• Home
  • Raw
  • Download

Lines Matching refs:pars

129 static int daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen);
132 static int daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars,
135 static int daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars,
137 static int daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars,
140 static int daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars,
143 static int daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
147 static int daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars,
151 static int daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars,
220 struct daemon_slpars pars; // service loop parameters in daemon_serviceloop() local
420 pars.sockctrl = sockctrl; in daemon_serviceloop()
421 pars.ssl = ssl; in daemon_serviceloop()
422 pars.isactive = isactive; // active mode in daemon_serviceloop()
423 pars.nullAuthAllowed = nullAuthAllowed; in daemon_serviceloop()
434 if (pars.isactive) in daemon_serviceloop()
449 if (getpeername(pars.sockctrl, (struct sockaddr *)&from, in daemon_serviceloop()
453 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
476 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
514 if (!pars.isactive) in daemon_serviceloop()
521 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
523 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
536 …if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout h… in daemon_serviceloop()
545 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
568 if (rpcap_senderror(pars.sockctrl, pars.ssl, header.ver, in daemon_serviceloop()
580 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
587 retval = daemon_msg_auth_req(&pars, plen); in daemon_serviceloop()
613 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
625 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
648 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
656 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
684 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
692 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
704 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
712 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
750 if ((!pars.isactive) && (session == NULL || session->sockdata == 0)) in daemon_serviceloop()
758 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
762 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
767 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
778 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
790 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
816 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
827 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
836 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
844 if (daemon_msg_findallif_req(header.ver, &pars, plen) == -1) in daemon_serviceloop()
864 retval = daemon_msg_open_req(header.ver, &pars, in daemon_serviceloop()
882 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
893 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
900 if (daemon_msg_startcap_req(header.ver, &pars, in daemon_serviceloop()
916 &pars, session, plen) == -1) in daemon_serviceloop()
925 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
953 if (daemon_msg_stats_req(header.ver, &pars, in daemon_serviceloop()
981 &pars, session) == -1) in daemon_serviceloop()
994 rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1006 &pars, plen, &samp_param) == -1) in daemon_serviceloop()
1022 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1032 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1062 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1070 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1083 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1091 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1217 daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen) in daemon_msg_auth_req() argument
1227 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, … in daemon_msg_auth_req()
1241 if (!pars->nullAuthAllowed) in daemon_msg_auth_req()
1246 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1271 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf); in daemon_msg_auth_req()
1293 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf); in daemon_msg_auth_req()
1316 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1346 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1378 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1386 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1394 if (rpcap_senderror(pars->sockctrl, pars->ssl, 0, PCAP_ERR_AUTH, in daemon_msg_auth_req()
1404 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1596 daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen) in daemon_msg_findallif_req() argument
1610 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_findallif_req()
1622 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1810 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1822 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1836 daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_open_req() argument
1853 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen, in daemon_msg_open_req()
1909 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1917 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_OPEN, in daemon_msg_open_req()
1926 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_open_req()
1938 daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_startcap_req() argument
1965 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &startcapreq, in daemon_msg_startcap_req()
2033 …ARTCAPREQ_FLAG_SERVEROPEN) || (startcapreq.flags & RPCAP_STARTCAPREQ_FLAG_DGRAM) || pars->isactive; in daemon_msg_startcap_req()
2045 if (getpeername(pars->sockctrl, (struct sockaddr *) &saddr, &saddrlen) == -1) in daemon_msg_startcap_req()
2107 session->sockctrl = pars->sockctrl; in daemon_msg_startcap_req()
2108 session->ctrl_ssl = pars->ssl; in daemon_msg_startcap_req()
2112 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_startcap_req()
2147 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2215 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2237 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_startcap_req()
2246 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2271 daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars, in daemon_msg_endcap_req() argument
2281 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PC… in daemon_msg_endcap_req()
2394 daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars, in daemon_msg_updatefilter_req() argument
2402 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_updatefilter_req()
2415 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2424 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), pcap_gete… in daemon_msg_updatefilter_req()
2434 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2438 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_UPDATEFILTER, in daemon_msg_updatefilter_req()
2448 daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars, uint32 plen, in daemon_msg_setsampling_req() argument
2457 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling… in daemon_msg_setsampling_req()
2474 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_setsampling_req()
2481 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2489 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_SETSAMPLING, in daemon_msg_setsampling_req()
2498 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2507 daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars, in daemon_msg_stats_req() argument
2518 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_stats_req()
2562 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2571 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_GETSTATS, in daemon_msg_stats_req()