/dports/security/medusa/medusa-2.2/src/modsrc/ |
H A D | pop3.c | 416 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in getAuthType() 421 FREE(bufSend); in getAuthType() 475 memset(bufSend, 0, sizeof(bufSend)); in sendAuthUSER() 482 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthUSER() 511 memset(bufSend, 0, sizeof(bufSend)); in sendAuthUSER() 514 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthUSER() 562 FREE(bufSend); in sendAuthPLAIN() 595 FREE(bufSend); in sendAuthLOGIN() 698 FREE(bufSend); in sendAuthNTLM() 730 FREE(bufSend); in sendAuthNTLM() [all …]
|
H A D | imap.c | 397 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initConnection() 400 FREE(bufSend); in initConnection() 403 FREE(bufSend); in initConnection() 428 FREE(bufSend); in initConnection() 524 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in sendAuthLogin() 530 FREE(bufSend); in sendAuthLogin() 554 FREE(bufSend); in sendAuthPlain() 593 FREE(bufSend); in sendAuthPlain() 627 FREE(bufSend); in sendAuthNTLM() 660 FREE(bufSend); in sendAuthNTLM() [all …]
|
H A D | smtp.c | 366 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in initConnection() 369 FREE(bufSend); in initConnection() 372 FREE(bufSend); in initConnection() 398 FREE(bufSend); in initConnection() 510 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in sendAuthPLAIN() 514 FREE(bufSend); in sendAuthPLAIN() 544 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in sendAuthPLAIN() 548 FREE(bufSend); in sendAuthPLAIN() 584 FREE(bufSend); in sendAuthLOGIN() 723 FREE(bufSend); in sendAuthNTLM() [all …]
|
H A D | nntp.c | 233 unsigned char bufSend[BUF_SIZE]; in terminateConnection() local 235 memset(bufSend, 0, sizeof(bufSend)); in terminateConnection() 238 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in terminateConnection() 250 unsigned char bufSend[BUF_SIZE]; in initConnection() local 282 memset(bufSend, 0, sizeof(bufSend)); in initConnection() 285 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initConnection() 320 unsigned char bufSend[BUF_SIZE]; in tryLogin() local 325 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 328 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in tryLogin() 353 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() [all …]
|
H A D | smtp-vrfy.c | 392 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in initConnection() 395 FREE(bufSend); in initConnection() 398 FREE(bufSend); in initConnection() 418 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in initConnection() 421 FREE(bufSend); in initConnection() 424 FREE(bufSend); in initConnection() 451 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in initConnection() 484 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in initConnection() 487 FREE(bufSend); in initConnection() 490 FREE(bufSend); in initConnection() [all …]
|
H A D | vmauthd.c | 258 unsigned char* bufSend = NULL; in tryLogin() local 262 bufSend = malloc(strlen(szLogin) + 7 + 1); in tryLogin() 263 memset(bufSend, 0, strlen(szLogin) + 7 + 1); in tryLogin() 266 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in tryLogin() 269 FREE(bufSend); in tryLogin() 272 FREE(bufSend); in tryLogin() 284 bufSend = malloc(strlen(szPassword) + 7 + 1); in tryLogin() 285 memset(bufSend, 0, strlen(szPassword) + 7 + 1); in tryLogin() 288 if (medusaSend(hSocket, bufSend, strlen((char *)bufSend), 0) < 0) in tryLogin() 291 FREE(bufSend); in tryLogin() [all …]
|
H A D | rlogin.c | 218 unsigned char bufSend[BUF_SIZE]; in tryLogin() local 223 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 224 bufSend[0]=0x00; in tryLogin() 225 strncpy((char *)bufSend+1, szLogin, strlen(szLogin)); in tryLogin() 226 bufSend[strlen(szLogin)+1]=0x00; in tryLogin() 227 strncpy((char *)bufSend+2+strlen(szLogin), szLogin, strlen(szLogin)); in tryLogin() 228 bufSend[strlen(szLogin)+1+strlen(szLogin)+1]=0x00; in tryLogin() 229 strncpy((char *)bufSend+1+strlen(szLogin)+1+strlen(szLogin)+1, "xterm", 5); in tryLogin() 230 bufSend[strlen(szLogin)+1+strlen(szLogin)+1+7]=0x00; in tryLogin() 260 sprintf((char *)bufSend,"%s\r",szPassword); in tryLogin() [all …]
