/external/libpcap/ |
D | sockutils.c | 150 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen) in sock_fmterror() argument 152 if (errbuf == NULL) in sock_fmterror() 156 pcap_fmt_errmsg_for_win32_err(errbuf, errbuflen, errcode, in sock_fmterror() 159 pcap_fmt_errmsg_for_errno(errbuf, errbuflen, errcode, in sock_fmterror() 184 void sock_geterror(const char *caller, char *errbuf, int errbuflen) in sock_geterror() argument 187 sock_fmterror(caller, GetLastError(), errbuf, errbuflen); in sock_geterror() 189 sock_fmterror(caller, errno, errbuf, errbuflen); in sock_geterror() 213 int sock_init(char *errbuf, int errbuflen) in sock_init() argument 222 if (errbuf) in sock_init() 223 snprintf(errbuf, errbuflen, "Failed to initialize Winsock\n"); in sock_init() [all …]
|
D | pcap-new.c | 74 …ap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) in pcap_findalldevs_ex() argument 91 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly."); in pcap_findalldevs_ex() 104 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex() 110 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex() 117 if (pcap_findalldevs(alldevs, errbuf) == -1) in pcap_findalldevs_ex() 122 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_ex() 136 if (pcap_createsrcstr(tmpstring, PCAP_SRC_IFLOCAL, NULL, NULL, dev->name, errbuf) == -1) in pcap_findalldevs_ex() 146 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex() 164 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex() 190 if (pcap_parsesrcstr(source, &type, NULL, NULL, name, errbuf) == -1) in pcap_findalldevs_ex() [all …]
|
D | pcap-rpcap.c | 170 static int rpcap_recv_msg_header(SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf); 171 …p_check_msg_ver(SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf); 172 …OCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf); 173 …ader(SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf); 174 static int rpcap_recv(SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf); 176 static int rpcap_discard(SOCKET sock, SSL *, uint32 len, char *errbuf); 293 …p_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr_storage **sockaddrout, char *errbuf) in rpcap_deseraddr() argument 308 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr() 338 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr() 435 sock_geterror("select()", p->errbuf, PCAP_ERRBUF_SIZE); in pcap_read_nocb_remote() [all …]
|
D | savefile.c | 109 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setnonblock() 117 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats() 126 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats_ex() 134 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setbuff() 142 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmode() 150 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmintocopy() 158 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in sf_getevent() 167 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_get_request() 176 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_set_request() 184 pcap_strlcpy(p->errbuf, "Sending packets isn't supported on savefiles", in sf_sendqueue_transmit() [all …]
|
D | sockutils.h | 128 int sock_init(char *errbuf, int errbuflen); 130 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen); 131 void sock_geterror(const char *caller, char *errbuf, int errbufsize); 134 char *errbuf, int errbuflen); 136 char *errbuf, int errbuflen); 138 char *errbuf, int errbuflen); 139 SOCKET sock_open(struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen); 140 int sock_close(SOCKET sock, char *errbuf, int errbuflen); 143 char *errbuf, int errbuflen); 144 …er, int size, char *tempbuf, int *offset, int totsize, int checkonly, char *errbuf, int errbuflen); [all …]
|
D | sf-pcapng.c | 257 char *errbuf) in read_bytes() argument 264 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 269 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_bytes() 279 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) in read_block() argument 290 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf); in read_block() 305 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 319 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block() 336 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length, in read_block() 342 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in read_block() 355 if (read_bytes(fp, bdata, data_remaining, 1, errbuf) == -1) in read_block() [all …]
|
D | pcap-bpf.c | 110 static int bpf_load(char *errbuf); 371 pcap_fmt_errmsg_for_errno(p->errbuf, in pcap_next_zbuf() 399 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 418 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf() 477 bpf_open(char *errbuf) in bpf_open() argument 491 if (bpf_load(errbuf) == PCAP_ERROR) in bpf_open() 510 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 559 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 568 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() 580 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open() [all …]
|
D | sslutils.c | 62 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen) in ssl_init_once() argument 78 …snprintf(errbuf, errbuflen, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), … in ssl_init_once() 89 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once() 96 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once() 106 snprintf(errbuf, errbuflen, "Cannot read CA list from %s", ssl_rootfile); in ssl_init_once() 119 snprintf(errbuf, errbuflen, "Cannot init random"); in ssl_init_once() 136 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen) in ssl_promotion() argument 138 if (ssl_init_once(is_server, 1, errbuf, errbuflen) < 0) { in ssl_promotion() 147 snprintf(errbuf, errbuflen, "SSL_accept(): %s", in ssl_promotion() 153 snprintf(errbuf, errbuflen, "SSL_connect(): %s", in ssl_promotion() [all …]
