• Home
  • Raw
  • Download

Lines Matching refs:PCAP_ERRBUF_SIZE

308 			pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,  in rpcap_deseraddr()
338 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in rpcap_deseraddr()
435 sock_geterror("select()", p->errbuf, PCAP_ERRBUF_SIZE); in pcap_read_nocb_remote()
456 p->bufsize, p->errbuf, PCAP_ERRBUF_SIZE); in pcap_read_nocb_remote()
472 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
483 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
527 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
576 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_read_nocb_remote()
897 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in rpcap_stats_rpcap()
929 sizeof(struct rpcap_header), p->errbuf, PCAP_ERRBUF_SIZE) < 0) in rpcap_stats_rpcap()
1009 snprintf(errbuf, PCAP_ERRBUF_SIZE, "getaddrinfo() %s", in rpcap_remoteact_getsock()
1123 sock_geterror("getsockname()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1132 sock_geterror("getnameinfo()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1155 if (sock_initaddress(NULL, "0", &hints, &addrinfo, fp->errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_startcapture_remote()
1159 1 /* max 1 connection in queue */, fp->errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET) in pcap_startcapture_remote()
1170 sock_geterror("getsockname()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1178 sock_geterror("getnameinfo()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1188 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_startcapture_remote()
1199 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_startcapture_remote()
1232 PCAP_ERRBUF_SIZE) < 0) in pcap_startcapture_remote()
1267 if (sock_initaddress(host, portdata, &hints, &addrinfo, fp->errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_startcapture_remote()
1270 …if ((sockdata = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, fp->errbuf, PCAP_ERRBUF_SIZE)) == INVALID_… in pcap_startcapture_remote()
1288 sock_geterror("accept()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1293 sock_close(sockdata, fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1304 pr->data_ssl = ssl_promotion(0, sockdata, fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1322 sock_geterror("pcap_startcapture_remote(): getsockopt() failed", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_startcapture_remote()
1384 pcap_fmt_errmsg_for_errno(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_startcapture_remote()
1528 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_pack_bpffilter()
1535 NULL, sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_pack_bpffilter()
1588 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_updatefilter_remote()
1599 PCAP_ERRBUF_SIZE) < 0) in pcap_updatefilter_remote()
1701 sock_geterror("getpeername()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1708 sock_geterror("getnameinfo()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1716 sock_geterror("getsockname()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1724 sock_geterror("getnameinfo()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1731 sock_geterror("getsockname()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1738 sock_geterror("getnameinfo()", fp->errbuf, PCAP_ERRBUF_SIZE); in pcap_createfilter_norpcappkt()
1755 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1772 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_createfilter_norpcappkt()
1828 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_setsampling_remote()
1833 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE, in pcap_setsampling_remote()
1839 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_setsampling_remote()
1850 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE)) in pcap_setsampling_remote()
1859 PCAP_ERRBUF_SIZE) < 0) in pcap_setsampling_remote()
1942 snprintf(errbuf, PCAP_ERRBUF_SIZE, "User name is too long (> 65535 bytes)"); in rpcap_doauth()
1952 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Password is too long (> 65535 bytes)"); in rpcap_doauth()
1960 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication type not recognized."); in rpcap_doauth()
1973 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
1982 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
1997 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2006 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in rpcap_doauth()
2014 PCAP_ERRBUF_SIZE) < 0) in rpcap_doauth()
2059 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2108 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_doauth()
2117 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_getnonblock_rpcap()
2125 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in pcap_setnonblock_rpcap()
2154 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2166 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2173 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_setup_session()
2211 &hints, &addrinfo, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_setup_session()
2217 errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_setup_session()
2222 errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET) in rpcap_setup_session()
2236 PCAP_ERRBUF_SIZE); in rpcap_setup_session()
2243 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_setup_session()
2333 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_open_rpcap()
2378 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE)) in pcap_open_rpcap()
2385 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE)) in pcap_open_rpcap()
2389 PCAP_ERRBUF_SIZE) < 0) in pcap_open_rpcap()
2515 errbuf, PCAP_ERRBUF_SIZE) < 0) in pcap_findalldevs_ex_remote()
2550 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_findalldevs_ex_remote()
2582 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface name too long"); in pcap_findalldevs_ex_remote()
2602 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2611 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface description too long"); in pcap_findalldevs_ex_remote()
2627 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2653 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in pcap_findalldevs_ex_remote()
2730 if (sock_close(sockctrl, errbuf, PCAP_ERRBUF_SIZE)) in pcap_findalldevs_ex_remote()
2809 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_accept_ex()
2815 …taddress(address, RPCAP_DEFAULT_NETPORT_ACTIVE, &hints, &addrinfo, errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_accept_ex()
2822 if (sock_initaddress(address, port, &hints, &addrinfo, errbuf, PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_accept_ex()
2829 …if ((sockmain = sock_open(addrinfo, SOCKOPEN_SERVER, 1, errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCK… in pcap_remoteact_accept_ex()
2848 sock_geterror("accept()", errbuf, PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
2856 ssl = ssl_promotion(0, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
2863 snprintf(errbuf, PCAP_ERRBUF_SIZE, "No TLS support"); in pcap_remoteact_accept_ex()
2872 sock_geterror("getnameinfo()", errbuf, PCAP_ERRBUF_SIZE); in pcap_remoteact_accept_ex()
2887 if (sock_check_hostlist((char *)hostlist, RPCAP_HOSTLIST_SEP, &from, errbuf, PCAP_ERRBUF_SIZE) < 0) in pcap_remoteact_accept_ex()
2951 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in pcap_remoteact_accept_ex()
2998 snprintf(errbuf, PCAP_ERRBUF_SIZE, "getaddrinfo() %s", gai_strerror(retval)); in pcap_remoteact_close()
3023 PCAP_ERRBUF_SIZE) < 0) in pcap_remoteact_close()
3056 PCAP_ERRBUF_SIZE) == -1) in pcap_remoteact_close()
3091 …snprintf(errbuf, PCAP_ERRBUF_SIZE, "The host you want to close the active connection is not known"… in pcap_remoteact_close()
3134 RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST, errbuf, PCAP_ERRBUF_SIZE) != -1) in pcap_remoteact_list()
3146 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The string you provided is not able to keep " in pcap_remoteact_list()
3151 pcap_strlcat(hostlist, hoststr, PCAP_ERRBUF_SIZE); in pcap_remoteact_list()
3170 PCAP_ERRBUF_SIZE); in rpcap_recv_msg_header()
3202 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_ver()
3262 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3268 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3272 snprintf(errbuf, PCAP_ERRBUF_SIZE, in rpcap_check_msg_type()
3324 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Message payload is too short"); in rpcap_recv()
3328 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcap_recv()
3342 char errbuf[PCAP_ERRBUF_SIZE]; in rpcap_msg_err()
3344 if (plen >= PCAP_ERRBUF_SIZE) in rpcap_msg_err()
3350 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in rpcap_msg_err()
3352 PCAP_ERRBUF_SIZE) == -1) in rpcap_msg_err()
3355 … snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf); in rpcap_msg_err()
3362 remote_errbuf[PCAP_ERRBUF_SIZE - 1] = '\0'; in rpcap_msg_err()
3376 (void)rpcap_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1), remote_errbuf); in rpcap_msg_err()
3387 PCAP_ERRBUF_SIZE) == -1) in rpcap_msg_err()
3390 … snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf); in rpcap_msg_err()
3411 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcap_discard()
3445 PCAP_ERRBUF_SIZE); in rpcap_read_packet_msg()
3475 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, in rpcap_read_packet_msg()