[packages/hydra] - rel 1

mrozowik mrozowik at pld-linux.org
Fri Nov 4 19:32:58 CET 2022


commit 8fefca419ca5464ffd2b35089856e483d81cf278
Author: Krzysztof Mrozowicz <mrozowik at pld-linux.org>
Date:   Fri Nov 4 18:32:47 2022 +0000

    - rel 1

 gcc10.patch | 967 ------------------------------------------------------------
 hydra.spec  |  23 +-
 2 files changed, 18 insertions(+), 972 deletions(-)
---
diff --git a/hydra.spec b/hydra.spec
index 8a0e59f..fbc2972 100644
--- a/hydra.spec
+++ b/hydra.spec
@@ -5,20 +5,31 @@ Summary:	Parallized network authentication cracker
 Summary(pl.UTF-8):	Zrównoleglony łamacz uwierzytelnień sieciowych
 Name:		hydra
 Version:	9.4
-Release:	0.1
+Release:	1
 License:	GPL
 Group:		Networking
-Source0:	https://github.com/vanhauser-thc/THC-Archive/blob/master/Tools/%{name}-%{version}.tar.gz?raw=true&/%{name}-%{version}.tar.gz
+Source0:	https://github.com/vanhauser-thc/THC-Archive/blob/master/Tools/%{name}-%{version}.tar.gz?raw=true&/hydra-%{version}.tar.gz
 # Source0-md5:	5486ece8f48c80fee8a5e9f6a295f4c0
 Patch0:		%{name}-nonsl.patch
 Patch1:		x32.patch
-Patch2:		gcc10.patch
 URL:		http://www.thc.org/thc-hydra/
+BuildRequires:	Firebird-devel
+BuildRequires:	freerdp2-devel
 BuildRequires:	gtk+2-devel
+BuildRequires:	libbson-devel
+BuildRequires:	libgpg-error-devel
+BuildRequires:	libmemcached-devel
+BuildRequires:	libsmbclient-devel
 BuildRequires:	libssh2-devel
+BuildRequires:	ncurses-devel
+BuildRequires:	openssl-devel
 BuildRequires:	openssl-devel >= 0.9.7d
+BuildRequires:	pcre-devel
 BuildRequires:	pkgconfig
 BuildRequires:	postgresql-devel
+BuildRequires:	subversion-devel
+BuildRequires:	zlib-devel
+Requires:	bash
 BuildRoot:	%{tmpdir}/%{name}-%{version}-root-%(id -u -n)
 
 %description
@@ -49,7 +60,6 @@ Wersja GTK+ programu hydra.
 %ifarch x32
 %patch1 -p1
 %endif
-#%patch2 -p1
 
 %build
 # this is not autoconf
@@ -66,7 +76,9 @@ WSSL_LIB_PATH=%{_libdir} \
 rm -rf $RPM_BUILD_ROOT
 install -d $RPM_BUILD_ROOT%{_bindir}
 
-install dpl4hydra.sh hydra pw-inspector xhydra $RPM_BUILD_ROOT%{_bindir}
+%{__sed} -i '1s,%{__sh},%{__bash},' hydra-wizard.sh
+
+cp -p dpl4hydra.sh hydra hydra-wizard.sh pw-inspector xhydra $RPM_BUILD_ROOT%{_bindir}
 
 %clean
 rm -rf $RPM_BUILD_ROOT
@@ -75,6 +87,7 @@ rm -rf $RPM_BUILD_ROOT
 %defattr(644,root,root,755)
 %doc CHANGES LICENSE README
 %attr(755,root,root) %{_bindir}/hydra
+%attr(755,root,root) %{_bindir}/hydra-wizard.sh
 %attr(755,root,root) %{_bindir}/dpl4hydra.sh
 %attr(755,root,root) %{_bindir}/pw-inspector
 
diff --git a/gcc10.patch b/gcc10.patch
deleted file mode 100644
index 89b76c3..0000000
--- a/gcc10.patch
+++ /dev/null
@@ -1,967 +0,0 @@
-diff -ur hydra-8.6/hydra-asterisk.c hydra-8.6-gcc10/hydra-asterisk.c
---- hydra-8.6/hydra-asterisk.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-asterisk.c	2021-10-17 23:50:04.727544648 +0200
-@@ -9,7 +9,7 @@
- 
- extern char *HYDRA_EXIT;
- 
--char *buf;
-+static char *buf;
- 
- int32_t start_asterisk(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "\"\"";
-diff -ur hydra-8.6/hydra.c hydra-8.6-gcc10/hydra.c
---- hydra-8.6/hydra.c	2017-07-21 13:33:16.000000000 +0200
-+++ hydra-8.6-gcc10/hydra.c	2021-10-17 23:50:04.727544648 +0200
-@@ -352,19 +352,19 @@
- #if !defined(ANDROID) && !defined(__BIONIC__)
- extern int32_t errno;
- #endif
--extern int32_t debug;
--extern int32_t verbose;
--extern int32_t waittime;
--extern int32_t port;
--extern int32_t found;
--extern int32_t use_proxy;
--extern int32_t proxy_count;
--extern int32_t selected_proxy;
--extern int32_t proxy_string_port[MAX_PROXY_COUNT];
--extern char proxy_string_ip[MAX_PROXY_COUNT][36];
--extern char proxy_string_type[MAX_PROXY_COUNT][10];
--extern char *proxy_authentication[MAX_PROXY_COUNT];
--extern char *cmdlinetarget;
-+int32_t debug;
-+int32_t verbose;
-+int32_t waittime;
-+int32_t port;
-+int32_t found;
-+int32_t use_proxy;
-+int32_t proxy_count;
-+int32_t selected_proxy;
-+int32_t proxy_string_port[MAX_PROXY_COUNT];
-+char proxy_string_ip[MAX_PROXY_COUNT][36];
-+char proxy_string_type[MAX_PROXY_COUNT][10];
-+char *proxy_authentication[MAX_PROXY_COUNT];
-+char *cmdlinetarget;
- extern char *fe80;
- 
- // required global vars
-diff -ur hydra-8.6/hydra-cisco.c hydra-8.6-gcc10/hydra-cisco.c
---- hydra-8.6/hydra-cisco.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-cisco.c	2021-10-17 23:50:04.727544648 +0200
