• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/

Lines Matching refs:socksreq

117   unsigned char socksreq[SOCKS4REQLEN]; /* room for SOCKS4 request incl. user
145 socksreq[0] = 4; /* version (SOCKS4) */
146 socksreq[1] = 1; /* connect */
147 socksreq[2] = (unsigned char)((remote_port >> 8) & 0xff); /* PORT MSB */
148 socksreq[3] = (unsigned char)(remote_port & 0xff); /* PORT LSB */
179 socksreq[4] = (unsigned char)ip[0];
180 socksreq[5] = (unsigned char)ip[1];
181 socksreq[6] = (unsigned char)ip[2];
182 socksreq[7] = (unsigned char)ip[3];
202 socksreq[8] = 0; /* ensure empty userid is NUL-terminated */
205 if(plen >= sizeof(socksreq) - 8) {
210 memcpy(socksreq + 8, proxy_name, plen+1);
221 (int)strlen((char*)socksreq + 8); /* size including NUL */
225 socksreq[4] = 0;
226 socksreq[5] = 0;
227 socksreq[6] = 0;
228 socksreq[7] = 1;
232 strcpy((char*)socksreq + packetsize, hostname);
238 code = Curl_write_plain(conn, sock, (char *)socksreq,
259 result = Curl_blockread_all(conn, sock, (char *)socksreq, packetsize,
286 if(socksreq[0] != 0) {
293 switch(socksreq[1]) {
301 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
302 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
303 ((socksreq[8] << 8) | socksreq[9]),
304 socksreq[1]);
311 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
312 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
313 ((socksreq[8] << 8) | socksreq[9]),
314 socksreq[1]);
321 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
322 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
323 ((socksreq[8] << 8) | socksreq[9]),
324 socksreq[1]);
330 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
331 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
332 ((socksreq[8] << 8) | socksreq[9]),
333 socksreq[1]);
371 unsigned char socksreq[600]; /* room for large user/pw (255 max each) */
418 socksreq[0] = 5; /* version */
420 socksreq[1] = (char)(proxy_name ? 3 : 2); /* number of methods (below) */
421 socksreq[2] = 0; /* no authentication */
422 socksreq[3] = 1; /* gssapi */
423 socksreq[4] = 2; /* username/password */
425 socksreq[1] = (char)(proxy_name ? 2 : 1); /* number of methods (below) */
426 socksreq[2] = 0; /* no authentication */
427 socksreq[3] = 2; /* username/password */
432 code = Curl_write_plain(conn, sock, (char *)socksreq, (2 + (int)socksreq[1]),
434 if((code != CURLE_OK) || (written != (2 + (int)socksreq[1]))) {
459 result=Curl_blockread_all(conn, sock, (char *)socksreq, 2, &actualread);
465 if(socksreq[0] != 5) {
469 if(socksreq[1] == 0) {
474 else if(socksreq[1] == 1) {
482 else if(socksreq[1] == 2) {
502 socksreq[len++] = 1; /* username/pw subnegotiation version */
503 socksreq[len++] = (unsigned char) proxy_name_len;
505 memcpy(socksreq + len, proxy_name, proxy_name_len);
507 socksreq[len++] = (unsigned char) proxy_password_len;
509 memcpy(socksreq + len, proxy_password, proxy_password_len);
512 code = Curl_write_plain(conn, sock, (char *)socksreq, len, &written);
518 result=Curl_blockread_all(conn, sock, (char *)socksreq, 2, &actualread);
525 if(socksreq[1] != 0) { /* status */
527 socksreq[0], socksreq[1]);
536 if(socksreq[1] == 255) {
538 if(socksreq[1] == 1) {
543 else if(socksreq[1] == 255) {
565 socksreq[len++] = 5; /* version (SOCKS5) */
566 socksreq[len++] = 1; /* connect */
567 socksreq[len++] = 0; /* must be zero */
570 socksreq[len++] = 3; /* ATYP: domain name = 3 */
571 socksreq[len++] = (char) hostname_len; /* address length */
572 memcpy(&socksreq[len], hostname, hostname_len); /* address str w/o NULL */
604 socksreq[len++] = 1; /* ATYP: IPv4 = 1 */
608 socksreq[len++] = ((unsigned char*)&saddr_in->sin_addr.s_addr)[i];
609 infof(data, "%d\n", socksreq[len-1]);
614 socksreq[len++] = 4; /* ATYP: IPv6 = 4 */
618 socksreq[len++] = ((unsigned char*)&saddr_in6->sin6_addr.s6_addr)[i];
634 socksreq[len++] = (unsigned char)((remote_port >> 8) & 0xff); /* PORT MSB */
635 socksreq[len++] = (unsigned char)(remote_port & 0xff); /* PORT LSB */
643 code = Curl_write_plain(conn, sock, (char *)socksreq, len, &written);
658 result = Curl_blockread_all(conn, sock, (char *)socksreq,
666 if(socksreq[0] != 5) { /* version */
671 if(socksreq[1] != 0) { /* Anything besides 0 is an error */
672 if(socksreq[3] == 1) {
675 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
676 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
677 ((socksreq[8] << 8) | socksreq[9]),
678 socksreq[1]);
680 else if(socksreq[3] == 3) {
684 ((socksreq[8] << 8) | socksreq[9]),
685 socksreq[1]);
687 else if(socksreq[3] == 4) {
691 (unsigned char)socksreq[4], (unsigned char)socksreq[5],
692 (unsigned char)socksreq[6], (unsigned char)socksreq[7],
693 (unsigned char)socksreq[8], (unsigned char)socksreq[9],
694 (unsigned char)socksreq[10], (unsigned char)socksreq[11],
695 (unsigned char)socksreq[12], (unsigned char)socksreq[13],
696 (unsigned char)socksreq[14], (unsigned char)socksreq[15],
697 (unsigned char)socksreq[16], (unsigned char)socksreq[17],
698 (unsigned char)socksreq[18], (unsigned char)socksreq[19],
699 ((socksreq[8] << 8) | socksreq[9]),
700 socksreq[1]);
722 if(socksreq[3] == 3) {
724 int addrlen = (int) socksreq[4];
727 else if(socksreq[3] == 4) {
739 result = Curl_blockread_all(conn, sock, (char *)&socksreq[10],