Lines Matching refs:errmsgbuf

155 static int rpcapd_recv(SOCKET sock, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf);
167 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client
227 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE);
228 if (rpcap_senderror(pars.sockctrl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
236 host_port_check_status = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE);
245 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
251 if (rpcap_senderror(pars.sockctrl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
301 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE);
302 if (rpcap_senderror(pars.sockctrl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
417 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_type_string);
421 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed", header.type);
424 PCAP_ERR_WRONGMSG, errmsgbuf, errbuf) == -1)
452 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
456 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
459 PCAP_ERR_WRONGMSG, errmsgbuf, errbuf) == -1)
476 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
478 PCAP_ERR_WRONGMSG, errmsgbuf, errbuf) == -1)
535 sock_geterror("select() failed", errmsgbuf, PCAP_ERRBUF_SIZE);
537 PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
819 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
824 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
827 PCAP_ERR_WRONGMSG, errmsgbuf, errbuf) == -1)
845 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
847 PCAP_ERR_WRONGMSG, errbuf, errmsgbuf) == -1)
967 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
974 status = rpcapd_recv(pars->sockctrl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
991 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
994 PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1014 pcap_fmt_errmsg_for_errno(errmsgbuf,
1018 status = rpcapd_recv(pars->sockctrl, username, usernamelen, &plen, errmsgbuf);
1035 pcap_fmt_errmsg_for_errno(errmsgbuf,
1040 status = rpcapd_recv(pars->sockctrl, passwd, passwdlen, &plen, errmsgbuf);
1055 if (daemon_AuthUserPwd(username, passwd, errmsgbuf))
1064 PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1091 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1094 PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1)
1105 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1114 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1141 if (rpcap_senderror(pars->sockctrl, 0, PCAP_ERR_AUTH, errmsgbuf,
1183 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log
1193 pcap_fmt_errmsg_for_win32_err(errmsgbuf,
1195 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1205 pcap_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE,
1207 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1331 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1349 if (pcap_findalldevs(&alldevs, errmsgbuf) == -1)
1401 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf,
1416 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1451 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1456 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1476 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1482 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1488 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1494 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1522 errmsgbuf, errbuf) == -1)
1539 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1548 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long");
1566 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device");
1576 errmsgbuf)) == NULL)
1581 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1590 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1610 errmsgbuf, errbuf) == -1)
1635 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1658 sizeof(struct rpcap_startcapreq), &plen, errmsgbuf);
1674 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure");
1701 errmsgbuf)) == NULL)
1729 sock_geterror("getpeername()", errmsgbuf, PCAP_ERRBUF_SIZE);
1746 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE);
1750 if (sock_initaddress(peerhost, portdata, &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1753 if ((session->sockdata = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1761 if (sock_initaddress(NULL, "0", &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1764 if ((session->sockdata = sock_open(addrinfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1771 sock_geterror("getsockname()", errmsgbuf, PCAP_ERRBUF_SIZE);
1779 sock_geterror("getnameinfo()", errmsgbuf, PCAP_ERRBUF_SIZE);
1793 ret = daemon_unpackapplyfilter(pars->sockctrl, session, &plen, errmsgbuf);
1807 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1816 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1902 errmsgbuf, errbuf) == -1)
1973 daemon_unpackapplyfilter(SOCKET sockctrl, struct session *session, uint32 *plenp, char *errmsgbuf)
1983 sizeof(struct rpcap_filter), plenp, errmsgbuf);
1997 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported");
2003 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
2011 pcap_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE,
2021 sizeof(struct rpcap_filterbpf_insn), plenp, errmsgbuf);
2041 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions");
2047 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp));
2059 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2063 ret = daemon_unpackapplyfilter(pars->sockctrl, session, &plen, errmsgbuf);
2100 errmsgbuf, NULL);
2113 char errmsgbuf[PCAP_ERRBUF_SIZE];
2118 status = rpcapd_recv(pars->sockctrl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf);
2151 errmsgbuf, errbuf) == -1)
2173 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2186 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2195 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2202 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp));
2233 errmsgbuf, NULL);
2547 * message into errmsgbuf and returns -2. Otherwise, tries to read
2554 rpcapd_recv(SOCKET sock, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf)
2562 pcap_snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short");