/external/ppp/pppd/ |
D | multilink.c | 164 p += slprintf(p, l-1, "BUNDLE=\"%q\"", peer_authname); in mp_join_bundle() 168 p += slprintf(p, bundle_id+l-p, "%s", in mp_join_bundle() 171 p += slprintf(p, bundle_id+l-p, "/%v", bundle_name); in mp_join_bundle() 178 slprintf(blinks_id, l + 7, "BUNDLE_LINKS=%s", bundle_id + 7); in mp_join_bundle() 294 slprintf(entry, sizeof(entry), "%s;", db_key); in make_bundle_links() 309 slprintf(p, l, "%s%s", rec.dptr, entry); in make_bundle_links() 334 slprintf(entry, sizeof(entry), "%s;", db_key); in remove_bundle_link() 420 slprintf(ifkey, sizeof(ifkey), "IFNAME=ppp%d", unit); 488 slprintf(str, sizeof(str), "IP:%I", htonl(addr)); 500 q += slprintf(q, sizeof(str)-1, "%s", [all …]
|
D | chap-md5.c | 79 slprintf(message, message_space, "Access granted"); in chap_md5_verify_response() 83 slprintf(message, message_space, "Access denied"); in chap_md5_verify_response()
|
D | main.c | 341 slprintf(numbuf, sizeof(numbuf), "%d", uid); 462 slprintf(db_key, sizeof(db_key), "pppd%d", getpid()); 492 slprintf(numbuf, sizeof(numbuf), "%d", getpid()); 759 slprintf(ifname, sizeof(ifname), "%s%d", PPP_DRV_NAME, ifunit); 803 slprintf(numbuf, sizeof(numbuf), "%d", getpid()); in detach() 834 slprintf(pidfilename, sizeof(pidfilename), "%s%s.pid", 856 slprintf(linkpidfile, sizeof(linkpidfile), "%sppp-%s.pid", 1208 slprintf(numbuf, sizeof(numbuf), "%u", link_connect_time); 1210 slprintf(numbuf, sizeof(numbuf), "%u", link_stats.bytes_out); 1212 slprintf(numbuf, sizeof(numbuf), "%u", link_stats.bytes_in); [all …]
|
D | ccp.c | 293 slprintf(bsd_value, sizeof(bsd_value), 341 slprintf(deflate_value, sizeof(deflate_value), 1370 slprintf(p, q - p, "MPPE "); 1373 slprintf(p, q - p, "128-bit "); 1377 slprintf(p, q - p, "40-bit "); 1381 slprintf(p, q - p, "stateful"); 1383 slprintf(p, q - p, "stateless"); 1391 slprintf(result, sizeof(result), "Deflate%s (%d/%d)", 1395 slprintf(result, sizeof(result), "Deflate%s (%d)", 1401 slprintf(result, sizeof(result), "BSD-Compress (%d/%d)", [all …]
|
D | utils.c | 132 slprintf __V((char *buf, int buflen, char *fmt, ...)) in slprintf() function 291 slprintf(num, sizeof(num), "%d.%d.%d.%d", (ip >> 24) & 0xff, 943 slprintf(lock_file, sizeof(lock_file), "%s/LK.%03d.%03d.%03d", 962 slprintf(lock_file, sizeof(lock_file), "%s/LCK..%s", LOCK_DIR, dev); 1017 slprintf(lock_buffer, sizeof(lock_buffer), "%10d\n", pid); 1059 slprintf(lock_buffer, sizeof(lock_buffer), "%10d\n", pid);
|
D | chap_ms.c | 231 slprintf(message, message_space, "Access granted"); in chapms_verify_response() 237 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0", in chapms_verify_response() 287 slprintf(message, message_space, "S=%s", saresponse); in chapms2_verify_response() 289 slprintf(message, message_space, "S=%s M=%s", in chapms2_verify_response() 316 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in chapms2_verify_response()
|
D | ipxcp.c | 255 slprintf(b, sizeof(b), "%x", ipxaddr); 1412 slprintf(strpid, sizeof(strpid), "%d", getpid()); 1413 slprintf(strspeed, sizeof(strspeed),"%d", baud_rate); 1443 slprintf (strlocal, sizeof(strlocal), "%0.6B", go->our_node); 1445 slprintf (strremote, sizeof(strremote), "%0.6B", ho->his_node);
|
