| /src/contrib/kyua/engine/ |
| H A D | requirements.cpp | 305 std::string reason; in check_reqs() local 307 reason = check_required_configs(md.required_configs(), cfg, test_suite); in check_reqs() 308 if (!reason.empty()) in check_reqs() 309 return reason; in check_reqs() 311 reason = check_allowed_architectures(md.allowed_architectures(), cfg); in check_reqs() 312 if (!reason.empty()) in check_reqs() 313 return reason; in check_reqs() 315 reason = check_execenv(md.execenv(), cfg); in check_reqs() 316 if (!reason.empty()) in check_reqs() 317 return reason; in check_reqs() [all …]
|
| H A D | atf_result.cpp | 136 const std::string reason = rest.substr(2); in parse_with_reason() local 137 INV(!reason.empty()); in parse_with_reason() 140 return atf_result(atf_result::broken, reason); in parse_with_reason() 142 return atf_result(atf_result::expected_death, reason); in parse_with_reason() 144 return atf_result(atf_result::expected_failure, reason); in parse_with_reason() 146 return atf_result(atf_result::expected_timeout, reason); in parse_with_reason() 148 return atf_result(atf_result::failed, reason); in parse_with_reason() 150 return atf_result(atf_result::skipped, reason); in parse_with_reason() 208 const std::string reason = rest.substr(delim + 2); in parse_with_reason_and_arg() local 211 return atf_result(atf_result::expected_exit, arg, reason); in parse_with_reason_and_arg() [all …]
|
| /src/contrib/atf/atf-c/ |
| H A D | tc.c | 205 const atf_dynstr_t *reason) in write_resfile() argument 214 INV(arg == -1 || reason != NULL); in write_resfile() 220 if (reason != NULL) { in write_resfile() 229 r = atf_dynstr_cstring(reason); in write_resfile() 245 reason == NULL ? "null" : atf_dynstr_cstring(reason)); in write_resfile() 257 atf_dynstr_t *reason) in create_resfile() argument 272 err = write_resfile(ctx->resfilefd, result, arg, reason); in create_resfile() 274 if (reason != NULL) in create_resfile() 275 atf_dynstr_fini(reason); in create_resfile() 284 atf_dynstr_t reason; in error_in_expect() local [all …]
|
| /src/crypto/heimdal/lib/kadm5/ |
| H A D | check-cracklib.pl | 84 my $reason = shift; 85 print "$reason\n"; 100 my $reason; 102 $reason = check_basic($params{'principal'}, $params{'new-password'}); 103 badpassword($reason) if ($reason ne "ok"); 105 $reason = fascist_check($params{'new-password'}, $database); 106 badpassword($reason) if ($reason ne "ok"); 108 $reason = check_repeat($params{'principal'}, $params{'new-password'}); 109 badpassword($reason) if ($reason ne "ok");
|
| /src/contrib/unbound/validator/ |
| H A D | val_kentry.c | 60 if(kd->reason) in key_entry_sizefunc() 61 s += strlen(kd->reason)+1; in key_entry_sizefunc() 95 free(kd->reason); in key_entry_deldatafunc() 138 if(d->reason) { in key_entry_copy_toregion() 139 newd->reason = regional_strdup(region, d->reason); in key_entry_copy_toregion() 140 if(!newd->reason) in key_entry_copy_toregion() 193 if(copy_reason && d->reason && *d->reason != 0) { in key_entry_copy() 194 newd->reason = strdup(d->reason); in key_entry_copy() 195 if(!newd->reason) { in key_entry_copy() 203 newd->reason = NULL; in key_entry_copy() [all …]
|
| H A D | val_sigcrypt.c | 560 char** reason, sldns_ede_code *reason_bogus, in dnskeyset_verify_rrset_sig() argument 591 sig_idx, sortree, &buf_canon, reason, reason_bogus, in dnskeyset_verify_rrset_sig() 598 *reason = "too many RRSIG validations"; in dnskeyset_verify_rrset_sig() 606 *reason = "signatures from unknown keys"; in dnskeyset_verify_rrset_sig() 613 *reason = "unsupported algorithm by crypto library"; in dnskeyset_verify_rrset_sig() 626 uint8_t* sigalg, char** reason, sldns_ede_code *reason_bogus, in dnskeyset_verify_rrset() argument 642 *reason = "no signatures"; in dnskeyset_verify_rrset() 652 *reason = "zone has no known algorithms"; in dnskeyset_verify_rrset() 660 dnskey, i, &sortree, reason, reason_bogus, in dnskeyset_verify_rrset() 675 *reason = "too many RRSIG validations"; in dnskeyset_verify_rrset() [all …]