-@@ -5,11 +5,11 @@
- #endif
- 
- extern char *HYDRA_EXIT;
--char *buf = NULL;
- 
- int32_t start_cisco(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *pass, buffer[300];
-+  char *buf = NULL;
- 
-   if (strlen(pass = hydra_get_next_password()) == 0)
-     pass = empty;
-diff -ur hydra-8.6/hydra-cisco-enable.c hydra-8.6-gcc10/hydra-cisco-enable.c
---- hydra-8.6/hydra-cisco-enable.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-cisco-enable.c	2021-10-17 23:50:04.727544648 +0200
-@@ -1,11 +1,11 @@
- #include "hydra-mod.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_cisco_enable(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *pass, buffer[300];
-+  char *buf;
- 
-   if (strlen(pass = hydra_get_next_password()) == 0)
-     pass = empty;
-@@ -63,6 +63,7 @@
-   int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL;
-   char buffer[300];
-   char *login;
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-diff -ur hydra-8.6/hydra-cvs.c hydra-8.6-gcc10/hydra-cvs.c
---- hydra-8.6/hydra-cvs.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-cvs.c	2021-10-17 23:50:04.727544648 +0200
-@@ -3,13 +3,13 @@
- extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec);
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_cvs(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *login, *pass, buffer[1024], pass2[513];
-   int32_t i;
-   char *directory = miscptr;
-+  char *buf;
- 
- /* evil cvs encryption sheme... 
-         0 111           P 125           p  58
-diff -ur hydra-8.6/hydra-ftp.c hydra-8.6-gcc10/hydra-ftp.c
---- hydra-8.6/hydra-ftp.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-ftp.c	2021-10-17 23:50:04.727544648 +0200
-@@ -1,11 +1,11 @@
- #include "hydra-mod.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_ftp(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "\"\"";
-   char *login, *pass, buffer[510];
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -77,6 +77,7 @@
- void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, int32_t tls) {
-   int32_t run = 1, next_run = 1, sock = -1;
-   int32_t myport = PORT_FTP, mysslport = PORT_FTP_SSL;
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-diff -ur hydra-8.6/hydra-gtk/src/main.c hydra-8.6-gcc10/hydra-gtk/src/main.c
---- hydra-8.6/hydra-gtk/src/main.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-gtk/src/main.c	2021-10-17 23:50:04.727544648 +0200
-@@ -18,11 +18,12 @@
- char *hydra_path2 = "/usr/local/bin/hydra";
- char *hydra_path3 = "/usr/bin/hydra";
- 
-+GtkWidget *wndMain;
-+char *HYDRA_BIN;
-+guint message_id;
- 
- int main(int argc, char *argv[]) {
--  extern GtkWidget *wndMain;
-   int i;
--  extern guint message_id;
-   GtkWidget *output;
-   GtkTextBuffer *outputbuf;
- 
-diff -ur hydra-8.6/hydra-gtk/src/support.h hydra-8.6-gcc10/hydra-gtk/src/support.h
---- hydra-8.6/hydra-gtk/src/support.h	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-gtk/src/support.h	2021-10-17 23:50:04.727544648 +0200
-@@ -40,6 +40,6 @@
- void glade_set_atk_action_description(AtkAction * action, const gchar * action_name, const gchar * description);
- 
- 
--GtkWidget *wndMain;
--char *HYDRA_BIN;
--guint message_id;
-+extern GtkWidget *wndMain;
-+extern char *HYDRA_BIN;
-+extern guint message_id;
-diff -ur hydra-8.6/hydra-http-form.c hydra-8.6-gcc10/hydra-http-form.c
---- hydra-8.6/hydra-http-form.c	2017-07-21 13:31:14.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-http-form.c	2021-10-17 23:50:04.730877987 +0200
-@@ -58,7 +58,7 @@
- #define HEADER_TYPE_DEFAULT_REPL                'd'
- 
- extern char *HYDRA_EXIT;
--char *buf;
-+static char *buf;
- char *cond;
- 
- typedef struct header_node {
-@@ -83,7 +83,7 @@
- 
- extern char *webtarget;
- extern char *slash;
--int32_t webport, freemischttpform = 0;
-+int32_t form_webport, freemischttpform = 0;
- char bufferurl[6096+24], cookieurl[6096+24] = "", userheader[6096+24] = "", *url, *variables, *optional1;
- 
- #define MAX_REDIRECT 				8
-@@ -616,7 +616,7 @@
-   if (use_proxy == 1 && proxy_authentication[selected_proxy] != NULL) {
-     if (getcookie) {
-       memset(proxy_string, 0, sizeof(proxy_string));
--      snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl);
-+      snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, cookieurl);
