/external/libpcap/ |
pcap-septel.h | 14 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
pcap-dag.h | 13 pcap_t *dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf);
|
pcap-null.c | 44 char *ebuf) 46 (void)strlcpy(ebuf, nosup, PCAP_ERRBUF_SIZE);
|
pcap-dlpi.c | 461 char *ebuf) 485 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 506 cp = split_dname(dname, &ppa, ebuf); 524 snprintf(ebuf, PCAP_ERRBUF_SIZE, 548 ppa = get_dlpi_ppa(p->fd, dname, ppa, ebuf); 568 cp = split_dname(dname, &ppa, ebuf); 582 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dname, 605 snprintf(ebuf, PCAP_ERRBUF_SIZE, 608 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", 623 if (dlinforeq(p->fd, ebuf) < 0 | [all...] |
pcap-linux.c | 205 static int iface_get_id(int fd, const char *device, char *ebuf); 207 static int iface_get_mtu(int fd, const char *device, char *ebuf); 208 static int iface_get_arptype(int fd, const char *device, char *ebuf); 210 static int iface_bind(int fd, int ifindex, char *ebuf); 212 static int iface_bind_old(int fd, const char *device, char *ebuf); 238 char *ebuf) 248 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); 254 return septel_open_live(device, snaplen, promisc, to_ms, ebuf); 262 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 283 snprintf(ebuf, PCAP_ERRBUF_SIZE [all...] |
pcap-snit.c | 231 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) 245 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSTIME: %s", 257 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSFLAGS: %s", 266 char *ebuf) 277 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 306 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s: %s", dev, 313 snprintf(ebuf, PCAP_ERRBUF_SIZE, "I_SRDOPT: %s", 318 snprintf(ebuf, PCAP_ERRBUF_SIZE, "push nbuf: %s", 328 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSCHUNK: %s", 340 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCBIND: %s: %s" [all...] |
pcap-nit.c | 213 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNIT: %s", 251 char *ebuf) 259 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 272 snprintf(ebuf, PCAP_ERRBUF_SIZE, 280 snprintf(ebuf, PCAP_ERRBUF_SIZE, 285 nit_setflags(p->fd, promisc, to_ms, ebuf); 295 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE); 304 strlcpy(ebuf, pcap_strerror(errno), PCAP_ERRBUF_SIZE);
|
pcap-bpf.c | 594 char *ebuf) 613 return dag_open_live(device, snaplen, promisc, to_ms, ebuf); 623 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 628 fd = bpf_open(p, ebuf); 636 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCVERSION: %s", 642 snprintf(ebuf, PCAP_ERRBUF_SIZE, 671 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCSETIF: %s: %s", 678 snprintf(ebuf, PCAP_ERRBUF_SIZE, 685 snprintf(ebuf, PCAP_ERRBUF_SIZE, "BIOCGDLT: %s", 716 snprintf(ebuf, PCAP_ERRBUF_SIZE, "unknown interface type %u" [all...] |
pcap-snoop.c | 199 char *ebuf) 212 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", 219 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop socket: %s", 228 snprintf(ebuf, PCAP_ERRBUF_SIZE, "snoop bind: %s", 234 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCADDSNOOP: %s", 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, 320 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCGIFMTU: %s", 354 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPLEN: %s", 361 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPING: %s", 369 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s" [all...] |
pcap-pf.c | 297 char *ebuf) 307 snprintf(ebuf, PCAP_ERRBUF_SIZE, 335 snprintf(ebuf, PCAP_ERRBUF_SIZE, "pf open: %s: %s\n\ 345 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCMBIS: %s", 356 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETW: %s", 362 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCDEVP: %s", 444 snprintf(ebuf, PCAP_ERRBUF_SIZE, "unknown data-link type %u", 459 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCTRUNCATE: %s", 469 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSETF: %s", 479 snprintf(ebuf, PCAP_ERRBUF_SIZE, "EIOCSRTIMEOUT: %s" [all...] |