|
| /src/contrib/pam_modules/pam_passwdqc/ |
| H A D | passwdqc_check.c | 283 const char *reason; in _passwdqc_check() local 291 reason = NULL; in _passwdqc_check() 294 reason = REASON_SAME; in _passwdqc_check() 298 if (!reason && length < params->min[4]) in _passwdqc_check() 299 reason = REASON_SHORT; in _passwdqc_check() 301 if (!reason && length > params->max) { in _passwdqc_check() 307 reason = REASON_SAME; in _passwdqc_check() 309 reason = REASON_LONG; in _passwdqc_check() 312 if (!reason && is_simple(params, newpass)) { in _passwdqc_check() 314 reason = REASON_SIMPLESHORT; in _passwdqc_check() [all …]
|
| /src/contrib/kyua/os/freebsd/ |
| H A D | reqs_checker_kmods.cpp | 43 std::string reason = ""; in exec() local 46 reason += " " + kmod; in exec() 47 if (!reason.empty()) in exec() 48 reason = "Required kmods are not loaded:" + reason + "."; in exec() 49 return reason; in exec()
|
| /src/contrib/unbound/testcode/ |
| H A D | unitzonemd.c | 72 char* reason = NULL; in zonemd_generate_test() local 96 &reason); in zonemd_generate_test() 97 if(reason) printf("zonemd failure reason: %s\n", reason); in zonemd_generate_test() 190 char* reason = NULL; in zonemd_check_test() local 221 hash, hashlen, region, buf, &reason); in zonemd_check_test() 222 unit_assert(result && reason == NULL); in zonemd_check_test() 224 hash, hashlen, region, buf, &reason); in zonemd_check_test() 225 unit_assert(result && strcmp(reason, "unsupported scheme")==0); in zonemd_check_test() 227 hash, hashlen, region, buf, &reason); in zonemd_check_test() 228 unit_assert(result && strcmp(reason, "unsupported algorithm")==0); in zonemd_check_test() [all …]
|
| /src/crypto/openssh/ |
| H A D | auth2-pubkeyfile.c | 177 const char *reason = NULL; in auth_check_principals_line() local 200 if ((opts = sshauthopt_parse(line_opts, &reason)) == NULL) { in auth_check_principals_line() 201 debug("%s: bad principals options: %s", loc, reason); in auth_check_principals_line() 202 auth_debug_add("%s: bad principals options: %s", loc, reason); in auth_check_principals_line() 272 const char *reason = NULL; in auth_check_authkey_line() local 290 reason = "invalid key option string"; in auth_check_authkey_line() 301 if ((keyopts = sshauthopt_parse(key_options, &reason)) == NULL) { in auth_check_authkey_line() 302 debug("%s: bad key options: %s", loc, reason); in auth_check_authkey_line() 303 auth_debug_add("%s: bad key options: %s", loc, reason); in auth_check_authkey_line() 328 reason = "Refused by key options"; in auth_check_authkey_line() [all …]
|
| H A D | srclimit.c | 58 const char *reason; member 259 srclimit_penalty_check_allow(int sock, const char **reason) in srclimit_penalty_check_allow() argument 291 *reason = "too many penalised addresses"; in srclimit_penalty_check_allow() 306 *reason = penalty->reason; in srclimit_penalty_check_allow() 353 const char *reason = NULL, *t; in srclimit_penalise() local 374 reason = "penalty: caused crash"; in srclimit_penalise() 378 reason = "penalty: failed authentication"; in srclimit_penalise() 382 reason = "penalty: connections without attempting authentication"; in srclimit_penalise() 386 reason = "penalty: connection prohibited by RefuseConnection"; in srclimit_penalise() 390 reason = "penalty: exceeded LoginGraceTime"; in srclimit_penalise() [all …]
|
| /src/tests/atf_python/ |
| H A D | atf_pytest.py | 117 reason: str 186 def set_report_state(self, test_name: str, state: str, reason: str): 187 self._tests_state_map[test_name] = self.ReportState(state, reason) 195 reason = data[2] 197 if reason.startswith(prefix): 198 reason = reason[len(prefix):] 199 return reason 241 reason = self._extract_report_reason(report) 249 self.set_report_state(test_name, state, reason) 257 self.set_report_state(test_name, state, reason) [all …]
