Lines Matching refs:PCAP_ERRBUF_SIZE
314 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr()
344 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr()
441 sock_geterrmsg(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
463 p->bufsize, p->errbuf, PCAP_ERRBUF_SIZE); in pcap_read_nocb_remote()
479 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
490 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
534 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
583 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
924 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in rpcap_stats_rpcap()
956 sizeof(struct rpcap_header), p->errbuf, PCAP_ERRBUF_SIZE) < 0) in rpcap_stats_rpcap()
1033 PCAP_ERRBUF_SIZE); in rpcap_remoteact_getsock()
1152 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1162 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1187 PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1192 1 /* max 1 connection in queue */, fp->errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET) in pcap_startcapture_remote()
1203 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1221 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1233 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_startcapture_remote()
1244 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_startcapture_remote()
1276 PCAP_ERRBUF_SIZE) < 0) in pcap_startcapture_remote()
1314 fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1318 …if ((sockdata = sock_open(host, addrinfo, SOCKOPEN_CLIENT, 0, fp->errbuf, PCAP_ERRBUF_SIZE)) == IN… in pcap_startcapture_remote()
1336 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1342 sock_close(sockdata, fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1353 pr->data_ssl = ssl_promotion(0, sockdata, fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1371 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1434 pcapint_fmt_errmsg_for_errno(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1578 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_pack_bpffilter()
1585 NULL, sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_pack_bpffilter()
1638 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_updatefilter_remote()
1649 PCAP_ERRBUF_SIZE) < 0) in pcap_updatefilter_remote()
1751 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1759 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1768 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1777 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1785 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1793 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1811 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1828 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1884 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_setsampling_remote()
1889 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_setsampling_remote()
1895 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_setsampling_remote()
1906 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_setsampling_remote()
1915 PCAP_ERRBUF_SIZE) < 0) in pcap_setsampling_remote()
2005 snprintf(errbuf, PCAP_ERRBUF_SIZE, "User name is too long (> 65535 bytes)"); in rpcap_doauth()
2015 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Password is too long (> 65535 bytes)"); in rpcap_doauth()
2023 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication type not recognized."); in rpcap_doauth()
2036 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2045 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2060 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2069 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2077 PCAP_ERRBUF_SIZE) < 0) in rpcap_doauth()
2099 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2124 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2151 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2229 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2241 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2250 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_getnonblock_rpcap()
2258 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_setnonblock_rpcap()
2287 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2299 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2306 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_setup_session()
2345 &hints, errbuf, PCAP_ERRBUF_SIZE); in rpcap_setup_session()
2350 errbuf, PCAP_ERRBUF_SIZE); in rpcap_setup_session()
2356 errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET) in rpcap_setup_session()
2370 PCAP_ERRBUF_SIZE); in rpcap_setup_session()
2377 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2468 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_open_rpcap()
2513 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in pcap_open_rpcap()
2520 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in pcap_open_rpcap()
2524 PCAP_ERRBUF_SIZE) < 0) in pcap_open_rpcap()
2653 errbuf, PCAP_ERRBUF_SIZE) < 0) in pcap_findalldevs_ex_remote()
2688 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_ex_remote()
2720 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface name too long"); in pcap_findalldevs_ex_remote()
2740 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2749 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface description too long"); in pcap_findalldevs_ex_remote()
2765 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2791 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2868 if (sock_close(sockctrl, errbuf, PCAP_ERRBUF_SIZE)) in pcap_findalldevs_ex_remote()
2948 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_accept_ex()
2956 PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
2961 PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
2968 …if ((sockmain = sock_open(NULL, addrinfo, SOCKOPEN_SERVER, 1, errbuf, PCAP_ERRBUF_SIZE)) == INVALI… in pcap_remoteact_accept_ex()
2987 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, "accept() failed"); in pcap_remoteact_accept_ex()
2995 ssl = ssl_promotion(0, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
3002 snprintf(errbuf, PCAP_ERRBUF_SIZE, "No TLS support"); in pcap_remoteact_accept_ex()
3011 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, in pcap_remoteact_accept_ex()
3027 if (sock_check_hostlist(hostlist, RPCAP_HOSTLIST_SEP, &from, errbuf, PCAP_ERRBUF_SIZE) < 0) in pcap_remoteact_accept_ex()
3092 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_remoteact_accept_ex()
3137 PCAP_ERRBUF_SIZE); in pcap_remoteact_close()
3164 PCAP_ERRBUF_SIZE) < 0) in pcap_remoteact_close()
3197 PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_close()
3232 …snprintf(errbuf, PCAP_ERRBUF_SIZE, "The host you want to close the active connection is not known"… in pcap_remoteact_close()
3275 RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST, errbuf, PCAP_ERRBUF_SIZE) != -1) in pcap_remoteact_list()
3288 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The string you provided is not able to keep " in pcap_remoteact_list()
3293 pcapint_strlcat(hostlist, hoststr, PCAP_ERRBUF_SIZE); in pcap_remoteact_list()
3312 PCAP_ERRBUF_SIZE); in rpcap_recv_msg_header()
3344 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_ver()
3404 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3410 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3414 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3466 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Message payload is too short"); in rpcap_recv()
3470 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcap_recv()
3484 char errbuf[PCAP_ERRBUF_SIZE]; in rpcap_msg_err()
3486 if (plen >= PCAP_ERRBUF_SIZE) in rpcap_msg_err()
3492 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in rpcap_msg_err()
3494 PCAP_ERRBUF_SIZE) == -1) in rpcap_msg_err()
3498 … snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf); in rpcap_msg_err()
3506 remote_errbuf[PCAP_ERRBUF_SIZE - 1] = '\0'; in rpcap_msg_err()
3520 (void)rpcap_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1), remote_errbuf); in rpcap_msg_err()
3531 PCAP_ERRBUF_SIZE) == -1) in rpcap_msg_err()
3535 … snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf); in rpcap_msg_err()
3557 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_discard()
3591 PCAP_ERRBUF_SIZE); in rpcap_read_packet_msg()
3621 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in rpcap_read_packet_msg()