client/cert.c
994
"unexpected OID: %s, want %s", fn, pbuf, cbuf);
usr.sbin/rpki-client/cms.c
104
warnx("%s: RFC 6488: error extracting signedAttrs", fn);
usr.sbin/rpki-client/cms.c
113
fn);
usr.sbin/rpki-client/cms.c
119
warnx("%s: RFC 6488: bad signed attribute", fn);
usr.sbin/rpki-client/cms.c
125
"signed attribute", fn);
usr.sbin/rpki-client/cms.c
131
"signed attribute", fn);
usr.sbin/rpki-client/cms.c
137
"signed attribute", fn);
usr.sbin/rpki-client/cms.c
140
if (!cms_get_signtime(fn, attr, signtime))
usr.sbin/rpki-client/cms.c
146
fn, buf);
usr.sbin/rpki-client/cms.c
154
"signed attribute", fn);
usr.sbin/rpki-client/cms.c
160
warnx("%s: missing CMS signing-time attribute", fn);
usr.sbin/rpki-client/cms.c
165
warnx("%s: RFC 6488: CMS has unsignedAttrs", fn);
usr.sbin/rpki-client/cms.c
173
cms_parse_validate_internal(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/cms.c
204
warnx("%s: RFC 6488: failed CMS parse", fn);
usr.sbin/rpki-client/cms.c
208
warnx("%s: %td bytes trailing garbage", fn, oder + len - der);
usr.sbin/rpki-client/cms.c
218
warnx("%s: CMS verification error", fn);
usr.sbin/rpki-client/cms.c
227
warnx("%s: RFC 6488: missing content-type", fn);
usr.sbin/rpki-client/cms.c
232
fn, buf);
usr.sbin/rpki-client/cms.c
236
warnx("%s: RFC 6488: CMS has multiple signerInfos", fn);
usr.sbin/rpki-client/cms.c
242
warnx("%s: Failed to retrieve SignedData version", fn);
usr.sbin/rpki-client/cms.c
246
warnx("%s: SignedData version %ld != 3", fn, version);
usr.sbin/rpki-client/cms.c
250
warnx("%s: Failed to retrieve SignerInfo version", fn);
usr.sbin/rpki-client/cms.c
254
warnx("%s: SignerInfo version %ld != 3", fn, version);
usr.sbin/rpki-client/cms.c
258
if (!cms_SignerInfo_check_attributes(fn, si, signtime))
usr.sbin/rpki-client/cms.c
267
warnx("%s: RFC 6488: wrong digest %s, want %s", fn,
usr.sbin/rpki-client/cms.c
276
warnx("%s: P-256 support is experimental", fn);
usr.sbin/rpki-client/cms.c
280
fn, nid2str(nid), LN_rsaEncryption);
usr.sbin/rpki-client/cms.c
289
"OID object is NULL", fn);
usr.sbin/rpki-client/cms.c
296
"unknown OID: %s, want %s", fn, buf, obuf);
usr.sbin/rpki-client/cms.c
30
cms_extract_econtent(const char *fn, CMS_ContentInfo *cms, unsigned char **res,
usr.sbin/rpki-client/cms.c
315
"for content-type attribute", fn);
usr.sbin/rpki-client/cms.c
322
"OID: %s, want %s", fn, buf, obuf);
usr.sbin/rpki-client/cms.c
332
warnx("%s: RFC 6488: CMS has CRLs", fn);
usr.sbin/rpki-client/cms.c
345
"want 1 signer, have %d", fn, sk_X509_num(certs));
usr.sbin/rpki-client/cms.c
349
cert = cert_parse_ee_cert(fn, talid, sk_X509_value(certs, 0));
usr.sbin/rpki-client/cms.c
355
fn);
usr.sbin/rpki-client/cms.c
359
warnx("%s: RFC 6488: could not extract SKI from SID", fn);
usr.sbin/rpki-client/cms.c
363
warnx("%s: RFC 6488: wrong cert referenced by SignerInfo", fn);
usr.sbin/rpki-client/cms.c
367
if (!cms_extract_econtent(fn, cms, res, rsz))
usr.sbin/rpki-client/cms.c
37
"eContent: zero-length content", fn);
usr.sbin/rpki-client/cms.c
389
cms_parse_validate(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/cms.c
395
if (!cms_parse_validate_internal(out_cert, fn, talid, der, derlen, oid,
usr.sbin/rpki-client/cms.c
43
"eContent: zero-length content", fn);
usr.sbin/rpki-client/cms.c
47
warnx("%s: overlong eContent of length %zu", fn, *rsz);
usr.sbin/rpki-client/cms.c
64
cms_get_signtime(const char *fn, X509_ATTRIBUTE *attr, time_t *signtime)
usr.sbin/rpki-client/cms.c
77
warnx("%s: CMS signing-time issue", fn);
usr.sbin/rpki-client/cms.c
80
warnx("%s: GeneralizedTime instead of UTCTime", fn);
usr.sbin/rpki-client/cms.c
84
warnx("%s: failed to convert %s", fn, time_str);
usr.sbin/rpki-client/cms.c
92
cms_SignerInfo_check_attributes(const char *fn, const CMS_SignerInfo *si,
usr.sbin/rpki-client/constraints.c
119
free(tal_constraints[talid].fn);
usr.sbin/rpki-client/constraints.c
122
tal_constraints[talid].fn = NULL;
usr.sbin/rpki-client/constraints.c
161
constraints_parse_ip_prefix(const char *fn, const char *prefix, enum afi afi,
usr.sbin/rpki-client/constraints.c
169
errx(1, "%s: failed to parse %s", fn, prefix);
usr.sbin/rpki-client/constraints.c
172
errx(1, "%s: failed to add prefix %s", fn, prefix);
usr.sbin/rpki-client/constraints.c
178
errx(1, "%s: failed to canonize with prefix %s", fn, prefix);
usr.sbin/rpki-client/constraints.c
182
constraints_parse_ip_range(const char *fn, const char *min, const char *max,
usr.sbin/rpki-client/constraints.c
189
errx(1, "%s: failed to parse %s", fn, min);
usr.sbin/rpki-client/constraints.c
191
errx(1, "%s: failed to parse %s", fn, max);
usr.sbin/rpki-client/constraints.c
194
errx(1, "%s: failed to add range %s--%s", fn, min, max);
usr.sbin/rpki-client/constraints.c
200
errx(1, "%s: failed to canonize with range %s--%s", fn,
usr.sbin/rpki-client/constraints.c
205
