/external/libpcap/ |
H A D | pcap-septel.h | 14 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
H A D | pcap-dag.h | 13 pcap_t *dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
H A D | pcap-null.c | 44 char *ebuf) 46 (void)strlcpy(ebuf, nosup, PCAP_ERRBUF_SIZE); 43 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument
|
H A D | pcap-dlpi.c | 461 char *ebuf) 485 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 506 cp = split_dname(dname, &ppa, ebuf); 524 snprintf(ebuf, PCAP_ERRBUF_SIZE, 548 ppa = get_dlpi_ppa(p->fd, dname, ppa, ebuf); 568 cp = split_dname(dname, &ppa, ebuf); 582 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dname, 605 snprintf(ebuf, PCAP_ERRBUF_SIZE, 608 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", 623 if (dlinforeq(p->fd, ebuf) < 460 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument 975 split_dname(char *device, int *unitp, char *ebuf) argument 1016 dl_doattach(int fd, int ppa, char *ebuf) argument 1028 dl_dohpuxbind(int fd, char *ebuf) argument 1121 send_request(int fd, char *ptr, int len, char *what, char *ebuf) argument 1141 recv_ack(int fd, int size, const char *what, char *bufp, char *ebuf, int *uerror) argument 1416 dlattachreq(int fd, bpf_u_int32 ppa, char *ebuf) argument 1427 dlbindreq(int fd, bpf_u_int32 sap, char *ebuf) argument 1447 dlbindack(int fd, char *bufp, char *ebuf, int *uerror) argument 1454 dlpromisconreq(int fd, bpf_u_int32 level, char *ebuf) argument 1465 dlokack(int fd, const char *what, char *bufp, char *ebuf) argument 1473 dlinforeq(int fd, char *ebuf) argument 1483 dlinfoack(int fd, char *bufp, char *ebuf) argument 1612 get_dlpi_ppa(register int fd, register const char *device, register int unit, register char *ebuf) argument 1799 get_dlpi_ppa(register int fd, register const char *ifname, register int unit, register char *ebuf) argument 1851 dlpi_kread(register int fd, register off_t addr, register void *buf, register u_int len, register char *ebuf) argument [all...] |
H A D | pcap-linux.c | 205 static int iface_get_id(int fd, const char *device, char *ebuf); 207 static int iface_get_mtu(int fd, const char *device, char *ebuf); 208 static int iface_get_arptype(int fd, const char *device, char *ebuf); 210 static int iface_bind(int fd, int ifindex, char *ebuf); 212 static int iface_bind_old(int fd, const char *device, char *ebuf); 238 char *ebuf) 248 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); 254 return septel_open_live(device, snaplen, promisc, to_ms, ebuf); 262 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 283 snprintf(ebuf, PCAP_ERRBUF_SIZ 237 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument 1388 live_open_new(pcap_t *handle, const char *device, int promisc, int to_ms, char *ebuf) argument 1609 iface_get_id(int fd, const char *device, char *ebuf) argument 1629 iface_bind(int fd, int ifindex, char *ebuf) argument 1778 live_open_old(pcap_t *handle, const char *device, int promisc, int to_ms, char *ebuf) argument 1903 iface_bind_old(int fd, const char *device, char *ebuf) argument 1941 iface_get_mtu(int fd, const char *device, char *ebuf) argument 1964 iface_get_arptype(int fd, const char *device, char *ebuf) argument [all...] |
H A D | pcap-snit.c | 231 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) argument 245 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSTIME: %s", 257 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSFLAGS: %s", 266 char *ebuf) 277 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 306 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dev, 313 snprintf(ebuf, PCAP_ERRBUF_SIZE, "I_SRDOPT: %s", 318 snprintf(ebuf, PCAP_ERRBUF_SIZE, "push nbuf: %s", 328 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSCHUNK: %s", 340 snprintf(ebuf, PCAP_ERRBUF_SIZ 265 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument [all...] |
H A D | pcap-nit.c | 213 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) argument 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNIT: %s", 251 char *ebuf) 259 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 272 snprintf(ebuf, PCAP_ERRBUF_SIZE, 280 snprintf(ebuf, PCAP_ERRBUF_SIZE, 285 nit_setflags(p->fd, promisc, to_ms, ebuf); 295 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 304 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 250 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument
|
H A D | pcap-bpf.c | 594 char *ebuf) 613 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); 623 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 628 fd = bpf_open(p, ebuf); 636 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCVERSION: %s", 642 snprintf(ebuf, PCAP_ERRBUF_SIZE, 671 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCSETIF: %s: %s", 678 snprintf(ebuf, PCAP_ERRBUF_SIZE, 685 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCGDLT: %s", 716 snprintf(ebuf, PCAP_ERRBUF_SIZ 593 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument [all...] |
