Lines Matching defs:errmsgbuf

163 static int rpcapd_recv(SOCKET sock, SSL *, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf);
222 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client
452 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
454 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
462 host_port_check_status = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE);
471 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
477 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
527 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
529 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
644 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_type_string);
648 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed", header.type);
652 errmsgbuf, errbuf) == -1)
680 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
684 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
688 errmsgbuf, errbuf) == -1)
705 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
708 errmsgbuf, errbuf) == -1)
768 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
772 errmsgbuf, errbuf) == -1)
1058 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
1063 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
1067 errmsgbuf, errbuf) == -1)
1085 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
1088 errbuf, errmsgbuf) == -1)
1223 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1230 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
1247 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1250 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1270 pcap_fmt_errmsg_for_errno(errmsgbuf,
1274 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf);
1291 pcap_fmt_errmsg_for_errno(errmsgbuf,
1296 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf);
1311 if (daemon_AuthUserPwd(username, passwd, errmsgbuf))
1320 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1347 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1350 0, PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1)
1361 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1370 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1403 errmsgbuf, errbuf) == -1)
1444 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log
1454 pcap_fmt_errmsg_for_win32_err(errmsgbuf,
1456 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1466 pcap_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE,
1468 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1597 pcap_strlcpy(errmsgbuf, "Reply length doesn't fit in 32 bits", \
1598 sizeof (errmsgbuf)); \
1607 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1624 if (pcap_findalldevs(&alldevs, errmsgbuf) == -1)
1651 pcap_strlcpy(errmsgbuf,
1653 sizeof (errmsgbuf));
1661 pcap_strlcpy(errmsgbuf,
1663 sizeof (errmsgbuf));
1685 pcap_strlcpy(errmsgbuf,
1687 sizeof (errmsgbuf));
1701 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf,
1765 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1770 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1775 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1795 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1801 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1807 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1813 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1841 PCAP_ERR_FINDALLIF, errmsgbuf, errbuf) == -1)
1858 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1867 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long");
1885 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device");
1895 errmsgbuf)) == NULL)
1900 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1909 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1936 errmsgbuf, errbuf) == -1)
1961 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1984 sizeof(struct rpcap_startcapreq), &plen, errmsgbuf);
2009 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure");
2037 errmsgbuf)) == NULL)
2065 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2083 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2088 if (sock_initaddress(peerhost, portdata, &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2091 if ((session->sockdata = sock_open(peerhost, addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2099 if (sock_initaddress(NULL, NULL, &hints, &addrinfo, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2102 if ((session->sockdata = sock_open(NULL, addrinfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2109 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2118 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2134 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2148 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2157 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2261 PCAP_ERR_STARTCAPTURE, errmsgbuf, errbuf) == -1)
2332 daemon_unpackapplyfilter(SOCKET sockctrl, SSL *ctrl_ssl, struct session *session, uint32 *plenp, char *errmsgbuf)
2342 sizeof(struct rpcap_filter), plenp, errmsgbuf);
2356 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported");
2362 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
2370 pcap_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE,
2380 sizeof(struct rpcap_filterbpf_insn), plenp, errmsgbuf);
2403 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions");
2409 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp));
2421 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2425 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2462 errmsgbuf, NULL);
2475 char errmsgbuf[PCAP_ERRBUF_SIZE];
2480 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf);
2513 errmsgbuf, errbuf) == -1)
2535 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2548 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2557 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2564 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp));
2595 errmsgbuf, NULL);
2936 * message into errmsgbuf and returns -2. Otherwise, tries to read
2943 rpcapd_recv(SOCKET sock, SSL *ssl, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf)
2951 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short");