constraints_parse_ip(const char *fn, char *p, enum afi afi, IPAddrBlocks *addrs)
usr.sbin/rpki-client/constraints.c
210
constraints_parse_ip_prefix(fn, p, afi, addrs);
usr.sbin/rpki-client/constraints.c
215
errx(1, "%s: failed to split range: %s", fn, p);
usr.sbin/rpki-client/constraints.c
217
constraints_parse_ip_range(fn, min, max, afi, addrs);
usr.sbin/rpki-client/constraints.c
227
constraints_parse_asn(const char *fn, const char *asn, ASIdentifiers *asids)
usr.sbin/rpki-client/constraints.c
232
errx(1, "%s: failed to parse AS %s", fn, asn);
usr.sbin/rpki-client/constraints.c
235
errx(1, "%s: failed to add AS %s", fn, asn);
usr.sbin/rpki-client/constraints.c
241
errx(1, "%s: failed to canonize with AS %s", fn, asn);
usr.sbin/rpki-client/constraints.c
245
constraints_parse_asn_range(const char *fn, const char *min, const char *max,
usr.sbin/rpki-client/constraints.c
251
errx(1, "%s: failed to parse AS %s", fn, min);
usr.sbin/rpki-client/constraints.c
253
errx(1, "%s: failed to parse AS %s", fn, max);
usr.sbin/rpki-client/constraints.c
256
errx(1, "%s: failed to add AS range %s--%s", fn, min, max);
usr.sbin/rpki-client/constraints.c
262
errx(1, "%s: failed to canonize with AS range %s--%s", fn,
usr.sbin/rpki-client/constraints.c
267
constraints_parse_as(const char *fn, char *p, ASIdentifiers *asids)
usr.sbin/rpki-client/constraints.c
272
constraints_parse_asn(fn, p, asids);
usr.sbin/rpki-client/constraints.c
277
errx(1, "%s: failed to split range: %s", fn, p);
usr.sbin/rpki-client/constraints.c
279
constraints_parse_asn_range(fn, min, max, asids);
usr.sbin/rpki-client/constraints.c
291
constraints_normalize_ip_addrblocks(const char *fn, IPAddrBlocks **addrs)
usr.sbin/rpki-client/constraints.c
307
errx(1, "%s: failed to convert to DER", fn);
usr.sbin/rpki-client/constraints.c
310
errx(1, "%s: failed to convert from DER", fn);
usr.sbin/rpki-client/constraints.c
314
errx(1, "%s: failed to push constraints", fn);
usr.sbin/rpki-client/constraints.c
336
char *fn, *p, *pp;
usr.sbin/rpki-client/constraints.c
348
fn = tal_constraints[talid].fn;
usr.sbin/rpki-client/constraints.c
350
tal_constraints[talid].fn = NULL;
usr.sbin/rpki-client/constraints.c
353
free(fn);
usr.sbin/rpki-client/constraints.c
398
errx(1, "%s: failed to parse %s", fn, p);
usr.sbin/rpki-client/constraints.c
403
constraints_parse_ip(fn, p, AFI_IPV4,
usr.sbin/rpki-client/constraints.c
407
constraints_parse_ip(fn, p, AFI_IPV6,
usr.sbin/rpki-client/constraints.c
41
char *fn; /* constraints filename */
usr.sbin/rpki-client/constraints.c
411
constraints_parse_as(fn, p, allow_asids);
usr.sbin/rpki-client/constraints.c
419
errx(1, "%s: failed to parse %s", fn, p);
usr.sbin/rpki-client/constraints.c
425
constraints_parse_ip(fn, p, AFI_IPV4,
usr.sbin/rpki-client/constraints.c
429
constraints_parse_ip(fn, p, AFI_IPV6,
usr.sbin/rpki-client/constraints.c
433
constraints_parse_as(fn, p, deny_asids);
usr.sbin/rpki-client/constraints.c
437
errx(1, "%s: failed to parse %s", fn, p);
usr.sbin/rpki-client/constraints.c
442
err(1, "%s", fn);
usr.sbin/rpki-client/constraints.c
446
errx(1, "%s: failed to canonize IP addresses allowlist", fn);
usr.sbin/rpki-client/constraints.c
448
errx(1, "%s: failed to canonize AS numbers allowlist", fn);
usr.sbin/rpki-client/constraints.c
450
errx(1, "%s: failed to canonize IP addresses denylist", fn);
usr.sbin/rpki-client/constraints.c
452
errx(1, "%s: failed to canonize AS numbers denylist", fn);
usr.sbin/rpki-client/constraints.c
455
if (!sbgp_parse_asids(fn, allow_asids, &allow_ases,
usr.sbin/rpki-client/constraints.c
458
fn);
usr.sbin/rpki-client/constraints.c
461
if (!sbgp_parse_asids(fn, deny_asids, &deny_ases,
usr.sbin/rpki-client/constraints.c
464
fn);
usr.sbin/rpki-client/constraints.c
467
constraints_normalize_ip_addrblocks(fn, &allow_addrs);
usr.sbin/rpki-client/constraints.c
469
if (!sbgp_parse_ipaddrblocks(fn, allow_addrs, &allow_ips,
usr.sbin/rpki-client/constraints.c
472
fn);
usr.sbin/rpki-client/constraints.c
475
constraints_normalize_ip_addrblocks(fn, &deny_addrs);
usr.sbin/rpki-client/constraints.c
477
if (!sbgp_parse_ipaddrblocks(fn, deny_addrs, &deny_ips,
usr.sbin/rpki-client/constraints.c
480
fn);
usr.sbin/rpki-client/constraints.c
497
free(fn);
usr.sbin/rpki-client/constraints.c
513
constraints_check_as(const char *fn, struct cert_as *cert,
usr.sbin/rpki-client/constraints.c
532
if (!as_check_overlap(cert, fn, deny_ases, num_deny_ases, 1))
usr.sbin/rpki-client/constraints.c
543
constraints_check_ips(const char *fn, struct cert_ip *cert,
usr.sbin/rpki-client/constraints.c
552
if (!ip_addr_check_overlap(cert, fn, deny_ips, num_deny_ips, 1))
usr.sbin/rpki-client/constraints.c
569
constraints_validate(const char *fn, const struct cert *cert)
usr.sbin/rpki-client/constraints.c
582
errx(1, "%s: talid out of range %d", fn, talid);
usr.sbin/rpki-client/constraints.c
590
