summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJoshua Judson Rosen2015-02-17 00:37:08 -0500
committerJoshua Judson Rosen2015-02-17 00:37:08 -0500
commit714aebccbd7a4ab6ec0964d4580efd49171ba140 (patch)
treee71ac66a95848b1c0e8f47ea7d3df0e54c052d48
parentNix mysleep(). (diff)
downloadapf-714aebccbd7a4ab6ec0964d4580efd49171ba140.tar.gz
Remove HTTP proxy support.
There are plenty of popular, readily-available external tools that, frankly, provide better options for going through proxies-- both of the HTTP variety and others (corkscrew, httptunnel, socat...); and dropping our internal implementation results in a significant reduction in code complexity--including the complete elimination of multithreading and all of the worries that go along with it.
-rw-r--r--README56
-rw-r--r--README.md56
-rw-r--r--config.h.in3
-rw-r--r--configure.ac1
-rw-r--r--doc/afclient.117
-rw-r--r--doc/afclient.conf.517
-rw-r--r--doc/afclient_example.conf6
-rw-r--r--doc/afserver.15
-rw-r--r--doc/afserver.conf.53
-rw-r--r--doc/afserver_example.conf1
-rw-r--r--doc/en/README56
-rw-r--r--src/Makefile.am7
-rw-r--r--src/afclient.c80
-rw-r--r--src/afclient.h4
-rw-r--r--src/afserver.c127
-rw-r--r--src/afserver.h2
-rw-r--r--src/client_initialization.c30
-rw-r--r--src/client_initialization.h2
-rw-r--r--src/client_realm_struct.c44
-rw-r--r--src/client_realm_struct.h6
-rw-r--r--src/client_signals.c6
-rw-r--r--src/connect_client_struct.h2
-rw-r--r--src/file_client.c33
-rw-r--r--src/file_server.c13
-rw-r--r--src/http_proxy_client.c565
-rw-r--r--src/http_proxy_client.h29
-rw-r--r--src/http_proxy_functions.c395
-rw-r--r--src/http_proxy_functions.h85
-rw-r--r--src/http_proxy_options_struct.c254
-rw-r--r--src/http_proxy_options_struct.h58
-rw-r--r--src/http_proxy_server.c585
-rw-r--r--src/http_proxy_server.h29
-rw-r--r--src/network.h3
-rw-r--r--src/server_remoteadmin.c16
-rw-r--r--src/server_signals.c9
-rw-r--r--src/thread_management.c102
-rw-r--r--src/thread_management.h34
-rw-r--r--src/usage.c21
38 files changed, 54 insertions, 2708 deletions
diff --git a/README b/README
index e9f5b20..a1952f4 100644
--- a/README
+++ b/README
@@ -36,14 +36,13 @@ INTRO
3.3.1 Users
3.3.2 Clients
3.4 Relay mode
-4. HTTP PROXY TUNNELS
-5. LOGGING
-6. MODULES
-7. MULTI TUNNELS
-8. EXAMPLES
- 8.1 tcp mode
- 8.2 reverse udp mode
-9. BUGS/PROBLEMS
+4. LOGGING
+5. MODULES
+6. MULTI TUNNELS
+7. EXAMPLES
+ 7.1 tcp mode
+ 7.2 reverse udp mode
+8. BUGS/PROBLEMS
NOTES
@@ -177,10 +176,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-4, --ipv4 - use ipv4 only
-6, --ipv6 - use ipv6 only
- HTTP PROXY:
-
- -P, --enableproxy - enable http proxy mode
-
2.2 afclient
------------
@@ -261,15 +256,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-l, --load - load a module for user's packets filtering
-L, --Load - load a module for service's packets filtering
- HTTP/HTTPS PROXY:
-
- -S, --use-https - use https proxy instead of http proxy
- -P, --proxyname - the name of the machine with proxy server
- -X, --proxyport - the port used by proxy server (default: 8080)
- -C, --pa-cred U:P - the user (U) and password (P) used in proxy
- authorization
- -B, --pa-t-basic - the Basic type of proxy authorization (default)
-
================================================================================
@@ -397,22 +383,8 @@ When user quits (close the connection or send 'quit' command), afclient exits.
================================================================================
-=====================
-4. HTTP PROXY TUNNELS
-=====================
-
-Afclient can communicate with afserver via HTTP proxy. In order to use this
-feature, afserver must be started with '-P, --enableproxy' option. Afclient must
-specify the proxy host ('-P, --proxyname' option) and port ('-X, --proxyport'
-option).
-
-Afclient with HTTP proxy mode enabled can still accept connections from
-afclients, which don't use HTTP proxy mode.
