• Home
  • Raw
  • Download

Lines Matching refs:sockctrl

98 	SOCKET sockctrl;	//!< SOCKET ID of the control connection  member
113 SOCKET sockctrl; member
128 static int daemon_msg_err(SOCKET sockctrl, SSL *, uint32 plen);
145 static int daemon_unpackapplyfilter(SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp,…
214 daemon_serviceloop(SOCKET sockctrl, int isactive, char *passiveClients, in daemon_serviceloop() argument
263 nrecv = sock_recv(sockctrl, NULL, (char *)&first_octet, 1, in daemon_serviceloop()
303 nrecv = rpcapd_recv_msg_header(sockctrl, NULL, &header); in daemon_serviceloop()
317 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
327 if (rpcap_senderror(sockctrl, NULL, header.ver, in daemon_serviceloop()
339 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE); in daemon_serviceloop()
364 nrecv = sock_recv(sockctrl, ssl, (char *) &tls_header, in daemon_serviceloop()
381 if (rpcapd_discard(sockctrl, NULL, plen) == -1) in daemon_serviceloop()
395 if (sock_send(sockctrl, NULL, (char *) &tls_header, in daemon_serviceloop()
405 if (sock_send(sockctrl, NULL, (char *) &tls_alert, in daemon_serviceloop()
420 pars.sockctrl = sockctrl; in daemon_serviceloop()
449 if (getpeername(pars.sockctrl, (struct sockaddr *)&from, in daemon_serviceloop()
453 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
476 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
521 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
523 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1) in daemon_serviceloop()
536 …if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout h… in daemon_serviceloop()
545 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
568 if (rpcap_senderror(pars.sockctrl, pars.ssl, header.ver, in daemon_serviceloop()
580 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
613 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
625 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
648 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
656 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
684 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
692 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
704 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
712 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
758 FD_SET(pars.sockctrl, &rfds); in daemon_serviceloop()
762 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv); in daemon_serviceloop()
767 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
778 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
790 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header); in daemon_serviceloop()
816 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
827 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
836 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen); in daemon_serviceloop()
882 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
893 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
925 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
994 rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1022 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1032 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1062 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1070 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1083 if (rpcap_senderror(pars.sockctrl, pars.ssl, in daemon_serviceloop()
1091 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1) in daemon_serviceloop()
1126 sock_close(sockctrl, NULL, 0); in daemon_serviceloop()
1138 daemon_msg_err(SOCKET sockctrl, SSL *ssl, uint32 plen) in daemon_msg_err() argument
1149 if (sock_recv(sockctrl, ssl, remote_errbuf, PCAP_ERRBUF_SIZE - 1, in daemon_msg_err()
1157 if (rpcapd_discard(sockctrl, ssl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1) in daemon_msg_err()
1175 if (sock_recv(sockctrl, ssl, remote_errbuf, plen, in daemon_msg_err()
1227 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, … in daemon_msg_auth_req()
1246 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1271 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf); in daemon_msg_auth_req()
1293 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf); in daemon_msg_auth_req()
1316 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1346 if (rpcap_senderror(pars->sockctrl, pars->ssl, in daemon_msg_auth_req()
1378 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_auth_req()
1386 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1394 if (rpcap_senderror(pars->sockctrl, pars->ssl, 0, PCAP_ERR_AUTH, in daemon_msg_auth_req()
1404 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_auth_req()
1610 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_findallif_req()
1622 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1810 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_findallif_req()
1822 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_findallif_req()
1853 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen, in daemon_msg_open_req()
1909 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_open_req()
1917 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_OPEN, in daemon_msg_open_req()
1926 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_open_req()
1965 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &startcapreq, in daemon_msg_startcap_req()
2045 if (getpeername(pars->sockctrl, (struct sockaddr *) &saddr, &saddrlen) == -1) in daemon_msg_startcap_req()
2107 session->sockctrl = pars->sockctrl; in daemon_msg_startcap_req()
2112 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_startcap_req()
2147 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_startcap_req()
2215 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2237 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, in daemon_msg_startcap_req()
2246 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_startcap_req()
2281 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PC… in daemon_msg_endcap_req()
2309 daemon_unpackapplyfilter(SOCKET sockctrl, SSL *ctrl_ssl, struct session *session, uint32 *plenp, ch… in daemon_unpackapplyfilter() argument
2318 status = rpcapd_recv(sockctrl, ctrl_ssl, (char *) &filter, in daemon_unpackapplyfilter()
2356 status = rpcapd_recv(sockctrl, ctrl_ssl, (char *) &insn, in daemon_unpackapplyfilter()
2402 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf); in daemon_msg_updatefilter_req()
2415 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2424 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), pcap_gete… in daemon_msg_updatefilter_req()
2434 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_updatefilter_req()
2438 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_UPDATEFILTER, in daemon_msg_updatefilter_req()
2457 …status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling… in daemon_msg_setsampling_req()
2474 …if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, P… in daemon_msg_setsampling_req()
2481 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2489 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_SETSAMPLING, in daemon_msg_setsampling_req()
2498 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_setsampling_req()
2518 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1) in daemon_msg_stats_req()
2562 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1) in daemon_msg_stats_req()
2571 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_GETSTATS, in daemon_msg_stats_req()
2773 rpcap_senderror(session->sockctrl, session->ctrl_ssl, session->protocol_version, in daemon_thrdatamain()