Home | History | Annotate | Download | only in libpcap

Lines Matching refs:sockctrl

85 	SOCKET sockctrl;
164 static void rpcap_msg_err(SOCKET sockctrl, uint32 plen, char *remote_errbuf);
700 if (temp->sockctrl == pr->rmt_sockctrl)
1052 if (temp->sockctrl == pr->rmt_sockctrl)
1809 static int rpcap_doauth(SOCKET sockctrl, uint8 *ver, struct pcap_rmtauth *auth, char *errbuf)
1819 status = rpcap_sendauth(sockctrl, ver, auth, errbuf);
1840 status = rpcap_sendauth(sockctrl, ver, auth, errbuf);
2110 SOCKET sockctrl;
2186 sockctrl = activeconn->sockctrl;
2230 if ((sockctrl = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2240 if (rpcap_doauth(sockctrl, &protocol_version, auth, errbuf) == -1)
2242 sock_close(sockctrl, NULL, 0);
2264 if (sock_send(sockctrl, sendbuf, sendbufidx, errbuf,
2269 if (rpcap_process_msg_header(sockctrl, protocol_version,
2275 if (rpcap_recv(sockctrl, (char *)&openreply,
2286 pr->rmt_sockctrl = sockctrl;
2322 sock_close(sockctrl, NULL, 0);
2349 SOCKET sockctrl; /* socket descriptor of the control connection */
2378 sockctrl = activeconn->sockctrl;
2415 if ((sockctrl = sock_open(addrinfo, SOCKOPEN_CLIENT, 0, errbuf, PCAP_ERRBUF_SIZE)) == INVALID_SOCKET)
2425 if (rpcap_doauth(sockctrl, &protocol_version, auth, errbuf) == -1)
2427 sock_close(sockctrl, NULL, 0);
2437 if (sock_send(sockctrl, (char *)&header, sizeof(struct rpcap_header),
2442 if (rpcap_process_msg_header(sockctrl, protocol_version,
2462 if (rpcap_recv(sockctrl, (char *)&findalldevs_if,
2511 if (rpcap_recv(sockctrl, tmpstring,
2544 if (rpcap_recv(sockctrl, tmpstring,
2577 if (rpcap_recv(sockctrl, (char *)&ifaddr,
2651 if (rpcap_discard(sockctrl, plen, errbuf) == 1)
2658 if (sock_close(sockctrl, errbuf, PCAP_ERRBUF_SIZE))
2681 (void) rpcap_discard(sockctrl, plen, NULL);
2686 sock_close(sockctrl, NULL, 0);
2711 SOCKET sockctrl; /* keeps the main socket identifier */
2759 sockctrl = accept(sockmain, (struct sockaddr *) &from, &fromlen);
2766 if (sockctrl == INVALID_SOCKET)
2776 rpcap_senderror(sockctrl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
2777 sock_close(sockctrl, NULL, 0);
2784 rpcap_senderror(sockctrl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
2785 sock_close(sockctrl, NULL, 0);
2792 if (rpcap_doauth(sockctrl, &protocol_version, auth, errbuf) == -1)
2795 rpcap_senderror(sockctrl, 0, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
2796 sock_close(sockctrl, NULL, 0);
2810 return sockctrl;
2832 rpcap_senderror(sockctrl, protocol_version, PCAP_ERR_REMOTEACCEPT, errbuf, NULL);
2833 sock_close(sockctrl, NULL, 0);
2838 temp->sockctrl = sockctrl;
2842 return sockctrl;
2885 if (sock_send(temp->sockctrl,
2894 (void)sock_close(temp->sockctrl, NULL,
2900 if (sock_close(temp->sockctrl, errbuf,
3176 static void rpcap_msg_err(SOCKET sockctrl, uint32 plen, char *remote_errbuf)
3186 if (sock_recv(sockctrl, remote_errbuf, PCAP_ERRBUF_SIZE - 1,
3203 (void)rpcap_discard(sockctrl, plen - (PCAP_ERRBUF_SIZE - 1), remote_errbuf);
3212 if (sock_recv(sockctrl, remote_errbuf, plen,