-const char gateway_rcs[] = "$Id: gateway.c,v 1.99 2016/10/25 10:46:56 fabiankeil Exp $";
/*********************************************************************
*
* File : $Source: /cvsroot/ijbswa/current/gateway.c,v $
* using a "forwarder" (i.e. HTTP proxy and/or a SOCKS4
* or SOCKS5 proxy).
*
- * Copyright : Written by and Copyright (C) 2001-2016 the
+ * Copyright : Written by and Copyright (C) 2001-2017 the
* Privoxy team. http://www.privoxy.org/
*
* Based on the Internet Junkbuster originally written
#endif /* HAVE_POLL */
#endif /* def FEATURE_CONNECTION_KEEP_ALIVE */
-const char gateway_h_rcs[] = GATEWAY_H_VERSION;
-
static jb_socket socks4_connect(const struct forward_spec * fwd,
const char * target_host,
int target_port,
#ifdef FEATURE_CONNECTION_SHARING
#define MAX_REUSABLE_CONNECTIONS 100
-static unsigned int keep_alive_timeout = DEFAULT_KEEP_ALIVE_TIMEOUT;
static struct reusable_connection reusable_connection[MAX_REUSABLE_CONNECTIONS];
static int mark_connection_unused(const struct reusable_connection *connection);
return socket_found;
}
-
-
-/*********************************************************************
- *
- * Function : set_keep_alive_timeout
- *
- * Description : Sets the timeout after which open
- * connections will no longer be reused.
- *
- * Parameters :
- * 1 : timeout = The timeout in seconds.
- *
- * Returns : void
- *
- *********************************************************************/
-void set_keep_alive_timeout(unsigned int timeout)
-{
- keep_alive_timeout = timeout;
-}
#endif /* def FEATURE_CONNECTION_SHARING */
}
-#ifdef FUZZ_SOCKS
+#ifdef FUZZ
/*********************************************************************
*
* Function : socks_fuzz
c->dstip[2] = (unsigned char)((web_server_addr >> 8) & 0xff);
c->dstip[3] = (unsigned char)((web_server_addr ) & 0xff);
-#ifdef FUZZ_SOCKS
+#ifdef FUZZ
sfd = 0;
#else
/* pass the request to the socks server */
return(JB_INVALID_SOCKET);
}
-#ifdef FUZZ_SOCKS
+#ifdef FUZZ
sfd = 0;
if (!err && read_socket(sfd, sbuf, 2) != 2)
#else
cbuf[client_pos++] = (char)((target_port >> 8) & 0xff);
cbuf[client_pos++] = (char)((target_port ) & 0xff);
-#ifndef FUZZ_SOCKS
+#ifndef FUZZ
if (write_socket(sfd, cbuf, client_pos))
{
errstr = "SOCKS5 negotiation write failed";
unsigned long long buffered_request_bytes =
(unsigned long long)(csp->client_iob->eod - csp->client_iob->cur);
log_error(LOG_LEVEL_CONNECT,
- "Optimistically sending %d bytes of client body. Expected %d",
+ "Optimistically sending %llu bytes of client body. Expected %llu",
csp->expected_client_content_length, buffered_request_bytes);
assert(csp->expected_client_content_length == buffered_request_bytes);
if (write_socket(sfd, csp->client_iob->cur, buffered_request_bytes))
{
log_error(LOG_LEVEL_CONNECT,
- "optimistically writing %d bytes of client body to: %s failed: %E",
+ "optimistically writing %llu bytes of client body to: %s failed: %E",
buffered_request_bytes, csp->http->hostport);
return(JB_INVALID_SOCKET);
}