/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libpcap-1.4.0/ |
H A D | pcap-bt-linux.h | 40 pcap_t *bt_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-can-linux.h | 35 pcap_t* can_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-canusb-linux.h | 35 pcap_t* canusb_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-netfilter-linux.h | 35 pcap_t *netfilter_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-septel.h | 14 pcap_t *septel_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-usb-linux.h | 40 pcap_t *usb_create(const char *device, char *ebuf, int *is_ours);
|
H A D | pcap-null.c | 43 pcap_create_interface(const char *device, char *ebuf) argument 45 (void)strlcpy(ebuf, nosup, PCAP_ERRBUF_SIZE);
|
H A D | pcap-dlpi.c | 781 * Returns NULL on error, and fills "ebuf" with an error message. 784 split_dname(char *device, int *unitp, char *ebuf) argument 795 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s missing unit number", 807 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s bad unit number", device); 811 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s unit number too large", 816 snprintf(ebuf, PCAP_ERRBUF_SIZE, "%s unit number is negative", 825 dl_doattach(int fd, int ppa, char *ebuf) argument 833 if (send_request(fd, (char *)&req, sizeof(req), "attach", ebuf) < 0) 836 err = dlokack(fd, "attach", (char *)buf, ebuf); 844 dl_dohpuxbind(int fd, char *ebuf) argument 958 send_request(int fd, char *ptr, int len, char *what, char *ebuf) argument 978 recv_ack(int fd, int size, const char *what, char *bufp, char *ebuf, int *uerror) argument 1260 dlbindreq(int fd, bpf_u_int32 sap, char *ebuf) argument 1280 dlbindack(int fd, char *bufp, char *ebuf, int *uerror) argument 1287 dlokack(int fd, const char *what, char *bufp, char *ebuf) argument 1295 dlinforeq(int fd, char *ebuf) argument 1305 dlinfoack(int fd, char *bufp, char *ebuf) argument 1317 dlpassive(int fd, char *ebuf) argument 1432 get_dlpi_ppa(register int fd, register const char *device, register int unit, register char *ebuf) argument 1619 get_dlpi_ppa(register int fd, register const char *ifname, register int unit, register char *ebuf) argument 1671 dlpi_kread(register int fd, register off_t addr, register void *buf, register u_int len, register char *ebuf) argument 1696 pcap_create_interface(const char *device, char *ebuf) argument [all...] |
H A D | pcap-dos.c | 113 static int first_init (const char *name, char *ebuf, int promisc); 146 pcap_t *pcap_create (const char *device, char *ebuf) argument 150 p = pcap_create_common(device, ebuf); 452 char *pcap_lookupdev (char *ebuf) argument 472 if (ebuf) 473 strcpy (ebuf, "No driver found"); 604 open_driver (const char *dev_name, char *ebuf, int promisc) argument 621 sprintf (ebuf, "failed to detect device `%s'", dev_name); 643 sprintf (ebuf, "failed to activate device `%s'", dev_name); 646 strcat (ebuf, " 750 first_init(const char *name, char *ebuf, int promisc) argument [all...] |
H A D | pcap-nit.c | 212 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) argument 233 snprintf(ebuf, PCAP_ERRBUF_SIZE, "SIOCSNIT: %s", 331 pcap_create_interface(const char *device, char *ebuf) argument 335 p = pcap_create_common(device, ebuf);
|
H A D | pcap-snit.c | 230 nit_setflags(int fd, int promisc, int to_ms, char *ebuf) argument 244 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSTIME: %s", 256 snprintf(ebuf, PCAP_ERRBUF_SIZE, "NIOCSFLAGS: %s", 410 pcap_create_interface(const char *device, char *ebuf) argument 414 p = pcap_create_common(device, ebuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/demos/maurice/ |