-
-================================================================================
-
==========
-5. LOGGING
+4. LOGGING
==========
Logging can be enabled by '-o, --log' option. The argument to this option must
@@ -448,7 +420,7 @@ Where
================================================================================
==========
-6. MODULES
+5. MODULES
==========
Afclient can use external modules for user's packets filtering ('-l, --load')
@@ -525,7 +497,7 @@ Modules have to be compiled with '-fPIC -shared' options.
================================================================================
================
-7. MULTI TUNNELS
+6. MULTI TUNNELS
================
Since version 0.8 it's possible to transfer multiple tunnels in the one
@@ -542,10 +514,10 @@ transferred to the destination pointed by the second '-p' option.
================================================================================
===========
-8. EXAMPLES
+7. EXAMPLES
===========
- 8.1 tcp mode
+ 7.1 tcp mode
------------
local network |FireWall| Internet
@@ -594,7 +566,7 @@ on our computer and we are behind a masquerade or a firewall:
6) We can now enter with a web-browser to: <name of the server>:50127 and we
will enter to our computer in the fact.
- 8.2 reverse udp mode
+ 7.2 reverse udp mode
--------------------
local network |FireWall| Internet
@@ -633,7 +605,7 @@ server on our computer (udp port 27960 on our machine):
================================================================================
================
-9. BUGS/PROBLEMS
+8. BUGS/PROBLEMS
================
There are no known/open bugs at the moment.
diff --git a/README.md b/README.md
index 1e082e4..4425480 100644
--- a/README.md
+++ b/README.md
@@ -27,14 +27,13 @@ INTRO
* 3.3.1 Users
* 3.3.2 Clients
* 3.4 Relay mode
-4. HTTP PROXY TUNNELS
-5. LOGGING
-6. MODULES
-7. MULTI TUNNELS
-8. EXAMPLES
- * 8.1 tcp mode
- * 8.2 reverse udp mode
-9. BUGS/PROBLEMS
+4. LOGGING
+5. MODULES
+6. MULTI TUNNELS
+7. EXAMPLES
+ * 7.1 tcp mode
+ * 7.2 reverse udp mode
+8. BUGS/PROBLEMS
NOTES
@@ -156,10 +155,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-4, --ipv4 - use ipv4 only
-6, --ipv6 - use ipv6 only
- HTTP PROXY:
-
- -P, --enableproxy - enable http proxy mode
-
2.2 afclient
------------
@@ -240,15 +235,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-l, --load - load a module for user's packets filtering
-L, --Load - load a module for service's packets filtering
- HTTP/HTTPS PROXY:
-
- -S, --use-https - use https proxy instead of http proxy
- -P, --proxyname - the name of the machine with proxy server
- -X, --proxyport - the port used by proxy server (default: 8080)
- -C, --pa-cred U:P - the user (U) and password (P) used in proxy
- authorization
- -B, --pa-t-basic - the Basic type of proxy authorization (default)
-
================================================================================
@@ -376,22 +362,8 @@ When user quits (close the connection or send 'quit' command), afclient exits.
================================================================================
-=====================
-4. HTTP PROXY TUNNELS
-=====================
-
-Afclient can communicate with afserver via HTTP proxy. In order to use this
-feature, afserver must be started with '-P, --enableproxy' option. Afclient must
-specify the proxy host ('-P, --proxyname' option) and port ('-X, --proxyport'
-option).
-
-Afclient with HTTP proxy mode enabled can still accept connections from
-afclients, which don't use HTTP proxy mode.
-
-================================================================================
-
==========
-5. LOGGING
+4. LOGGING
==========
Logging can be enabled by '-o, --log' option. The argument to this option must
@@ -427,7 +399,7 @@ Where
================================================================================
==========
-6. MODULES
+5. MODULES
==========
Afclient can use external modules for user's packets filtering ('-l, --load')
@@ -504,7 +476,7 @@ Modules have to be compiled with '-fPIC -shared' options.
================================================================================
================
-7. MULTI TUNNELS
+6. MULTI TUNNELS
================
Since version 0.8 it's possible to transfer multiple tunnels in the one
@@ -521,10 +493,10 @@ transferred to the destination pointed by the second '-p' option.
================================================================================
===========
-8. EXAMPLES
+7. EXAMPLES
===========
- 8.1 tcp mode
+ 7.1 tcp mode
------------
local network |FireWall| Internet
@@ -573,7 +545,7 @@ on our computer and we are behind a masquerade or a firewall:
6) We can now enter with a web-browser to: <name of the server>:50127 and we
will enter to our computer in the fact.
