Home
last modified time | relevance | path

Searched refs:slprintf (Results 1 – 20 of 20) sorted by relevance

/external/ppp/pppd/
Dmultilink.c164 p += slprintf(p, l-1, "BUNDLE=\"%q\"", peer_authname); in mp_join_bundle()
168 p += slprintf(p, bundle_id+l-p, "%s", in mp_join_bundle()
171 p += slprintf(p, bundle_id+l-p, "/%v", bundle_name); in mp_join_bundle()
178 slprintf(blinks_id, l + 7, "BUNDLE_LINKS=%s", bundle_id + 7); in mp_join_bundle()
294 slprintf(entry, sizeof(entry), "%s;", db_key); in make_bundle_links()
309 slprintf(p, l, "%s%s", rec.dptr, entry); in make_bundle_links()
334 slprintf(entry, sizeof(entry), "%s;", db_key); in remove_bundle_link()
420 slprintf(ifkey, sizeof(ifkey), "IFNAME=ppp%d", unit);
488 slprintf(str, sizeof(str), "IP:%I", htonl(addr));
500 q += slprintf(q, sizeof(str)-1, "%s",
[all …]
Dchap-md5.c79 slprintf(message, message_space, "Access granted"); in chap_md5_verify_response()
83 slprintf(message, message_space, "Access denied"); in chap_md5_verify_response()
Dmain.c341 slprintf(numbuf, sizeof(numbuf), "%d", uid);
462 slprintf(db_key, sizeof(db_key), "pppd%d", getpid());
492 slprintf(numbuf, sizeof(numbuf), "%d", getpid());
759 slprintf(ifname, sizeof(ifname), "%s%d", PPP_DRV_NAME, ifunit);
803 slprintf(numbuf, sizeof(numbuf), "%d", getpid()); in detach()
834 slprintf(pidfilename, sizeof(pidfilename), "%s%s.pid",
856 slprintf(linkpidfile, sizeof(linkpidfile), "%sppp-%s.pid",
1208 slprintf(numbuf, sizeof(numbuf), "%u", link_connect_time);
1210 slprintf(numbuf, sizeof(numbuf), "%u", link_stats.bytes_out);
1212 slprintf(numbuf, sizeof(numbuf), "%u", link_stats.bytes_in);
[all …]
Dccp.c293 slprintf(bsd_value, sizeof(bsd_value),
341 slprintf(deflate_value, sizeof(deflate_value),
1370 slprintf(p, q - p, "MPPE ");
1373 slprintf(p, q - p, "128-bit ");
1377 slprintf(p, q - p, "40-bit ");
1381 slprintf(p, q - p, "stateful");
1383 slprintf(p, q - p, "stateless");
1391 slprintf(result, sizeof(result), "Deflate%s (%d/%d)",
1395 slprintf(result, sizeof(result), "Deflate%s (%d)",
1401 slprintf(result, sizeof(result), "BSD-Compress (%d/%d)",
[all …]
Dutils.c132 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() function
291 slprintf(num, sizeof(num), "%d.%d.%d.%d", (ip >> 24) & 0xff,
943 slprintf(lock_file, sizeof(lock_file), "%s/LK.%03d.%03d.%03d",
962 slprintf(lock_file, sizeof(lock_file), "%s/LCK..%s", LOCK_DIR, dev);
1017 slprintf(lock_buffer, sizeof(lock_buffer), "%10d\n", pid);
1059 slprintf(lock_buffer, sizeof(lock_buffer), "%10d\n", pid);
Dchap_ms.c231 slprintf(message, message_space, "Access granted"); in chapms_verify_response()
237 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0", in chapms_verify_response()
287 slprintf(message, message_space, "S=%s", saresponse); in chapms2_verify_response()
289 slprintf(message, message_space, "S=%s M=%s", in chapms2_verify_response()
316 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in chapms2_verify_response()
Dipxcp.c255 slprintf(b, sizeof(b), "%x", ipxaddr);
1412 slprintf(strpid, sizeof(strpid), "%d", getpid());
1413 slprintf(strspeed, sizeof(strspeed),"%d", baud_rate);
1443 slprintf (strlocal, sizeof(strlocal), "%0.6B", go->our_node);
1445 slprintf (strremote, sizeof(strremote), "%0.6B", ho->his_node);
Dipcp.c302 slprintf(b, sizeof(b), "%I", ipaddr);
