Lines Matching defs:pars
127 static int daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen);
130 static int daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars,
133 static int daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars,
135 static int daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars,
138 static int daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars,
141 static int daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
145 static int daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars,
149 static int daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars,
218 struct daemon_slpars pars; // service loop parameters
418 pars.sockctrl = sockctrl;
419 pars.ssl = ssl;
420 pars.isactive = isactive; // active mode
421 pars.nullAuthAllowed = nullAuthAllowed;
432 if (pars.isactive)
447 if (getpeername(pars.sockctrl, (struct sockaddr *)&from,
452 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
475 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_HOSTNOAUTH, errmsgbuf, errbuf) == -1)
513 if (!pars.isactive)
520 FD_SET(pars.sockctrl, &rfds);
522 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv);
527 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_NETW, errmsgbuf, errbuf) == -1)
536 if (rpcap_senderror(pars.sockctrl, pars.ssl, 0, PCAP_ERR_INITTIMEOUT, "The RPCAP initial timeout has expired", errbuf) == -1)
545 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header);
568 if (rpcap_senderror(pars.sockctrl, pars.ssl, header.ver,
580 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
587 retval = daemon_msg_auth_req(&pars, plen);
613 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
625 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen);
648 if (rpcap_senderror(pars.sockctrl, pars.ssl,
656 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
684 if (rpcap_senderror(pars.sockctrl, pars.ssl,
692 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
704 if (rpcap_senderror(pars.sockctrl, pars.ssl,
712 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
750 if ((!pars.isactive) && (session == NULL || session->sockdata == 0))
758 FD_SET(pars.sockctrl, &rfds);
762 retval = select((int)pars.sockctrl + 1, &rfds, NULL, NULL, &tv);
768 if (rpcap_senderror(pars.sockctrl, pars.ssl,
779 if (rpcap_senderror(pars.sockctrl, pars.ssl,
791 nrecv = rpcapd_recv_msg_header(pars.sockctrl, pars.ssl, &header);
817 if (rpcap_senderror(pars.sockctrl, pars.ssl,
828 (void)rpcapd_discard(pars.sockctrl, pars.ssl, plen);
837 (void)daemon_msg_err(pars.sockctrl, pars.ssl, plen);
845 if (daemon_msg_findallif_req(header.ver, &pars, plen) == -1)
865 retval = daemon_msg_open_req(header.ver, &pars,
883 if (rpcap_senderror(pars.sockctrl, pars.ssl,
894 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
901 if (daemon_msg_startcap_req(header.ver, &pars,
917 &pars, session, plen) == -1)
926 if (rpcap_senderror(pars.sockctrl, pars.ssl,
954 if (daemon_msg_stats_req(header.ver, &pars,
982 &pars, session) == -1)
995 rpcap_senderror(pars.sockctrl, pars.ssl,
1007 &pars, plen, &samp_param) == -1)
1023 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1033 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1063 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1071 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1084 if (rpcap_senderror(pars.sockctrl, pars.ssl,
1092 if (rpcapd_discard(pars.sockctrl, pars.ssl, plen) == -1)
1218 daemon_msg_auth_req(struct daemon_slpars *pars, uint32 plen)
1228 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &auth, sizeof(struct rpcap_auth), &plen, errmsgbuf);
1242 if (!pars->nullAuthAllowed)
1247 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1272 status = rpcapd_recv(pars->sockctrl, pars->ssl, username, usernamelen, &plen, errmsgbuf);
1294 status = rpcapd_recv(pars->sockctrl, pars->ssl, passwd, passwdlen, &plen, errmsgbuf);
1317 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1347 if (rpcap_senderror(pars->sockctrl, pars->ssl,
1384 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1392 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1400 if (rpcap_senderror(pars->sockctrl, pars->ssl, 0, PCAP_ERR_AUTH,
1410 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1602 daemon_msg_findallif_req(uint8 ver, struct daemon_slpars *pars, uint32 plen)
1615 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1627 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
1826 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1838 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
1852 daemon_msg_open_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
1869 nread = sock_recv(pars->sockctrl, pars->ssl, source, plen,
1925 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
1933 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_OPEN,
1942 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
1954 daemon_msg_startcap_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
1981 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &startcapreq,
2049 serveropen_dp = (startcapreq.flags & RPCAP_STARTCAPREQ_FLAG_SERVEROPEN) || (startcapreq.flags & RPCAP_STARTCAPREQ_FLAG_DGRAM) || pars->isactive;
2061 if (getpeername(pars->sockctrl, (struct sockaddr *) &saddr, &saddrlen) == -1)
2131 session->sockctrl = pars->sockctrl;
2132 session->ctrl_ssl = pars->ssl;
2136 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2171 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2240 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2262 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver,
2271 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2296 daemon_msg_endcap_req(uint8 ver, struct daemon_slpars *pars,
2306 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof(struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2419 daemon_msg_updatefilter_req(uint8 ver, struct daemon_slpars *pars,
2427 ret = daemon_unpackapplyfilter(pars->sockctrl, pars->ssl, session, &plen, errmsgbuf);
2440 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2449 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE))
2459 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2463 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_UPDATEFILTER,
2473 daemon_msg_setsampling_req(uint8 ver, struct daemon_slpars *pars, uint32 plen,
2482 status = rpcapd_recv(pars->sockctrl, pars->ssl, (char *) &rpcap_samp, sizeof(struct rpcap_sampling), &plen, errmsgbuf);
2499 if (sock_send(pars->sockctrl, pars->ssl, (char *) &header, sizeof (struct rpcap_header), errbuf, PCAP_ERRBUF_SIZE) == -1)
2506 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2514 if (rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_SETSAMPLING,
2523 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2532 daemon_msg_stats_req(uint8 ver, struct daemon_slpars *pars,
2543 if (rpcapd_discard(pars->sockctrl, pars->ssl, plen) == -1)
2587 if (sock_send(pars->sockctrl, pars->ssl, sendbuf, sendbufidx, errbuf, PCAP_ERRBUF_SIZE) == -1)
2596 rpcap_senderror(pars->sockctrl, pars->ssl, ver, PCAP_ERR_GETSTATS,