Lines Matching defs:errbuf
65 * Best practice is to define the errbuf variable as a char of size
173 static int rpcap_recv_msg_header(PCAP_SOCKET sock, SSL *, struct rpcap_header *header, char *errbuf);
174 static int rpcap_check_msg_ver(PCAP_SOCKET sock, SSL *, uint8 expected_ver, struct rpcap_header *header, char *errbuf);
175 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf);
176 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *, uint8 ver, uint8 request_type, struct rpcap_header *header, char *errbuf);
177 static int rpcap_recv(PCAP_SOCKET sock, SSL *, void *buffer, size_t toread, uint32 *plen, char *errbuf);
179 static int rpcap_discard(PCAP_SOCKET sock, SSL *, uint32 len, char *errbuf);
255 * \param errbuf: a pointer to a user-allocated buffer (of size PCAP_ERRBUF_SIZE)
260 * The error message is returned in the 'errbuf' variable, while the deserialized address
299 rpcap_deseraddr(struct rpcap_sockaddr *sockaddrin, struct sockaddr **sockaddrout, char *errbuf)
314 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
344 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
441 sock_geterrmsg(p->errbuf, PCAP_ERRBUF_SIZE,
463 p->bufsize, p->errbuf, PCAP_ERRBUF_SIZE);
479 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
490 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
534 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
568 header, p->errbuf) == -1)
583 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
924 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
956 sizeof(struct rpcap_header), p->errbuf, PCAP_ERRBUF_SIZE) < 0)
961 RPCAP_MSG_STATS_REQ, &header, p->errbuf) == -1)
968 sizeof(struct rpcap_stats), &plen, p->errbuf) == -1)
984 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, plen, p->errbuf) == -1)
1013 * \param errbuf: a pointer to a user-allocated buffer (of size
1021 rpcap_remoteact_getsock(const char *host, int *error, char *errbuf)
1032 addrinfo = sock_initaddress(host, NULL, &hints, errbuf,
1081 * (if one) is returned into the 'errbuf' field of the pcap_t structure.
1152 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1162 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1186 addrinfo = sock_initaddress(NULL, NULL, &hints, fp->errbuf,
1192 1 /* max 1 connection in queue */, fp->errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1203 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1221 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE,
1233 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1244 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1275 if (sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, sendbuf, sendbufidx, fp->errbuf,
1281 RPCAP_MSG_STARTCAP_REQ, &header, fp->errbuf) == -1)
1287 sizeof(struct rpcap_startcapreply), &plen, fp->errbuf) == -1)
1314 fp->errbuf, PCAP_ERRBUF_SIZE);
1318 if ((sockdata = sock_open(host, addrinfo, SOCKOPEN_CLIENT, 0, fp->errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
1336 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1342 sock_close(sockdata, fp->errbuf, PCAP_ERRBUF_SIZE);
1353 pr->data_ssl = ssl_promotion(0, sockdata, fp->errbuf, PCAP_ERRBUF_SIZE);
1371 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1434 pcapint_fmt_errmsg_for_errno(fp->errbuf, PCAP_ERRBUF_SIZE,
1446 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, plen, fp->errbuf) == -1)
1557 * is returned into the 'errbuf' field of the pcap_t structure.
1578 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1585 NULL, sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1638 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1648 if (sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, sendbuf, sendbufidx, fp->errbuf,
1654 RPCAP_MSG_UPDATEFILTER_REQ, &header, fp->errbuf) == -1)
1660 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, header.plen, fp->errbuf) == -1)
1728 * is returned into the 'errbuf' field of the pcap_t structure.
1751 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1759 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1768 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1777 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1785 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1793 sock_geterrmsg(fp->errbuf, PCAP_ERRBUF_SIZE,
1811 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE,
1828 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE,
1864 * error message is returned in the 'errbuf' member of the pcap_t structure.
1884 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE,
1889 snprintf(fp->errbuf, PCAP_ERRBUF_SIZE,
1895 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1906 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, fp->errbuf, PCAP_ERRBUF_SIZE))
1914 if (sock_send(pr->rmt_sockctrl, pr->ctrl_ssl, sendbuf, sendbufidx, fp->errbuf,
1920 RPCAP_MSG_SETSAMPLING_REQ, &header, fp->errbuf) == -1)
1926 if (rpcap_discard(pr->rmt_sockctrl, pr->ctrl_ssl, header.plen, fp->errbuf) == -1)
1966 * \param errbuf: a pointer to a user-allocated buffer (of size
1972 * an error message string is returned in the 'errbuf' variable.