|
D | sf-pcap.c | 153 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, in pcap_check_header() argument 194 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 197 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 218 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 232 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 243 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf); in pcap_check_header() 303 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header() 406 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in pcap_check_header() 427 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in grow_buffer() 459 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_packet() [all …]
|
D | pcap.c | 169 internal_wsockinit(char *errbuf) in internal_wsockinit() argument 188 if (errbuf != NULL) { in internal_wsockinit() 189 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in internal_wsockinit() 244 pcap_init(unsigned int opts, char *errbuf) in pcap_init() argument 260 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 271 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init() 280 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified"); in pcap_init() 304 if (internal_wsockinit(errbuf) == -1) { in pcap_init() 336 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() 341 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message() [all …]
|
D | pcap-npf.c | 160 char *errbuf) in oid_get_request() argument 173 snprintf(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request() 184 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request() 223 pcap_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_npf() 280 pcap_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_ex_npf() 306 …snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: not enough memory to allocate the kernel buff… in pcap_setbuff_npf() 320 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: working mode not recognized"); in pcap_setmode_npf() 335 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: unable to set the requested mintocopy size"); in pcap_setmintocopy_npf() 354 return (oid_get_request(pw->adapter, oid, data, lenp, p->errbuf)); in pcap_oid_get_request_npf() 373 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_oid_set_request_npf() [all …]
|
D | pcap-pf.c | 127 pcap_fmt_errmsg_for_errno(pc->errbuf, in pcap_read_pf() 128 sizeof(pc->errbuf), errno, "pf read"); in pcap_read_pf() 160 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf() 170 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf() 230 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_pf() 329 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 335 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 360 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 372 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() 379 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf() [all …]
|
D | pcap-dlpi.c | 235 pcap_fmt_errmsg_for_errno(p->errbuf, in pcap_read_dlpi() 236 sizeof(p->errbuf), errno, "getmsg"); in pcap_read_dlpi() 259 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi() 265 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi() 271 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi() 304 pcap_strlcpy(p->errbuf, "send: Not supported on this version of this OS", in pcap_inject_dlpi() 342 open_dlpi_device(const char *name, u_int *ppa, char *errbuf) in open_dlpi_device() argument 368 cp = split_dname(dname, &unit, errbuf); in open_dlpi_device() 390 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in open_dlpi_device() 399 status = get_dlpi_ppa(fd, dname, unit, ppa, errbuf); in open_dlpi_device() [all …]
|
D | pcap-snf.c | 57 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_pcap_stats() 168 pcap_fmt_errmsg_for_errno(p->errbuf, in snf_read() 204 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_inject() 215 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_inject() 220 pcap_strlcpy(p->errbuf, "Sending packets isn't supported with this snf version", in snf_inject() 236 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "device is NULL"); in snf_activate() 263 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate() 273 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate() 296 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate() 325 snf_findalldevs(pcap_if_list_t *devlistp, char *errbuf) in snf_findalldevs() argument [all …]
|
D | fmtutils.c | 269 pcap_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, in pcap_fmt_errmsg_for_errno() argument 278 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_errno() 280 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_errno() 290 p = errbuf + msglen; in pcap_fmt_errmsg_for_errno() 328 utf_8_to_acp_truncated(errbuf); in pcap_fmt_errmsg_for_errno() 377 pcap_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, in pcap_fmt_errmsg_for_win32_err() argument 389 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_win32_err() 391 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_win32_err() 401 p = errbuf + msglen; in pcap_fmt_errmsg_for_win32_err() 445 utf_8_len = p - errbuf; in pcap_fmt_errmsg_for_win32_err() [all …]
|
D | pcap-airpcap.c | 328 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_set_datalink() 383 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats() 429 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats_ex() 455 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setbuff() 468 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmode() 482 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmintocopy() 502 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_get_request() 511 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_set_request() 519 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_sendqueue_transmit() 531 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setuserbuffer() [all …]