if (constraints_check_as(fn, &cert->ases[i],
usr.sbin/rpki-client/constraints.c
594
as_warn(fn, tal_constraints[talid].warn, &cert->ases[i]);
usr.sbin/rpki-client/constraints.c
604
if (constraints_check_ips(fn, &cert->ips[i], allow_ips,
usr.sbin/rpki-client/constraints.c
608
ip_warn(fn, tal_constraints[talid].warn, &cert->ips[i]);
usr.sbin/rpki-client/constraints.c
91
tal_constraints[talid].fn = constraints;
usr.sbin/rpki-client/crl.c
104
"Key Identifier missing", fn);
usr.sbin/rpki-client/crl.c
114
fn, SHA_DIGEST_LENGTH, dsz);
usr.sbin/rpki-client/crl.c
130
crl_check_revoked(const char *fn, X509_CRL *x509_crl)
usr.sbin/rpki-client/crl.c
149
"certificate list without entries disallowed", fn);
usr.sbin/rpki-client/crl.c
167
"disallowed", fn);
usr.sbin/rpki-client/crl.c
176
crl_check_sigalg(const char *fn, const struct crl *crl)
usr.sbin/rpki-client/crl.c
184
warnx("%s: missing signatureAlgorithm in certificateList", fn);
usr.sbin/rpki-client/crl.c
188
warnx("%s: missing signature in tbsCertList", fn);
usr.sbin/rpki-client/crl.c
195
"AlgorithmIdentifier mismatch", fn);
usr.sbin/rpki-client/crl.c
199
return x509_check_tbs_sigalg(fn, tbsalg);
usr.sbin/rpki-client/crl.c
203
crl_parse(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/crl.c
220
warnx("%s: d2i_X509_CRL", fn);
usr.sbin/rpki-client/crl.c
224
warnx("%s: %td bytes trailing garbage", fn, oder + len - der);
usr.sbin/rpki-client/crl.c
229
warnx("%s: RFC 6487 section 5: version 2 expected", fn);
usr.sbin/rpki-client/crl.c
234
warnx("%s: X509_CRL_get_issuer", fn);
usr.sbin/rpki-client/crl.c
237
if (!x509_valid_issuer_name(fn, name))
usr.sbin/rpki-client/crl.c
240
if (!crl_check_sigalg(fn, crl))
usr.sbin/rpki-client/crl.c
249
"%d != 2", fn, count);
usr.sbin/rpki-client/crl.c
252
if (!crl_check_crl_number(fn, crl->x509_crl))
usr.sbin/rpki-client/crl.c
254
if ((crl->aki = crl_get_aki(fn, crl->x509_crl)) == NULL)
usr.sbin/rpki-client/crl.c
259
warnx("%s: X509_CRL_get0_lastUpdate failed", fn);
usr.sbin/rpki-client/crl.c
263
warnx("%s: ASN1_TIME_to_tm failed", fn);
usr.sbin/rpki-client/crl.c
269
warnx("%s: X509_CRL_get0_nextUpdate failed", fn);
usr.sbin/rpki-client/crl.c
273
warnx("%s: ASN1_TIME_to_tm failed", fn);
usr.sbin/rpki-client/crl.c
277
if (!crl_check_revoked(fn, crl->x509_crl))
usr.sbin/rpki-client/crl.c
36
crl_check_crl_number(const char *fn, const X509_CRL *x509_crl)
usr.sbin/rpki-client/crl.c
46
"failed to parse CRL number", fn);
usr.sbin/rpki-client/crl.c
49
fn);
usr.sbin/rpki-client/crl.c
54
fn);
usr.sbin/rpki-client/crl.c
58
ret = x509_valid_seqnum(fn, "CRL number", aint);
usr.sbin/rpki-client/crl.c
71
crl_get_aki(const char *fn, X509_CRL *x509_crl)
usr.sbin/rpki-client/crl.c
83
"failed to parse CRL extension", fn);
usr.sbin/rpki-client/crl.c
86
"CRL extension missing", fn);
usr.sbin/rpki-client/crl.c
91
"AKI: extension not non-critical", fn);
usr.sbin/rpki-client/crl.c
97
fn);
usr.sbin/rpki-client/filemode.c
336
rtype_from_der(const char *fn, const unsigned char *der, size_t len)
usr.sbin/rpki-client/filemode.c
357
warnx("%s: CMS object not signedData", fn);
usr.sbin/rpki-client/filemode.c
363
"OID object is NULL", fn);
usr.sbin/rpki-client/ip.c
106
ip_addr_check_overlap(const struct cert_ip *ip, const char *fn,
usr.sbin/rpki-client/ip.c
142
"and addresses of the same class", fn);
usr.sbin/rpki-client/ip.c
157
"cannot have overlapping IP addresses", fn);
usr.sbin/rpki-client/ip.c
158
ip_warn(fn, "certificate IP", ip);
usr.sbin/rpki-client/ip.c
159
ip_warn(fn, "offending IP", &ips[i]);
usr.sbin/rpki-client/ip.c
173
enum afi afi, const char *fn, struct ip_addr *addr)
usr.sbin/rpki-client/ip.c
188
"unused bit count must be zero if length is zero", fn);
usr.sbin/rpki-client/ip.c
200
"unused bits must be set to zero", fn);
usr.sbin/rpki-client/ip.c
209
"IP address too long", fn);
usr.sbin/rpki-client/ip.c
349
ip_warn(const char *fn, const char *msg, const struct cert_ip *ip)
usr.sbin/rpki-client/ip.c
356
warnx("%s: %s: %s", fn, msg, buf);
usr.sbin/rpki-client/ip.c
360
warnx("%s: %s: %s", fn, msg, buf);
usr.sbin/rpki-client/ip.c
363
warnx("%s: %s: IP (inherit)", fn, msg);
usr.sbin/rpki-client/ip.c
366
warnx("%s: corrupt cert", fn);
usr.sbin/rpki-client/ip.c
38
ip_addr_afi_parse(const char *fn, const ASN1_OCTET_STRING *astr, enum afi *afi)
usr.sbin/rpki-client/ip.c
48
warnx("%s: SAFI not allowed", fn);
usr.sbin/rpki-client/ip.c
52
warnx("%s: invalid AFI length, want 2, have %d", fn, len);
usr.sbin/rpki-client/ip.c
63
"have %hd", fn, v);
usr.sbin/rpki-client/mft.c
106
valid_mft_filename(const char *fn, size_t len)
usr.sbin/rpki-client/mft.c
110
if (!valid_filename(fn, len))
usr.sbin/rpki-client/mft.c
113
c = memchr(fn, '.', len);
usr.sbin/rpki-client/mft.c
114
if (c == NULL || c != memrchr(fn, '.', len))
usr.sbin/rpki-client/mft.c
126
rtype_from_mftfile(const char *fn)
usr.sbin/rpki-client/mft.c