-       http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request);
-       if (hydra_send(s, http_request, strlen(http_request), 0) < 0)
-         return 1;
-@@ -628,7 +628,7 @@
-     // now prepare for the "real" request
-     if (strcmp(type, "POST") == 0) {
-       memset(proxy_string, 0, sizeof(proxy_string));
--      snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url);
-+      snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, url);
-       snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables));
-       if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT))
-         hdrrepv(&ptr_head, "Content-Length", content_length);
-@@ -664,7 +664,7 @@
-       if (getcookie) {
-         //doing a GET to get cookies
-         memset(proxy_string, 0, sizeof(proxy_string));
--        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, cookieurl);
-+        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, cookieurl);
-         http_request = prepare_http_request("GET", proxy_string, NULL, cookie_request);
-         if (hydra_send(s, http_request, strlen(http_request), 0) < 0)
-           return 1;
-@@ -676,7 +676,7 @@
-       // now prepare for the "real" request
-       if (strcmp(type, "POST") == 0) {
-         memset(proxy_string, 0, sizeof(proxy_string));
--        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, url);
-+        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, url);
-         snprintf(content_length, MAX_CONTENT_LENGTH - 1, "%d", (int32_t) strlen(upd3variables));
-         if (header_exists(&ptr_head, "Content-Length", HEADER_TYPE_DEFAULT))
-           hdrrepv(&ptr_head, "Content-Length", content_length);
-@@ -863,7 +863,7 @@
-         // proxy with authentication
-         hdrrepv(&ptr_head, "Host", str2);
-         memset(proxy_string, 0, sizeof(proxy_string));
--        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3);
-+        snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, str3);
-         normal_request = stringify_headers(&ptr_head);
-         http_request = prepare_http_request("GET", proxy_string, NULL, normal_request);
-       } else {
-@@ -871,7 +871,7 @@
-           // proxy without authentication
-           hdrrepv(&ptr_head, "Host", str2);
-           memset(proxy_string, 0, sizeof(proxy_string));
--          snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, webport, str3);
-+          snprintf(proxy_string, MAX_PROXY_LENGTH - 1, "http://%s:%d%.600s", webtarget, form_webport, str3);
-           normal_request = stringify_headers(&ptr_head);
-           http_request = prepare_http_request("GET", proxy_string, NULL, normal_request);
-         } else {
-@@ -1056,11 +1056,11 @@
-   else if (webtarget == NULL && cmdlinetarget == NULL)
-     webtarget = hydra_address2string(ip);
-   if (port != 0)
--    webport = port;
-+    form_webport = port;
-   else if ((options & OPTION_SSL) == 0)
--    webport = PORT_HTTP;
-+    form_webport = PORT_HTTP;
-   else
--    webport = PORT_HTTP_SSL;
-+    form_webport = PORT_HTTP_SSL;
- 
-   sprintf(bufferurl, "%.6096s", miscptr);
-   url = bufferurl;
-diff -ur hydra-8.6/hydra-http-proxy-urlenum.c hydra-8.6-gcc10/hydra-http-proxy-urlenum.c
---- hydra-8.6/hydra-http-proxy-urlenum.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-http-proxy-urlenum.c	2021-10-17 23:50:04.727544648 +0200
-@@ -2,7 +2,6 @@
- #include "sasl.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- static int32_t http_proxy_auth_mechanism = AUTH_ERROR;
- 
- int32_t start_http_proxy_urlenum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname) {
-@@ -12,6 +11,7 @@
-   char *header = "";            /* XXX TODO */
-   char *ptr;
-   int32_t auth = 0;
-+  char *buf;
- 
-   login = hydra_get_next_login();
-   if (login == NULL || strlen(login) == 0 || strstr(login, "://") == NULL) {
-diff -ur hydra-8.6/hydra-imap.c hydra-8.6-gcc10/hydra-imap.c
---- hydra-8.6/hydra-imap.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-imap.c	2021-10-17 23:50:04.730877987 +0200
-@@ -2,8 +2,7 @@
- #include "sasl.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
--int32_t counter;
-+int32_t imap_counter;
- 
- int32_t imap_auth_mechanism = AUTH_CLEAR;
- 
-@@ -42,6 +41,7 @@
- int32_t start_imap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *login, *pass, buffer[500], buffer2[500], *fooptr;