|
D | pcap-snoop.c | 98 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_read_snoop() 153 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_snoop() 170 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_stats_snoop() 215 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 231 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 237 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 313 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 346 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 380 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() 386 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop() [all …]
|
D | pcap-snit.c | 132 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_read_snit() 225 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_snit() 249 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags() 262 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags() 274 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags() 338 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit() 345 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit() 351 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit() 362 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit() 380 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit() [all …]
|
D | fad-glifc.c | 77 pcap_findalldevs_interfaces(pcap_if_list_t *devlistp, char *errbuf, in pcap_findalldevs_interfaces() argument 99 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 109 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 122 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 135 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 151 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 200 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces() 222 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces() 250 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces() 285 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces() [all …]
|
D | pcap-linux.c | 439 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in get_mac80211_phydev() 454 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, in get_mac80211_phydev() 477 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init() 483 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init() 490 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init() 498 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init() 533 ifindex = iface_get_id(sock_fd, device, handle->errbuf); in add_mon_if() 539 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if() 569 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if() 593 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if() [all …]
|
/external/libpcap/rpcapd/ |
D | rpcapd.c | 186 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in main() local 199 memset(errbuf, 0, sizeof(errbuf)); in main() 335 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1) in main() 337 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 342 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in main() 344 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 363 sock_geterror("Can't create state change event", errbuf, in main() 365 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() 374 sock_geterror("Can't set control handler", errbuf, in main() 376 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main() [all …]
|
D | daemon.c | 130 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf); 145 …on_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf); 221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop() local 249 *errbuf = 0; // Initialize errbuf in daemon_serviceloop() 264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop() 268 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); in daemon_serviceloop() 329 "TLS is required by this server", errbuf) == -1) in daemon_serviceloop() 332 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop() 339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop() 343 errbuf); in daemon_serviceloop() [all …]
|
/external/libpcap/testprogs/ |
D | findalldevstest.c | 40 static char errbuf[ERRBUF_SIZE+1]; in win32_strerror() local 43 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf, in win32_strerror() 50 errlen = strlen(errbuf); in win32_strerror() 52 errbuf[errlen - 1] = '\0'; in win32_strerror() 53 errbuf[errlen - 2] = '\0'; in win32_strerror() 56 return errbuf; in win32_strerror() 108 char errbuf[PCAP_ERRBUF_SIZE+1]; in main() local 119 if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1) in main() 134 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1) in main() 136 fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf); in main() [all …]
|
/external/tcpdump/ |
D | netdissect.c | 47 nd_init(char *errbuf, size_t errbuf_size) in nd_init() argument 60 strlcpy(errbuf, "Attempting to initialize Winsock failed", in nd_init() 78 strlcpy(errbuf, "", errbuf_size); in nd_init() 121 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) in nd_load_smi_module() argument 125 snprintf(errbuf, errbuf_size, "could not load MIB module %s", in nd_load_smi_module() 132 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support", in nd_load_smi_module()
|
/external/python/cpython2/Python/ |
D | dynload_aix.c | 111 char *message[1024], errbuf[1024]; in aix_loaderror() local 133 #define ERRBUF_APPEND(s) strncat(errbuf, s, sizeof(errbuf)-strlen(errbuf)-1) in aix_loaderror() 135 PyOS_snprintf(errbuf, sizeof(errbuf), "from module %.200s ", pathname); in aix_loaderror() 151 errbuf[strlen(errbuf)-1] = '\0'; /* trim off last newline */ in aix_loaderror() 152 PyErr_SetString(PyExc_ImportError, errbuf); in aix_loaderror()
|