Lines Matching refs:PCAP_ERRBUF_SIZE
221 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in daemon_serviceloop()
222 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client in daemon_serviceloop()
264 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
366 errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
396 TLS_RECORD_HEADER_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
406 TLS_ALERT_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_serviceloop()
452 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
461 …atus = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
526 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
642 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_t… in daemon_serviceloop()
646 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed… in daemon_serviceloop()
678 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
682 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
703 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
766 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
1055 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type… in daemon_serviceloop()
1060 …snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", … in daemon_serviceloop()
1082 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type); in daemon_serviceloop()
1140 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_err()
1141 char remote_errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_err()
1143 if (plen >= PCAP_ERRBUF_SIZE) in daemon_msg_err()
1149 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in daemon_msg_err()
1151 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_err()
1157 if (rpcapd_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1) in daemon_msg_err()
1166 remote_errbuf[PCAP_ERRBUF_SIZE - 1] = '\0'; in daemon_msg_err()
1177 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_err()
1219 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_auth_req()
1220 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_auth_req()
1244 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1268 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in daemon_msg_auth_req()
1289 PCAP_ERRBUF_SIZE, errno, "malloc() failed"); in daemon_msg_auth_req()
1344 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_msg_auth_req()
1358 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1367 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1378 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1436 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log in daemon_AuthUserPwd()
1440 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1447 PCAP_ERRBUF_SIZE, error, "LogonUser() failed"); in daemon_AuthUserPwd()
1457 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1458 pcap_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1499 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1507 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1535 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1550 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed"); in daemon_AuthUserPwd()
1557 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_AuthUserPwd()
1598 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_findallif_req()
1599 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_findallif_req()
1695 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1709 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1753 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1758 PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1777 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1783 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1789 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1795 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1810 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1839 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_open_req()
1840 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_open_req()
1849 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long"); in daemon_msg_open_req()
1854 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_open_req()
1867 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device"); in daemon_msg_open_req()
1882 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1891 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1909 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1942 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_startcap_req()
1943 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_startcap_req()
1982 snprintf(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
1991 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure"); in daemon_msg_startcap_req()
2047 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2064 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2068 if (sock_initaddress(peerhost, portdata, &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2071 …if ((session->sockdata = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == … in daemon_msg_startcap_req()
2079 if (sock_initaddress(NULL, "0", &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2082 …nfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_… in daemon_msg_startcap_req()
2089 sock_geterror("getsockname()", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2097 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2126 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2135 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2147 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2165 sock_geterror("accept()", errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2183 ssl = ssl_promotion(1, session->sockdata, errbuf, PCAP_ERRBUF_SIZE); in daemon_msg_startcap_req()
2199 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error creating the data thread"); in daemon_msg_startcap_req()
2207 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE, in daemon_msg_startcap_req()
2274 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_endcap_req()
2281 …ockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_endcap_req()
2333 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported"); in daemon_unpackapplyfilter()
2339 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2347 pcap_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE, in daemon_unpackapplyfilter()
2380 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions"); in daemon_unpackapplyfilter()
2386 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp)); in daemon_unpackapplyfilter()
2397 char errbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_updatefilter_req()
2398 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_updatefilter_req()
2424 …->ssl, (char *) &header, sizeof (struct rpcap_header), pcap_geterr(session->fp), PCAP_ERRBUF_SIZE)) in daemon_msg_updatefilter_req()
2451 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_setsampling_req()
2452 char errmsgbuf[PCAP_ERRBUF_SIZE]; in daemon_msg_setsampling_req()
2474 …ckctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_setsampling_req()
2511 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in daemon_msg_stats_req()
2512 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client in daemon_msg_stats_req()
2525 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2534 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2541 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp)); in daemon_msg_stats_req()
2562 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2583 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer in daemon_thrdatamain()
2692 PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2709 PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2730 errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_thrdatamain()
2741 …s = sock_send(session->sockdata, session->data_ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE); in daemon_thrdatamain()
2772 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error reading the packets: %s", pcap_geterr(session->fp)); in daemon_thrdatamain()
2884 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv_msg_header()
2887 SOCK_RECEIVEALL_YES|SOCK_EOF_ISNT_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv_msg_header()
2916 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors in rpcapd_recv()
2921 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short"); in rpcapd_recv()
2925 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE); in rpcapd_recv()
2944 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed in rpcapd_discard()
2948 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1) in rpcapd_discard()