Lines Matching refs:PCAP_ERRBUF_SIZE

166 	char errbuf[PCAP_ERRBUF_SIZE + 1];	// keeps the error string, prior to be printed
167 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client
227 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE);
236 host_port_check_status = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE);
301 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE);
417 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_type_string);
421 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed", header.type);
452 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
456 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
476 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
535 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE);
819 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
824 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
845 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
887 char errbuf[PCAP_ERRBUF_SIZE];
888 char remote_errbuf[PCAP_ERRBUF_SIZE];
890 if (plen >= PCAP_ERRBUF_SIZE)
896 if (sock_recv(sockctrl, remote_errbuf, PCAP_ERRBUF_SIZE - 1,
898 PCAP_ERRBUF_SIZE) == -1)
904 if (rpcapd_discard(sockctrl, plen - (PCAP_ERRBUF_SIZE - 1)) == -1)
913 remote_errbuf[PCAP_ERRBUF_SIZE - 1] = '\0';
924 PCAP_ERRBUF_SIZE) == -1)
955 * (if one) has to be written. It must be at least PCAP_ERRBUF_SIZE
966 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
967 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
991 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1015 PCAP_ERRBUF_SIZE, errno, "malloc() failed");
1036 PCAP_ERRBUF_SIZE, errno, "malloc() failed");
1091 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1105 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1114 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1125 if (sock_send(pars->sockctrl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1183 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log
1187 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1194 PCAP_ERRBUF_SIZE, error, "LogonUser() failed");
1204 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1205 pcap_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE,
1246 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1254 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1282 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1297 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1304 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
1314 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
1330 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1331 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1402 PCAP_ERRBUF_SIZE) == -1)
1416 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1452 PCAP_ERRBUF_SIZE) == -1)
1457 PCAP_ERRBUF_SIZE) == -1)
1476 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1482 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1488 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1494 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1509 if (sock_send(pars->sockctrl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1538 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1539 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1548 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long");
1553 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE);
1566 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device");
1581 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1590 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1601 if (sock_send(pars->sockctrl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1634 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1635 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1674 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure");
1729 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE);
1746 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE);
1750 if (sock_initaddress(peerhost, portdata, &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1753 if ((session->sockdata = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1761 if (sock_initaddress(NULL, "0", &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1764 if ((session->sockdata = sock_open(addrinfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1771 sock_geterror("getsockname()", errmsgbuf, PCAP_ERRBUF_SIZE);
1779 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE);
1807 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1816 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1828 if (sock_send(pars->sockctrl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1846 sock_geterror("accept()", errbuf, PCAP_ERRBUF_SIZE);
1863 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error creating the data thread");
1871 pcap_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
1938 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1945 if (sock_send(pars->sockctrl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
1997 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported");
2003 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
2011 pcap_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE,
2041 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions");
2047 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp));
2058 char errbuf[PCAP_ERRBUF_SIZE];
2059 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2085 if (sock_send(pars->sockctrl, (char *) &header, sizeof (struct rpcap_header), pcap_geterr(session->fp), PCAP_ERRBUF_SIZE))
2112 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2113 char errmsgbuf[PCAP_ERRBUF_SIZE];
2135 if (sock_send(pars->sockctrl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2172 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2173 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2186 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2195 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2202 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp));
2223 if (sock_send(pars->sockctrl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2244 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer
2339 PCAP_ERRBUF_SIZE) == -1)
2356 PCAP_ERRBUF_SIZE) == -1)
2373 errbuf, PCAP_ERRBUF_SIZE) == -1)
2384 status = sock_send(session->sockdata, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE);
2415 pcap_snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error reading the packets: %s", pcap_geterr(session->fp));
2525 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2528 SOCK_RECEIVEALL_YES|SOCK_EOF_ISNT_ERROR, errbuf, PCAP_ERRBUF_SIZE);
2557 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2562 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short");
2566 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE);
2585 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed
2589 if (sock_discard(sock, len, errbuf, PCAP_ERRBUF_SIZE) == -1)