Lines Matching refs:errmsgbuf
161 …t rpcapd_recv(PCAP_SOCKET sock, SSL *, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf);
220 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client in daemon_serviceloop() local
450 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
460 …host_port_check_status = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf,… in daemon_serviceloop()
469 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf); in daemon_serviceloop()
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
525 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
642 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_t… in daemon_serviceloop()
646 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed… in daemon_serviceloop()
650 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
678 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
682 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
686 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
703 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
706 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
766 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_serviceloop()
770 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
1056 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
1061 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
1065 errmsgbuf, errbuf) == -1) in daemon_serviceloop()
1083 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
1086 errbuf, errmsgbuf) == -1) in daemon_serviceloop()
1221 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_auth_req() local
1228 …pcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf); in daemon_msg_auth_req()
1245 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1248 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1268 pcapint_fmt_errmsg_for_errno(errmsgbuf, in daemon_msg_auth_req()
1272 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf); in daemon_msg_auth_req()
1289 pcapint_fmt_errmsg_for_errno(errmsgbuf, in daemon_msg_auth_req()
1294 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf); in daemon_msg_auth_req()
1309 if (daemon_AuthUserPwd(username, passwd, errmsgbuf)) in daemon_msg_auth_req()
1318 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1345 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1348 0, PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1359 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1368 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1401 errmsgbuf, errbuf) == -1) in daemon_msg_auth_req()
1442 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log in daemon_AuthUserPwd() local
1452 pcapint_fmt_errmsg_for_win32_err(errmsgbuf, in daemon_AuthUserPwd()
1454 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf); in daemon_AuthUserPwd()
1464 pcapint_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1466 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf); in daemon_AuthUserPwd()
1595 pcapint_strlcpy(errmsgbuf, "Reply length doesn't fit in 32 bits", \
1596 sizeof (errmsgbuf)); \
1605 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_findallif_req() local
1622 if (pcap_findalldevs(&alldevs, errmsgbuf) == -1) in daemon_msg_findallif_req()
1649 pcapint_strlcpy(errmsgbuf, in daemon_msg_findallif_req()
1651 sizeof (errmsgbuf)); in daemon_msg_findallif_req()
1659 pcapint_strlcpy(errmsgbuf, in daemon_msg_findallif_req()
1661 sizeof (errmsgbuf)); in daemon_msg_findallif_req()
1683 pcapint_strlcpy(errmsgbuf, in daemon_msg_findallif_req()
1685 sizeof (errmsgbuf)); in daemon_msg_findallif_req()
1699 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, in daemon_msg_findallif_req()
1763 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf, in daemon_msg_findallif_req()
1768 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf, in daemon_msg_findallif_req()
1773 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf, in daemon_msg_findallif_req()
1793 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1799 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1805 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1811 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1839 PCAP_ERR_FINDALLIF, errmsgbuf, errbuf) == -1) in daemon_msg_findallif_req()
1856 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_open_req() local
1865 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long"); in daemon_msg_open_req()
1883 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device"); in daemon_msg_open_req()
1893 errmsgbuf)) == NULL) in daemon_msg_open_req()
1898 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1907 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1934 errmsgbuf, errbuf) == -1) in daemon_msg_open_req()
1959 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_startcap_req() local
1982 sizeof(struct rpcap_startcapreq), &plen, errmsgbuf); in daemon_msg_startcap_req()
2007 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure"); in daemon_msg_startcap_req()
2035 errmsgbuf)) == NULL) in daemon_msg_startcap_req()
2063 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2081 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2087 errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2091 …if ((session->sockdata = sock_open(peerhost, addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_… in daemon_msg_startcap_req()
2099 addrinfo = sock_initaddress(NULL, NULL, &hints, errmsgbuf, in daemon_msg_startcap_req()
2104 …pen(NULL, addrinfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZ… in daemon_msg_startcap_req()
2111 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2120 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2136 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_startcap_req()
2150 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2159 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2263 PCAP_ERR_STARTCAPTURE, errmsgbuf, errbuf) == -1) in daemon_msg_startcap_req()
2334 …ilter(PCAP_SOCKET sockctrl, SSL *ctrl_ssl, struct session *session, uint32 *plenp, char *errmsgbuf) in daemon_unpackapplyfilter() argument
2344 sizeof(struct rpcap_filter), plenp, errmsgbuf); in daemon_unpackapplyfilter()
2358 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported"); in daemon_unpackapplyfilter()
2364 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2372 pcapint_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2382 sizeof(struct rpcap_filterbpf_insn), plenp, errmsgbuf); in daemon_unpackapplyfilter()
2405 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions"); in daemon_unpackapplyfilter()
2411 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp)); in daemon_unpackapplyfilter()
2423 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_updatefilter_req() local
2427 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_updatefilter_req()
2464 errmsgbuf, NULL); in daemon_msg_updatefilter_req()
2477 char errmsgbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_setsampling_req() local
2482 …(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf); in daemon_msg_setsampling_req()
2515 errmsgbuf, errbuf) == -1) in daemon_msg_setsampling_req()
2537 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_stats_req() local
2550 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2559 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2566 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp)); in daemon_msg_stats_req()
2597 errmsgbuf, NULL); in daemon_msg_stats_req()
2945 rpcapd_recv(PCAP_SOCKET sock, SSL *ssl, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf) in rpcapd_recv() argument
2953 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short"); in rpcapd_recv()