- 8.2 reverse udp mode
+ 7.2 reverse udp mode
--------------------
local network |FireWall| Internet
@@ -612,7 +584,7 @@ server on our computer (udp port 27960 on our machine):
================================================================================
================
-9. BUGS/PROBLEMS
+8. BUGS/PROBLEMS
================
There are no known/open bugs at the moment.
diff --git a/config.h.in b/config.h.in
index c337350..69181e2 100644
--- a/config.h.in
+++ b/config.h.in
@@ -63,9 +63,6 @@
/* Define to 1 if you have the `nsl' library (-lnsl). */
#undef HAVE_LIBNSL
-/* Define to 1 if you have the `pthread' library (-lpthread). */
-#undef HAVE_LIBPTHREAD
-
/* Define to 1 if you have the `socket' library (-lsocket). */
#undef HAVE_LIBSOCKET
diff --git a/configure.ac b/configure.ac
index 4d029fa..db59cae 100644
--- a/configure.ac
+++ b/configure.ac
@@ -66,7 +66,6 @@ AC_CHECK_LIB([dl], [dlopen],
USE_RDYNAMIC=""
])
AC_SUBST(USE_RDYNAMIC)
-AC_CHECK_LIB([pthread], [pthread_create], [], [])
AC_CHECK_LIB([socket], [socket], [], [])
AC_CHECK_LIB([nsl], [gethostbyaddr], [], [])
AC_CHECK_LIB([crypto], [X509_sign], [], [])
diff --git a/doc/afclient.1 b/doc/afclient.1
index 677ec7a..fc3fa7d 100644
--- a/doc/afclient.1
+++ b/doc/afclient.1
@@ -140,23 +140,6 @@ is running (required)
.B -L, --Load
load a module for service's packets filtering
-.I HTTP/HTTPS PROXY
-
-.B -S, --use-https
- use https proxy instead of http proxy
-
-.B -P, --proxyname
- the name of the machine with proxy server
-
-.B -X, --proxyport
- the port used by proxy server (default: 8080)
-
-.B -C, --pa-cred U:P
- the user (U) and password (P) used in proxy authorization
-
-.B -B, --pa-t-basic
- the Basic type of proxy authorization (default)
-
.SH "REMOTE ADMINISTRATION"
Remote administration mode is enabled by
diff --git a/doc/afclient.conf.5 b/doc/afclient.conf.5
index 4f8a5c6..903be32 100644
--- a/doc/afclient.conf.5
+++ b/doc/afclient.conf.5
@@ -20,7 +20,7 @@ are ignored. Options from configuration file are taken before values from comman
.IR --storefile ,
.IR --dateformat ,
.IR --ignorepkeys
-and the options connected with http proxy and auto-reconnect support). When something is not declared, hard-coded values are used.
+and the options connected with auto-reconnect support). When something is not declared, hard-coded values are used.
.SH DESCRIPTION
.B Afclient
@@ -118,21 +118,6 @@ is running
.B Load FILE
load a module for service's packets filtering
-.B use-https
- use https proxy instead of http proxy
-
-.B proxyname NAME
- the name of the machine with proxy server
-
-.B proxyport PORT
- the port used by proxy server (default: 8080)
-
-.B pa-cred U:P
- the user (U) and password (P) used in proxy authorization
-
-.B pa-t-basic
- the Basic type of proxy authorization (default)
-
.SH "SEE ALSO"
.BR afserver.conf (5),
diff --git a/doc/afclient_example.conf b/doc/afclient_example.conf
index d336ce3..aef4078 100644
--- a/doc/afclient_example.conf
+++ b/doc/afclient_example.conf
@@ -46,9 +46,3 @@
#load usermodule #load a module for user's packets filtering
#Load servicemodule #load a module for service's packets filtering
-
-#use-https #use https proxy instead of http proxy
-#proxyname httpproxy #the name of the machine with proxy server
-#proxyport 8080 #the port used by proxy server (default: 8080)
-#pa-cred user:password #the user (U) and password (P) used in proxy authorization
-#pa-t-basic #the Basic type of proxy authorization (default)
diff --git a/doc/afserver.1 b/doc/afserver.1
index 887d79b..a4fa66e 100644
--- a/doc/afserver.1
+++ b/doc/afserver.1
@@ -129,11 +129,6 @@ connects to it (default: 50126)
.B -6, --ipv6
use ipv6 only
-.I HTTP PROXY
-
-.B -P, --enableproxy
- enable http proxy mode
-
.SH "REMOTE ADMINISTRATION"
Currently available commands are:
diff --git a/doc/afserver.conf.5 b/doc/afserver.conf.5
index c62e105..51090c1 100644
--- a/doc/afserver.conf.5
+++ b/doc/afserver.conf.5
@@ -116,9 +116,6 @@ commands.