|
H A D | ftp.c | 374 unsigned char bufSend[BUF_SIZE]; in initAuthSSL() local 380 memset(bufSend, 0, BUF_SIZE); in initAuthSSL() 381 sprintf((char*)bufSend, "AUTH TLS\r\n"); in initAuthSSL() 382 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in initAuthSSL() 419 unsigned char bufSend[BUF_SIZE]; in tryLogin() local 424 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 427 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in tryLogin() 462 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 465 if (medusaSend(hSocket, bufSend, strlen((char*)bufSend), 0) < 0) in tryLogin() 504 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() [all …]
|
H A D | pcanywhere.c | 313 unsigned char bufSend[MAX_BUF]; in pcaUserAuth() local 355 memset(bufSend, 0, BUF_SIZE); in pcaUserAuth() 356 bufSend[0] = 0x06; in pcaUserAuth() 357 bufSend[1] = strlen(clogin); in pcaUserAuth() 380 bufSend[0] = 0x06; in pcaUserAuth() 381 bufSend[1] = strlen(clogin); in pcaUserAuth() 390 bufSend[0] = 0x06; in pcaUserAuth() 392 bufSend[2] = 0xf7; in pcaUserAuth() 446 memset(bufSend, 0, BUF_SIZE); in pcaUserAuth() 447 bufSend[0] = 0x06; in pcaUserAuth() [all …]
|
H A D | rsh.c | 220 unsigned char bufSend[BUF_SIZE]; in tryLogin() local 228 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 229 bufSend[0]=0x00; in tryLogin() 230 strncpy((char *)bufSend+1, szLogin, strlen(szLogin)); in tryLogin() 231 bufSend[strlen(szLogin)+1]=0x00; in tryLogin() 232 strncpy((char *)bufSend+2+strlen(szLogin), szPassword, strlen(szPassword)); in tryLogin() 233 bufSend[strlen(szLogin)+1+strlen(szPassword)+1]=0x00; in tryLogin() 234 strncpy((char *)bufSend+1+strlen(szLogin)+1+strlen(szPassword)+1, "id", 3); in tryLogin() 235 bufSend[strlen(szLogin)+1+strlen(szPassword)+1+3]=0x00; in tryLogin() 237 if (medusaSend(hSocket, bufSend, strlen(szLogin)+1+strlen(szPassword)+1+4 , 0) < 0) in tryLogin()
|
H A D | http.c | 401 unsigned char* bufSend = NULL; in getAuthType() local 419 FREE(bufSend); in getAuthType() 423 FREE(bufSend); in getAuthType() 464 unsigned char* bufSend = NULL; in sendAuthBasic() local 504 FREE(bufSend); in sendAuthBasic() 510 unsigned char* bufSend = NULL; in sendAuthNTLM() local 549 FREE(bufSend); in sendAuthNTLM() 612 FREE(bufSend); in sendAuthNTLM() 620 unsigned char* bufSend = NULL; in sendAuthDigest() local 675 FREE(bufSend); in sendAuthDigest() [all …]
|
H A D | snmp.c | 556 unsigned char* bufSend; in sendRead() local 601 bufSend = malloc(nSendBufferSize); in sendRead() 602 memset(bufSend, 0, nSendBufferSize); in sendRead() 603 memcpy(bufSend, &snmpv1_a, sizeof(snmpv1_a)); in sendRead() 611 free(bufSend); in sendRead() 614 free(bufSend); in sendRead() 621 unsigned char* bufSend; in sendWrite() local 668 bufSend = malloc(nSendBufferSize); in sendWrite() 669 memset(bufSend, 0, nSendBufferSize); in sendWrite() 683 free(bufSend); in sendWrite() [all …]
|
H A D | rexec.c | 220 unsigned char bufSend[BUF_SIZE]; in tryLogin() local 225 memset(bufSend, 0, sizeof(bufSend)); in tryLogin() 226 bufSend[0]=0x00; in tryLogin() 227 strncpy((char *)bufSend+1, szLogin, strlen(szLogin)); in tryLogin() 228 bufSend[strlen(szLogin)+1]=0x00; in tryLogin() 229 strncpy((char *)bufSend+2+strlen(szLogin), szPassword, strlen(szPassword)); in tryLogin() 230 bufSend[strlen(szLogin)+1+strlen(szPassword)+1]=0x00; in tryLogin() 231 strncpy((char *)bufSend+1+strlen(szLogin)+1+strlen(szPassword)+1, "id", 3); in tryLogin() 232 bufSend[strlen(szLogin)+1+strlen(szPassword)+1+3]=0x00; in tryLogin() 234 if (medusaSend(hSocket, bufSend, strlen(szLogin)+1+strlen(szPassword)+1+4 , 0) < 0) in tryLogin()
|
H A D | telnet.c | 424 unsigned char bufSend[BUFFER_SIZE]; in tryLogin() local 441 memset(bufSend, 0, BUFFER_SIZE); in tryLogin() 442 sprintf((char *)bufSend, "%s\r", szLogin); in tryLogin() 519 memset(bufSend, 0, BUFFER_SIZE); in tryLogin() 520 sprintf((char *)bufSend, "%s\r", szPassword); in tryLogin() 523 if (medusaSend(hSocket, bufSend, nSendBufferSize, 0) < 0) in tryLogin() 621 unsigned char bufSend[BUFFER_SIZE]; in tryLoginAS400() local 657 memset(bufSend, 0, BUFFER_SIZE); in tryLoginAS400() 664 sprintf((char *)bufSend, "%s\t%s\r", szUser, szPass); in tryLoginAS400() 665 nSendBufferSize = strlen((char *)bufSend) + 1; in tryLoginAS400() [all …]