130
type = rtype_from_file_extension(fn);
usr.sbin/rpki-client/mft.c
149
mft_parse_filehash(const char *fn, struct mft *mft, const FileAndHash *fh,
usr.sbin/rpki-client/mft.c
163
warnx("%s: RFC 9286 section 4.2.2: bad filename", fn);
usr.sbin/rpki-client/mft.c
176
"invalid SHA256 length, have %d", fn, length);
usr.sbin/rpki-client/mft.c
183
warnx("%s: RFC 6487: too many CRLs listed on MFT", fn);
usr.sbin/rpki-client/mft.c
188
"(%s)", fn, file, mft->crl);
usr.sbin/rpki-client/mft.c
233
mft_has_unique_names_and_hashes(const char *fn, const Manifest *mft)
usr.sbin/rpki-client/mft.c
249
warnx("%s: duplicate name: %.*s", fn,
usr.sbin/rpki-client/mft.c
264
warnx("%s: duplicate hash for %.*s and %.*s", fn,
usr.sbin/rpki-client/mft.c
286
mft_parse_econtent(const char *fn, struct mft *mft, const unsigned char *d,
usr.sbin/rpki-client/mft.c
296
warnx("%s: RFC 9286 section 4: failed to parse Manifest", fn);
usr.sbin/rpki-client/mft.c
300
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/mft.c
305
if (!valid_econtent_version(fn, mft_asn1->version, 0))
usr.sbin/rpki-client/mft.c
308
mft->seqnum = x509_convert_seqnum(fn, "manifest number",
usr.sbin/rpki-client/mft.c
313
if (!x509_get_generalized_time(fn, "manifest thisUpdate",
usr.sbin/rpki-client/mft.c
317
if (!x509_get_generalized_time(fn, "manifest nextUpdate",
usr.sbin/rpki-client/mft.c
322
warnx("%s: bad update interval", fn);
usr.sbin/rpki-client/mft.c
328
"want SHA256 object, have %s", fn,
usr.sbin/rpki-client/mft.c
334
warnx("%s: no files in manifest fileList", fn);
usr.sbin/rpki-client/mft.c
338
warnx("%s: %d exceeds manifest entry limit (%d)", fn,
usr.sbin/rpki-client/mft.c
352
if (!mft_parse_filehash(fn, mft, fh, &found_crl))
usr.sbin/rpki-client/mft.c
357
warnx("%s: CRL not part of MFT fileList", fn);
usr.sbin/rpki-client/mft.c
361
if (!mft_has_unique_names_and_hashes(fn, mft_asn1))
usr.sbin/rpki-client/mft.c
375
mft_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/mft.c
388
cms = cms_parse_validate(&cert, fn, talid, der, len, mft_oid, &cmsz,
usr.sbin/rpki-client/mft.c
404
warnx("%s: RFC 3779 extension not set to inherit", fn);
usr.sbin/rpki-client/mft.c
411
"invalid CRL distribution point", fn);
usr.sbin/rpki-client/mft.c
418
"bad CRL distribution point extension", fn);
usr.sbin/rpki-client/mft.c
424
if (mft_parse_econtent(fn, mft, cms, cmsz) == 0)
usr.sbin/rpki-client/mft.c
429
fn);
usr.sbin/rpki-client/mft.c
66
rtype_from_file_extension(const char *fn)
usr.sbin/rpki-client/mft.c
70
sz = strlen(fn);
usr.sbin/rpki-client/mft.c
74
if (strcasecmp(fn + sz - 4, ".tal") == 0)
usr.sbin/rpki-client/mft.c
76
if (strcasecmp(fn + sz - 4, ".cer") == 0)
usr.sbin/rpki-client/mft.c
78
if (strcasecmp(fn + sz - 4, ".crl") == 0)
usr.sbin/rpki-client/mft.c
80
if (strcasecmp(fn + sz - 4, ".mft") == 0)
usr.sbin/rpki-client/mft.c
82
if (strcasecmp(fn + sz - 4, ".roa") == 0)
usr.sbin/rpki-client/mft.c
84
if (strcasecmp(fn + sz - 4, ".sig") == 0)
usr.sbin/rpki-client/mft.c
86
if (strcasecmp(fn + sz - 4, ".asa") == 0)
usr.sbin/rpki-client/mft.c
88
if (strcasecmp(fn + sz - 4, ".tak") == 0)
usr.sbin/rpki-client/mft.c
90
if (strcasecmp(fn + sz - 4, ".spl") == 0)
usr.sbin/rpki-client/mft.c
92
if (strcasecmp(fn + sz - 4, ".ccr") == 0)
usr.sbin/rpki-client/mft.c
94
if (strcasecmp(fn + sz - 3, ".gz") == 0)
usr.sbin/rpki-client/output.c
148
if ((*outputs[i].fn)(fout, vd, st) != 0) {
usr.sbin/rpki-client/output.c
66
int (*fn)(FILE *, struct validation_data *, struct stats *);
usr.sbin/rpki-client/parser.c
117
find_issuer(const char *fn, int id, const char *aki, const char *mftaki)
usr.sbin/rpki-client/parser.c
124
warnx("%s: RFC 6487: unknown cert with SKI %s", fn,
usr.sbin/rpki-client/parser.c
131
warnx("%s: AKI %s doesn't match Manifest AKI %s", fn,
usr.sbin/rpki-client/parser.c
138
warnx("%s: AKI %s doesn't match issuer SKI %s", fn,
usr.sbin/rpki-client/parser.c
154
char *fn, *repopath;
usr.sbin/rpki-client/parser.c
170
if (asprintf(&fn, "%s/%s", repopath, file) == -1)
usr.sbin/rpki-client/parser.c
173
if (asprintf(&fn, "%s/%s/%s", repopath, path, file) == -1)
usr.sbin/rpki-client/parser.c
176
return fn;
usr.sbin/rpki-client/parser.c
267
proc_parser_mft_check(const char *fn, struct mft *p)
usr.sbin/rpki-client/parser.c
298
warnx("%s#%s: bad message digest for %s", fn,
usr.sbin/rpki-client/parser.c
317
char *fn = NULL;
usr.sbin/rpki-client/parser.c
322
fn = parse_filepath(entp->repoid, entp->path, mft->crl, loc);
usr.sbin/rpki-client/parser.c
323
if (fn == NULL)
usr.sbin/rpki-client/parser.c
326
f = load_file(fn, &flen);
usr.sbin/rpki-client/parser.c
329
warn("parse file %s", fn);
usr.sbin/rpki-client/parser.c
336
crl = crl_parse(fn, f, flen);
usr.sbin/rpki-client/parser.c
341
warnx("%s: AKI doesn't match Manifest AKI", fn);
usr.sbin/rpki-client/parser.c
348
*crlfile = fn;
usr.sbin/rpki-client/parser.c
356