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -56,7 +56,7 @@
- 
-   switch (imap_auth_mechanism) {
-   case AUTH_LOGIN:
--    sprintf(buffer, "%d AUTHENTICATE LOGIN\r\n", counter);
-+    sprintf(buffer, "%d AUTHENTICATE LOGIN\r\n", imap_counter);
-     if (hydra_send(s, buffer, strlen(buffer), 0) < 0) {
-       return 1;
-     }
-@@ -89,7 +89,7 @@
-     break;
- 
-   case AUTH_PLAIN:
--    sprintf(buffer, "%d AUTHENTICATE PLAIN\r\n", counter);
-+    sprintf(buffer, "%d AUTHENTICATE PLAIN\r\n", imap_counter);
-     if (hydra_send(s, buffer, strlen(buffer), 0) < 0) {
-       return 1;
-     }
-@@ -122,13 +122,13 @@
-       switch (imap_auth_mechanism) {
- 
-       case AUTH_CRAMMD5:
--        sprintf(buffer, "%d AUTHENTICATE CRAM-MD5\r\n", counter);
-+        sprintf(buffer, "%d AUTHENTICATE CRAM-MD5\r\n", imap_counter);
-         break;
-       case AUTH_CRAMSHA1:
--        sprintf(buffer, "%d AUTHENTICATE CRAM-SHA1\r\n", counter);
-+        sprintf(buffer, "%d AUTHENTICATE CRAM-SHA1\r\n", imap_counter);
-         break;
-       case AUTH_CRAMSHA256:
--        sprintf(buffer, "%d AUTHENTICATE CRAM-SHA256\r\n", counter);
-+        sprintf(buffer, "%d AUTHENTICATE CRAM-SHA256\r\n", imap_counter);
-         break;
-       }
-       if (hydra_send(s, buffer, strlen(buffer), 0) < 0) {
-@@ -186,7 +186,7 @@
-     }
-     break;
-   case AUTH_DIGESTMD5:{
--      sprintf(buffer, "%d AUTHENTICATE DIGEST-MD5\r\n", counter);
-+      sprintf(buffer, "%d AUTHENTICATE DIGEST-MD5\r\n", imap_counter);
- 
-       if (hydra_send(s, buffer, strlen(buffer), 0) < 0)
-         return 1;
-@@ -225,7 +225,7 @@
-       if (rc) {
-         return 3;
-       }
--      sprintf(buffer, "%d AUTHENTICATE SCRAM-SHA-1\r\n", counter);
-+      sprintf(buffer, "%d AUTHENTICATE SCRAM-SHA-1\r\n", imap_counter);
-       if (hydra_send(s, buffer, strlen(buffer), 0) < 0) {
-         return 1;
-       }
-@@ -283,7 +283,7 @@
-       unsigned char buf2[4096];
- 
-       //Send auth request
--      sprintf(buffer, "%d AUTHENTICATE NTLM\r\n", counter);
-+      sprintf(buffer, "%d AUTHENTICATE NTLM\r\n", imap_counter);
- 
-       if (hydra_send(s, buffer, strlen(buffer), 0) < 0)
-         return 1;
-@@ -324,7 +324,7 @@
-     break;
-   default:
-     //clear authentication
--    sprintf(buffer, "%d LOGIN \"%.100s\" \"%.100s\"\r\n", counter, login, pass);
-+    sprintf(buffer, "%d LOGIN \"%.100s\" \"%.100s\"\r\n", imap_counter, login, pass);
-   }
- 
-   if (hydra_send(s, buffer, strlen(buffer), 0) < 0) {
-@@ -340,7 +340,7 @@
-     hydra_completed_pair();
-     if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-       return 3;
--    if (counter == 4)
-+    if (imap_counter == 4)
-       return 1;
-     return (2);
-   }
-@@ -357,6 +357,7 @@
-   int32_t run = 1, next_run = 1, sock = -1;
-   int32_t myport = PORT_IMAP, mysslport = PORT_IMAP_SSL, disable_tls = 1;
-   char *buffer1 = "1 CAPABILITY\r\n";
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-@@ -396,7 +397,7 @@
-       /* send capability request */
-       if (hydra_send(sock, buffer1, strlen(buffer1), 0) < 0)
-         exit(-1);
--      counter = 2;
-+      imap_counter = 2;
-       buf = imap_read_server_capacity(sock);
- 
-       if (buf == NULL) {
-@@ -418,7 +419,7 @@
-         /* check for STARTTLS, if available we may have access to more basic auth methods */
-         if (strstr(buf, "STARTTLS") != NULL) {
-           hydra_send(sock, "2 STARTTLS\r\n", strlen("2 STARTTLS\r\n"), 0);
--          counter++;
-+          imap_counter++;
-           free(buf);
-           buf = hydra_receive_line(sock);
-           if (buf == NULL || (strstr(buf, " NO ") != NULL || strstr(buf, "failed") != NULL || strstr(buf, " BAD ") != NULL)) {
-@@ -439,7 +440,7 @@
-             if (hydra_send(sock, "3 CAPABILITY\r\n", strlen("3 CAPABILITY\r\n"), 0) < 0)
-               hydra_child_exit(2);
-             buf = imap_read_server_capacity(sock);
--            counter++;
-+            imap_counter++;
-             if (buf == NULL)
-               hydra_child_exit(2);
-           }
-@@ -556,7 +557,7 @@
-       break;
-     case 2:                    /* run the cracking function */
-       next_run = start_imap(sock, ip, port, options, miscptr, fp);
--      counter++;
-+      imap_counter++;