|
H A D | web-form.c | 498 unsigned char* bufSend = NULL; in sendPost() local 509 …nSendBufferSize = asprintf((char **)&bufSend, "POST /%s HTTP/1.0\r\nHost: %s\r\nUser-Agent: %s\r\n… in sendPost() 511 if (medusaSend(hSocket, bufSend, nSendBufferSize, 0) < 0) in sendPost() 517 free(bufSend); in sendPost() 524 unsigned char* bufSend = NULL; in sendGet() local 529 …nSendBufferSize = asprintf((char **)&bufSend, "GET /%s?%s%s&%s%s HTTP/1.0\r\nHost: %s\r\nUser-Agen… in sendGet() 531 …nSendBufferSize = asprintf((char **)&bufSend, "GET /%s?%s%s&%s%s&%s HTTP/1.0\r\nHost: %s\r\nUser-A… in sendGet() 533 if (medusaSend(hSocket, bufSend, nSendBufferSize, 0) < 0) in sendGet() 539 free(bufSend); in sendGet()
|
H A D | wrapper.c | 507 char *bufSend; in tryLogin() local 512 bufSend = malloc(strlen(szPassword) + 2); in tryLogin() 513 memset(bufSend, 0, strlen(szPassword) + 2); in tryLogin() 514 sprintf(bufSend, "%s\n", szPassword); in tryLogin() 515 iDataProcessed = write(_psSessionData->PARENT_WRITE, bufSend, strlen(bufSend)); in tryLogin() 516 …UG_MODULE, "Sending account login credentials to child process: %s (%d)", bufSend, iDataProcessed); in tryLogin()
|
H A D | vnc.c | 801 unsigned char *bufSend = NULL; in sendAuthMSLogin() local 890 bufSend = malloc(8 + sizeof(ms_user) + sizeof(ms_passwd) + 1); in sendAuthMSLogin() 891 memset(bufSend, 0, 8 + sizeof(ms_user) + sizeof(ms_passwd) + 1); in sendAuthMSLogin() 897 memcpy(bufSend, client_pub, 8); in sendAuthMSLogin() 898 memcpy(bufSend + 8, ms_user, sizeof(ms_user)); in sendAuthMSLogin() 899 memcpy(bufSend + 8 + sizeof(ms_user), ms_passwd, sizeof(ms_passwd)); in sendAuthMSLogin() 901 if (medusaSend(hSocket, bufSend, 8 + sizeof(ms_user) + sizeof(ms_passwd), 0) < 0) in sendAuthMSLogin()
|
H A D | mssql.c | 485 unsigned char bufSend[3 * MSLEN + 422 + 1]; in tryLogin() local 499 memset(bufSend, 0, 3 * MSLEN + 422 + 1); in tryLogin() 500 makeSQLLogin(szLogin, szPassword, bufSend); in tryLogin() 502 if (medusaSend(hSocket, bufSend, MSLEN + 1 + 39 + MSLEN + 1 + 110 + 1 + MSLEN + 270, 0) < 0) in tryLogin()
|
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/ooni/psiphon/oopsi/github.com/refraction-networking/gotapdance/tapdance/ |
H A D | utils.go | 97 bufSend := new(bytes.Buffer) 102 bufSend.Grow(2 + len(msgBytes)) // to avoid double allocation 103 err = binary.Write(bufSend, binary.BigEndian, int16(len(msgBytes))) 106 bufSend.Grow(2 + 4 + len(msgBytes)) // to avoid double allocation 107 bufSend.Write([]byte{0, 0}) 108 err = binary.Write(bufSend, binary.BigEndian, int32(len(msgBytes))) 111 err = binary.Write(bufSend, binary.BigEndian, int16(-len(msgBytes))) 121 bufSend.Write(msgBytes) 122 return bufSend.Bytes()
|
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/ooni/psiphon/oopsi/github.com/refraction-networking/gotapdance/tapdance/ |
H A D | utils.go | 97 bufSend := new(bytes.Buffer) 102 bufSend.Grow(2 + len(msgBytes)) // to avoid double allocation 103 err = binary.Write(bufSend, binary.BigEndian, int16(len(msgBytes))) 106 bufSend.Grow(2 + 4 + len(msgBytes)) // to avoid double allocation 107 bufSend.Write([]byte{0, 0}) 108 err = binary.Write(bufSend, binary.BigEndian, int32(len(msgBytes))) 111 err = binary.Write(bufSend, binary.BigEndian, int16(-len(msgBytes))) 121 bufSend.Write(msgBytes) 122 return bufSend.Bytes()
|
/dports/audio/carla/Carla-2.4.1/source/utils/ |
H A D | CarlaLogThread.hpp | 138 char bufSend[2048+1]; in run() local 165 std::memcpy(bufSend, bufTemp, bufTempPos); in run() 166 std::memcpy(bufSend+bufTempPos, bufRead+lastRead, k); in run() 171 std::memcpy(bufSend, bufRead+lastRead, k); in run() 175 bufSend[k] = '\0'; in run() 179 … fCallback(fCallbackPtr, CarlaBackend::ENGINE_CALLBACK_DEBUG, 0, 0, 0, 0, 0.0f, bufSend); in run()
|