Home
last modified time | relevance | path

Searched refs:errbuf (Results 1 – 25 of 121) sorted by relevance

12345

/external/libpcap/
Dsockutils.c150 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen) in sock_fmterror() argument
152 if (errbuf == NULL) in sock_fmterror()
156 pcap_fmt_errmsg_for_win32_err(errbuf, errbuflen, errcode, in sock_fmterror()
159 pcap_fmt_errmsg_for_errno(errbuf, errbuflen, errcode, in sock_fmterror()
184 void sock_geterror(const char *caller, char *errbuf, int errbuflen) in sock_geterror() argument
187 sock_fmterror(caller, GetLastError(), errbuf, errbuflen); in sock_geterror()
189 sock_fmterror(caller, errno, errbuf, errbuflen); in sock_geterror()
213 int sock_init(char *errbuf, int errbuflen) in sock_init() argument
222 if (errbuf) in sock_init()
223 snprintf(errbuf, errbuflen, "Failed to initialize Winsock\n"); in sock_init()
[all …]
Dpcap-new.c74 …ap_findalldevs_ex(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf) in pcap_findalldevs_ex() argument
91 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The source string is too long. Cannot handle it correctly."); in pcap_findalldevs_ex()
104 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex()
110 if (pcap_parsesrcstr(source, &type, NULL, NULL, NULL, errbuf) == -1) in pcap_findalldevs_ex()
117 if (pcap_findalldevs(alldevs, errbuf) == -1) in pcap_findalldevs_ex()
122 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_ex()
136 if (pcap_createsrcstr(tmpstring, PCAP_SRC_IFLOCAL, NULL, NULL, dev->name, errbuf) == -1) in pcap_findalldevs_ex()
146 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex()
164 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_ex()
190 if (pcap_parsesrcstr(source, &type, NULL, NULL, name, errbuf) == -1) in pcap_findalldevs_ex()
[all …]
Dpcap-rpcap.c170 static int rpcap_recv_msg_header(SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf);
171 …p_check_msg_ver(SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf);
172 …OCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf);
173 …ader(SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf);
174 static int rpcap_recv(SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf);
176 static int rpcap_discard(SOCKET sock, SSL *, uint32 len, char *errbuf);
293 …p_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr_storage **sockaddrout, char *errbuf) in rpcap_deseraddr() argument
308 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr()
338 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr()
435 sock_geterror("select()", p->errbuf, PCAP_ERRBUF_SIZE); in pcap_read_nocb_remote()
[all …]
Dsavefile.c109 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setnonblock()
117 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats()
126 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_stats_ex()
134 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setbuff()
142 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmode()
150 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_setmintocopy()
158 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in sf_getevent()
167 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_get_request()
176 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in sf_oid_set_request()
184 pcap_strlcpy(p->errbuf, "Sending packets isn't supported on savefiles", in sf_sendqueue_transmit()
[all …]
Dsockutils.h128 int sock_init(char *errbuf, int errbuflen);
130 void sock_fmterror(const char *caller, int errcode, char *errbuf, int errbuflen);
131 void sock_geterror(const char *caller, char *errbuf, int errbufsize);
134 char *errbuf, int errbuflen);
136 char *errbuf, int errbuflen);
138 char *errbuf, int errbuflen);
139 SOCKET sock_open(struct addrinfo *addrinfo, int server, int nconn, char *errbuf, int errbuflen);
140 int sock_close(SOCKET sock, char *errbuf, int errbuflen);
143 char *errbuf, int errbuflen);
144 …er, int size, char *tempbuf, int *offset, int totsize, int checkonly, char *errbuf, int errbuflen);
[all …]
Dsf-pcapng.c257 char *errbuf) in read_bytes() argument
264 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in read_bytes()
269 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_bytes()
279 read_block(FILE *fp, pcap_t *p, struct block_cursor *cursor, char *errbuf) in read_block() argument
290 status = read_bytes(fp, &bhdr, sizeof(bhdr), 0, errbuf); in read_block()
305 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block()
319 snprintf(errbuf, PCAP_ERRBUF_SIZE, in read_block()
336 snprintf(errbuf, PCAP_ERRBUF_SIZE, "pcapng block size %u > maximum %u", bhdr.total_length, in read_block()