-       break;
-     case 3:                    /* clean exit */
-       if (sock >= 0)
-diff -ur hydra-8.6/hydra-irc.c hydra-8.6-gcc10/hydra-irc.c
---- hydra-8.6/hydra-irc.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-irc.c	2021-10-17 23:50:04.727544648 +0200
-@@ -7,7 +7,6 @@
- */
- 
- extern char *HYDRA_EXIT;
--char *buf;
- char buffer[300] = "";
- int32_t myport = PORT_IRC, mysslport = PORT_IRC_SSL;
- 
-diff -ur hydra-8.6/hydra-ldap.c hydra-8.6-gcc10/hydra-ldap.c
---- hydra-8.6/hydra-ldap.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-ldap.c	2021-10-17 23:50:04.730877987 +0200
-@@ -3,8 +3,7 @@
- 
- extern char *HYDRA_EXIT;
- 
--unsigned char *buf;
--int32_t counter;
-+int32_t ldap_counter;
- int32_t tls_required = 0;
- 
- int32_t start_ldap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp, char *hostname, char version, int32_t auth_method) {
-@@ -13,6 +12,7 @@
-   unsigned char buffer[512];
-   int32_t length = 0;
-   int32_t ldap_auth_mechanism = auth_method;
-+  unsigned char *buf;
- 
-   /*
-      The LDAP "simple" method has three modes of operation:
-@@ -53,7 +53,7 @@
- 
-   buffer[2] = 2;
-   buffer[3] = 1;
--  buffer[4] = counter % 256;
-+  buffer[4] = ldap_counter % 256;
- 
-   buffer[5] = 96;
-   buffer[6] = length - 7;
-@@ -126,7 +126,7 @@
-     sasl_cram_md5(fooptr, pass, ptr);
-     if (fooptr == NULL)
-       return 1;
--    counter++;
-+    ldap_counter++;
-     if (strstr(miscptr, "^USER^") != NULL) {
-       miscptr = hydra_strrep(miscptr, "^USER^", login);
-     }
-@@ -139,7 +139,7 @@
- 
-     buffer[2] = 2;
-     buffer[3] = 1;
--    buffer[4] = counter % 256;
-+    buffer[4] = ldap_counter % 256;
- 
-     buffer[5] = 96;
-     buffer[6] = length - 7;
-@@ -174,7 +174,7 @@
- 
-       ptr = strstr((char *) buf, "realm=");
- 
--      counter++;
-+      ldap_counter++;
-       if (strstr(miscptr, "^USER^") != NULL) {
-         miscptr = hydra_strrep(miscptr, "^USER^", login);
-       }
-@@ -211,7 +211,7 @@
-       ind++;
-       buffer[ind] = 1;
-       ind++;
--      buffer[ind] = counter % 256;
-+      buffer[ind] = ldap_counter % 256;
-       ind++;
-       buffer[ind] = 96;         /*0x60 */
-       ind++;
-@@ -354,6 +354,7 @@
- void service_ldap(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname, char version, int32_t auth_method) {
-   int32_t run = 1, next_run = 1, sock = -1;
-   int32_t myport = PORT_LDAP, mysslport = PORT_LDAP_SSL;
-+  unsigned char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-@@ -380,7 +381,7 @@
-           hydra_report(stderr, "[ERROR] Child with pid %d terminating, can not connect\n", (int32_t) getpid());
-         hydra_child_exit(1);
-       }
--      counter = 1;
-+      ldap_counter = 1;
-       if (tls_required) {
-         /* Start TLS operation OID = 1.3.6.1.4.1.1466.20037 according to RFC 2830 */
-         char confidentiality_required[] = "\x30\x1d\x02\x01\x01\x77\x18\x80\x16\x31\x2e\x33\x2e\x36\x2e\x31\x2e\x34\x2e\x31\x2e\x31\x34\x36\x36\x2e\x32\x30\x30\x33\x37";
-@@ -399,7 +400,7 @@
-           } else {
-             if (verbose)
-               hydra_report(stderr, "[VERBOSE] TLS connection done\n");
--            counter++;
-+            ldap_counter++;
-           }
-         } else {
-           hydra_report(stderr, "[ERROR] Can't use TLS %s\n", buf);
-@@ -410,7 +411,7 @@
-       break;
-     case 2:                    /* run the cracking function */
-       next_run = start_ldap(sock, ip, port, options, miscptr, fp, hostname, version, auth_method);
--      counter++;
-+      ldap_counter++;
-       break;
-     case 3:                    /* clean exit */
-       if (sock >= 0)
-diff -ur hydra-8.6/hydra-mod.c hydra-8.6-gcc10/hydra-mod.c
---- hydra-8.6/hydra-mod.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-mod.c	2021-10-17 23:50:04.727544648 +0200
-@@ -463,7 +463,7 @@
-   BIGNUM *n;
-   n = BN_new();
-   RSA_get0_key(rsa, &n, NULL, NULL);
--  ok = BN_zero(n);
-+  BN_zero(n);
- #else
-   if (rsa->n == 0)
-     ok = 1;
-diff -ur hydra-8.6/hydra-mod.h hydra-8.6-gcc10/hydra-mod.h
---- hydra-8.6/hydra-mod.h	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-mod.h	2021-10-17 23:50:04.727544648 +0200
-@@ -45,19 +45,19 @@
- #endif
- char *hydra_string_replace(const char *string, const char *substr, const char *replacement);
- 