free(fn);
usr.sbin/rpki-client/repo.c
1006
if ((fn = rrdp_filename(rr, uri, 0)) == NULL)
usr.sbin/rpki-client/repo.c
1009
if (repo_mkpath(AT_FDCWD, fn) == -1)
usr.sbin/rpki-client/repo.c
1015
fd = open(fn, flags, 0644);
usr.sbin/rpki-client/repo.c
1019
rr->notifyuri, fn);
usr.sbin/rpki-client/repo.c
1020
free(fn);
usr.sbin/rpki-client/repo.c
1023
warn("open %s", fn);
usr.sbin/rpki-client/repo.c
1028
warn("write %s", fn);
usr.sbin/rpki-client/repo.c
1033
errx(1, "short write %s", fn);
usr.sbin/rpki-client/repo.c
1034
free(fn);
usr.sbin/rpki-client/repo.c
1043
free(fn);
usr.sbin/rpki-client/repo.c
1690
char *fn;
usr.sbin/rpki-client/repo.c
1704
fn = rrdp_filename(rr, fp->file, 0);
usr.sbin/rpki-client/repo.c
1706
if (unlink(fn) == -1) {
usr.sbin/rpki-client/repo.c
1708
warn("unlink %s", fn);
usr.sbin/rpki-client/repo.c
1711
logx("deleted %s", fn);
usr.sbin/rpki-client/repo.c
1714
free(fn);
usr.sbin/rpki-client/repo.c
1717
fn = rrdp_filename(rr, fp->file, 1);
usr.sbin/rpki-client/repo.c
1718
if (!filepath_exists(tree, fn)) {
usr.sbin/rpki-client/repo.c
1719
if (unlink(fn) == -1) {
usr.sbin/rpki-client/repo.c
1721
warn("unlink %s", fn);
usr.sbin/rpki-client/repo.c
1724
logx("deleted %s", fn);
usr.sbin/rpki-client/repo.c
1729
"deleted", fn);
usr.sbin/rpki-client/repo.c
1731
free(fn);
usr.sbin/rpki-client/repo.c
1749
char *fn, *base;
usr.sbin/rpki-client/repo.c
1758
fn = fp->file + rsyncsz;
usr.sbin/rpki-client/repo.c
1760
fn = fp->file + 1; /* just skip the '.' */
usr.sbin/rpki-client/repo.c
1764
fn = base + 1;
usr.sbin/rpki-client/repo.c
1789
if (repo_mkpath(AT_FDCWD, fn) == -1)
usr.sbin/rpki-client/repo.c
1795
if ((fp->file = strdup(fn)) == NULL)
usr.sbin/rpki-client/repo.c
1872
char *fn;
usr.sbin/rpki-client/repo.c
1874
if (asprintf(&fn, "%s/%s", rr->basedir, path) == -1)
usr.sbin/rpki-client/repo.c
1883
if (fstatat(cachefd, fn, &st, 0) == 0 &&
usr.sbin/rpki-client/repo.c
1885
free(fn);
usr.sbin/rpki-client/repo.c
1888
if (repo_mkpath(cachefd, fn) == 0) {
usr.sbin/rpki-client/repo.c
1890
cachefd, fn) == -1)
usr.sbin/rpki-client/repo.c
1891
warn("rename %s to %s", path, fn);
usr.sbin/rpki-client/repo.c
1896
free(fn);
usr.sbin/rpki-client/repo.c
963
char *fn = NULL;
usr.sbin/rpki-client/repo.c
981
free(fn);
usr.sbin/rpki-client/repo.c
982
if ((fn = rrdp_filename(rr, uri, try++)) == NULL)
usr.sbin/rpki-client/repo.c
984
fd = open(fn, O_RDONLY);
usr.sbin/rpki-client/repo.c
988
warnx("%s: bad file digest for %s", rr->notifyuri, fn);
usr.sbin/rpki-client/repo.c
989
free(fn);
usr.sbin/rpki-client/repo.c
992
free(fn);
usr.sbin/rpki-client/roa.c
105
"malformed AS identifier", fn);
usr.sbin/rpki-client/roa.c
112
"(got %d, expected 1 or 2)", fn, ipaddrblocksz);
usr.sbin/rpki-client/roa.c
122
if (!ip_addr_afi_parse(fn, addrfam->addressFamily, &afi)) {
usr.sbin/rpki-client/roa.c
124
"invalid", fn);
usr.sbin/rpki-client/roa.c
132
"IPv4 appears twice", fn);
usr.sbin/rpki-client/roa.c
139
"IPv6 appears twice", fn);
usr.sbin/rpki-client/roa.c
147
"empty ROAIPAddressFamily", fn);
usr.sbin/rpki-client/roa.c
153
fn, MAX_IP_SIZE);
usr.sbin/rpki-client/roa.c
164
if (!ip_addr_parse(addr->address, afi, fn, &ipaddr)) {
usr.sbin/rpki-client/roa.c
166
"invalid IP address", fn);
usr.sbin/rpki-client/roa.c
176
fn);
usr.sbin/rpki-client/roa.c
181
"maxLength (%llu)", fn,
usr.sbin/rpki-client/roa.c
188
fn, (unsigned long long)maxlen);
usr.sbin/rpki-client/roa.c
212
roa_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/roa.c
224
cms = cms_parse_validate(&cert, fn, talid, der, len, roa_oid, &cmsz,
usr.sbin/rpki-client/roa.c
233
if (!roa_parse_econtent(fn, roa, cms, cmsz))
usr.sbin/rpki-client/roa.c
237
warnx("%s: inherit elements not allowed in EE cert", fn);
usr.sbin/rpki-client/roa.c
242
warnx("%s: superfluous AS Resources extension present", fn);
usr.sbin/rpki-client/roa.c
247
warnx("%s: no IP address present", fn);
usr.sbin/rpki-client/roa.c
255
roa->valid = valid_roa(fn, cert, roa);
usr.sbin/rpki-client/roa.c
67
roa_parse_econtent(const char *fn, struct roa *roa, const unsigned char *d,
usr.sbin/rpki-client/roa.c
86
"RouteOriginAttestation", fn);
usr.sbin/rpki-client/roa.c
90
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/roa.c
95
if (!valid_econtent_version(fn, roa_asn1->version, 0))
usr.sbin/rpki-client/rsc.c
103
fn, MAX_AS_SIZE);
usr.sbin/rpki-client/rsc.c
117
if (!sbgp_as_id(fn, rsc->ases, &rsc->num_ases,
usr.sbin/rpki-client/rsc.c
122
if (!sbgp_as_range(fn, rsc->ases, &rsc->num_ases,
usr.sbin/rpki-client/rsc.c
127
warnx("%s: RSC AsList: unknown type %d", fn, aor->type);
usr.sbin/rpki-client/rsc.c
136
rsc_parse_iplist(const char *fn, struct rsc *rsc,
usr.sbin/rpki-client/rsc.c
150
warnx("%s: RSC ipAddrBlocks empty", fn);
usr.sbin/rpki-client/rsc.c
161
fn, MAX_IP_SIZE);
usr.sbin/rpki-client/rsc.c
170
if (!ip_addr_afi_parse(fn, af->addressFamily, &afi)) {