342 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in read_block()
355 if (read_bytes(fp, bdata, data_remaining, 1, errbuf) == -1) in read_block()
[all …]
Dpcap-bpf.c110 static int bpf_load(char *errbuf);
371 pcap_fmt_errmsg_for_errno(p->errbuf, in pcap_next_zbuf()
399 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf()
418 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_zbuf()
477 bpf_open(char *errbuf) in bpf_open() argument
491 if (bpf_load(errbuf) == PCAP_ERROR) in bpf_open()
510 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open()
559 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open()
568 snprintf(errbuf, PCAP_ERRBUF_SIZE, in bpf_open()
580 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in bpf_open()
[all …]
Dsslutils.c62 int ssl_init_once(int is_server, int enable_compression, char *errbuf, size_t errbuflen) in ssl_init_once() argument
78 …snprintf(errbuf, errbuflen, "Cannot get a new SSL context: %s", ERR_error_string(ERR_get_error(), … in ssl_init_once()
89 …snprintf(errbuf, errbuflen, "Cannot read certificate file %s: %s", certfile, ERR_error_string(ERR_… in ssl_init_once()
96 …snprintf(errbuf, errbuflen, "Cannot read private key file %s: %s", keyfile, ERR_error_string(ERR_g… in ssl_init_once()
106 snprintf(errbuf, errbuflen, "Cannot read CA list from %s", ssl_rootfile); in ssl_init_once()
119 snprintf(errbuf, errbuflen, "Cannot init random"); in ssl_init_once()
136 SSL *ssl_promotion(int is_server, SOCKET s, char *errbuf, size_t errbuflen) in ssl_promotion() argument
138 if (ssl_init_once(is_server, 1, errbuf, errbuflen) < 0) { in ssl_promotion()
147 snprintf(errbuf, errbuflen, "SSL_accept(): %s", in ssl_promotion()
153 snprintf(errbuf, errbuflen, "SSL_connect(): %s", in ssl_promotion()
[all …]
Dsf-pcap.c153 pcap_check_header(const uint8_t *magic, FILE *fp, u_int precision, char *errbuf, in pcap_check_header() argument
194 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header()
197 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header()
218 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header()
232 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header()
243 p = PCAP_OPEN_OFFLINE_COMMON(errbuf, struct pcap_sf); in pcap_check_header()
303 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_check_header()
406 snprintf(errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in pcap_check_header()
427 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "out of memory"); in grow_buffer()
459 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_next_packet()
[all …]
Dpcap.c169 internal_wsockinit(char *errbuf) in internal_wsockinit() argument
188 if (errbuf != NULL) { in internal_wsockinit()
189 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in internal_wsockinit()
244 pcap_init(unsigned int opts, char *errbuf) in pcap_init() argument
260 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init()
271 snprintf(errbuf, PCAP_ERRBUF_SIZE, in pcap_init()
280 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Unknown options specified"); in pcap_init()
304 if (internal_wsockinit(errbuf) == -1) { in pcap_init()
336 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message()
341 (void)snprintf(pcap->errbuf, sizeof(pcap->errbuf), in pcap_set_not_initialized_message()
[all …]
Dpcap-npf.c160 char *errbuf) in oid_get_request() argument
173 snprintf(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request()
184 pcap_fmt_errmsg_for_win32_err(errbuf, PCAP_ERRBUF_SIZE, in oid_get_request()
223 pcap_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_npf()
280 pcap_fmt_errmsg_for_win32_err(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_stats_ex_npf()
306 …snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: not enough memory to allocate the kernel buff… in pcap_setbuff_npf()
320 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: working mode not recognized"); in pcap_setmode_npf()
335 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: unable to set the requested mintocopy size"); in pcap_setmintocopy_npf()
354 return (oid_get_request(pw->adapter, oid, data, lenp, p->errbuf)); in pcap_oid_get_request_npf()
373 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_oid_set_request_npf()
[all …]
Dpcap-pf.c127 pcap_fmt_errmsg_for_errno(pc->errbuf, in pcap_read_pf()
128 sizeof(pc->errbuf), errno, "pf read"); in pcap_read_pf()
160 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf()
170 snprintf(pc->errbuf, sizeof(pc->errbuf), in pcap_read_pf()