327 slprintf(vj_value, sizeof(vj_value), "%d", value);
515 slprintf(netmask_str, sizeof(netmask_str), "%I", mask);
1977 slprintf(strspeed, sizeof(strspeed), "%d", baud_rate);
1978 slprintf(strlocal, sizeof(strlocal), "%I", ipcp_gotoptions[0].ouraddr);
1979 slprintf(strremote, sizeof(strremote), "%I", ipcp_hisoptions[0].hisaddr);
Dchap-new.c345 slprintf(rname, sizeof(rname), "%.*v", len, name); in chap_handle_response()
441 slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); in chap_respond()
Doptions.c475 slprintf(path, pl, "%s/%s", user, file); in options_from_user()
506 slprintf(path, pl, "%s%s", _PATH_TTYOPT, dev); in options_for_tty()
1438 slprintf(fname, l, "%s%s", _PATH_PEERFILES, arg);
Dauth.c1356 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd);
1357 slprintf(user, sizeof(user), "%.*v", userlen, auser);
2541 slprintf(struid, sizeof(struid), "%d", getuid());
2544 slprintf(strspeed, sizeof(strspeed), "%d", baud_rate);
Dsys-solaris.c758 slprintf(ifr.ifr_name, sizeof(ifr.ifr_name), PPP_DRV_NAME "%d", ifunit); in sys_init()
2236 slprintf(ifdev, sizeof(ifdev), "/dev/%s", name);
2537 slprintf(lock_file, sizeof(lock_file), "%s%03d.%03d.%03d",
2573 slprintf(ascii_pid, sizeof(ascii_pid), "%10d\n", getpid());
Dtty.c277 slprintf(speed_str, sizeof(speed_str), "%d", spd);
734 slprintf(numbuf, sizeof(numbuf), "%d", baud_rate); in connect_tty()
Dupap.c448 slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
Dsys-linux.c2130 slprintf(route_buffer, sizeof(route_buffer), in ppp_available()
2564 slprintf(pty_name, sizeof(pty_name), "/dev.pts/%d", ptn);
2580 slprintf(pty_name, sizeof(pty_name), "/dev/pty%c%x",
Dpppd.h507 int slprintf __P((char *, int, char *, ...)); /* sprintf++ */
Deap.c1212 (void) slprintf(path, pl, "%s/%s", user, file); in name_of_pn_file()
/external/ppp/pppd/plugins/
Dwinbind.c596 slprintf(message, message_space, "Access granted"); in winbind_chap_verify()
604 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0", in winbind_chap_verify()
645 slprintf(message, message_space, "S=%s", saresponse); in winbind_chap_verify()
647 slprintf(message, message_space, "S=%s M=%s", in winbind_chap_verify()
655 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in winbind_chap_verify()
659 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in winbind_chap_verify()
/external/ppp/pppd/plugins/radius/
Dradattr.c75 slprintf(fname, sizeof(fname), "/var/run/radattr.%s", ifname); in print_attributes()
108 slprintf(fname, sizeof(fname), "/var/run/radattr.%s", ifname); in cleanup()
Dradius.c571 slprintf(msg, BUF_LEN, "RADIUS: wrong service type %ld for %s", in radius_setparams()
581 slprintf(msg, BUF_LEN, "RADIUS: wrong framed protocol %ld for %s", in radius_setparams()
621 slprintf(msg, BUF_LEN, "RADIUS: bad remote IP address %I for %s", in radius_setparams()
644 slprintf(msg,BUF_LEN,"RADIUS: bad MS-CHAP2-Success packet"); in radius_setparams()
655 slprintf(msg, BUF_LEN, in radius_setparams()
665 slprintf(msg, BUF_LEN, in radius_setparams()
1223 slprintf(msg, BUF_LEN, "RADIUS: Can't read config file %s", in radius_init()
1229 slprintf(msg, BUF_LEN, "RADIUS: Can't read dictionary file %s", in radius_init()
1235 slprintf(msg, BUF_LEN, "RADIUS: Can't read map file %s", in radius_init()