/dports/security/snort3/snort3-3.1.19.0/src/network_inspectors/appid/detector_plugins/test/ |
H A D | detector_smtp_test.cc | 54 const uint8_t* data_end = client_str + strlen((const char*)client_str)-2; 92 const uint8_t* data_end = client_str + strlen((const char*)client_str)-2; 109 const uint8_t* data_end = client_str + strlen((const char*)client_str)-2; 124 const uint8_t* data_end = client_str + strlen((const char*)client_str)-2; 137 check_client_version(client_str, APP_ID_OUTLOOK, "15.0", 151 check_client_version(client_str, APP_ID_OUTLOOK, "11.0", 164 check_client_version(client_str, APP_ID_LOTUS_NOTES, "2.0", 181 const uint8_t* data_end = client_str + strlen((const char*)client_str)-2; 197 check_client_version(client_str, APP_ID_EUDORA_PRO, "2.2", 203 const uint8_t* client_str=(const uint8_t*)"AOL 6.4\r\n"; [all …]
|
/dports/www/trafficserver/trafficserver-9.1.1/plugins/tcpinfo/ |
H A D | tcpinfo.cc | 108 char client_str[INET6_ADDRSTRLEN]; in log_tcp_info() local 141 inet_ntop(client_addr.sa->sa_family, client_addr.addr(), client_str, sizeof(client_str)); in log_tcp_info() 149 …Write(config->log, "%s %s %s %u %u %u %u %u %u %u %u %u %u %u %u %u %u %u", event_name, client_str, in log_tcp_info() 155 …config->log, "%s %s %s %u %u %u %u %u %u %u %u %u %u %u %u %u", event_name, client_str, server_str, in log_tcp_info() 162 …config->log, "%s %s %s %u %u %u %u %u %u %u %u %u %u %u %u %u", event_name, client_str, server_str, in log_tcp_info() 169 …ret = TSTextLogObjectWrite(config->log, "%s %s %s %u", event_name, client_str, server_str, info.tc… in log_tcp_info()
|
/dports/net/dhcp6/wide-dhcpv6-20080615.2/ |
H A D | dhcp6relay_script.c | 63 static char client_str[] = "client"; variable 140 elen = sizeof (client_str) + 1 + strlen(t) + 1; 148 snprintf(s, elen, "%s=%s", client_str, t);
|
/dports/net/samba412/samba-4.12.15/dfs_server/ |
H A D | dfs_server_ad.c | 577 char *client_str = NULL; in dodc_referral() local 599 client_str = tsocket_address_inet_addr_string(client, r); in dodc_referral() 600 if (client_str == NULL) { in dodc_referral() 605 site_name = samdb_client_site_name(sam_ctx, r, client_str, NULL, true); in dodc_referral() 688 char *client_str = NULL; in dosysvol_referral() local 710 client_str = tsocket_address_inet_addr_string(client, r); in dosysvol_referral() 711 if (client_str == NULL) { in dosysvol_referral() 716 site_name = samdb_client_site_name(sam_ctx, r, client_str, NULL, true); in dosysvol_referral()
|
/dports/www/trafficserver/trafficserver-9.1.1/plugins/experimental/traffic_dump/ |
H A D | session_data.cc | 456 char client_str[INET6_ADDRSTRLEN]; in global_session_handler() local 459 …inet_ntop(AF_INET, &(reinterpret_cast<sockaddr_in const *>(client_ip)->sin_addr), client_str, INET… in global_session_handler() 461 …NET6, &(reinterpret_cast<sockaddr_in6 const *>(client_ip)->sin6_addr), client_str, INET6_ADDRSTRLE… in global_session_handler() 464 snprintf(client_str, INET6_ADDRSTRLEN, "unknown"); in global_session_handler() 470 ts::file::path log_p = log_directory / ts::file::path(std::string(client_str, 3)); in global_session_handler()
|
/dports/security/softether5/SoftEtherVPN-5.02.5180/src/Cedar/ |
H A D | Session.h | 310 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str); 311 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h…
|
H A D | Connection.h | 238 CONNECTION *NewClientConnectionEx(SESSION *s, char *client_str, UINT client_ver, UINT client_build);
|
H A D | Session.c | 1789 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str) in NewRpcSessionEx() argument 1791 return NewRpcSessionEx2(cedar, option, err, client_str, NULL); in NewRpcSessionEx() 1793 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h… in NewRpcSessionEx2() argument 1827 c = s->Connection = NewClientConnectionEx(s, client_str, cedar->Version, cedar->Build); in NewRpcSessionEx2()
|
/dports/security/softether-devel/v4.36-9754/src/Cedar/ |
H A D | Session.h | 413 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str); 414 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h…
|
H A D | Connection.h | 329 CONNECTION *NewClientConnectionEx(SESSION *s, char *client_str, UINT client_ver, UINT client_build);
|
H A D | Session.c | 1874 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str) in NewRpcSessionEx() argument 1876 return NewRpcSessionEx2(cedar, option, err, client_str, NULL); in NewRpcSessionEx() 1878 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h… in NewRpcSessionEx2() argument 1912 c = s->Connection = NewClientConnectionEx(s, client_str, cedar->Version, cedar->Build); in NewRpcSessionEx2()
|
H A D | Connection.c | 3615 CONNECTION *NewClientConnectionEx(SESSION *s, char *client_str, UINT client_ver, UINT client_build) in NewClientConnectionEx() argument 3640 if (client_str == NULL) in NewClientConnectionEx() 3665 StrCpy(c->ClientStr, sizeof(c->ClientStr), client_str); in NewClientConnectionEx()
|
/dports/security/softether/v4.38-9760/src/Cedar/ |
