/external/libpcap/ |
D | pcap-dlpi.c | 461 char *ebuf) in pcap_open_live() argument 485 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); in pcap_open_live() 506 cp = split_dname(dname, &ppa, ebuf); in pcap_open_live() 524 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 548 ppa = get_dlpi_ppa(p->fd, dname, ppa, ebuf); in pcap_open_live() 568 cp = split_dname(dname, &ppa, ebuf); in pcap_open_live() 582 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dname, in pcap_open_live() 605 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 608 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", in pcap_open_live() 623 if (dlinforeq(p->fd, ebuf) < 0 || in pcap_open_live() [all …]
|
D | pcap-linux.c | 205 static int iface_get_id(int fd, const char *device, char *ebuf); 207 static int iface_get_mtu(int fd, const char *device, char *ebuf); 208 static int iface_get_arptype(int fd, const char *device, char *ebuf); 210 static int iface_bind(int fd, int ifindex, char *ebuf); 212 static int iface_bind_old(int fd, const char *device, char *ebuf); 238 char *ebuf) in pcap_open_live() argument 248 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); in pcap_open_live() 254 return septel_open_live(device, snaplen, promisc, to_ms, ebuf); in pcap_open_live() 262 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", in pcap_open_live() 283 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() [all …]
|
D | pcap-snit.c | 231 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) in nit_setflags() argument 245 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSTIME: %s", in nit_setflags() 257 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSFLAGS: %s", in nit_setflags() 266 char *ebuf) in pcap_open_live() argument 277 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); in pcap_open_live() 306 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dev, in pcap_open_live() 313 snprintf(ebuf, PCAP_ERRBUF_SIZE, "I_SRDOPT: %s", in pcap_open_live() 318 snprintf(ebuf, PCAP_ERRBUF_SIZE, "push nbuf: %s", in pcap_open_live() 328 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSCHUNK: %s", in pcap_open_live() 340 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCBIND: %s: %s", in pcap_open_live() [all …]
|
D | pcap-bpf.c | 594 char *ebuf) in pcap_open_live() argument 613 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); in pcap_open_live() 623 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", in pcap_open_live() 628 fd = bpf_open(p, ebuf); in pcap_open_live() 636 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCVERSION: %s", in pcap_open_live() 642 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 671 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCSETIF: %s: %s", in pcap_open_live() 678 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 685 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCGDLT: %s", in pcap_open_live() 716 snprintf(ebuf, PCAP_ERRBUF_SIZE, "unknown interface type %u", in pcap_open_live() [all …]
|
D | pcap-snoop.c | 199 char *ebuf) in pcap_open_live() argument 212 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", in pcap_open_live() 219 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop socket: %s", in pcap_open_live() 228 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop bind: %s", in pcap_open_live() 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCADDSNOOP: %s", in pcap_open_live() 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 320 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCGIFMTU: %s", in pcap_open_live() 354 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPLEN: %s", in pcap_open_live() 361 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPING: %s", in pcap_open_live() 369 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", in pcap_open_live()
|
D | pcap-nit.c | 213 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) in nit_setflags() argument 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNIT: %s", in nit_setflags() 251 char *ebuf) in pcap_open_live() argument 259 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); in pcap_open_live() 272 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 280 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 285 nit_setflags(p->fd, promisc, to_ms, ebuf); in pcap_open_live() 295 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); in pcap_open_live() 304 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); in pcap_open_live()
|
D | pcap-pf.c | 297 char *ebuf) in pcap_open_live() argument 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, in pcap_open_live() 335 snprintf(ebuf, PCAP_ERRBUF_SIZE, "pf open: %s: %s\n\ in pcap_open_live() 345 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCMBIS: %s", in pcap_open_live() 356 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETW: %s", in pcap_open_live() 362 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCDEVP: %s", in pcap_open_live() 444 snprintf(ebuf, PCAP_ERRBUF_SIZE, "unknown data-link type %u", in pcap_open_live() 459 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCTRUNCATE: %s", in pcap_open_live() 469 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETF: %s", in pcap_open_live() 479 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSRTIMEOUT: %s", in pcap_open_live() [all …]