H A D | example4.c | 47 char ebuf[BUFLEN+24]; local 68 EVP_EncodeUpdate(&ectx, ebuf, &ebuflen, buf, readlen); 70 write(STDOUT, ebuf, ebuflen); 73 EVP_EncodeFinal(&ectx, ebuf, &ebuflen); 75 write(STDOUT, ebuf, ebuflen); 81 char ebuf[BUFLEN+24]; local 103 rc = EVP_DecodeUpdate(&ectx, ebuf, &ebuflen, buf, readlen); 108 write(STDOUT, ebuf, ebuflen); 116 write(STDOUT, ebuf, ebuflen); 119 EVP_DecodeFinal(&ectx, ebuf, [all...] |
H A D | example3.c | 50 char ebuf[BUFLEN + 8]; local 78 EVP_CipherUpdate(&ectx, ebuf, &ebuflen, buf, readlen); 80 write(STDOUT, ebuf, ebuflen); 83 EVP_CipherFinal_ex(&ectx, ebuf, &ebuflen); 86 write(STDOUT, ebuf, ebuflen);
|
H A D | example1.c | 69 char ebuf[512]; local 114 EVP_SealUpdate(&ectx, ebuf, &ebuflen, buf, readlen); 116 write(STDOUT, ebuf, ebuflen); 119 EVP_SealFinal(&ectx, ebuf, &ebuflen); 121 write(STDOUT, ebuf, ebuflen); 130 char ebuf[512]; local 176 int readlen = read(STDIN, ebuf, sizeof(ebuf)); 186 EVP_OpenUpdate(&ectx, buf, &buflen, ebuf, readlen);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libpcap-1.4.0/tests/ |
H A D | reactivatetest.c | 40 char ebuf[PCAP_ERRBUF_SIZE]; local 44 pd = pcap_open_live("lo0", 65535, 0, 1000, ebuf); 46 pd = pcap_open_live("lo", 65535, 0, 1000, ebuf); 49 ebuf);
|
H A D | nonblocktest.c | 61 char ebuf[PCAP_ERRBUF_SIZE]; local 86 device = pcap_lookupdev(ebuf); 88 error("%s", ebuf); 90 *ebuf = '\0'; 91 pd = pcap_open_live(device, 65535, 0, 1000, ebuf); 93 error("%s", ebuf); 94 else if (*ebuf) 95 warning("%s", ebuf); 96 if (pcap_lookupnet(device, &localnet, &netmask, ebuf) < 0) { 99 warning("%s", ebuf); [all...] |
H A D | opentest.c | 55 char ebuf[PCAP_ERRBUF_SIZE]; local 117 pd = pcap_create(device, ebuf); 119 error("%s", ebuf); 162 *ebuf = '\0'; 163 pd = pcap_open_live(device, 65535, 0, 1000, ebuf); 165 error("%s", ebuf); 166 else if (*ebuf) 167 warning("%s", ebuf);
|
H A D | selpolltest.c | 62 char ebuf[PCAP_ERRBUF_SIZE]; local 116 device = pcap_lookupdev(ebuf); 118 error("%s", ebuf); 120 *ebuf = '\0'; 121 pd = pcap_open_live(device, 65535, 0, 1000, ebuf); 123 error("%s", ebuf); 124 else if (*ebuf) 125 warning("%s", ebuf); 126 if (pcap_lookupnet(device, &localnet, &netmask, ebuf) < 0) { 129 warning("%s", ebuf); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/tcpdump-4.4.0/ |
H A D | machdep.c | 56 abort_on_misalignment(char *ebuf _U_, size_t ebufsiz _U_) 62 (void)snprintf(ebuf, ebufsiz, "setsysinfo: errno %d", errno);
|
H A D | tcpdump.c | 691 char ebuf[PCAP_ERRBUF_SIZE]; local 730 if (abort_on_misalignment(ebuf, sizeof(ebuf)) < 0) 731 error("%s", ebuf); 779 if (pcap_findalldevs(&devpointer, ebuf) < 0) 780 error("%s", ebuf); 859 if (pcap_findalldevs(&devpointer, ebuf) < 0) 860 error("%s", ebuf); 1187 pd = pcap_open_offline(RFileName, ebuf); 1189 error("%s", ebuf); [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/iodbc/ |
H A D | herr.c | 80 sqlerr_t *ebuf; local 98 ebuf = (sqlerr_t *) MEM_ALLOC (sizeof (sqlerr_t)); 100 if (ebuf == NULL) 105 ebuf->msg = msg; 106 ebuf->code = code; 107 ebuf->idx = idx; 108 ebuf->next = (sqlerr_t *) herr; 110 return (HERR) ebuf;
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/infiniband/hw/ipath/ |
H A D | ipath_stats.c | 301 char ebuf[256]; local 303 iserr = ipath_decode_err(dd, ebuf, sizeof ebuf, 309 "(%s)\n", ebuf); 321 ebuf); 324 " problem interrupt (%s)\n", ebuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/dhcp6/ |
H A D | client6_token.l | 224 char ebuf[BUFSIZ], *bp, *ep; 226 bp = ebuf; 227 ep = ebuf + sizeof(ebuf); 232 dprintf(level, ebuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/dhcp6/ |
H A D | client6_token.l | 224 char ebuf[BUFSIZ], *bp, *ep; 226 bp = ebuf; 227 ep = ebuf + sizeof(ebuf); 232 dprintf(level, ebuf);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libav-0.8.8/libavcodec/ |
H A D | lzw.c | 45 const uint8_t *pbuf, *ebuf; member in struct:LZWState 105 if (s->pbuf + s->bs >= s->ebuf) { 106 s->pbuf = s->ebuf; 114 s->pbuf= s->ebuf; 143 s->ebuf = s->pbuf + buf_size;
|