D | ipcp.c | 302 slprintf(b, sizeof(b), "%I", ipaddr); 327 slprintf(vj_value, sizeof(vj_value), "%d", value); 515 slprintf(netmask_str, sizeof(netmask_str), "%I", mask); 1977 slprintf(strspeed, sizeof(strspeed), "%d", baud_rate); 1978 slprintf(strlocal, sizeof(strlocal), "%I", ipcp_gotoptions[0].ouraddr); 1979 slprintf(strremote, sizeof(strremote), "%I", ipcp_hisoptions[0].hisaddr);
|
D | chap-new.c | 345 slprintf(rname, sizeof(rname), "%.*v", len, name); in chap_handle_response() 441 slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); in chap_respond()
|
D | options.c | 475 slprintf(path, pl, "%s/%s", user, file); in options_from_user() 506 slprintf(path, pl, "%s%s", _PATH_TTYOPT, dev); in options_for_tty() 1438 slprintf(fname, l, "%s%s", _PATH_PEERFILES, arg);
|
D | auth.c | 1356 slprintf(passwd, sizeof(passwd), "%.*v", passwdlen, apasswd); 1357 slprintf(user, sizeof(user), "%.*v", userlen, auser); 2541 slprintf(struid, sizeof(struid), "%d", getuid()); 2544 slprintf(strspeed, sizeof(strspeed), "%d", baud_rate);
|
D | sys-solaris.c | 758 slprintf(ifr.ifr_name, sizeof(ifr.ifr_name), PPP_DRV_NAME "%d", ifunit); in sys_init() 2236 slprintf(ifdev, sizeof(ifdev), "/dev/%s", name); 2537 slprintf(lock_file, sizeof(lock_file), "%s%03d.%03d.%03d", 2573 slprintf(ascii_pid, sizeof(ascii_pid), "%10d\n", getpid());
|
D | tty.c | 277 slprintf(speed_str, sizeof(speed_str), "%d", spd); 734 slprintf(numbuf, sizeof(numbuf), "%d", baud_rate); in connect_tty()
|
D | upap.c | 448 slprintf(rhostname, sizeof(rhostname), "%.*v", ruserlen, ruser);
|
D | sys-linux.c | 2130 slprintf(route_buffer, sizeof(route_buffer), in ppp_available() 2564 slprintf(pty_name, sizeof(pty_name), "/dev.pts/%d", ptn); 2580 slprintf(pty_name, sizeof(pty_name), "/dev/pty%c%x",
|
D | pppd.h | 507 int slprintf __P((char *, int, char *, ...)); /* sprintf++ */
|
D | eap.c | 1212 (void) slprintf(path, pl, "%s/%s", user, file); in name_of_pn_file()
|
/external/ppp/pppd/plugins/ |
D | winbind.c | 596 slprintf(message, message_space, "Access granted"); in winbind_chap_verify() 604 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0", in winbind_chap_verify() 645 slprintf(message, message_space, "S=%s", saresponse); in winbind_chap_verify() 647 slprintf(message, message_space, "S=%s M=%s", in winbind_chap_verify() 655 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in winbind_chap_verify() 659 slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", in winbind_chap_verify()
|
/external/ppp/pppd/plugins/radius/ |
D | radattr.c | 75 slprintf(fname, sizeof(fname), "/var/run/radattr.%s", ifname); in print_attributes() 108 slprintf(fname, sizeof(fname), "/var/run/radattr.%s", ifname); in cleanup()
|
D | radius.c | 571 slprintf(msg, BUF_LEN, "RADIUS: wrong service type %ld for %s", in radius_setparams() 581 slprintf(msg, BUF_LEN, "RADIUS: wrong framed protocol %ld for %s", in radius_setparams() 621 slprintf(msg, BUF_LEN, "RADIUS: bad remote IP address %I for %s", in radius_setparams() 644 slprintf(msg,BUF_LEN,"RADIUS: bad MS-CHAP2-Success packet"); in radius_setparams() 655 slprintf(msg, BUF_LEN, in radius_setparams() 665 slprintf(msg, BUF_LEN, in radius_setparams() 1223 slprintf(msg, BUF_LEN, "RADIUS: Can't read config file %s", in radius_init() 1229 slprintf(msg, BUF_LEN, "RADIUS: Can't read dictionary file %s", in radius_init() 1235 slprintf(msg, BUF_LEN, "RADIUS: Can't read map file %s", in radius_init()
|