Lines Matching refs:bufSend

361   unsigned char *bufSend = NULL;  in initConnection()  local
393 bufSend = malloc(nSendBufferSize + 1); in initConnection()
394 memset(bufSend, 0, nSendBufferSize + 1); in initConnection()
395 sprintf((char*)bufSend, "%s CAPABILITY\r\n", _psSessionData->szTag); in initConnection()
397 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initConnection()
400 FREE(bufSend); in initConnection()
403 FREE(bufSend); in initConnection()
419 bufSend = malloc(strlen(_psSessionData->szTag) + 11 + 1); in initConnection()
420 memset(bufSend, 0, strlen(_psSessionData->szTag) + 11 + 1); in initConnection()
421 sprintf((char*)bufSend, "%s STARTTLS\r\n", _psSessionData->szTag); in initConnection()
422 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initConnection()
425 FREE(bufSend); in initConnection()
428 FREE(bufSend); in initConnection()
451 bufSend = malloc(nSendBufferSize + 1); in initConnection()
452 memset(bufSend, 0, nSendBufferSize + 1); in initConnection()
453 sprintf((char*)bufSend, "%s CAPABILITY\r\n", _psSessionData->szTag); in initConnection()
455 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initConnection()
458 FREE(bufSend); in initConnection()
461 FREE(bufSend); in initConnection()
505 unsigned char* bufSend = NULL; in sendAuthLogin() local
510 bufSend = malloc(nSendBufferSize + 1); in sendAuthLogin()
511 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthLogin()
516 …sprintf((char*)bufSend, "%s LOGIN \"%s\\\\%s\" \"%s\"\r\n", _psSessionData->szTag, _psSessionData-… in sendAuthLogin()
521 … sprintf((char*)bufSend, "%s LOGIN \"%s\" \"%s\"\r\n", _psSessionData->szTag, szLogin, szPassword); in sendAuthLogin()
524 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthLogin()
530 FREE(bufSend); in sendAuthLogin()
537 unsigned char* bufSend = NULL; in sendAuthPlain() local
546 bufSend = malloc(nSendBufferSize + 1); in sendAuthPlain()
547 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthPlain()
548 sprintf((char*)bufSend, "%s AUTHENTICATE PLAIN\r\n", _psSessionData->szTag); in sendAuthPlain()
550 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthPlain()
554 FREE(bufSend); in sendAuthPlain()
582 bufSend = malloc(nSendBufferSize + 1); in sendAuthPlain()
583 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthPlain()
584 sprintf((char*)bufSend, "%s\r\n", szEncodedAuth); in sendAuthPlain()
587 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthPlain()
593 FREE(bufSend); in sendAuthPlain()
607 unsigned char* bufSend = NULL; in sendAuthNTLM() local
619 bufSend = malloc(nSendBufferSize + 1); in sendAuthNTLM()
620 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthNTLM()
621 sprintf((char*)bufSend, "%s AUTHENTICATE NTLM\r\n", _psSessionData->szTag); in sendAuthNTLM()
623 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthNTLM()
627 FREE(bufSend); in sendAuthNTLM()
649 bufSend = malloc(nSendBufferSize + 1); in sendAuthNTLM()
650 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthNTLM()
651 sprintf((char*)bufSend, "%s\r\n", szTmpBuf64); in sendAuthNTLM()
655 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthNTLM()
660 FREE(bufSend); in sendAuthNTLM()
690 bufSend = malloc(nSendBufferSize + 1); in sendAuthNTLM()
691 memset(bufSend, 0, nSendBufferSize + 1); in sendAuthNTLM()
692 sprintf((char*)bufSend, "%s\r\n", szTmpBuf64); in sendAuthNTLM()
694 if (medusaSend(hSocket, bufSend, nSendBufferSize, 0) < 0) in sendAuthNTLM()
701 FREE(bufSend); in sendAuthNTLM()