230 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_pf()
329 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf()
335 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf()
360 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf()
372 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf()
379 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_pf()
[all …]
Dpcap-dlpi.c235 pcap_fmt_errmsg_for_errno(p->errbuf, in pcap_read_dlpi()
236 sizeof(p->errbuf), errno, "getmsg"); in pcap_read_dlpi()
259 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi()
265 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi()
271 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_dlpi()
304 pcap_strlcpy(p->errbuf, "send: Not supported on this version of this OS", in pcap_inject_dlpi()
342 open_dlpi_device(const char *name, u_int *ppa, char *errbuf) in open_dlpi_device() argument
368 cp = split_dname(dname, &unit, errbuf); in open_dlpi_device()
390 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in open_dlpi_device()
399 status = get_dlpi_ppa(fd, dname, unit, ppa, errbuf); in open_dlpi_device()
[all …]
Dpcap-snf.c57 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_pcap_stats()
168 pcap_fmt_errmsg_for_errno(p->errbuf, in snf_read()
204 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_inject()
215 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_inject()
220 pcap_strlcpy(p->errbuf, "Sending packets isn't supported with this snf version", in snf_inject()
236 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "device is NULL"); in snf_activate()
263 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate()
273 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate()
296 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in snf_activate()
325 snf_findalldevs(pcap_if_list_t *devlistp, char *errbuf) in snf_findalldevs() argument
[all …]
Dfmtutils.c269 pcap_fmt_errmsg_for_errno(char *errbuf, size_t errbuflen, int errnum, in pcap_fmt_errmsg_for_errno() argument
278 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_errno()
280 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_errno()
290 p = errbuf + msglen; in pcap_fmt_errmsg_for_errno()
328 utf_8_to_acp_truncated(errbuf); in pcap_fmt_errmsg_for_errno()
377 pcap_fmt_errmsg_for_win32_err(char *errbuf, size_t errbuflen, DWORD errnum, in pcap_fmt_errmsg_for_win32_err() argument
389 vsnprintf(errbuf, errbuflen, fmt, ap); in pcap_fmt_errmsg_for_win32_err()
391 msglen = strlen(errbuf); in pcap_fmt_errmsg_for_win32_err()
401 p = errbuf + msglen; in pcap_fmt_errmsg_for_win32_err()
445 utf_8_len = p - errbuf; in pcap_fmt_errmsg_for_win32_err()
[all …]
Dpcap-airpcap.c328 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_set_datalink()
383 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats()
429 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_stats_ex()
455 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setbuff()
468 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmode()
482 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setmintocopy()
502 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_get_request()
511 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_oid_set_request()
519 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_sendqueue_transmit()
531 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in airpcap_setuserbuffer()
[all …]
Dpcap-snoop.c98 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_read_snoop()
153 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_snoop()
170 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_stats_snoop()
215 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
231 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
237 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
313 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
346 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
380 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
386 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snoop()
[all …]
Dpcap-snit.c132 pcap_fmt_errmsg_for_errno(p->errbuf, sizeof(p->errbuf), in pcap_read_snit()
225 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_inject_snit()
249 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags()
262 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags()
274 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in nit_setflags()
338 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit()
345 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit()