1975 int *byte_swapped, struct pcap_rmtauth *auth, char *errbuf)
2005 snprintf(errbuf, PCAP_ERRBUF_SIZE, "User name is too long (> 65535 bytes)");
2015 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Password is too long (> 65535 bytes)");
2023 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication type not recognized.");
2036 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE))
2045 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE))
2060 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE))
2069 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE))
2076 if (sock_send(sockctrl, ssl, sendbuf, sendbufidx, errbuf,
2082 &header, errbuf) == -1)
2099 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2124 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2132 reply_len, &plen, errbuf) == -1)
2139 if (rpcap_discard(sockctrl, ssl, plen, errbuf) == -1)
2151 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2229 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2241 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2250 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
2258 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,
2267 char *host, char *port, char *iface, char *errbuf)
2279 errbuf) == -1)
2287 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2299 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2306 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1)
2310 activeconn = rpcap_remoteact_getsock(host, &error, errbuf);
2345 &hints, errbuf, PCAP_ERRBUF_SIZE);
2350 errbuf, PCAP_ERRBUF_SIZE);
2356 errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2369 *sslp = ssl_promotion(0, *sockctrlp, errbuf,
2377 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2385 byte_swappedp, auth, errbuf) == -1)
2430 * \param errbuf: see pcap_open().
2434 * calls (pcap_compile() and so on). In case of problems, errbuf contains
2442 pcap_t *pcap_open_rpcap(const char *source, int snaplen, int flags, int read_timeout, struct pcap_rmtauth *auth, char *errbuf)
2461 fp = PCAP_CREATE_COMMON(errbuf, struct pcap_rpcap);
2468 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
2498 host, ctrlport, iface, errbuf) == -1)
2513 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errbuf, PCAP_ERRBUF_SIZE))
2520 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errbuf, PCAP_ERRBUF_SIZE))
2523 if (sock_send(sockctrl, ssl, sendbuf, sendbufidx, errbuf,
2529 RPCAP_MSG_OPEN_REQ, &header, errbuf) == -1)
2535 sizeof(struct rpcap_openreply), &plen, errbuf) == -1)
2539 if (rpcap_discard(sockctrl, ssl, plen, errbuf) == -1)
2616 pcap_findalldevs_ex_remote(const char *source, struct pcap_rmtauth *auth, pcap_if_t **alldevs, char *errbuf)
2642 errbuf) == -1)
2653 errbuf, PCAP_ERRBUF_SIZE) < 0)
2658 RPCAP_MSG_FINDALLIF_REQ, &header, errbuf) == -1)
2677 sizeof(struct rpcap_findalldevs_if), &plen, errbuf) == -1)
2688 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
2720 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface name too long");
2726 findalldevs_if.namelen, &plen, errbuf) == -1)
2733 host, port, tmpstring, uses_ssl, errbuf) == -1)
2739 pcapint_fmt_errmsg_for_errno(errbuf,
2749 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Interface description too long");
2755 findalldevs_if.desclen, &plen, errbuf) == -1)
2764 pcapint_fmt_errmsg_for_errno(errbuf,
2781 &plen, errbuf) == -1)
2790 pcapint_fmt_errmsg_for_errno(errbuf,
2801 errbuf) == -1)
2807 errbuf) == -1)
2813 errbuf) == -1)
2819 errbuf) == -1)
2853 if (rpcap_discard(sockctrl, ssl, plen, errbuf) == 1)
2868 if (sock_close(sockctrl, errbuf, PCAP_ERRBUF_SIZE))
2924 PCAP_SOCKET pcap_remoteact_accept_ex(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, int uses_ssl, char *errbuf)
2948 if (sock_init(errbuf, PCAP_ERRBUF_SIZE) == -1)
2955 RPCAP_DEFAULT_NETPORT_ACTIVE, &hints, errbuf,
2960 addrinfo = sock_initaddress(address, port, &hints, errbuf,