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | mesh_mpm.c | 31 const u8 *reason; /* Reason Code (conditional, 2 octets) */ member 102 mpm_ie->reason = ie + len - 2; in mesh_mpm_parse_peer_mgmt() 496 u16 reason = 0; in plink_timer() local 513 reason = WLAN_REASON_MESH_MAX_RETRIES; in plink_timer() 518 if (!reason) in plink_timer() 519 reason = WLAN_REASON_MESH_CONFIRM_TIMEOUT; in plink_timer() 524 mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason); in plink_timer() 563 int reason = WLAN_REASON_MESH_PEERING_CANCELLED; in mesh_mpm_plink_close() local 572 mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason); in mesh_mpm_plink_close() 967 enum plink_event event, u16 reason) in mesh_mpm_fsm() argument [all …]
|
| /src/tests/examples/ |
| H A D | test_examples.py | 21 @pytest.mark.skip(reason="comment me to run the test") 31 @pytest.mark.skip(reason="comment me to run the test") 39 @pytest.mark.skip(reason="comment me to run the test") 52 @pytest.mark.skip(reason="comment me to run the test") 62 @pytest.mark.skip(reason="comment me to run the test") 70 @pytest.mark.skip(reason="comment me to run the test") 128 @pytest.mark.skip(reason="comment me to run the test") 134 @pytest.mark.skip(reason="comment me to run the test") 187 @pytest.mark.skip(reason="comment me to run the test")
|
| /src/sys/dev/rtwn/rtl8192c/pci/ |
| H A D | r92ce_fw.c | 57 r92ce_fw_reset(struct rtwn_softc *sc, int reason) in r92ce_fw_reset() argument 60 if (reason == RTWN_FW_RESET_CHECKSUM) in r92ce_fw_reset() 63 r92c_fw_reset(sc, reason); in r92ce_fw_reset() 69 if (reason == RTWN_FW_RESET_DOWNLOAD) in r92ce_fw_reset()
|
| /src/crypto/openssl/test/recipes/ |
| H A D | 02-test_errstr.t | 139 my $reason = $res[0]; 140 $reason =~ s|\R$||; 141 $reason = ( split_error($reason) )[3]; 143 return match_any($reason, $errcode_hex, @strings);
|
| /src/crypto/openssl/crypto/ec/ |
| H A D | eck_prn.c | 72 int ret = 0, reason = ERR_R_BIO_LIB; in ECPKParameters_print() local 86 reason = ERR_R_PASSED_NULL_PARAMETER; in ECPKParameters_print() 92 reason = ERR_R_BN_LIB; in ECPKParameters_print() 129 reason = ERR_R_BN_LIB; in ECPKParameters_print() 134 reason = ERR_R_EC_LIB; in ECPKParameters_print() 139 reason = ERR_R_EC_LIB; in ECPKParameters_print() 145 reason = ERR_R_EC_LIB; in ECPKParameters_print() 153 reason = ERR_R_EC_LIB; in ECPKParameters_print() 214 ERR_raise(ERR_LIB_EC, reason); in ECPKParameters_print()
|
| /src/crypto/openssl/ssl/quic/ |
| H A D | quic_channel.c | 424 OPENSSL_free((char *)ch->terminate_cause.reason); in ch_cleanup() 1325 const char *reason = "bad transport parameter"; in ch_on_transport_params() local 1343 reason = "multiple transport parameter extensions"; in ch_on_transport_params() 1360 reason = TP_REASON_DUP("ORIG_DCID"); in ch_on_transport_params() 1365 reason = TP_REASON_SERVER_ONLY("ORIG_DCID"); in ch_on_transport_params() 1370 reason = TP_REASON_MALFORMED("ORIG_DCID"); in ch_on_transport_params() 1377 reason = TP_REASON_EXPECTED_VALUE("ORIG_DCID"); in ch_on_transport_params() 1387 reason = TP_REASON_SERVER_ONLY("RETRY_SCID"); in ch_on_transport_params() 1392 reason = TP_REASON_DUP("RETRY_SCID"); in ch_on_transport_params() 1397 reason = TP_REASON_NOT_RETRY("RETRY_SCID"); in ch_on_transport_params() [all …]
|
| /src/contrib/llvm-project/lldb/source/Plugins/Process/FreeBSD/ |
| H A D | NativeThreadFreeBSD.cpp | 83 m_stop_info.reason = StopReason::eStopReasonSignal; in SetStoppedBySignal() 101 m_stop_info.reason = StopReason::eStopReasonBreakpoint; in SetStoppedByBreakpoint() 107 m_stop_info.reason = StopReason::eStopReasonTrace; in SetStoppedByTrace() 113 m_stop_info.reason = StopReason::eStopReasonExec; in SetStoppedByExec() 128 m_stop_info.reason = StopReason::eStopReasonWatchpoint; in SetStoppedByWatchpoint() 136 m_stop_info.reason = StopReason::eStopReasonFork; in SetStoppedByFork() 146 m_stop_info.reason = StopReason::eStopReasonVFork; in SetStoppedByVFork() 155 m_stop_info.reason = StopReason::eStopReasonVForkDone; in SetStoppedByVForkDone() 162 m_stop_info.reason = StopReason::eStopReasonNone; in SetStoppedWithNoReason() 174 m_stop_info.reason = StopReason::eStopReasonNone; in SetRunning() [all …]