usr.sbin/rpki-client/rsc.c
171
warnx("%s: RSC: invalid AFI", fn);
usr.sbin/rpki-client/rsc.c
179
if (!sbgp_addr(fn, rsc->ips,
usr.sbin/rpki-client/rsc.c
184
if (!sbgp_addr_range(fn, rsc->ips,
usr.sbin/rpki-client/rsc.c
190
"unknown type %d", fn, aor->type);
usr.sbin/rpki-client/rsc.c
200
rsc_check_digesttype(const char *fn, struct rsc *rsc, const X509_ALGOR *alg)
usr.sbin/rpki-client/rsc.c
209
" %d", fn, type);
usr.sbin/rpki-client/rsc.c
215
fn, nid2str(nid));
usr.sbin/rpki-client/rsc.c
227
rsc_parse_checklist(const char *fn, struct rsc *rsc,
usr.sbin/rpki-client/rsc.c
235
warnx("%s: RSC checkList needs at least one entry", fn);
usr.sbin/rpki-client/rsc.c
240
warnx("%s: %zu exceeds checklist entry limit (%d)", fn,
usr.sbin/rpki-client/rsc.c
261
warnx("%s: RSC Digest: invalid SHA256 length", fn);
usr.sbin/rpki-client/rsc.c
273
warnx("%s: RSC FileNameAndHash: bad filename", fn);
usr.sbin/rpki-client/rsc.c
291
rsc_parse_econtent(const char *fn, struct rsc *rsc, const unsigned char *d,
usr.sbin/rpki-client/rsc.c
305
warnx("%s: RSC: failed to parse RpkiSignedChecklist", fn);
usr.sbin/rpki-client/rsc.c
309
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/rsc.c
314
if (!valid_econtent_version(fn, rsc_asn1->version, 0))
usr.sbin/rpki-client/rsc.c
320
fn);
usr.sbin/rpki-client/rsc.c
324
if (!rsc_parse_aslist(fn, rsc, resources->asID))
usr.sbin/rpki-client/rsc.c
327
if (!rsc_parse_iplist(fn, rsc, resources->ipAddrBlocks))
usr.sbin/rpki-client/rsc.c
330
if (!rsc_check_digesttype(fn, rsc, rsc_asn1->digestAlgorithm))
usr.sbin/rpki-client/rsc.c
333
if (!rsc_parse_checklist(fn, rsc, rsc_asn1->checkList))
usr.sbin/rpki-client/rsc.c
347
rsc_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/rsc.c
359
cms = cms_parse_validate(&cert, fn, talid, der, len, rsc_oid, &cmsz,
usr.sbin/rpki-client/rsc.c
369
warnx("%s: inherit elements not allowed in EE cert", fn);
usr.sbin/rpki-client/rsc.c
373
if (!rsc_parse_econtent(fn, rsc, cms, cmsz))
usr.sbin/rpki-client/rsc.c
376
rsc->valid = valid_rsc(fn, cert, rsc);
usr.sbin/rpki-client/rsc.c
88
rsc_parse_aslist(const char *fn, struct rsc *rsc,
usr.sbin/rpki-client/rsc.c
97
warnx("%s: RSC asID empty", fn);
usr.sbin/rpki-client/rsync.c
117
char *fn;
usr.sbin/rpki-client/rsync.c
128
if ((asprintf(&fn, "%.*s%s", dirs * 3, dotdot, compdir)) == -1)
usr.sbin/rpki-client/rsync.c
130
return fn;
usr.sbin/rpki-client/spl.c
101
spl_parse_econtent(const char *fn, struct spl *spl, const unsigned char *d,
usr.sbin/rpki-client/spl.c
118
warnx("%s: failed to parse SignedPrefixList", fn);
usr.sbin/rpki-client/spl.c
122
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/spl.c
127
if (!valid_econtent_version(fn, spl_asn1->version, 0))
usr.sbin/rpki-client/spl.c
131
warnx("%s: asid: malformed AS identifier", fn);
usr.sbin/rpki-client/spl.c
138
"(got %d, expected 0, 1, or 2)", fn, num_afps);
usr.sbin/rpki-client/spl.c
150
warnx("%s: empty AddressFamilyAddressPrefixes", fn);
usr.sbin/rpki-client/spl.c
154
warnx("%s: too many addressPrefixes entries", fn);
usr.sbin/rpki-client/spl.c
158
if (!ip_addr_afi_parse(fn, afp->addressFamily, &afi))
usr.sbin/rpki-client/spl.c
165
fn);
usr.sbin/rpki-client/spl.c
170
fn);
usr.sbin/rpki-client/spl.c
177
fn);
usr.sbin/rpki-client/spl.c
190
if (!ip_addr_parse(prefix_asn1, afi, fn, &ip_addr))
usr.sbin/rpki-client/spl.c
195
warnx("%s: invalid addressPrefixes sorting", fn);
usr.sbin/rpki-client/spl.c
217
spl_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/spl.c
229
cms = cms_parse_validate(&cert, fn, talid, der, len, spl_oid, &cmsz,
usr.sbin/rpki-client/spl.c
238
if (!spl_parse_econtent(fn, spl, cms, cmsz))
usr.sbin/rpki-client/spl.c
242
warnx("%s: inherit elements not allowed in EE cert", fn);
usr.sbin/rpki-client/spl.c
247
warnx("%s: AS Resources extension missing", fn);
usr.sbin/rpki-client/spl.c
252
warnx("%s: superfluous IP Resources extension present", fn);
usr.sbin/rpki-client/spl.c
260
spl->valid = valid_spl(fn, cert, spl);
usr.sbin/rpki-client/tak.c
111
warnx("%s: invalid TA URI", fn);
usr.sbin/rpki-client/tak.c
121
if ((res->ski = x509_pubkey_get_ski(pubkey, fn)) == NULL)
usr.sbin/rpki-client/tak.c
125
warnx("%s: i2d_X509_PUBKEY failed", fn);
usr.sbin/rpki-client/tak.c
143
tak_parse_econtent(const char *fn, struct tak *tak, const unsigned char *d,
usr.sbin/rpki-client/tak.c
152
warnx("%s: failed to parse Trust Anchor Key", fn);
usr.sbin/rpki-client/tak.c
156
warnx("%s: %td bytes trailing garbage in eContent", fn,
usr.sbin/rpki-client/tak.c
161
if (!valid_econtent_version(fn, tak_asn1->version, 0))
usr.sbin/rpki-client/tak.c
164
tak->current = parse_takey(fn, tak_asn1->current);
usr.sbin/rpki-client/tak.c
169
tak->predecessor = parse_takey(fn, tak_asn1->predecessor);
usr.sbin/rpki-client/tak.c
175
tak->successor = parse_takey(fn, tak_asn1->successor);
usr.sbin/rpki-client/tak.c
191
