Lines Matching refs:socksreq

290   unsigned char *socksreq = sx->buffer;
317 socksreq[0] = 4; /* version (SOCKS4) */
318 socksreq[1] = 1; /* connect */
319 socksreq[2] = (unsigned char)((sx->remote_port >> 8) & 0xff); /* MSB */
320 socksreq[3] = (unsigned char)(sx->remote_port & 0xff); /* LSB */
384 socksreq[4] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[0];
385 socksreq[5] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[1];
386 socksreq[6] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[2];
387 socksreq[7] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[3];
409 socksreq[8] = 0; /* ensure empty userid is NUL-terminated */
420 memcpy(socksreq + 8, sx->proxy_user, plen + 1);
428 strlen((char *)socksreq + 8); /* size including NUL */
433 socksreq[4] = 0;
434 socksreq[5] = 0;
435 socksreq[6] = 0;
436 socksreq[7] = 1;
441 strcpy((char *)socksreq + packetsize, sx->hostname);
448 sx->outp = socksreq;
466 sx->outp = socksreq;
506 if(socksreq[0]) {
513 switch(socksreq[1]) {
521 socksreq[4], socksreq[5], socksreq[6], socksreq[7],
522 (((unsigned char)socksreq[2] << 8) | (unsigned char)socksreq[3]),
523 (unsigned char)socksreq[1]);
530 socksreq[4], socksreq[5], socksreq[6], socksreq[7],
531 (((unsigned char)socksreq[2] << 8) | (unsigned char)socksreq[3]),
532 (unsigned char)socksreq[1]);
539 socksreq[4], socksreq[5], socksreq[6], socksreq[7],
540 (((unsigned char)socksreq[2] << 8) | (unsigned char)socksreq[3]),
541 (unsigned char)socksreq[1]);
547 socksreq[4], socksreq[5], socksreq[6], socksreq[7],
548 (((unsigned char)socksreq[2] << 8) | (unsigned char)socksreq[3]),
549 (unsigned char)socksreq[1]);
581 unsigned char *socksreq = sx->buffer;
620 socksreq[idx++] = 5; /* version */
622 socksreq[idx++] = 0; /* no authentication */
624 socksreq[idx++] = 1; /* GSS-API */
626 socksreq[idx++] = 2; /* username/password */
628 socksreq[1] = (unsigned char) (idx - 2);
630 sx->outp = socksreq;
656 sx->outp = socksreq; /* store it here */
667 else if(socksreq[0] != 5) {
671 else if(socksreq[1] == 0) {
676 else if(socksreq[1] == 2) {
682 else if(allow_gssapi && (socksreq[1] == 1)) {
693 if(!allow_gssapi && (socksreq[1] == 1)) {
698 else if(socksreq[1] == 255) {
736 socksreq[len++] = 1; /* username/pw subnegotiation version */
737 socksreq[len++] = (unsigned char) proxy_user_len;
744 memcpy(socksreq + len, sx->proxy_user, proxy_user_len);
747 socksreq[len++] = (unsigned char) proxy_password_len;
754 memcpy(socksreq + len, sx->proxy_password, proxy_password_len);
760 sx->outp = socksreq;
772 sx->outp = socksreq;
786 else if(socksreq[1]) { /* status */
788 socksreq[0], socksreq[1]);
859 socksreq[len++] = 5; /* version (SOCKS5) */
860 socksreq[len++] = 1; /* connect */
861 socksreq[len++] = 0; /* must be zero */
865 socksreq[len++] = 1; /* ATYP: IPv4 = 1 */
869 socksreq[len++] = ((unsigned char *)&saddr_in->sin_addr.s_addr)[i];
879 socksreq[len++] = 4; /* ATYP: IPv6 = 4 */
883 socksreq[len++] =
903 socksreq[len++] = 5; /* version (SOCKS5) */
904 socksreq[len++] = 1; /* connect */
905 socksreq[len++] = 0; /* must be zero */
917 socksreq[len++] = 4;
918 memcpy(&socksreq[len], ip6, sizeof(ip6));
924 socksreq[len++] = 1;
925 memcpy(&socksreq[len], ip4, sizeof(ip4));
929 socksreq[len++] = 3;
930 socksreq[len++] = (unsigned char) hostname_len; /* one byte length */
931 memcpy(&socksreq[len], sx->hostname, hostname_len); /* w/o NULL */
942 socksreq[len++] = (unsigned char)((sx->remote_port >> 8) & 0xff);
944 socksreq[len++] = (unsigned char)(sx->remote_port & 0xff);
952 sx->outp = socksreq;
973 sx->outp = socksreq;
985 else if(socksreq[0] != 5) { /* version */
990 else if(socksreq[1]) { /* Anything besides 0 is an error */
992 int code = socksreq[1];
994 sx->hostname, (unsigned char)socksreq[1]);
1030 if(socksreq[3] == 3) {
1032 int addrlen = (int) socksreq[4];
1035 else if(socksreq[3] == 4) {
1039 else if(socksreq[3] == 1) {
1055 sx->outp = &socksreq[10];