--int32_t debug;
--int32_t verbose;
--int32_t waittime;
--int32_t port;
--int32_t found;
--int32_t proxy_count;
--int32_t use_proxy;
--int32_t selected_proxy;
--char proxy_string_ip[MAX_PROXY_COUNT][36];
--int32_t proxy_string_port[MAX_PROXY_COUNT];
--char proxy_string_type[MAX_PROXY_COUNT][10];
--char *proxy_authentication[MAX_PROXY_COUNT];
--char *cmdlinetarget;
-+extern int32_t debug;
-+extern int32_t verbose;
-+extern int32_t waittime;
-+extern int32_t port;
-+extern int32_t found;
-+extern int32_t proxy_count;
-+extern int32_t use_proxy;
-+extern int32_t selected_proxy;
-+extern char proxy_string_ip[MAX_PROXY_COUNT][36];
-+extern int32_t proxy_string_port[MAX_PROXY_COUNT];
-+extern char proxy_string_type[MAX_PROXY_COUNT][10];
-+extern char *proxy_authentication[MAX_PROXY_COUNT];
-+extern char *cmdlinetarget;
- 
- typedef int32_t BOOL;
- 
-diff -ur hydra-8.6/hydra-mssql.c hydra-8.6-gcc10/hydra-mssql.c
---- hydra-8.6/hydra-mssql.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-mssql.c	2021-10-17 23:50:04.727544648 +0200
-@@ -3,7 +3,6 @@
- #define MSLEN 30
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- unsigned char p_hdr[] =
-   "\x02\x00\x02\x00\x00\x00\x02\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" "\x00\x00\x00\x00\x00\x00\x00\x00\x00";
-@@ -93,13 +92,11 @@
-   if (ret > 10 && buffer[8] == '\xe3') {
-     hydra_report_found_host(port, ip, "mssql", fp);
-     hydra_completed_pair_found();
--    free(buf);
-     if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-       return 2;
-     return 1;
-   }
- 
--  free(buf);
-   hydra_completed_pair();
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-     return 2;
-diff -ur hydra-8.6/hydra-nntp.c hydra-8.6-gcc10/hydra-nntp.c
---- hydra-8.6/hydra-nntp.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-nntp.c	2021-10-17 23:50:04.727544648 +0200
-@@ -13,7 +13,6 @@
- int32_t nntp_auth_mechanism = AUTH_CLEAR;
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- char *nntp_read_server_capacity(int32_t sock) {
-   char *ptr = NULL;
-@@ -51,6 +50,7 @@
-   char *empty = "\"\"";
-   char *login, *pass, buffer[500], buffer2[500], *fooptr;
-   int32_t i = 1;
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -270,6 +270,7 @@
-   int32_t i = 0, run = 1, next_run = 1, sock = -1;
-   int32_t myport = PORT_NNTP, mysslport = PORT_NNTP_SSL, disable_tls = 0;
-   char *buffer1 = "CAPABILITIES\r\n";
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-diff -ur hydra-8.6/hydra-oracle-listener.c hydra-8.6-gcc10/hydra-oracle-listener.c
---- hydra-8.6/hydra-oracle-listener.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-oracle-listener.c	2021-10-17 23:50:04.730877987 +0200
-@@ -22,8 +22,7 @@
- #define HASHSIZE 17
- 
- extern char *HYDRA_EXIT;
--char *buf;
--unsigned char *hash;
-+unsigned char *ora_hash_pass;
- int32_t sid_mechanism = AUTH_PLAIN;
- 
- int32_t initial_permutation(unsigned char **result, char *p_str, int32_t *sz) {
-@@ -138,7 +137,7 @@
- }
- 
- int32_t ora_hash_password(char *pass) {
--  // secret hash function comes here, and written to char *hash
-+  // secret hash function comes here, and written to char *ora_hash_pass
-   int32_t siz = 0;
-   unsigned char *desresult;
-   unsigned char *result;
-@@ -172,7 +171,7 @@
-     return 1;
-   }
- 
--  memcpy(hash, result, HASHSIZE);
-+  memcpy(ora_hash_pass, result, HASHSIZE);
-   free(desresult);
-   free(result);
- 
-@@ -192,6 +191,7 @@
-   char connect_string[200];
-   char buffer2[260];
-   int32_t siz = 0;
-+  char *buf;
- 
-   memset(connect_string, 0, sizeof(connect_string));
-   memset(buffer2, 0, sizeof(buffer2));
-@@ -200,22 +200,22 @@
-     pass = empty;
- 
-   if (sid_mechanism == AUTH_PLAIN) {
--    if ((hash = malloc(HASHSIZE)) == NULL) {
-+    if ((ora_hash_pass = malloc(HASHSIZE)) == NULL) {
-       hydra_report(stderr, "[ERROR] Can't allocate memory\n");
-       return 1;
-     }
--    memset(hash, 0, HASHSIZE);
-+    memset(ora_hash_pass, 0, HASHSIZE);
-     if (ora_hash_password(pass)) {
-       hydra_report(stderr, "[ERROR] generating Oracle hash\n");
--      free(hash);
-+      free(ora_hash_pass);
-       return 1;
-     }
--    pass = (char *) hash;
-+    pass = (char *) ora_hash_pass;
-   }
-   snprintf(connect_string, sizeof(connect_string), "(DESCRIPTION=(CONNECT_DATA=(CID=(PROGRAM=))(COMMAND=reload)(PASSWORD=%s)(SERVICE=)(VERSION=169869568)))", pass);
