Lines Matching defs:errbuf
128 static int daemon_AuthUserPwd(char *username, char *password, char *errbuf);
143 static int daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *, struct session *session, uint32 *plenp, char *errbuf);
219 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed
247 *errbuf = 0; // Initialize errbuf
262 SOCK_EOF_ISNT_ERROR|SOCK_MSG_PEEK, errbuf, PCAP_ERRBUF_SIZE);
266 rpcapd_log(LOGPRIO_ERROR, "Peek from client failed: %s", errbuf);
327 "TLS is required by this server", errbuf) == -1)
330 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
337 ssl = ssl_promotion(1, sockctrl, errbuf, PCAP_ERRBUF_SIZE);
341 errbuf);
364 errbuf, PCAP_ERRBUF_SIZE);
368 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
394 TLS_RECORD_HEADER_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1)
397 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
404 TLS_ALERT_LEN, errbuf, PCAP_ERRBUF_SIZE) == -1)
407 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
453 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
476 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
528 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
536 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout has expired", errbuf) == -1)
537 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
571 errbuf) == -1)
574 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
650 errmsgbuf, errbuf) == -1)
652 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
686 errmsgbuf, errbuf) == -1)
688 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
706 errmsgbuf, errbuf) == -1)
708 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
739 errbuf[0] = 0; // clear errbuf
770 errmsgbuf, errbuf) == -1)
771 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
782 errbuf) == -1)
783 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
820 errbuf) == -1)
823 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
838 // Do nothing; just exit; the error code is already into the errbuf
887 errbuf) == -1)
891 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
930 errbuf) == -1)
933 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
999 errbuf);
1027 errbuf) == -1)
1029 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1065 errmsgbuf, errbuf) == -1)
1067 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1086 errbuf, errmsgbuf) == -1)
1088 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1141 char errbuf[PCAP_ERRBUF_SIZE];
1151 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf,
1155 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
1177 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf,
1181 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
1208 * \param errbuf: a user-allocated buffer in which the error message
1214 * returned in the 'errbuf' variable; this gives a message for the
1220 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1248 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1251 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1318 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1321 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1348 0, PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1)
1351 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1384 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1387 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1401 errmsgbuf, errbuf) == -1)
1404 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1419 daemon_AuthUserPwd(char *username, char *password, char *errbuf)
1446 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1463 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1505 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1513 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1541 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1556 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Authentication failed");
1563 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
1573 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
1604 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1631 errbuf) == -1)
1633 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1826 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1828 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1839 PCAP_ERR_FINDALLIF, errmsgbuf, errbuf) == -1)
1841 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1855 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1870 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE);
1873 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
1925 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1927 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1934 errmsgbuf, errbuf) == -1)
1937 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
1958 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
1998 snprintf(errbuf, PCAP_ERRBUF_SIZE,
2171 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2174 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2189 sock_geterrmsg(errbuf, PCAP_ERRBUF_SIZE,
2192 errbuf);
2208 ssl = ssl_promotion(1, session->sockdata, errbuf, PCAP_ERRBUF_SIZE);
2211 rpcapd_log(LOGPRIO_ERROR, "TLS handshake failed: %s", errbuf);
2224 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error creating the data thread");
2232 pcapint_fmt_errmsg_for_errno(errbuf, PCAP_ERRBUF_SIZE,
2263 PCAP_ERR_STARTCAPTURE, errmsgbuf, errbuf) == -1)
2266 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2299 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2306 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2309 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2422 char errbuf[PCAP_ERRBUF_SIZE];
2449 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE))
2452 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2476 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2499 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2502 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2515 errmsgbuf, errbuf) == -1)
2518 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2536 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2587 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2589 rpcapd_log(LOGPRIO_ERROR, "Send to client failed: %s", errbuf);
2608 char errbuf[PCAP_ERRBUF_SIZE + 1]; // error buffer
2626 // Initialize errbuf
2627 memset(errbuf, 0, sizeof(errbuf));
2716 &sendbufidx, (int)sendbufsize, SOCKBUF_CHECKONLY, errbuf,
2721 errbuf);
2733 &sendbufidx, (int)sendbufsize, SOCKBUF_CHECKONLY, errbuf,
2738 errbuf);
2755 errbuf, PCAP_ERRBUF_SIZE) == -1)
2759 errbuf);
2766 status = sock_send(session->sockdata, session->data_ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE);
2778 errbuf);
2797 snprintf(errbuf, PCAP_ERRBUF_SIZE, "Error reading the packets: %s", pcap_geterr(session->fp));
2799 PCAP_ERR_READEX, errbuf, NULL);
2916 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2919 SOCK_RECEIVEALL_YES|SOCK_EOF_ISNT_ERROR, errbuf, PCAP_ERRBUF_SIZE);
2923 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
2948 char errbuf[PCAP_ERRBUF_SIZE]; // buffer for network errors
2957 SOCK_RECEIVEALL_YES|SOCK_EOF_IS_ERROR, errbuf, PCAP_ERRBUF_SIZE);
2960 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);
2976 char errbuf[PCAP_ERRBUF_SIZE + 1]; // keeps the error string, prior to be printed
2980 if (sock_discard(sock, ssl, len, errbuf, PCAP_ERRBUF_SIZE) == -1)
2983 rpcapd_log(LOGPRIO_ERROR, "Read from client failed: %s", errbuf);