Lines Matching refs:sockctrl
96 PCAP_SOCKET sockctrl; //!< PCAP_SOCKET ID of the control connection member
111 PCAP_SOCKET sockctrl; member
126 static int daemon_msg_err(PCAP_SOCKET sockctrl, SSL *, uint32 plen);
143 static int daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *p…
212 daemon_serviceloop(PCAP_SOCKET sockctrl, int isactive, char *passiveClients, in daemon_serviceloop() argument
261 nrecv = sock_recv(sockctrl, NULL, (char *)&first_octet, 1, in daemon_serviceloop()
301 nrecv = rpcapd_recv_msg_header(sockctrl, NULL, &header); in daemon_serviceloop()
315 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
325 if (rpcap_senderror(sockctrl, NULL, header.ver, in daemon_serviceloop()
337 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
362 nrecv = sock_recv(sockctrl, ssl, (char *) &tls_header, in daemon_serviceloop()
379 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
393 if (sock_send(sockctrl, NULL, (char *) &tls_header, in daemon_serviceloop()
403 if (sock_send(sockctrl, NULL, (char *) &tls_alert, in daemon_serviceloop()
418 pars.sockctrl = sockctrl; in daemon_serviceloop()
447 if (getpeername(pars.sockctrl, (struct sockaddr *)&from, in daemon_serviceloop()
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
520 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
522 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
536 …if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout h… in daemon_serviceloop()
545 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
568 if (rpcap_senderror(pars.sockctrl, pars.ssl, header.ver, in daemon_serviceloop()
580 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
613 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
625 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
648 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
656 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
684 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
692 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
704 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
712 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
758 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
762 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
768 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
779 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
791 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
817 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
828 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
837 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
883 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
894 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
926 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
995 rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1023 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1033 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1063 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1071 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1084 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1092 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1127 sock_close(sockctrl, NULL, 0); in daemon_serviceloop()
1139 daemon_msg_err(PCAP_SOCKET sockctrl, SSL *ssl, uint32 plen) in daemon_msg_err() argument
1150 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in daemon_msg_err()
1158 if (rpcapd_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1) in daemon_msg_err()
1176 if (sock_recv(sockctrl, ssl, remote_errbuf, plen, in daemon_msg_err()
1228 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, … in daemon_msg_auth_req()
1247 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1272 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf); in daemon_msg_auth_req()
1294 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf); in daemon_msg_auth_req()
1317 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1347 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1384 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1392 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1400 if (rpcap_senderror(pars->sockctrl, pars->ssl, 0, PCAP_ERR_AUTH, in daemon_msg_auth_req()
1410 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1615 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_findallif_req()
1627 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1826 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1838 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1869 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen, in daemon_msg_open_req()
1925 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1933 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_OPEN, in daemon_msg_open_req()
1942 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_open_req()
1981 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &startcapreq, in daemon_msg_startcap_req()
2061 if (getpeername(pars->sockctrl, (struct sockaddr *) &saddr, &saddrlen) == -1) in daemon_msg_startcap_req()
2131 session->sockctrl = pars->sockctrl; in daemon_msg_startcap_req()
2136 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_startcap_req()
2171 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2240 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2262 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_startcap_req()
2271 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2306 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PC… in daemon_msg_endcap_req()
2334 daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *ctrl_ssl, struct session *session, uint32 *plen… in daemon_unpackapplyfilter() argument
2343 status = rpcapd_recv(sockctrl, ctrl_ssl, (char *) &filter, in daemon_unpackapplyfilter()
2381 status = rpcapd_recv(sockctrl, ctrl_ssl, (char *) &insn, in daemon_unpackapplyfilter()
2427 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_updatefilter_req()
2440 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2449 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_updatefilter_req()
2459 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2463 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_UPDATEFILTER, in daemon_msg_updatefilter_req()
2482 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling… in daemon_msg_setsampling_req()
2499 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_setsampling_req()
2506 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2514 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_SETSAMPLING, in daemon_msg_setsampling_req()
2523 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2543 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_stats_req()
2587 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2596 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_GETSTATS, in daemon_msg_stats_req()
2798 rpcap_senderror(session->sockctrl, session->ctrl_ssl, session->protocol_version, in daemon_thrdatamain()