Lines Matching defs:errmsgbuf
161 static int rpcapd_recv(PCAP_SOCKET sock, SSL *, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf);
220 char errmsgbuf[PCAP_ERRBUF_SIZE + 1]; // buffer for errors to send to the client
450 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
460 host_port_check_status = sock_check_hostlist(passiveClients, RPCAP_HOSTLIST_SEP, &from, errmsgbuf, PCAP_ERRBUF_SIZE);
469 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
525 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
642 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s request sent before authentication was completed", msg_type_string);
646 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message of type %u sent before authentication was completed", header.type);
650 errmsgbuf, errbuf) == -1)
678 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
682 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
686 errmsgbuf, errbuf) == -1)
703 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
706 errmsgbuf, errbuf) == -1)
766 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
770 errmsgbuf, errbuf) == -1)
1056 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message %s received from client", msg_type_string);
1061 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Server-to-client message of type %u received from client", header.type);
1065 errmsgbuf, errbuf) == -1)
1083 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Unknown message type %u", header.type);
1086 errbuf, errmsgbuf) == -1)
1221 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1228 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
1245 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1248 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1268 pcapint_fmt_errmsg_for_errno(errmsgbuf,
1272 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf);
1289 pcapint_fmt_errmsg_for_errno(errmsgbuf,
1294 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf);
1309 if (daemon_AuthUserPwd(username, passwd, errmsgbuf))
1318 0, PCAP_ERR_AUTH_FAILED, errmsgbuf, errbuf) == -1)
1345 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
1348 0, PCAP_ERR_AUTH_TYPE_NOTSUP, errmsgbuf, errbuf) == -1)
1359 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1368 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1401 errmsgbuf, errbuf) == -1)
1442 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to log
1452 pcapint_fmt_errmsg_for_win32_err(errmsgbuf,
1454 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1464 pcapint_fmt_errmsg_for_win32_err(errmsgbuf, PCAP_ERRBUF_SIZE,
1466 rpcapd_log(LOGPRIO_ERROR, "%s", errmsgbuf);
1595 pcapint_strlcpy(errmsgbuf, "Reply length doesn't fit in 32 bits", \
1596 sizeof (errmsgbuf)); \
1605 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1622 if (pcap_findalldevs(&alldevs, errmsgbuf) == -1)
1649 pcapint_strlcpy(errmsgbuf,
1651 sizeof (errmsgbuf));
1659 pcapint_strlcpy(errmsgbuf,
1661 sizeof (errmsgbuf));
1683 pcapint_strlcpy(errmsgbuf,
1685 sizeof (errmsgbuf));
1699 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf,
1763 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1768 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1773 RPCAP_NETBUF_SIZE, SOCKBUF_BUFFERIZE, errmsgbuf,
1793 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1799 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1805 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1811 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1839 PCAP_ERR_FINDALLIF, errmsgbuf, errbuf) == -1)
1856 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1865 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string too long");
1883 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Source string refers to a remote device");
1893 errmsgbuf)) == NULL)
1898 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1907 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
1934 errmsgbuf, errbuf) == -1)
1959 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
1982 sizeof(struct rpcap_startcapreq), &plen, errmsgbuf);
2007 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Can't allocate session structure");
2035 errmsgbuf)) == NULL)
2063 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2081 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2087 errmsgbuf, PCAP_ERRBUF_SIZE);
2091 if ((session->sockdata = sock_open(peerhost, addrinfo, SOCKOPEN_CLIENT, 0, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2099 addrinfo = sock_initaddress(NULL, NULL, &hints, errmsgbuf,
2104 if ((session->sockdata = sock_open(NULL, addrinfo, SOCKOPEN_SERVER, 1 /* max 1 connection in queue */, errmsgbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2111 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2120 sock_geterrmsg(errmsgbuf, PCAP_ERRBUF_SIZE,
2136 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2150 RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2159 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2263 PCAP_ERR_STARTCAPTURE, errmsgbuf, errbuf) == -1)
2334 daemon_unpackapplyfilter(PCAP_SOCKET sockctrl, SSL *ctrl_ssl, struct session *session, uint32 *plenp, char *errmsgbuf)
2344 sizeof(struct rpcap_filter), plenp, errmsgbuf);
2358 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Only BPF/NPF filters are currently supported");
2364 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE,
2372 pcapint_fmt_errmsg_for_errno(errmsgbuf, PCAP_ERRBUF_SIZE,
2382 sizeof(struct rpcap_filterbpf_insn), plenp, errmsgbuf);
2405 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "The filter contains bogus instructions");
2411 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "RPCAP error: %s", pcap_geterr(session->fp));
2423 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2427 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2464 errmsgbuf, NULL);
2477 char errmsgbuf[PCAP_ERRBUF_SIZE];
2482 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf);
2515 errmsgbuf, errbuf) == -1)
2537 char errmsgbuf[PCAP_ERRBUF_SIZE]; // buffer for errors to send to the client
2550 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2559 &sendbufidx, RPCAP_NETBUF_SIZE, SOCKBUF_CHECKONLY, errmsgbuf, PCAP_ERRBUF_SIZE) == -1)
2566 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "%s", pcap_geterr(session->fp));
2597 errmsgbuf, NULL);
2938 * message into errmsgbuf and returns -2. Otherwise, tries to read
2945 rpcapd_recv(PCAP_SOCKET sock, SSL *ssl, char *buffer, size_t toread, uint32 *plen, char *errmsgbuf)
2953 snprintf(errmsgbuf, PCAP_ERRBUF_SIZE, "Message payload is too short");