Lines Matching refs:PCAP_ERRBUF_SIZE
219 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop()
220 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client in daemon_serviceloop()
262 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
337 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
364 errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
394 TLS_RECORD_HEADER_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
404 TLS_ALERT_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
450 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
460 …atus = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
525 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
642 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_t… in daemon_serviceloop()
646 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed… in daemon_serviceloop()
678 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
682 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
703 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
766 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
1056 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
1061 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
1083 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
1141 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_err()
1142 char remote_errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_err()
1144 if (plen >= PCAP_ERRBUF_SIZE) in daemon_msg_err()
1150 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in daemon_msg_err()
1152 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_err()
1158 if (rpcapd_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1) in daemon_msg_err()
1167 remote_errbuf[PCAP_ERRBUF_SIZE - 1] = '\0'; in daemon_msg_err()
1178 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_err()
1220 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_auth_req()
1221 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_auth_req()
1245 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1269 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in daemon_msg_auth_req()
1290 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in daemon_msg_auth_req()
1345 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1359 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1368 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1384 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1442 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log in daemon_AuthUserPwd()
1446 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1453 PCAP_ERRBUF_SIZE, error, "LogonUser() failed"); in daemon_AuthUserPwd()
1463 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1464 pcapint_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1505 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1513 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1541 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1556 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1563 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1604 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_findallif_req()
1605 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_findallif_req()
1700 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1764 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1769 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1774 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1793 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1799 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1805 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1811 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1826 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1855 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_open_req()
1856 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_open_req()
1865 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long"); in daemon_msg_open_req()
1870 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_open_req()
1883 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device"); in daemon_msg_open_req()
1898 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1907 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1925 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1958 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_startcap_req()
1959 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_startcap_req()
1998 snprintf(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2007 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure"); in daemon_msg_startcap_req()
2063 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2081 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2087 errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2091 …data = sock_open(peerhost, addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_… in daemon_msg_startcap_req()
2100 PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2104 …nfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_… in daemon_msg_startcap_req()
2111 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2120 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2150 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2159 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2171 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2189 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2208 ssl = ssl_promotion(1, session->sockdata, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2224 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error creating the data thread"); in daemon_msg_startcap_req()
2232 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2299 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_endcap_req()
2306 …ockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_endcap_req()
2358 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported"); in daemon_unpackapplyfilter()
2364 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2372 pcapint_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2405 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions"); in daemon_unpackapplyfilter()
2411 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp)); in daemon_unpackapplyfilter()
2422 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_updatefilter_req()
2423 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_updatefilter_req()
2449 …rs->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE)) in daemon_msg_updatefilter_req()
2476 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_setsampling_req()
2477 char errmsgbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_setsampling_req()
2499 …ckctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_setsampling_req()
2536 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_stats_req()
2537 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_stats_req()
2550 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2559 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2566 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp)); in daemon_msg_stats_req()
2587 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2608 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer in daemon_thrdatamain()
2717 PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2734 PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2755 errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2766 …s = sock_send(session->sockdata, session->data_ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE); in daemon_thrdatamain()
2797 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error reading the packets: %s", pcap_geterr(session->fp)); in daemon_thrdatamain()
2916 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv_msg_header()
2919 SOCK_RECEIVEALL_YES|SOCK_EOF_ISNT_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv_msg_header()
2948 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv()
2953 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short"); in rpcapd_recv()
2957 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv()
2976 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in rpcapd_discard()
2980 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcapd_discard()