351 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit()
362 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit()
380 pcap_fmt_errmsg_for_errno(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_activate_snit()
[all …]
Dfad-glifc.c77 pcap_findalldevs_interfaces(pcap_if_list_t *devlistp, char *errbuf, in pcap_findalldevs_interfaces() argument
99 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
109 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
122 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
135 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
151 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
200 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_interfaces()
222 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces()
250 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces()
285 pcap_fmt_errmsg_for_errno(errbuf, in pcap_findalldevs_interfaces()
[all …]
Dpcap-linux.c439 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in get_mac80211_phydev()
454 pcap_fmt_errmsg_for_errno(handle->errbuf, PCAP_ERRBUF_SIZE, in get_mac80211_phydev()
477 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init()
483 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init()
490 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init()
498 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in nl80211_init()
533 ifindex = iface_get_id(sock_fd, device, handle->errbuf); in add_mon_if()
539 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if()
569 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if()
593 snprintf(handle->errbuf, PCAP_ERRBUF_SIZE, in add_mon_if()
[all …]
/external/libpcap/rpcapd/
Drpcapd.c186 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in main() local
199 memset(errbuf, 0, sizeof(errbuf)); in main()
335 if (pcap_init(PCAP_CHAR_ENC_UTF_8, errbuf) == -1) in main()
337 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main()
342 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in main()
344 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main()
363 sock_geterror("Can't create state change event", errbuf, in main()
365 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main()
374 sock_geterror("Can't set control handler", errbuf, in main()
376 rpcapd_log(LOGPRIO_ERROR, "%s", errbuf); in main()
[all …]
Ddaemon.c130 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
145 …on_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf);
221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop() local
249 *errbuf = 0; // Initialize errbuf in daemon_serviceloop()
264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
268 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); in daemon_serviceloop()
329 "TLS is required by this server", errbuf) == -1) in daemon_serviceloop()
332 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
343 errbuf); in daemon_serviceloop()
[all …]
/external/libpcap/testprogs/
Dfindalldevstest.c40 static char errbuf[ERRBUF_SIZE+1]; in win32_strerror() local
43 FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, error, 0, errbuf, in win32_strerror()
50 errlen = strlen(errbuf); in win32_strerror()
52 errbuf[errlen - 1] = '\0'; in win32_strerror()
53 errbuf[errlen - 2] = '\0'; in win32_strerror()
56 return errbuf; in win32_strerror()
108 char errbuf[PCAP_ERRBUF_SIZE+1]; in main() local
119 if (pcap_findalldevs_ex(argv[1], NULL, &alldevs, errbuf) == -1) in main()
134 if (pcap_findalldevs_ex(argv[1], &auth, &alldevs, errbuf) == -1) in main()
136 fprintf(stderr,"Error in pcap_findalldevs: %s\n",errbuf); in main()
[all …]
/external/tcpdump/
Dnetdissect.c47 nd_init(char *errbuf, size_t errbuf_size) in nd_init() argument
60 strlcpy(errbuf, "Attempting to initialize Winsock failed", in nd_init()
78 strlcpy(errbuf, "", errbuf_size); in nd_init()
121 nd_load_smi_module(const char *module, char *errbuf, size_t errbuf_size) in nd_load_smi_module() argument
125 snprintf(errbuf, errbuf_size, "could not load MIB module %s", in nd_load_smi_module()
132 snprintf(errbuf, errbuf_size, "MIB module %s not loaded: no libsmi support", in nd_load_smi_module()
/external/python/cpython2/Python/
Ddynload_aix.c111 char *message[1024], errbuf[1024]; in aix_loaderror() local
133 #define ERRBUF_APPEND(s) strncat(errbuf, s, sizeof(errbuf)-strlen(errbuf)-1) in aix_loaderror()
135 PyOS_snprintf(errbuf, sizeof(errbuf), "from module %.200s ", pathname); in aix_loaderror()
151 errbuf[strlen(errbuf)-1] = '\0'; /* trim off last newline */ in aix_loaderror()
152 PyErr_SetString(PyExc_ImportError, errbuf); in aix_loaderror()

12345