|
D | pcap-dag.c | 497 dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) in dag_open_live() argument 512 snprintf(ebuf, PCAP_ERRBUF_SIZE, "device is NULL: %s", pcap_strerror(errno)); in dag_open_live() 519 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno)); in dag_open_live() 530 …snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errn… in dag_open_live() 536 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: %s\n", pcap_strerror(errno)); in dag_open_live() 542 …snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: tx (even numbered) streams not supported for cap… in dag_open_live() 549 …snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errn… in dag_open_live() 560 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_open %s: %s", device, pcap_strerror(errno)); in dag_open_live() 567 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_attach_stream: %s\n", pcap_strerror(errno)); in dag_open_live() 576 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_get_stream_poll: %s\n", pcap_strerror(errno)); in dag_open_live() [all …]
|
D | pcap-win32.c | 394 char *ebuf) in pcap_open_live() argument 405 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); in pcap_open_live() 417 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Error opening adapter: %s", pcap_win32strerror()); in pcap_open_live() 424 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Cannot determine the network type: %s", pcap_win32strerror()); in pcap_open_live() 513 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to promiscuous mode"); in pcap_open_live() 521 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to non-promiscuous mode"); in pcap_open_live() 535 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to allocate the PACKET structure"); in pcap_open_live() 548 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); in pcap_open_live() 559 …snprintf(ebuf, PCAP_ERRBUF_SIZE,"driver error: not enough memory to allocate the kernel buffer\n"); in pcap_open_live() 566 snprintf(ebuf, PCAP_ERRBUF_SIZE,"Error calling PacketSetMinToCopy: %s\n", pcap_win32strerror()); in pcap_open_live()
|
D | pcap-dos.c | 112 static int first_init (const char *name, char *ebuf, int promisc); 447 char *pcap_lookupdev (char *ebuf) in pcap_lookupdev() argument 467 if (ebuf) in pcap_lookupdev() 468 strcpy (ebuf, "No driver found"); in pcap_lookupdev() 599 open_driver (const char *dev_name, char *ebuf, int promisc) in open_driver() argument 616 sprintf (ebuf, "failed to detect device `%s'", dev_name); in open_driver() 638 sprintf (ebuf, "failed to activate device `%s'", dev_name); in open_driver() 641 strcat (ebuf, ": "); in open_driver() 642 strcat (ebuf, pktInfo.error); in open_driver() 660 sprintf (ebuf, "device `%s' not supported", dev_name); in open_driver() [all …]
|
D | pcap-null.c | 44 char *ebuf) in pcap_open_live() argument 46 (void)strlcpy(ebuf, nosup, PCAP_ERRBUF_SIZE); in pcap_open_live()
|
D | pcap-septel.c | 209 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) { in septel_open_live() argument 214 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno)); in septel_open_live()
|
D | pcap-septel.h | 14 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
D | pcap-dag.h | 13 pcap_t *dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
D | pcap.c | 692 static char ebuf[20]; in pcap_strerror() 696 (void)snprintf(ebuf, sizeof ebuf, "Unknown error: %d", errnum); in pcap_strerror() 697 return(ebuf); in pcap_strerror()
|
/external/tcpdump/ |
D | tcpdump.c | 463 char ebuf[PCAP_ERRBUF_SIZE]; in main() local 495 if (abort_on_misalignment(ebuf, sizeof(ebuf)) < 0) in main() 496 error("%s", ebuf); in main() 541 if (pcap_findalldevs(&devpointer, ebuf) < 0) in main() 542 error("%s", ebuf); in main() 597 if (pcap_findalldevs(&devpointer, ebuf) < 0) in main() 598 error("%s", ebuf); in main() 851 pd = pcap_open_offline(RFileName, ebuf); in main() 853 error("%s", ebuf); in main() 871 device = pcap_lookupdev(ebuf); in main() [all …]
|
D | machdep.c | 56 abort_on_misalignment(char *ebuf _U_, size_t ebufsiz _U_) in abort_on_misalignment() 62 (void)snprintf(ebuf, ebufsiz, "setsysinfo: errno %d", errno); in abort_on_misalignment()
|
/external/wpa_supplicant/ |
D | radius.c | 851 u8 *ebuf, size_t *elen) in encrypt_ms_key() argument 865 os_memset(ebuf, 0, len); in encrypt_ms_key() 866 ebuf[0] = key_len; in encrypt_ms_key() 867 os_memcpy(ebuf + 1, key, key_len); in encrypt_ms_key() 871 pos = ebuf; in encrypt_ms_key()
|
/external/ipsec-tools/src/racoon/ |
D | crypto_openssl.c | 1200 static char ebuf[512]; in eay_strerror() local 1211 n = snprintf(ebuf + len, sizeof(ebuf) - len, in eay_strerror() 1215 if (n < 0 || n >= sizeof(ebuf) - len) in eay_strerror() 1218 if (sizeof(ebuf) < len) in eay_strerror() 1222 return ebuf; in eay_strerror()
|
/external/qemu/ |
D | vl.c | 2058 char ebuf[15] = "Escape-Char"; in mux_print_help() local 2063 snprintf(ebuf, sizeof(ebuf), "C-%c", term_escape_char - 1 + 'a'); in mux_print_help() 2073 chr->chr_write(chr, (uint8_t *)ebuf, strlen(ebuf)); in mux_print_help()
|