H A D | pcap-snoop.c | 199 char *ebuf) 212 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 219 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop socket: %s", 228 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop bind: %s", 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCADDSNOOP: %s", 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, 320 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCGIFMTU: %s", 354 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPLEN: %s", 361 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPING: %s", 369 snprintf(ebuf, PCAP_ERRBUF_SIZ 198 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument [all...] |
H A D | pcap-pf.c | 297 char *ebuf) 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, 335 snprintf(ebuf, PCAP_ERRBUF_SIZE, "pf open: %s: %s\n\ 345 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCMBIS: %s", 356 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETW: %s", 362 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCDEVP: %s", 444 snprintf(ebuf, PCAP_ERRBUF_SIZE, "unknown data-link type %u", 459 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCTRUNCATE: %s", 469 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETF: %s", 479 snprintf(ebuf, PCAP_ERRBUF_SIZ 296 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument [all...] |
H A D | pcap-win32.c | 394 char *ebuf) 405 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); 417 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Error opening adapter: %s", pcap_win32strerror()); 424 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Cannot determine the network type: %s", pcap_win32strerror()); 513 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to promiscuous mode"); 521 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to non-promiscuous mode"); 535 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to allocate the PACKET structure"); 548 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); 559 snprintf(ebuf, PCAP_ERRBUF_SIZE,"driver error: not enough memory to allocate the kernel buffer\n"); 566 snprintf(ebuf, PCAP_ERRBUF_SIZ 393 pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument [all...] |
H A D | pcap-dag.c | 497 dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) argument 512 snprintf(ebuf, PCAP_ERRBUF_SIZE, "device is NULL: %s", pcap_strerror(errno)); 519 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno)); 530 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errno)); 536 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: %s\n", pcap_strerror(errno)); 542 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: tx (even numbered) streams not supported for capture\n"); 549 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errno)); 560 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_open %s: %s", device, pcap_strerror(errno)); 567 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_attach_stream: %s\n", pcap_strerror(errno)); 576 snprintf(ebuf, PCAP_ERRBUF_SIZ [all...] |
H A D | pcap-dos.c | 112 static int first_init (const char *name, char *ebuf, int promisc); 447 char *pcap_lookupdev (char *ebuf) argument 467 if (ebuf) 468 strcpy (ebuf, "No driver found"); 599 open_driver (const char *dev_name, char *ebuf, int promisc) argument 616 sprintf (ebuf, "failed to detect device `%s'", dev_name); 638 sprintf (ebuf, "failed to activate device `%s'", dev_name); 641 strcat (ebuf, ": "); 642 strcat (ebuf, pktInfo.error); 660 sprintf (ebuf, "devic 745 first_init(const char *name, char *ebuf, int promisc) argument [all...] |
H A D | pcap-septel.c | 209 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) { argument 214 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno));
|
H A D | pcap.c | 692 static char ebuf[20]; 696 (void)snprintf(ebuf, sizeof ebuf, "Unknown error: %d", errnum); 697 return(ebuf);
|
/external/tcpdump/ |
H A D | machdep.c | 56 abort_on_misalignment(char *ebuf _U_, size_t ebufsiz _U_) 62 (void)snprintf(ebuf, ebufsiz, "setsysinfo: errno %d", errno);
|
H A D | tcpdump.c | 463 char ebuf[PCAP_ERRBUF_SIZE]; local 495 if (abort_on_misalignment(ebuf, sizeof(ebuf)) < 0) 496 error("%s", ebuf); 541 if (pcap_findalldevs(&devpointer, ebuf) < 0) 542 error("%s", ebuf); 597 if (pcap_findalldevs(&devpointer, ebuf) < 0) 598 error("%s", ebuf); 851 pd = pcap_open_offline(RFileName, ebuf); 853 error("%s", ebuf); [all...] |
/external/wpa_supplicant/ |
H A D | radius.c | 851 u8 *ebuf, size_t *elen) 865 os_memset(ebuf, 0, len); 866 ebuf[0] = key_len; 867 os_memcpy(ebuf + 1, key, key_len); 871 pos = ebuf; 848 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
H A D | radius.c | 856 u8 *ebuf, size_t *elen) 869 os_memset(ebuf, 0, len); 870 ebuf[0] = key_len; 871 os_memcpy(ebuf + 1, key, key_len); 875 pos = ebuf; 853 encrypt_ms_key(const u8 *key, size_t key_len, u16 salt, const u8 *req_authenticator, const u8 *secret, size_t secret_len, u8 *ebuf, size_t *elen) argument
|
/external/ipsec-tools/src/racoon/ |
H A D | crypto_openssl.c | 1194 static char ebuf[512]; local 1205 n = snprintf(ebuf + len, sizeof(ebuf) - len, 1209 if (n < 0 || n >= sizeof(ebuf) - len) 1212 if (sizeof(ebuf) < len) 1216 return ebuf;
|
/external/qemu/ |
H A D | qemu-char-android.c | 308 char ebuf[15] = "Escape-Char"; local 313 snprintf(ebuf, sizeof(ebuf), "C-%c", term_escape_char - 1 + 'a'); 323 chr->chr_write(chr, (uint8_t *)ebuf, strlen(ebuf));
|
H A D | qemu-char.c | 300 char ebuf[15] = "Escape-Char"; local 305 snprintf(ebuf, sizeof(ebuf), "C-%c", term_escape_char - 1 + 'a'); 315 chr->chr_write(chr, (uint8_t *)ebuf, strlen(ebuf));
|