• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.5.8/xnu-1228.15.4/bsd/netkey/

Lines Matching refs:printf

72 #define panic(param)	{ printf(param); exit(-1); }
89 printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n",
92 printf(" len=%u reserved=%u seq=%u pid=%u\n",
100 printf("sadb_ext{ len=%u type=%u }\n",
104 printf("kdebug_sadb: invalid ext_len=0 was passed.\n");
108 printf("kdebug_sadb: ext_len exceeds end of buffer.\n");
153 printf("kdebug_sadb: invalid ext_type %u was passed.\n",
181 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
184 printf("sadb_comb{ auth=%u encrypt=%u "
189 printf(" auth_minbits=%u auth_maxbits=%u "
196 printf(" soft_alloc=%u hard_alloc=%u "
203 printf(" soft_alloc=%lu hard_alloc=%lu "
211 printf("}\n");
228 printf("sadb_ident_%s{",
232 printf(" type=%d id=%lu",
239 printf("\n str=\"");
244 printf("%c", *p & 0xff);
246 printf("\\%03o", *p & 0xff);
249 printf("\"");
254 printf(" }\n");
274 printf("sadb_sup{\n");
276 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
281 printf("}\n");
294 printf("kdebug_sadb_lifetime: NULL pointer was passed.\n");
296 printf("sadb_lifetime{ alloc=%u, bytes=%u\n",
299 printf(" addtime=%u, usetime=%u }\n",
316 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
319 printf(" auth=%u encrypt=%u flags=0x%08x }\n",
335 printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n",
355 printf("sadb_key{ bits=%u reserved=%u\n",
357 printf(" key=");
362 printf("kdebug_sadb_key: key length mismatch, bit:%d len:%ld.\n",
369 printf(" }\n");
383 printf("sadb_x_sa2{ mode=%u reqid=%u\n",
385 printf(" reserved1=%u reserved2=%u sequence=%u }\n",
403 printf("sadb_x_policy{ type=%u dir=%u id=%x }\n",
415 printf(" { len=%u proto=%u mode=%u level=%u reqid=%u\n",
430 printf(" }\n");
434 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
439 printf("invalid ipsec policy length\n");
466 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
474 printf(" type=discard }\n");
477 printf(" type=none }\n");
484 printf(" level=%u\n", isr->level);
488 printf(" }\n");
492 printf(" type=bypass }\n");
495 printf(" type=entrust }\n");
498 printf("kdebug_secpolicy: Invalid policy found. %d\n",
514 printf("secpolicyindex{ dir=%u prefs=%u prefd=%u ul_proto=%u\n",
519 printf("\n");
522 printf("}\n");
535 printf("secasindex{ mode=%u proto=%u\n",
540 printf("\n");
543 printf("\n");
556 printf("secas{");
559 printf(" refcnt=%u state=%u auth=%u enc=%u\n",
561 printf(" spi=%u flags=%u\n",
569 printf(" iv=");
571 printf("\n");
600 printf(" secreplay{ count=%u wsize=%u seq=%u lastseq=%u",
604 printf(" }\n");
608 printf("\n bitmap { ");
612 printf("%u", (((rpl->bitmap)[len] >> l) & 1) ? 1 : 0);
614 printf(" }\n");
627 printf("mbuf(%p){ m_next:%p m_nextpkt:%p m_data:%p "
633 printf(" m_pkthdr{ len:%d rcvif:%p }\n",
638 printf(" m_ext{ ext_buf:%p ext_free:%p "
656 printf(" m_data:\n");
659 printf("\n");
661 printf(" ");
662 printf("%02x", mtod(m, u_char *)[i]);
665 printf("\n");
686 printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family);
691 printf(" port=%u\n", ntohs(sin4->sin_port));
697 printf(" port=%u\n", ntohs(sin6->sin6_port));
698 printf(" flowinfo=0x%08x, scope_id=0x%08x\n",
706 printf(" }\n");
719 printf("%c", (unsigned char)buf[i]);
733 if (i != 0 && i % 32 == 0) printf("\n");
734 if (i % 4 == 0) printf(" ");
735 printf("%02x", (unsigned char)buf[i]);
738 if (i % 32 != 0) printf("\n");