Lines Matching refs:printf

72 #define panic(param)	{ printf(param); exit(-1); }
89 printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n",
92 printf(" len=%u reserved=%u seq=%u pid=%u\n",
100 printf("sadb_ext{ len=%u type=%u }\n",
104 printf("kdebug_sadb: invalid ext_len=0 was passed.\n");
108 printf("kdebug_sadb: ext_len exceeds end of buffer.\n");
159 printf("kdebug_sadb: invalid ext_type %u was passed.\n",
187 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
190 printf("sadb_comb{ auth=%u encrypt=%u "
195 printf(" auth_minbits=%u auth_maxbits=%u "
202 printf(" soft_alloc=%u hard_alloc=%u "
209 printf(" soft_alloc=%lu hard_alloc=%lu "
217 printf("}\n");
234 printf("sadb_ident_%s{",
238 printf(" type=%d id=%lu",
245 printf("\n str=\"");
250 printf("%c", *p & 0xff);
252 printf("\\%03o", *p & 0xff);
255 printf("\"");
260 printf(" }\n");
280 printf("sadb_sup{\n");
282 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
287 printf("}\n");
300 printf("kdebug_sadb_lifetime: NULL pointer was passed.\n");
302 printf("sadb_lifetime{ alloc=%u, bytes=%u\n",
305 printf(" addtime=%u, usetime=%u }\n",
322 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
325 printf(" auth=%u encrypt=%u flags=0x%08x }\n",
341 printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n",
361 printf("sadb_key{ bits=%u reserved=%u\n",
363 printf(" key=");
368 printf("kdebug_sadb_key: key length mismatch, bit:%d len:%ld.\n",
375 printf(" }\n");
389 printf("sadb_x_sa2{ mode=%u reqid=%u\n",
391 printf(" reserved1=%u reserved2=%u sequence=%u }\n",
408 printf("sadb_session_id{ id0=%llx, id1=%llx}\n",
427 printf("sadb_sastat{ dir=%u num=%u\n",
431 printf(" spi=%x,\n",
434 printf("}\n");
450 printf("sadb_x_policy{ type=%u dir=%u id=%x }\n",
462 printf(" { len=%u proto=%u mode=%u level=%u reqid=%u\n",
477 printf(" }\n");
481 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
486 printf("invalid ipsec policy length\n");
513 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
521 printf(" type=discard }\n");
524 printf(" type=none }\n");
531 printf(" level=%u\n", isr->level);
535 printf(" }\n");
539 printf(" type=bypass }\n");
542 printf(" type=entrust }\n");
545 printf("kdebug_secpolicy: Invalid policy found. %d\n",
561 printf("secpolicyindex{ dir=%u prefs=%u prefd=%u ul_proto=%u\n",
566 printf("\n");
569 printf("}\n");
582 printf("secasindex{ mode=%u proto=%u\n",
587 printf("\n");
590 printf("\n");
603 printf("secas{");
606 printf(" refcnt=%u state=%u auth=%u enc=%u\n",
608 printf(" spi=%u flags=%u\n",
616 printf(" iv=");
618 printf("\n");
647 printf(" secreplay{ count=%u wsize=%u seq=%u lastseq=%u",
651 printf(" }\n");
655 printf("\n bitmap { ");
659 printf("%u", (((rpl->bitmap)[len] >> l) & 1) ? 1 : 0);
661 printf(" }\n");
674 printf("mbuf(%p){ m_next:%p m_nextpkt:%p m_data:%p "
680 printf(" m_pkthdr{ len:%d rcvif:%p }\n",
685 printf(" m_ext{ ext_buf:%p ext_free:%p "
703 printf(" m_data:\n");
706 printf("\n");
708 printf(" ");
709 printf("%02x", mtod(m, u_char *)[i]);
712 printf("\n");
733 printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family);
738 printf(" port=%u\n", ntohs(sin4->sin_port));
744 printf(" port=%u\n", ntohs(sin6->sin6_port));
745 printf(" flowinfo=0x%08x, scope_id=0x%08x\n",
753 printf(" }\n");
766 printf("%c", (unsigned char)buf[i]);
780 if (i != 0 && i % 32 == 0) printf("\n");
781 if (i % 4 == 0) printf(" ");
782 printf("%02x", (unsigned char)buf[i]);
785 if (i % 32 != 0) printf("\n");