Lines Matching defs:header

173 static int rpcap_recv_msg_header(PCAP_SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf);
174 static int rpcap_check_msg_ver(PCAP_SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf);
175 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf);
176 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf);
392 struct rpcap_header *header; /* general header according to the RPCAP format */
393 struct rpcap_pkthdr *net_pkt_header; /* header of the packet, from the message */
452 * We have to define 'header' as a pointer to a larger buffer,
455 header = (struct rpcap_header *) p->buffer;
477 * Message is shorter than an rpcap header.
480 "UDP packet message is shorter than an rpcap header");
483 plen = ntohl(header->plen);
487 * Message is shorter than the header claims it
491 "UDP packet message is shorter than its rpcap header claims");
502 * We haven't read any of the packet header yet.
504 * packet header.
520 * We have the header, so we know how long the
522 * is the size of the packet header plus the
525 plen = ntohl(header->plen);
562 header->plen = plen;
568 header, p->errbuf) == -1)
576 if (header->type != RPCAP_MSG_PACKET)
588 /* Fill in packet header */
743 struct rpcap_header header; /* header of the RPCAP packet */
761 rpcap_createhdr(&header, pr->protocol_version,
769 (void)sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, (char *)&header,
774 rpcap_createhdr(&header, pr->protocol_version,
782 if (sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, (char *)&header,
792 &header, NULL) == 0)
795 header.plen, NULL);
914 struct rpcap_header header; /* header of the RPCAP packet */
951 rpcap_createhdr(&header, pr->protocol_version,
955 if (sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, (char *)&header,
959 /* Receive and process the reply message header. */
961 RPCAP_MSG_STATS_REQ, &header, p->errbuf) == -1)
964 plen = header.plen;
1105 struct rpcap_header header; /* header of the RPCAP packet */
1279 /* Receive and process the reply message header. */
1281 RPCAP_MSG_STARTCAP_REQ, &header, fp->errbuf) == -1)
1284 plen = header.plen;
1426 * namely the length of the message header plus the length
1427 * of the packet header plus the snapshot length.
1635 struct rpcap_header header; /* To keep the reply message */
1652 /* Receive and process the reply message header. */
1654 RPCAP_MSG_UPDATEFILTER_REQ, &header, fp->errbuf) == -1)
1660 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, header.plen, fp->errbuf) == -1)
1871 struct rpcap_header header; /* To keep the reply message */
1918 /* Receive and process the reply message header. */
1920 RPCAP_MSG_SETSAMPLING_REQ, &header, fp->errbuf) == -1)
1926 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, header.plen, fp->errbuf) == -1)
1982 struct rpcap_header header;
2080 /* Receive and process the reply message header */
2082 &header, errbuf) == -1)
2090 plen = header.plen;
2458 struct rpcap_header header; /* header of the RPCAP packet */
2527 /* Receive and process the reply message header. */
2529 RPCAP_MSG_OPEN_REQ, &header, errbuf) == -1)
2531 plen = header.plen;
2623 struct rpcap_header header; /* structure that keeps the general header of the rpcap protocol */
2649 rpcap_createhdr(&header, protocol_version, RPCAP_MSG_FINDALLIF_REQ,
2652 if (sock_send(sockctrl, ssl, (char *)&header, sizeof(struct rpcap_header),
2656 /* Receive and process the reply message header. */
2658 RPCAP_MSG_FINDALLIF_REQ, &header, errbuf) == -1)
2661 plen = header.plen;
2664 nif = ntohs(header.value);
3150 struct rpcap_header header;
3154 rpcap_createhdr(&header, temp->protocol_version,
3162 (char *)&header,
3304 * Receive the header of a message.
3306 static int rpcap_recv_msg_header(PCAP_SOCKET sock, SSL *ssl, struct rpcap_header *header, char *errbuf)
3310 nrecv = sock_recv(sock, ssl, (char *) header, sizeof(struct rpcap_header),
3318 header->plen = ntohl(header->plen);
3326 static int rpcap_check_msg_ver(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, struct rpcap_header *header, char *errbuf)
3331 if (header->ver != expected_ver)
3336 if (rpcap_discard(sock, ssl, header->plen, errbuf) == -1)
3346 header->ver, expected_ver);
3357 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf)
3365 if (header->type == RPCAP_MSG_ERROR)
3371 *errcode = ntohs(header->value);
3372 rpcap_msg_err(sock, ssl, header->plen, errbuf);
3382 if (header->type != (request_type | RPCAP_MSG_IS_REPLY))
3391 if (rpcap_discard(sock, ssl, header->plen, errbuf) == -1)
3398 msg_type_string = rpcap_msg_type_string(header->type);
3416 header->type, request_type_string);
3425 * Receive and process the header of a message.
3427 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf)
3431 if (rpcap_recv_msg_header(sock, ssl, header, errbuf) == -1)
3440 if (rpcap_check_msg_ver(sock, ssl, expected_ver, header, errbuf) == -1)
3446 return rpcap_check_msg_type(sock, ssl, request_type, header,
3586 * We haven't read all of the packet header yet.