Cosmetic change to please code scanner

This commit is contained in:
David Maciejak 2019-06-02 11:21:54 +08:00
parent d01f473d2e
commit 87a6e9385e
9 changed files with 15 additions and 0 deletions

View file

@ -114,6 +114,7 @@ void service_asterisk(char *ip, int32_t sp, unsigned char options, char *miscptr
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(0); hydra_child_exit(0);
break;
default: default:
hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);

View file

@ -155,10 +155,12 @@ void service_ftp_core(char *ip, int32_t sp, unsigned char options, char *miscptr
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(2); hydra_child_exit(2);
break;
case 4: /* clean exit */ case 4: /* clean exit */
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(0); hydra_child_exit(0);
break;
default: default:
hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);

View file

@ -236,6 +236,7 @@ void service_icq(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL
default: default:
fprintf(stderr, "[ERROR] Caught unknown return code, exiting!\n"); fprintf(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);
break;
} }
run = next_run; run = next_run;
} }

View file

@ -95,6 +95,7 @@ void service_redis_core(char *ip, int32_t sp, unsigned char options, char *miscp
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(0); hydra_child_exit(0);
break;
default: default:
hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);

View file

@ -111,6 +111,7 @@ void service_rpcap(char *ip, int32_t sp, unsigned char options, char *miscptr, F
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(0); hydra_child_exit(0);
break;
default: default:
hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);

View file

@ -126,6 +126,7 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL
ssh_finalize(); ssh_finalize();
ssh_free(session); ssh_free(session);
hydra_child_exit(0); hydra_child_exit(0);
break;
case 3: case 3:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();
@ -133,12 +134,14 @@ void service_ssh(char *ip, int32_t sp, unsigned char options, char *miscptr, FIL
if (verbose) if (verbose)
fprintf(stderr, "[ERROR] ssh protocol error\n"); fprintf(stderr, "[ERROR] ssh protocol error\n");
hydra_child_exit(2); hydra_child_exit(2);
break;
case 4: case 4:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();
ssh_free(session); ssh_free(session);
fprintf(stderr, "[ERROR] ssh target does not support password auth\n"); fprintf(stderr, "[ERROR] ssh target does not support password auth\n");
hydra_child_exit(2); hydra_child_exit(2);
break;
default: default:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();

View file

@ -124,18 +124,21 @@ void service_sshkey(char *ip, int32_t sp, unsigned char options, char *miscptr,
ssh_finalize(); ssh_finalize();
ssh_free(session); ssh_free(session);
hydra_child_exit(0); hydra_child_exit(0);
break;
case 3: case 3:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();
ssh_free(session); ssh_free(session);
fprintf(stderr, "[ERROR] ssh protocol error\n"); fprintf(stderr, "[ERROR] ssh protocol error\n");
hydra_child_exit(2); hydra_child_exit(2);
break;
case 4: case 4:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();
ssh_free(session); ssh_free(session);
fprintf(stderr, "[ERROR] ssh target does not support pubkey auth\n"); fprintf(stderr, "[ERROR] ssh target does not support pubkey auth\n");
hydra_child_exit(2); hydra_child_exit(2);
break;
default: default:
ssh_disconnect(session); ssh_disconnect(session);
ssh_finalize(); ssh_finalize();

View file

@ -134,6 +134,7 @@ void service_vmauthd(char *ip, int32_t sp, unsigned char options, char *miscptr,
if (sock >= 0) if (sock >= 0)
sock = hydra_disconnect(sock); sock = hydra_disconnect(sock);
hydra_child_exit(0); hydra_child_exit(0);
break;
default: default:
hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n"); hydra_report(stderr, "[ERROR] Caught unknown return code, exiting!\n");
hydra_child_exit(2); hydra_child_exit(2);

View file

@ -77,6 +77,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char
case 0x0: case 0x0:
hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf[3]); hydra_report(stderr, "[ERROR] VNC server told us to quit %c\n", buf[3]);
hydra_child_exit(0); hydra_child_exit(0);
break;
case 0x1: case 0x1:
hydra_report(fp, "VNC server does not require authentication.\n"); hydra_report(fp, "VNC server does not require authentication.\n");
if (fp != stdout) if (fp != stdout)
@ -84,6 +85,7 @@ int32_t start_vnc(int32_t s, char *ip, int32_t port, unsigned char options, char
hydra_report_found_host(port, ip, "vnc", fp); hydra_report_found_host(port, ip, "vnc", fp);
hydra_completed_pair_found(); hydra_completed_pair_found();
hydra_child_exit(2); hydra_child_exit(2);
break;
case 0x2: case 0x2:
//VNC security type supported is the only type supported for now //VNC security type supported is the only type supported for now
if (vnc_client_version == RFB37) { if (vnc_client_version == RFB37) {