Lines Matching refs:printf
72 #define panic(param) { printf(param); exit(-1); }
90 printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n",
93 printf(" len=%u reserved=%u seq=%u pid=%u\n",
101 printf("sadb_ext{ len=%u type=%u }\n",
105 printf("kdebug_sadb: invalid ext_len=0 was passed.\n");
109 printf("kdebug_sadb: ext_len exceeds end of buffer.\n");
160 printf("kdebug_sadb: invalid ext_type %u was passed.\n",
189 printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);
192 printf("sadb_comb{ auth=%u encrypt=%u "
197 printf(" auth_minbits=%u auth_maxbits=%u "
204 printf(" soft_alloc=%u hard_alloc=%u "
211 printf(" soft_alloc=%lu hard_alloc=%lu "
219 printf("}\n");
237 printf("sadb_ident_%s{",
241 printf(" type=%d id=%lu",
248 printf("\n str=\"");
253 printf("%c", *p & 0xff);
255 printf("\\%03o", *p & 0xff);
259 printf("\"");
264 printf(" }\n");
285 printf("sadb_sup{\n");
287 printf(" { id=%d ivlen=%d min=%d max=%d }\n",
292 printf("}\n");
305 printf("kdebug_sadb_lifetime: NULL pointer was passed.\n");
308 printf("sadb_lifetime{ alloc=%u, bytes=%u\n",
311 printf(" addtime=%u, usetime=%u }\n",
329 printf("sadb_sa{ spi=%u replay=%u state=%u\n",
332 printf(" auth=%u encrypt=%u flags=0x%08x }\n",
349 printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n",
370 printf("sadb_key{ bits=%u reserved=%u\n",
372 printf(" key=");
377 printf("kdebug_sadb_key: key length mismatch, bit:%d len:%ld.\n",
384 printf(" }\n");
399 printf("sadb_x_sa2{ mode=%u reqid=%u\n",
401 printf(" reserved1=%u reserved2=%u sequence=%u }\n",
419 printf("sadb_session_id{ id0=%llx, id1=%llx}\n",
439 printf("sadb_sastat{ dir=%u num=%u\n",
443 printf(" spi=%x,\n",
446 printf("}\n");
463 printf("sadb_x_policy{ type=%u dir=%u id=%x }\n",
475 printf(" { len=%u proto=%u mode=%u level=%u reqid=%u\n",
490 printf(" }\n");
494 printf("kdebug_sadb_x_policy: wrong policy struct.\n");
499 printf("invalid ipsec policy length\n");
528 printf("secpolicy{ refcnt=%u state=%u policy=%u\n",
536 printf(" type=discard }\n");
539 printf(" type=none }\n");
545 printf(" level=%u\n", isr->level);
548 printf(" }\n");
552 printf(" type=bypass }\n");
555 printf(" type=entrust }\n");
558 printf("kdebug_secpolicy: Invalid policy found. %d\n",
575 printf("secpolicyindex{ dir=%u prefs=%u prefd=%u ul_proto=%u internal_if=%s\n",
581 printf("\n");
584 printf("}\n");
598 printf("secasindex{ mode=%u proto=%u\n",
603 printf("\n");
606 printf("\n");
620 printf("secas{");
623 printf(" refcnt=%u state=%u auth=%u enc=%u\n",
625 printf(" spi=%u flags=%u\n",
635 printf(" iv=");
637 printf("\n");
672 printf(" secreplay{ count=%u wsize=%zu seq=%u lastseq=%u",
676 printf(" }\n");
680 printf("\n bitmap { ");
684 printf("%u", (((rpl->bitmap)[len] >> l) & 1) ? 1 : 0);
687 printf(" }\n");
701 printf("mbuf(0x%llx){ m_next:0x%llx m_nextpkt:0x%llx m_data:0x%llx "
710 printf(" m_pkthdr{ len:%d rcvif:0x%llx }\n",
716 printf(" m_ext{ ext_buf:0x%llx ext_free:0x%llx "
736 printf(" m_data:\n");
739 printf("\n");
742 printf(" ");
744 printf("%02x", mtod(m, u_char *)[i]);
747 printf("\n");
767 printf("sockaddr{ len=%u family=%u", addr->sa_len, addr->sa_family);
772 printf(" port=%u\n", ntohs(sin4->sin_port));
777 printf(" port=%u\n", ntohs(sin6->sin6_port));
778 printf(" flowinfo=0x%08x, scope_id=0x%08x\n",
785 printf(" }\n");
798 printf("%c", (unsigned char)buf[i]);
814 printf("\n");
817 printf(" ");
819 printf("%02x", (unsigned char)buf[i]);
823 printf("\n");