|
| /src/contrib/llvm-project/lldb/source/Plugins/Process/NetBSD/ |
| H A D | NativeThreadNetBSD.cpp | 83 m_stop_info.reason = StopReason::eStopReasonSignal; in SetStoppedBySignal() 101 m_stop_info.reason = StopReason::eStopReasonBreakpoint; in SetStoppedByBreakpoint() 107 m_stop_info.reason = StopReason::eStopReasonTrace; in SetStoppedByTrace() 113 m_stop_info.reason = StopReason::eStopReasonExec; in SetStoppedByExec() 128 m_stop_info.reason = StopReason::eStopReasonWatchpoint; in SetStoppedByWatchpoint() 136 m_stop_info.reason = StopReason::eStopReasonFork; in SetStoppedByFork() 146 m_stop_info.reason = StopReason::eStopReasonVFork; in SetStoppedByVFork() 155 m_stop_info.reason = StopReason::eStopReasonVForkDone; in SetStoppedByVForkDone() 162 m_stop_info.reason = StopReason::eStopReasonNone; in SetStoppedWithNoReason() 174 m_stop_info.reason = StopReason::eStopReasonNone; in SetRunning() [all …]
|
| /src/contrib/atf/atf-c++/ |
| H A D | tests.cpp | 342 impl::tc::fail(const std::string& reason) in fail() argument 344 atf_tc_fail("%s", reason.c_str()); in fail() 348 impl::tc::fail_nonfatal(const std::string& reason) in fail_nonfatal() argument 350 atf_tc_fail_nonfatal("%s", reason.c_str()); in fail_nonfatal() 354 impl::tc::skip(const std::string& reason) in skip() argument 356 atf_tc_skip("%s", reason.c_str()); in skip() 380 impl::tc::expect_fail(const std::string& reason) in expect_fail() argument 382 atf_tc_expect_fail("%s", reason.c_str()); in expect_fail() 386 impl::tc::expect_exit(const int exitcode, const std::string& reason) in expect_exit() argument 388 atf_tc_expect_exit(exitcode, "%s", reason.c_str()); in expect_exit() [all …]
|
| /src/sys/dev/xen/control/ |
| H A D | control.c | 335 const struct xctrl_shutdown_reason *reason; in xctrl_on_watch_event() local 351 reason = xctrl_shutdown_reasons; in xctrl_on_watch_event() 352 last_reason = reason + nitems(xctrl_shutdown_reasons); in xctrl_on_watch_event() 353 while (reason < last_reason) { in xctrl_on_watch_event() 354 if (!strcmp(result, reason->name)) { in xctrl_on_watch_event() 355 reason->handler(); in xctrl_on_watch_event() 358 reason++; in xctrl_on_watch_event()
|
| /src/contrib/kyua/model/ |
| H A D | test_result.cpp | 101 model::test_result::reason(void) const in reason() function in model::test_result 159 const std::string& reason = object.reason(); in operator <<() local 160 if (reason.empty()) { in operator <<() 165 % text::quote(result_name, '\'') % text::quote(reason, '\''); in operator <<()
|
| /src/crypto/openssl/include/openssl/ |
| H A D | err.h.in | 192 * |0| library | reason | 195 * A few of the reason bits are reserved as flags with special meaning: 199 * | rflags| | reason | 205 * The reason flags are part of the overall reason code for practical 207 * reason codes in different numeric ranges. 209 * The currently known reason flags are: 211 * ERR_RFLAG_FATAL Flags that the reason code is considered fatal. 213 * is also the code for ERR_R_FATAL (that reason 214 * code served the dual purpose of flag and reason 216 * ERR_RFLAG_COMMON Flags that the reason code is common to all [all …]
|
| /src/sys/x86/acpica/ |
| H A D | madt.c | 144 const char *reason; in madt_x2apic_disable_reason() local 149 reason = NULL; in madt_x2apic_disable_reason() 155 reason = "by DMAR table"; in madt_x2apic_disable_reason() 157 if (reason != NULL) in madt_x2apic_disable_reason() 158 return (reason); in madt_x2apic_disable_reason() 185 reason = in madt_x2apic_disable_reason() 192 if (reason != NULL) in madt_x2apic_disable_reason() 193 return (reason); in madt_x2apic_disable_reason() 205 const char *reason; in madt_setup_local() local 210 reason = madt_x2apic_disable_reason(); in madt_setup_local() [all …]
|