Lines Matching defs:pars

129 static int daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen);
132 static int daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars,
135 static int daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars,
137 static int daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars,
140 static int daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars,
143 static int daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
147 static int daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars,
151 static int daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars,
220 struct daemon_slpars pars; // service loop parameters
420 pars.sockctrl = sockctrl;
421 pars.ssl = ssl;
422 pars.isactive = isactive; // active mode
423 pars.nullAuthAllowed = nullAuthAllowed;
434 if (pars.isactive)
449 if (getpeername(pars.sockctrl, (struct sockaddr *)&from,
454 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
477 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
515 if (!pars.isactive)
522 FD_SET(pars.sockctrl, &rfds);
524 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv);
529 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
538 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout has expired", errbuf) == -1)
547 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header);
570 if (rpcap_senderror(pars.sockctrl, pars.ssl, header.ver,
582 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
589 retval = daemon_msg_auth_req(&pars, plen);
615 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
627 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen);
650 if (rpcap_senderror(pars.sockctrl, pars.ssl,
658 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
686 if (rpcap_senderror(pars.sockctrl, pars.ssl,
694 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
706 if (rpcap_senderror(pars.sockctrl, pars.ssl,
714 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
752 if ((!pars.isactive) && (session == NULL || session->sockdata == 0))
760 FD_SET(pars.sockctrl, &rfds);
764 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv);
770 if (rpcap_senderror(pars.sockctrl, pars.ssl,
781 if (rpcap_senderror(pars.sockctrl, pars.ssl,
793 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header);
819 if (rpcap_senderror(pars.sockctrl, pars.ssl,
830 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
839 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen);
847 if (daemon_msg_findallif_req(header.ver, &pars, plen) == -1)
867 retval = daemon_msg_open_req(header.ver, &pars,
885 if (rpcap_senderror(pars.sockctrl, pars.ssl,
896 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
903 if (daemon_msg_startcap_req(header.ver, &pars,
919 &pars, session, plen) == -1)
928 if (rpcap_senderror(pars.sockctrl, pars.ssl,
956 if (daemon_msg_stats_req(header.ver, &pars,
984 &pars, session) == -1)
997 rpcap_senderror(pars.sockctrl, pars.ssl,
1009 &pars, plen, &samp_param) == -1)
1025 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1035 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1065 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1073 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1086 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1094 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1220 daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen)
1230 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
1244 if (!pars->nullAuthAllowed)
1249 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1274 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf);
1296 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf);
1319 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1349 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1386 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1394 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1402 if (rpcap_senderror(pars->sockctrl, pars->ssl, 0, PCAP_ERR_AUTH,
1412 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1604 daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen)
1617 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1629 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
1828 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1840 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
1854 daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
1871 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen,
1927 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1935 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_OPEN,
1944 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1956 daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
1983 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &startcapreq,
2051 serveropen_dp = (startcapreq.flags & RPCAP_STARTCAPREQ_FLAG_SERVEROPEN) || (startcapreq.flags & RPCAP_STARTCAPREQ_FLAG_DGRAM) || pars->isactive;
2063 if (getpeername(pars->sockctrl, (struct sockaddr *) &saddr, &saddrlen) == -1)
2129 session->sockctrl = pars->sockctrl;
2130 session->ctrl_ssl = pars->ssl;
2134 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2169 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2238 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2260 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
2269 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2294 daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars,
2304 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2417 daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
2425 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2438 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2447 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE))
2457 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2461 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_UPDATEFILTER,
2471 daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
2480 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf);
2497 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2504 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2512 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_SETSAMPLING,
2521 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2530 daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars,
2541 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2585 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2594 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_GETSTATS,