Lines Matching refs:errbuf
128 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
143 …packapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf);
219 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop() local
247 *errbuf = 0; // Initialize errbuf in daemon_serviceloop()
262 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
266 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf); in daemon_serviceloop()
327 "TLS is required by this server", errbuf) == -1) in daemon_serviceloop()
330 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
337 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
341 errbuf); in daemon_serviceloop()
364 errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
368 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in daemon_serviceloop()
394 TLS_RECORD_HEADER_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
397 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
404 TLS_ALERT_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
407 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
453 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
476 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
528 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
536 …ockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout has expired", errbuf) == -1) in daemon_serviceloop()
537 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
571 errbuf) == -1) in daemon_serviceloop()
574 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
650 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
652 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
686 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
688 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
706 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
708 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
739 errbuf[0] = 0; // clear errbuf in daemon_serviceloop()
770 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
771 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
782 errbuf) == -1) in daemon_serviceloop()
783 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
820 errbuf) == -1) in daemon_serviceloop()
823 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
887 errbuf) == -1) in daemon_serviceloop()
891 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
930 errbuf) == -1) in daemon_serviceloop()
933 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
999 errbuf); in daemon_serviceloop()
1027 errbuf) == -1) in daemon_serviceloop()
1029 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
1065 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
1067 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
1086 errbuf, errmsgbuf) == -1) in daemon_serviceloop()
1088 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_serviceloop()
1141 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_err() local
1151 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, in daemon_msg_err()
1155 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in daemon_msg_err()
1177 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, in daemon_msg_err()
1181 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in daemon_msg_err()
1220 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_auth_req() local
1248 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1251 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_auth_req()
1318 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1321 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_auth_req()
1348 0, PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1351 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_auth_req()
1384 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1387 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_auth_req()
1401 errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1404 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_auth_req()
1419 daemon_AuthUserPwd(char *username, char *password, char *errbuf) in daemon_AuthUserPwd() argument
1446 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1463 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1505 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1513 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1541 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1556 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1563 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1604 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_findallif_req() local
1631 errbuf) == -1) in daemon_msg_findallif_req()
1633 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_findallif_req()
1826 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1828 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_findallif_req()
1839 PCAP_ERR_FINDALLIF, errmsgbuf, errbuf) == -1) in daemon_msg_findallif_req()
1841 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_findallif_req()
1855 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_open_req() local
1870 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_open_req()
1873 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in daemon_msg_open_req()
1925 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1927 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_open_req()
1934 errmsgbuf, errbuf) == -1) in daemon_msg_open_req()
1937 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_open_req()
1958 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_startcap_req() local
1998 snprintf(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2171 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2174 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_startcap_req()
2189 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2192 errbuf); in daemon_msg_startcap_req()
2208 ssl = ssl_promotion(1, session->sockdata, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2211 rpcapd_log(LOGPRIO_ERROR, "TLS handshake failed: %s", errbuf); in daemon_msg_startcap_req()
2224 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error creating the data thread"); in daemon_msg_startcap_req()
2232 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2263 PCAP_ERR_STARTCAPTURE, errmsgbuf, errbuf) == -1) in daemon_msg_startcap_req()
2266 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_startcap_req()
2299 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_endcap_req() local
2306 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PC… in daemon_msg_endcap_req()
2309 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_endcap_req()
2422 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_updatefilter_req() local
2449 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_updatefilter_req()
2452 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_updatefilter_req()
2476 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_setsampling_req() local
2499 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_setsampling_req()
2502 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_setsampling_req()
2515 errmsgbuf, errbuf) == -1) in daemon_msg_setsampling_req()
2518 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_setsampling_req()
2536 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_stats_req() local
2587 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2589 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf); in daemon_msg_stats_req()
2608 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer in daemon_thrdatamain() local
2627 memset(errbuf, 0, sizeof(errbuf)); in daemon_thrdatamain()
2716 &sendbufidx, (int)sendbufsize, SOCKBUF_CHECKONLY, errbuf, in daemon_thrdatamain()
2721 errbuf); in daemon_thrdatamain()
2733 &sendbufidx, (int)sendbufsize, SOCKBUF_CHECKONLY, errbuf, in daemon_thrdatamain()
2738 errbuf); in daemon_thrdatamain()
2755 errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2759 errbuf); in daemon_thrdatamain()
2766 …status = sock_send(session->sockdata, session->data_ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_… in daemon_thrdatamain()
2778 errbuf); in daemon_thrdatamain()
2797 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error reading the packets: %s", pcap_geterr(session->fp)); in daemon_thrdatamain()
2799 PCAP_ERR_READEX, errbuf, NULL); in daemon_thrdatamain()
2916 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv_msg_header() local
2919 SOCK_RECEIVEALL_YES|SOCK_EOF_ISNT_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv_msg_header()
2923 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in rpcapd_recv_msg_header()
2948 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv() local
2957 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv()
2960 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in rpcapd_recv()
2976 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in rpcapd_discard() local
2980 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcapd_discard()
2983 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf); in rpcapd_discard()