pcap-win32.c | 394 char *ebuf) 405 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); 417 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Error opening adapter: %s", pcap_win32strerror()); 424 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Cannot determine the network type: %s", pcap_win32strerror()); 513 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to promiscuous mode"); 521 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to set hardware filter to non-promiscuous mode"); 535 snprintf(ebuf, PCAP_ERRBUF_SIZE, "failed to allocate the PACKET structure"); 548 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc: %s", pcap_strerror(errno)); 559 snprintf(ebuf, PCAP_ERRBUF_SIZE,"driver error: not enough memory to allocate the kernel buffer\n"); 566 snprintf(ebuf, PCAP_ERRBUF_SIZE,"Error calling PacketSetMinToCopy: %s\n", pcap_win32strerror()) [all...] |
pcap-dag.c | 497 dag_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) 512 snprintf(ebuf, PCAP_ERRBUF_SIZE, "device is NULL: %s", pcap_strerror(errno)); 519 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno)); 530 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errno)); 536 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: %s\n", pcap_strerror(errno)); 542 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_parse_name: tx (even numbered) streams not supported for capture\n"); 549 snprintf(ebuf, PCAP_ERRBUF_SIZE, "Can't allocate string for device name: %s\n", pcap_strerror(errno)); 560 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_open %s: %s", device, pcap_strerror(errno)); 567 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_attach_stream: %s\n", pcap_strerror(errno)); 576 snprintf(ebuf, PCAP_ERRBUF_SIZE, "dag_get_stream_poll: %s\n", pcap_strerror(errno)) [all...] |
pcap-dos.c | 112 static int first_init (const char *name, char *ebuf, int promisc); 447 char *pcap_lookupdev (char *ebuf) 467 if (ebuf) 468 strcpy (ebuf, "No driver found"); 599 open_driver (const char *dev_name, char *ebuf, int promisc) 616 sprintf (ebuf, "failed to detect device `%s'", dev_name); 638 sprintf (ebuf, "failed to activate device `%s'", dev_name); 641 strcat (ebuf, ": "); 642 strcat (ebuf, pktInfo.error); 660 sprintf (ebuf, "device `%s' not supported", dev_name) [all...] |
pcap-septel.c | 209 pcap_t *septel_open_live(const char *device, int snaplen, int promisc, int to_ms, char *ebuf) { 214 snprintf(ebuf, PCAP_ERRBUF_SIZE, "malloc %s: %s", device, pcap_strerror(errno));
|
pcap.c | 692 static char ebuf[20]; 696 (void)snprintf(ebuf, sizeof ebuf, "Unknown error: %d", errnum); 697 return(ebuf);
|
/external/tcpdump/ |
machdep.c | 56 abort_on_misalignment(char *ebuf _U_, size_t ebufsiz _U_) 62 (void)snprintf(ebuf, ebufsiz, "setsysinfo: errno %d", errno);
|
tcpdump.c | 463 char ebuf[PCAP_ERRBUF_SIZE]; local 495 if (abort_on_misalignment(ebuf, sizeof(ebuf)) < 0) 496 error("%s", ebuf); 541 if (pcap_findalldevs(&devpointer, ebuf) < 0) 542 error("%s", ebuf); 597 if (pcap_findalldevs(&devpointer, ebuf) < 0) 598 error("%s", ebuf); 851 pd = pcap_open_offline(RFileName, ebuf); 853 error("%s", ebuf); [all...] |
/external/wpa_supplicant/ |
radius.c | 851 u8 *ebuf, size_t *elen) 865 os_memset(ebuf, 0, len); 866 ebuf[0] = key_len; 867 os_memcpy(ebuf + 1, key, key_len); 871 pos = ebuf;
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 856 u8 *ebuf, size_t *elen) 869 os_memset(ebuf, 0, len); 870 ebuf[0] = key_len; 871 os_memcpy(ebuf + 1, key, key_len); 875 pos = ebuf;
|
/external/ipsec-tools/src/racoon/ |
crypto_openssl.c | 1194 static char ebuf[512]; local 1205 n = snprintf(ebuf + len, sizeof(ebuf) - len, 1209 if (n < 0 || n >= sizeof(ebuf) - len) 1212 if (sizeof(ebuf) < len) 1216 return ebuf; [all...] |
/external/qemu/ |
qemu-char-android.c | 308 char ebuf[15] = "Escape-Char"; local 313 snprintf(ebuf, sizeof(ebuf), "C-%c", term_escape_char - 1 + 'a'); 323 chr->chr_write(chr, (uint8_t *)ebuf, strlen(ebuf)); [all...] |
qemu-char.c | 300 char ebuf[15] = "Escape-Char"; local 305 snprintf(ebuf, sizeof(ebuf), "C-%c", term_escape_char - 1 + 'a'); 315 chr->chr_write(chr, (uint8_t *)ebuf, strlen(ebuf)); [all...] |