H A D | Session.h | 414 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str); 415 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h…
|
H A D | Connection.h | 330 CONNECTION *NewClientConnectionEx(SESSION *s, char *client_str, UINT client_ver, UINT client_build);
|
H A D | Session.c | 1874 SESSION *NewRpcSessionEx(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str) in NewRpcSessionEx() argument 1876 return NewRpcSessionEx2(cedar, option, err, client_str, NULL); in NewRpcSessionEx() 1878 SESSION *NewRpcSessionEx2(CEDAR *cedar, CLIENT_OPTION *option, UINT *err, char *client_str, void *h… in NewRpcSessionEx2() argument 1912 c = s->Connection = NewClientConnectionEx(s, client_str, cedar->Version, cedar->Build); in NewRpcSessionEx2()
|
/dports/security/libssh/libssh-0.9.6/src/ |
H A D | kex.c | 299 static int cmp_first_kex_algo(const char *client_str, in cmp_first_kex_algo() argument 308 colon = strchr(client_str, ','); in cmp_first_kex_algo() 310 client_kex_len = strlen(client_str); in cmp_first_kex_algo() 312 client_kex_len = colon - client_str; in cmp_first_kex_algo() 326 is_wrong = (strncmp(client_str, server_str, client_kex_len) != 0); in cmp_first_kex_algo()
|
/dports/net/dante/dante-1.4.3/sockd/ |
H A D | sockd_udp.c | 762 char client_str[MAXSOCKADDRSTRING], local 771 sockaddr2string(&client->client, client_str, sizeof(client_str)),
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/feature/control/ |
H A D | control_cmd.c | 1797 SMARTLIST_FOREACH(auth_clients_v3_str, char *, client_str, { in handle_control_add_onion() 1798 control_printf_midreply(conn, 250, "ClientAuthV3=%s", client_str); in handle_control_add_onion() 1838 SMARTLIST_FOREACH(auth_clients_v3_str, char *, client_str, in handle_control_add_onion() 1839 tor_free(client_str)); in handle_control_add_onion()
|
/dports/security/tor/tor-0.4.6.8/src/feature/control/ |
H A D | control_cmd.c | 1797 SMARTLIST_FOREACH(auth_clients_v3_str, char *, client_str, { in handle_control_add_onion() 1798 control_printf_midreply(conn, 250, "ClientAuthV3=%s", client_str); in handle_control_add_onion() 1838 SMARTLIST_FOREACH(auth_clients_v3_str, char *, client_str, in handle_control_add_onion() 1839 tor_free(client_str)); in handle_control_add_onion()
|
/dports/net/x11vnc/x11vnc-0.9.16/ |
H A D | tkx11vnc | 4853 global x11vnc_client_file client_str client_info_read 4896 set client_str $str 4915 global client_str 4916 set_client_balloon $client_str 5228 global client_str saved_clients_str 5230 if {[info exists client_str]} { 5231 if {$client_str != ""} { 5232 set str $client_str 5320 global x11vnc_client_file client_tail client_sock client_str saved_clients_str 6356 set client_str $cres [all …]
|
/dports/polish/libgadu/libgadu-1.12.2/src/ |
H A D | handlers.c | 98 char client_str[1000]; in gg_session_handle_welcome_110() local 126 snprintf(client_str, sizeof(client_str), "%s%s%s", in gg_session_handle_welcome_110() 128 client_str[sizeof(client_str) - 1] = '\0'; in gg_session_handle_welcome_110() 137 msg.client = client_str; in gg_session_handle_welcome_110()
|
/dports/net-im/libpurple/pidgin-2.14.8/libpurple/protocols/gg/lib/ |
H A D | handlers.c | 98 char client_str[1000]; in gg_session_handle_welcome_110() local 126 snprintf(client_str, sizeof(client_str), "%s%s%s", in gg_session_handle_welcome_110() 128 client_str[sizeof(client_str) - 1] = '\0'; in gg_session_handle_welcome_110() 137 msg.client = client_str; in gg_session_handle_welcome_110()
|
/dports/net-im/pidgin/pidgin-2.14.8/libpurple/protocols/gg/lib/ |
H A D | handlers.c | 98 char client_str[1000]; in gg_session_handle_welcome_110() local 126 snprintf(client_str, sizeof(client_str), "%s%s%s", in gg_session_handle_welcome_110() 128 client_str[sizeof(client_str) - 1] = '\0'; in gg_session_handle_welcome_110() 137 msg.client = client_str; in gg_session_handle_welcome_110()
|
/dports/net-im/finch/pidgin-2.14.8/libpurple/protocols/gg/lib/ |
H A D | handlers.c | 98 char client_str[1000]; in gg_session_handle_welcome_110() local 126 snprintf(client_str, sizeof(client_str), "%s%s%s", in gg_session_handle_welcome_110() 128 client_str[sizeof(client_str) - 1] = '\0'; in gg_session_handle_welcome_110() 137 msg.client = client_str; in gg_session_handle_welcome_110()
|
/dports/security/openssl-quictls/openssl-7f2ab56a2b842b8e6fefc7b9d20eb5ff9c6ef151/test/ |
H A D | sslapitest.c | 9565 static const char *client_str = "CLIENT"; in test_quic_api_version() local 9584 (unsigned char*)client_str, in test_quic_api_version() 9585 strlen(client_str)+1)) in test_quic_api_version() 9601 if (!TEST_mem_eq(peer_str, peer_str_len, client_str, strlen(client_str)+1)) in test_quic_api_version() 9717 static const char *client_str = "CLIENT"; in quic_setupearly_data_test() local 9748 (unsigned char*)client_str, in quic_setupearly_data_test() 9749 strlen(client_str)+1)) in quic_setupearly_data_test() 9817 (unsigned char*)client_str, in quic_setupearly_data_test() 9818 strlen(client_str)+1)) in quic_setupearly_data_test()
|