- 
--  if (hash != NULL)
--    free(hash);
-+  if (ora_hash_pass != NULL)
-+    free(ora_hash_pass);
-   if (verbose)
-     hydra_report(stderr, "[VERBOSE] using connectiong string: %s\n", connect_string);
- 
-diff -ur hydra-8.6/hydra-oracle-sid.c hydra-8.6-gcc10/hydra-oracle-sid.c
---- hydra-8.6/hydra-oracle-sid.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-oracle-sid.c	2021-10-17 23:50:04.730877987 +0200
-@@ -19,7 +19,6 @@
- #define HASHSIZE 16
- 
- extern char *HYDRA_EXIT;
--char *buf;
- unsigned char *hash;
- 
- 
-@@ -40,6 +39,7 @@
-   char connect_string[200];
-   char buffer2[260];
-   int32_t siz = 0;
-+  char *buf;
- 
-   memset(connect_string, 0, sizeof(connect_string));
-   memset(buffer2, 0, sizeof(buffer2));
-diff -ur hydra-8.6/hydra-pcnfs.c hydra-8.6-gcc10/hydra-pcnfs.c
---- hydra-8.6/hydra-pcnfs.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-pcnfs.c	2021-10-17 23:50:04.730877987 +0200
-@@ -3,7 +3,6 @@
- /* pcnfs stuff copied from prout.c */
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- #define LEN_HDR_RPC	24
- #define LEN_AUTH_UNIX   72+12
-@@ -37,6 +36,7 @@
-   char *empty = "";
-   char *login, *pass, buffer[LEN_HDR_RPC + LEN_AUTH_UNIX + LEN_HDR_PCN_AUTH];
-   char *ptr, *pkt = buffer;
-+  char *buf;
- 
-   unsigned long *authp;
-   struct timeval tv;
-diff -ur hydra-8.6/hydra-pop3.c hydra-8.6-gcc10/hydra-pop3.c
---- hydra-8.6/hydra-pop3.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-pop3.c	2021-10-17 23:50:04.730877987 +0200
-@@ -13,7 +13,6 @@
- } pool;
- 
- extern char *HYDRA_EXIT;
--char *buf;
- char apop_challenge[300] = "";
- pool *plist = NULL, *p = NULL;
- 
-@@ -120,6 +119,7 @@
- int32_t start_pop3(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "\"\"";
-   char *login, *pass, buffer[500], buffer2[500], *fooptr;
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -416,6 +416,7 @@
- void service_pop3(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) {
-   int32_t run = 1, next_run = 1, sock = -1;
-   char *ptr = NULL;
-+  char *buf;
- 
-   //extract data from the pool, ip is the key
-   if (plist == NULL)
-@@ -520,6 +521,7 @@
-   char *capa_str = "CAPA\r\n";
-   char *quit_str = "QUIT\r\n";
-   pool p;
-+  char *buf;
- 
-   p.pop3_auth_mechanism = AUTH_CLEAR;
-   p.disable_tls = 1;
-diff -ur hydra-8.6/hydra-redis.c hydra-8.6-gcc10/hydra-redis.c
---- hydra-8.6/hydra-redis.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-redis.c	2021-10-17 23:50:04.730877987 +0200
-@@ -1,11 +1,11 @@
- #include "hydra-mod.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_redis(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *pass, buffer[510];
-   char *empty = "";
-+  char *buf;
- 
-   if (strlen(pass = hydra_get_next_password()) == 0)
-     pass = empty;
-@@ -133,6 +133,7 @@
-   int32_t sock = -1;
-   int32_t myport = PORT_REDIS, mysslport = PORT_REDIS_SSL;
-   char buffer[] = "*1\r\n$4\r\nping\r\n";
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if ((options & OPTION_SSL) == 0) {
-diff -ur hydra-8.6/hydra-rexec.c hydra-8.6-gcc10/hydra-rexec.c
---- hydra-8.6/hydra-rexec.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-rexec.c	2021-10-17 23:50:04.730877987 +0200
-@@ -5,7 +5,6 @@
- #define COMMAND "/bin/ls /"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_rexec(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-diff -ur hydra-8.6/hydra-rlogin.c hydra-8.6-gcc10/hydra-rlogin.c
---- hydra-8.6/hydra-rlogin.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-rlogin.c	2021-10-17 23:50:04.730877987 +0200
-@@ -12,7 +12,6 @@
- #define TERM "vt100/9600"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_rlogin(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-diff -ur hydra-8.6/hydra-rpcap.c hydra-8.6-gcc10/hydra-rpcap.c
---- hydra-8.6/hydra-rpcap.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-rpcap.c	2021-10-17 23:50:04.730877987 +0200
-@@ -4,11 +4,11 @@
- #include "hydra-mod.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_rpcap(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *login, *pass, buffer[1024];
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -128,6 +128,7 @@
-   int32_t sock = -1;
-   int32_t myport = PORT_RPCAP, mysslport = PORT_RPCAP_SSL;