tak_parse(struct cert **out_cert, const char *fn, int talid,
usr.sbin/rpki-client/tak.c
203
cms = cms_parse_validate(&cert, fn, talid, der, len, tak_oid, &cmsz,
usr.sbin/rpki-client/tak.c
213
warnx("%s: RFC 3779 extension not set to inherit", fn);
usr.sbin/rpki-client/tak.c
217
if (!tak_parse_econtent(fn, tak, cms, cmsz))
usr.sbin/rpki-client/tak.c
221
warnx("%s: current TAKey's SKI does not match EE AKI", fn);
usr.sbin/rpki-client/tak.c
65
parse_takey(const char *fn, const TAKey *takey)
usr.sbin/rpki-client/tak.c
98
warnx("%s: Signed TAL requires at least 1 CertificateURI", fn);
usr.sbin/rpki-client/tal.c
112
"instead of %s", fn, f, file);
usr.sbin/rpki-client/tal.c
120
warnx("%s: no URIs in TAL file", fn);
usr.sbin/rpki-client/tal.c
130
"bad public key", fn);
usr.sbin/rpki-client/tal.c
141
"failed public key parse", fn);
usr.sbin/rpki-client/tal.c
146
"%td bytes of trailing garbage", fn,
usr.sbin/rpki-client/tal.c
165
tal_parse(const char *fn, char *buf, size_t len)
usr.sbin/rpki-client/tal.c
171
p = tal_parse_buffer(fn, buf, len);
usr.sbin/rpki-client/tal.c
176
d = strrchr(fn, '/');
usr.sbin/rpki-client/tal.c
178
d = fn;
usr.sbin/rpki-client/tal.c
42
tal_parse_buffer(const char *fn, char *buf, size_t len)
usr.sbin/rpki-client/tal.c
83
warnx("%s: invalid URI", fn);
usr.sbin/rpki-client/tal.c
89
warnx("%s: unsupported URL schema: %s", fn, line);
usr.sbin/rpki-client/tal.c
93
warnx("%s: not a certificate URL: %s", fn, line);
usr.sbin/rpki-client/validate.c
107
as_warn(fn, "RFC 6487: uncovered resource", &cert->ases[i]);
usr.sbin/rpki-client/validate.c
119
ip_warn(fn, "RFC 6487: uncovered resource", &cert->ips[i]);
usr.sbin/rpki-client/validate.c
131
valid_roa(const char *fn, struct cert *cert, struct roa *roa)
usr.sbin/rpki-client/validate.c
143
warnx("%s: RFC 9582: uncovered IP: %s", fn, buf);
usr.sbin/rpki-client/validate.c
156
valid_spl(const char *fn, struct cert *cert, struct spl *spl)
usr.sbin/rpki-client/validate.c
162
warnx("%s: SPL: uncovered ASID: %u", fn, spl->asid);
usr.sbin/rpki-client/validate.c
224
valid_filename(const char *fn, size_t len)
usr.sbin/rpki-client/validate.c
229
for (c = fn, i = 0; i < len; i++, c++)
usr.sbin/rpki-client/validate.c
440
valid_rsc(const char *fn, struct cert *cert, struct rsc *rsc)
usr.sbin/rpki-client/validate.c
457
as_warn(fn, "RSC ResourceBlock uncovered", &rsc->ases[i]);
usr.sbin/rpki-client/validate.c
466
ip_warn(fn, "RSC ResourceBlock uncovered", &rsc->ips[i]);
usr.sbin/rpki-client/validate.c
474
valid_econtent_version(const char *fn, const ASN1_INTEGER *aint,
usr.sbin/rpki-client/validate.c
482
warnx("%s: unexpected version 0", fn);
usr.sbin/rpki-client/validate.c
487
warnx("%s: ASN1_INTEGER_get_uint64 failed", fn);
usr.sbin/rpki-client/validate.c
492
warnx("%s: incorrect encoding for version 0", fn);
usr.sbin/rpki-client/validate.c
497
warnx("%s: unexpected version (expected %llu, got %llu)", fn,
usr.sbin/rpki-client/validate.c
510
valid_aspa(const char *fn, struct cert *cert, struct aspa *aspa)
usr.sbin/rpki-client/validate.c
517
warnx("%s: ASPA: uncovered Customer ASID: %u", fn, aspa->custasid);
usr.sbin/rpki-client/validate.c
87
valid_cert(const char *fn, struct auth *a, const struct cert *cert)
usr.sbin/rpki-client/x509.c
142
x509_pubkey_get_ski(X509_PUBKEY *pubkey, const char *fn)
usr.sbin/rpki-client/x509.c
157
warnx("%s: X509_PUBKEY_get0_param failed", fn);
usr.sbin/rpki-client/x509.c
165
"parameters not NULL", fn);
usr.sbin/rpki-client/x509.c
173
warnx("%s: RFC 7935, 3.1 SPKI not RSAPublicKey", fn);
usr.sbin/rpki-client/x509.c
180
"parameters not namedCurve", fn);
usr.sbin/rpki-client/x509.c
184
warnx("%s: RFC 8608, 3.1, named curve not P-256", fn);
usr.sbin/rpki-client/x509.c
192
warnx("%s: unsupported public key type %s", fn, buf);
usr.sbin/rpki-client/x509.c
197
warnx("%s: EVP_Digest failed", fn);
usr.sbin/rpki-client/x509.c
307
x509_get_generalized_time(const char *fn, const char *descr,
usr.sbin/rpki-client/x509.c
311
warnx("%s: %s time format invalid", fn, descr);
usr.sbin/rpki-client/x509.c
315
warnx("%s: parsing %s failed", fn, descr);
usr.sbin/rpki-client/x509.c
326
x509_location(const char *fn, const char *descr, GENERAL_NAME *location,
usr.sbin/rpki-client/x509.c
335
warnx("%s: RFC 6487 section 4.8: %s not URI", fn, descr);
usr.sbin/rpki-client/x509.c
343
warnx("%s: RFC 6487 section 4.8: %s bad location", fn, descr);
usr.sbin/rpki-client/x509.c
373
valid_printable_string(const char *fn, const char *descr, const ASN1_STRING *as)
usr.sbin/rpki-client/x509.c
385
" not PrintableString", fn, descr);
usr.sbin/rpki-client/x509.c
396
fn, descr, data[i]);
usr.sbin/rpki-client/x509.c
409
x509_valid_name_internal(const char *fn, const char *descr, const X509_NAME *xn)
usr.sbin/rpki-client/x509.c
419
warnx("%s: X509_NAME_get_entry", fn);
usr.sbin/rpki-client/x509.c
423
