Lines Matching refs:plen
126 static int daemon_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen);
127 static int daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen);
131 uint32 plen);
134 uint32 plen, char *source, size_t sourcelen);
136 uint32 plen, char *source, struct session **sessionp,
142 struct session *session, uint32 plen);
146 struct session *session, uint32 plen, struct pcap_stat *stats,
150 uint32 plen, struct rpcap_sampling *samp_param);
161 static int rpcapd_recv(PCAP_SOCKET sock, SSL *, char *buffer, size_t toread, uint32 *plen, char *er…
225 uint32 plen; // payload length from header in daemon_serviceloop() local
312 plen = header.plen; in daemon_serviceloop()
315 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
376 plen = (tls_header.length_hi << 8U) | tls_header.length_lo; in daemon_serviceloop()
379 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
557 plen = header.plen; in daemon_serviceloop()
580 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
587 retval = daemon_msg_auth_req(&pars, plen); in daemon_serviceloop()
613 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
625 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
656 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
692 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
712 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
803 plen = header.plen; in daemon_serviceloop()
828 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
837 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
845 if (daemon_msg_findallif_req(header.ver, &pars, plen) == -1) in daemon_serviceloop()
866 plen, source, sizeof(source)); in daemon_serviceloop()
894 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
902 plen, source, &session, &samp_param, in daemon_serviceloop()
917 &pars, session, plen) == -1) in daemon_serviceloop()
955 session, plen, &stats, svrcapt) == -1) in daemon_serviceloop()
1007 &pars, plen, &samp_param) == -1) in daemon_serviceloop()
1033 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1071 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1092 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1139 daemon_msg_err(PCAP_SOCKET sockctrl, SSL *ssl, uint32 plen) in daemon_msg_err() argument
1144 if (plen >= PCAP_ERRBUF_SIZE) in daemon_msg_err()
1158 if (rpcapd_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1) in daemon_msg_err()
1169 else if (plen == 0) in daemon_msg_err()
1176 if (sock_recv(sockctrl, ssl, remote_errbuf, plen, in daemon_msg_err()
1188 remote_errbuf[plen] = '\0'; in daemon_msg_err()
1218 daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen) in daemon_msg_auth_req() argument
1228 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, … in daemon_msg_auth_req()
1272 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf); in daemon_msg_auth_req()
1294 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf); in daemon_msg_auth_req()
1392 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1410 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1602 daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen) in daemon_msg_findallif_req() argument
1615 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_findallif_req()
1852 daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_open_req() argument
1863 if (plen > sourcelen - 1) in daemon_msg_open_req()
1869 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen, in daemon_msg_open_req()
1877 plen -= nread; in daemon_msg_open_req()
1942 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_open_req()
1954 daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_startcap_req() argument
1982 sizeof(struct rpcap_startcapreq), &plen, errmsgbuf); in daemon_msg_startcap_req()
2136 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_startcap_req()
2240 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2271 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2420 struct session *session, uint32 plen) in daemon_msg_updatefilter_req() argument
2427 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_updatefilter_req()
2440 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2459 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2473 daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_setsampling_req() argument
2482 …(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf); in daemon_msg_setsampling_req()
2506 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2523 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2533 struct session *session, uint32 plen, struct pcap_stat *stats, in daemon_msg_stats_req() argument
2543 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_stats_req()
2931 headerp->plen = ntohl(headerp->plen); in rpcapd_recv_msg_header()
2945 rpcapd_recv(PCAP_SOCKET sock, SSL *ssl, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf) in rpcapd_recv() argument
2950 if (toread > *plen) in rpcapd_recv()
2963 *plen -= nread; in rpcapd_recv()