-   char buffer[] = "\x00\x08\x00\x00\x00\x00\x00\x08\x00\x00\x00\x00\x00\x00\x00\x00";
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if ((options & OPTION_SSL) == 0) {
-diff -ur hydra-8.6/hydra-rsh.c hydra-8.6-gcc10/hydra-rsh.c
---- hydra-8.6/hydra-rsh.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-rsh.c	2021-10-17 23:50:04.730877987 +0200
-@@ -11,7 +11,6 @@
- */
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_rsh(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-diff -ur hydra-8.6/hydra-rtsp.c hydra-8.6-gcc10/hydra-rtsp.c
---- hydra-8.6/hydra-rtsp.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-rtsp.c	2021-10-17 23:50:04.730877987 +0200
-@@ -12,7 +12,6 @@
- #include "sasl.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- char packet[500];
- char packet2[500];
- 
-diff -ur hydra-8.6/hydra-smtp-enum.c hydra-8.6-gcc10/hydra-smtp-enum.c
---- hydra-8.6/hydra-smtp-enum.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-smtp-enum.c	2021-10-17 23:50:04.730877987 +0200
-@@ -14,7 +14,6 @@
- #include "hydra-mod.h"
- 
- extern char *HYDRA_EXIT;
--char *buf;
- char *err = NULL;
- int32_t tosent = 0;
- 
-@@ -27,6 +26,7 @@
- int32_t start_smtp_enum(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *login, *pass, buffer[500];
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -154,6 +154,7 @@
-   int32_t run = 1, next_run = 1, sock = -1, i = 0;
-   int32_t myport = PORT_SMTP, mysslport = PORT_SMTP_SSL;
-   char *buffer = "HELO hydra\r\n";
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-diff -ur hydra-8.6/hydra-socks5.c hydra-8.6-gcc10/hydra-socks5.c
---- hydra-8.6/hydra-socks5.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-socks5.c	2021-10-17 23:50:04.730877987 +0200
-@@ -10,7 +10,6 @@
- */
- 
- extern char *HYDRA_EXIT;
--unsigned char *buf;
- 
- int32_t fail_cnt;
- 
-@@ -18,6 +17,7 @@
-   char *empty = "";
-   char *login, *pass, buffer[300];
-   int32_t pport, fud = 0;
-+  unsigned char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-diff -ur hydra-8.6/hydra-teamspeak.c hydra-8.6-gcc10/hydra-teamspeak.c
---- hydra-8.6/hydra-teamspeak.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-teamspeak.c	2021-10-17 23:50:04.730877987 +0200
-@@ -36,7 +36,6 @@
- extern int32_t hydra_data_ready_timed(int32_t socket, long sec, long usec);
- 
- extern char *HYDRA_EXIT;
--char *buf;
- 
- int32_t start_teamspeak(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-diff -ur hydra-8.6/hydra-telnet.c hydra-8.6-gcc10/hydra-telnet.c
---- hydra-8.6/hydra-telnet.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-telnet.c	2021-10-17 23:50:04.730877987 +0200
-@@ -2,13 +2,13 @@
- #include <arpa/telnet.h>
- 
- extern char *HYDRA_EXIT;
--char *buf;
- int32_t no_line_mode;
- 
- int32_t start_telnet(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "";
-   char *login, *pass, buffer[300];
-   int32_t i = 0;
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -99,6 +99,7 @@
- void service_telnet(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) {
-   int32_t run = 1, next_run = 1, sock = -1, fck;
-   int32_t myport = PORT_TELNET, mysslport = PORT_TELNET_SSL;
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
-diff -ur hydra-8.6/hydra-vmauthd.c hydra-8.6-gcc10/hydra-vmauthd.c
---- hydra-8.6/hydra-vmauthd.c	2017-07-21 13:26:40.000000000 +0200
-+++ hydra-8.6-gcc10/hydra-vmauthd.c	2021-10-17 23:50:04.730877987 +0200
-@@ -8,11 +8,11 @@
- 
- extern char *HYDRA_EXIT;
- 
--char *buf;
- 
- int32_t start_vmauthd(int32_t s, char *ip, int32_t port, unsigned char options, char *miscptr, FILE * fp) {
-   char *empty = "\"\"";
-   char *login, *pass, buffer[300];
-+  char *buf;
- 
-   if (strlen(login = hydra_get_next_login()) == 0)
-     login = empty;
-@@ -68,6 +68,7 @@
- void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr, FILE * fp, int32_t port, char *hostname) {
-   int32_t run = 1, next_run = 1, sock = -1;
-   int32_t myport = PORT_VMAUTHD, mysslport = PORT_VMAUTHD_SSL;
-+  char *buf;
- 
-   hydra_register_socket(sp);
-   if (memcmp(hydra_get_next_pair(), &HYDRA_EXIT, sizeof(HYDRA_EXIT)) == 0)
================================================================

---- gitweb:

http://git.pld-linux.org/gitweb.cgi/packages/hydra.git/commitdiff/8fefca419ca5464ffd2b35089856e483d81cf278



More information about the pld-cvs-commit mailing list