warnx("%s: X509_NAME_ENTRY_get_object", fn);
usr.sbin/rpki-client/x509.c
432
fn, descr);
usr.sbin/rpki-client/x509.c
437
fn);
usr.sbin/rpki-client/x509.c
446
if (!valid_printable_string(fn, descr, as))
usr.sbin/rpki-client/x509.c
452
fn, descr);
usr.sbin/rpki-client/x509.c
457
warnx("%s: OBJ_obj2nid failed", fn);
usr.sbin/rpki-client/x509.c
461
" %s in %s", fn, nid2str(nid), descr);
usr.sbin/rpki-client/x509.c
468
fn, descr);
usr.sbin/rpki-client/x509.c
476
x509_valid_subject_name(const char *fn, const X509_NAME *xn)
usr.sbin/rpki-client/x509.c
478
return x509_valid_name_internal(fn, "subject", xn);
usr.sbin/rpki-client/x509.c
482
x509_valid_issuer_name(const char *fn, const X509_NAME *xn)
usr.sbin/rpki-client/x509.c
484
return x509_valid_name_internal(fn, "issuer", xn);
usr.sbin/rpki-client/x509.c
492
x509_seqnum_to_bn(const char *fn, const char *descr, const ASN1_INTEGER *i)
usr.sbin/rpki-client/x509.c
497
warnx("%s: %s: ASN1_INTEGER_to_BN error", fn, descr);
usr.sbin/rpki-client/x509.c
502
warnx("%s: %s should be non-negative", fn, descr);
usr.sbin/rpki-client/x509.c
508
warnx("%s: %s should fit in 20 octets", fn, descr);
usr.sbin/rpki-client/x509.c
525
x509_convert_seqnum(const char *fn, const char *descr, const ASN1_INTEGER *i)
usr.sbin/rpki-client/x509.c
533
if ((bn = x509_seqnum_to_bn(fn, descr, i)) == NULL)
usr.sbin/rpki-client/x509.c
537
warnx("%s: %s: BN_bn2hex error", fn, descr);
usr.sbin/rpki-client/x509.c
545
x509_valid_seqnum(const char *fn, const char *descr, const ASN1_INTEGER *i)
usr.sbin/rpki-client/x509.c
549
if ((bn = x509_seqnum_to_bn(fn, descr, i)) == NULL)
usr.sbin/rpki-client/x509.c
563
x509_check_tbs_sigalg(const char *fn, const X509_ALGOR *tbsalg)
usr.sbin/rpki-client/x509.c
571
warnx("%s: unknown signature type", fn);
usr.sbin/rpki-client/x509.c
584
fn, LN_sha256WithRSAEncryption);
usr.sbin/rpki-client/x509.c
593
fn, LN_sha256WithRSAEncryption);
usr.sbin/rpki-client/x509.c
600
"the parameters", fn, SN_ecdsa_with_SHA256);
usr.sbin/rpki-client/x509.c
604
warnx("%s: P-256 support is experimental", fn);
usr.sbin/rpki-client/x509.c
609
fn, nid2str(nid), LN_sha256WithRSAEncryption);
usr.sbin/smtpd/smtpd.c
1273
const char *fn;
usr.sbin/smtpd/smtpd.c
1281
while (dict_iter(env->sc_filters_dict, &iter, (const char **)&fn, (void **)&fc)) {
usr.sbin/smtpd/smtpd.c
1292
while (dict_iter(env->sc_filters_dict, &iter, (const char **)&fn, (void **)&fc)) {
usr.sbin/tcpdump/print-smb.c
125
static struct smbfns *fn = &trans2_fns[0];
usr.sbin/tcpdump/print-smb.c
131
fn = smbfind(SVAL(words+1,14*2),trans2_fns);
usr.sbin/tcpdump/print-smb.c
144
fn->name,pcnt,dcnt);
usr.sbin/tcpdump/print-smb.c
154
f1 = fn->descript.req_f1;
usr.sbin/tcpdump/print-smb.c
155
f2 = fn->descript.req_f2;
usr.sbin/tcpdump/print-smb.c
163
f1 = fn->descript.rep_f1;
usr.sbin/tcpdump/print-smb.c
164
f2 = fn->descript.rep_f2;
usr.sbin/tcpdump/print-smb.c
167
if (fn->descript.fn) {
usr.sbin/tcpdump/print-smb.c
168
fn->descript.fn(param,data,pcnt,dcnt);
usr.sbin/tcpdump/print-smb.c
31
void (*fn)(); /* sometimes (u_char *, u_char *, u_char *, u_char *)
usr.sbin/tcpdump/print-smb.c
500
struct smbfns *fn;
usr.sbin/tcpdump/print-smb.c
508
fn = smbfind(command,smb_fns);
usr.sbin/tcpdump/print-smb.c
510
printf("%s-%s",fn->name,request?"request":"reply");
usr.sbin/tcpdump/print-smb.c
533
f1 = fn->descript.req_f1;
usr.sbin/tcpdump/print-smb.c
534
f2 = fn->descript.req_f2;
usr.sbin/tcpdump/print-smb.c
536
f1 = fn->descript.rep_f1;
usr.sbin/tcpdump/print-smb.c
537
f2 = fn->descript.rep_f2;
usr.sbin/tcpdump/print-smb.c
540
if (fn->descript.fn) {
usr.sbin/tcpdump/print-smb.c
541
fn->descript.fn(words,data,buf,maxbuf);
usr.sbin/tcpdump/print-smb.c
565
if ((fn->flags & FLG_CHAIN) && CVAL(words,0) && SVAL(words,1)!=0xFF) {
usr.sbin/tcpdump/print-smb.c
570
fn = smbfind(command,smb_fns);
usr.sbin/tcpdump/print-smb.c
572
printf("chained-%s-%s ",fn->name,request?"request":"reply");
usr.sbin/unbound/validator/autotrust.c
1114
autr_write_contents(FILE* out, char* fn, struct trust_anchor* tp)
usr.sbin/unbound/validator/autotrust.c
1122
log_err("could not write to %s: %s", fn, strerror(errno));
usr.sbin/unbound/validator/autotrust.c
1132
log_err("could not write to %s: %s", fn, strerror(errno));
usr.sbin/unbound/validator/autotrust.c
1136
if(!print_id(out, fn, tp->name, tp->namelen, tp->dclass)) {
usr.sbin/unbound/validator/autotrust.c
1152
log_err("could not write to %s: %s", fn, strerror(errno));
usr.sbin/unbound/validator/autotrust.c
1170
log_err("malloc failure writing %s", fn);
usr.sbin/unbound/validator/autotrust.c
1179
log_err("could not write to %s: %s", fn, strerror(errno));
usr.sbin/vmd/pci.c
294
pci_iobar_fn_t fn = NULL;
usr.sbin/vmd/pci.c
308
fn = pci.pci_devices[i].pd_barfunc[j];
usr.sbin/vmd/pci.c
317
if (fn == NULL) {
usr.sbin/vmd/pci.c
327
if (fn(dir, reg, &vei->vei.vei_data, &intr, cookie, sz))