2968 if ((sockmain = sock_open(NULL, addrinfo, SOCKOPEN_SERVER, 1, errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2987 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, "accept() failed");
2995 ssl = ssl_promotion(0, sockctrl, errbuf, PCAP_ERRBUF_SIZE);
3002 snprintf(errbuf, PCAP_ERRBUF_SIZE, "No TLS support");
3011 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE,
3013 rpcap_senderror(sockctrl, ssl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
3027 if (sock_check_hostlist(hostlist, RPCAP_HOSTLIST_SEP, &from, errbuf, PCAP_ERRBUF_SIZE) < 0)
3029 rpcap_senderror(sockctrl, ssl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
3046 auth, errbuf) == -1)
3049 rpcap_senderror(sockctrl, ssl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
3092 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
3094 rpcap_senderror(sockctrl, ssl, protocol_version, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
3117 PCAP_SOCKET pcap_remoteact_accept(const char *address, const char *port, const char *hostlist, char *connectinghost, struct pcap_rmtauth *auth, char *errbuf)
3119 return pcap_remoteact_accept_ex(address, port, hostlist, connectinghost, auth, 0, errbuf);
3122 int pcap_remoteact_close(const char *host, char *errbuf)
3136 addrinfo = sock_initaddress(host, NULL, &hints, errbuf,
3163 sizeof(struct rpcap_header), errbuf,
3196 if (sock_close(temp->sockctrl, errbuf,
3232 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The host you want to close the active connection is not known");
3258 int pcap_remoteact_list(char *hostlist, char sep, int size, char *errbuf)
3271 /*int sock_getascii_addrport(const struct sockaddr_storage *sockaddr, char *address, int addrlen, char *port, int portlen, int flags, char *errbuf, int errbuflen) */
3275 RPCAP_HOSTLIST_SIZE, NULL, 0, NI_NUMERICHOST, errbuf, PCAP_ERRBUF_SIZE) != -1)
3279 /* sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE, */
3288 snprintf(errbuf, PCAP_ERRBUF_SIZE, "The string you provided is not able to keep "
3306 static int rpcap_recv_msg_header(PCAP_SOCKET sock, SSL *ssl, struct rpcap_header *header, char *errbuf)
3311 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf,
3326 static int rpcap_check_msg_ver(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, struct rpcap_header *header, char *errbuf)
3336 if (rpcap_discard(sock, ssl, header->plen, errbuf) == -1)
3342 if (errbuf != NULL)
3344 snprintf(errbuf, PCAP_ERRBUF_SIZE,
3357 static int rpcap_check_msg_type(PCAP_SOCKET sock, SSL *ssl, uint8 request_type, struct rpcap_header *header, uint16 *errcode, char *errbuf)
3372 rpcap_msg_err(sock, ssl, header->plen, errbuf);
3391 if (rpcap_discard(sock, ssl, header->plen, errbuf) == -1)
3399 if (errbuf != NULL)
3404 snprintf(errbuf, PCAP_ERRBUF_SIZE,
3410 snprintf(errbuf, PCAP_ERRBUF_SIZE,
3414 snprintf(errbuf, PCAP_ERRBUF_SIZE,
3427 static int rpcap_process_msg_header(PCAP_SOCKET sock, SSL *ssl, uint8 expected_ver, uint8 request_type, struct rpcap_header *header, char *errbuf)
3431 if (rpcap_recv_msg_header(sock, ssl, header, errbuf) == -1)
3440 if (rpcap_check_msg_ver(sock, ssl, expected_ver, header, errbuf) == -1)
3447 &errcode, errbuf);
3459 static int rpcap_recv(PCAP_SOCKET sock, SSL *ssl, void *buffer, size_t toread, uint32 *plen, char *errbuf)
3466 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Message payload is too short");
3470 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE);
3484 char errbuf[PCAP_ERRBUF_SIZE];
3493 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf,
3498 snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf);
3530 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf,
3535 snprintf(remote_errbuf, PCAP_ERRBUF_SIZE, "Read of error message from client failed: %s", errbuf);
3553 static int rpcap_discard(PCAP_SOCKET sock, SSL *ssl, uint32 len, char *errbuf)
3557 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1)
3590 SOCK_RECEIVEALL_NO|SOCK_EOF_IS_ERROR, p->errbuf,
3621 snprintf(p->errbuf, PCAP_ERRBUF_SIZE,