.B ipv6
use ipv6 only
-.B enableproxy
- enable http proxy mode
-
.SH "SEE ALSO"
.BR afclient.conf (5),
diff --git a/doc/afserver_example.conf b/doc/afserver_example.conf
index 8bdafa6..02f920d 100644
--- a/doc/afserver_example.conf
+++ b/doc/afserver_example.conf
@@ -46,7 +46,6 @@ manageport 50126 #portnumber on which server is listening for afclient
#dnslookups #try to obtain dns names of the computers
#ipv4 #use ipv4 only
#ipv6 #use ipv6 only
-#enableproxy #enable http proxy mode
#cacerfile filename #the name of the file with CA certificates
# (if used, require clients to have valid certificates)
#cerdepth #the maximum depth of valid certificate-chains
diff --git a/doc/en/README b/doc/en/README
index e9f5b20..a1952f4 100644
--- a/doc/en/README
+++ b/doc/en/README
@@ -36,14 +36,13 @@ INTRO
3.3.1 Users
3.3.2 Clients
3.4 Relay mode
-4. HTTP PROXY TUNNELS
-5. LOGGING
-6. MODULES
-7. MULTI TUNNELS
-8. EXAMPLES
- 8.1 tcp mode
- 8.2 reverse udp mode
-9. BUGS/PROBLEMS
+4. LOGGING
+5. MODULES
+6. MULTI TUNNELS
+7. EXAMPLES
+ 7.1 tcp mode
+ 7.2 reverse udp mode
+8. BUGS/PROBLEMS
NOTES
@@ -177,10 +176,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-4, --ipv4 - use ipv4 only
-6, --ipv6 - use ipv6 only
- HTTP PROXY:
-
- -P, --enableproxy - enable http proxy mode
-
2.2 afclient
------------
@@ -261,15 +256,6 @@ Multiple clients allow to create more sophisticated tunneling scheme.
-l, --load - load a module for user's packets filtering
-L, --Load - load a module for service's packets filtering
- HTTP/HTTPS PROXY:
-
- -S, --use-https - use https proxy instead of http proxy
- -P, --proxyname - the name of the machine with proxy server
- -X, --proxyport - the port used by proxy server (default: 8080)
- -C, --pa-cred U:P - the user (U) and password (P) used in proxy
- authorization
- -B, --pa-t-basic - the Basic type of proxy authorization (default)
-
================================================================================
@@ -397,22 +383,8 @@ When user quits (close the connection or send 'quit' command), afclient exits.
================================================================================
-=====================
-4. HTTP PROXY TUNNELS
-=====================
-
-Afclient can communicate with afserver via HTTP proxy. In order to use this
-feature, afserver must be started with '-P, --enableproxy' option. Afclient must
-specify the proxy host ('-P, --proxyname' option) and port ('-X, --proxyport'
-option).
-
-Afclient with HTTP proxy mode enabled can still accept connections from
-afclients, which don't use HTTP proxy mode.
-
-================================================================================
-
==========
-5. LOGGING
+4. LOGGING
==========
Logging can be enabled by '-o, --log' option. The argument to this option must
@@ -448,7 +420,7 @@ Where
================================================================================
==========
-6. MODULES
+5. MODULES
==========
Afclient can use external modules for user's packets filtering ('-l, --load')
@@ -525,7 +497,7 @@ Modules have to be compiled with '-fPIC -shared' options.
================================================================================
================
-7. MULTI TUNNELS
+6. MULTI TUNNELS
================
Since version 0.8 it's possible to transfer multiple tunnels in the one
@@ -542,10 +514,10 @@ transferred to the destination pointed by the second '-p' option.
================================================================================
===========
-8. EXAMPLES
+7. EXAMPLES
===========
- 8.1 tcp mode
+ 7.1 tcp mode
------------
local network |FireWall| Internet
@@ -594,7 +566,7 @@ on our computer and we are behind a masquerade or a firewall:
6) We can now enter with a web-browser to: <name of the server>:50127 and we
will enter to our computer in the fact.
- 8.2 reverse udp mode
+ 7.2 reverse udp mode
--------------------
local network |FireWall| Internet
@@ -633,7 +605,7 @@ server on our computer (udp port 27960 on our machine):
================================================================================
================
-9. BUGS/PROBLEMS
+8. BUGS/PROBLEMS
================
There are no known/open bugs at the moment.
diff --git a/src/Makefile.am b/src/Makefile.am
index b385b15..48c6934 100644
--- a/src/Makefile.am
+++ b/src/Makefile.am
@@ -2,8 +2,8 @@ bin_PROGRAMS = afserver afclient
afserver_SOURCES = afserver.c network.c file.c stats.c buf_list_node_struct.c buf_list_struct.c \
server_remoteadmin.c server_check.c server_set.c server_eval.c server_find.c \
server_remove.c make_ssl_handshake.c first_run.c inet_ntop.c realmnames.c \
- clientnames.c usernames.c http_proxy_functions.c http_proxy_server.c server_get.c \
- thread_management.c server_signals.c usage.c logging.c daemon.c ssl_fd_struct.c \
+ clientnames.c usernames.c server_get.c \
+ server_signals.c usage.c logging.c daemon.c ssl_fd_struct.c \
user_stats_struct.c usr_cli_struct.c connect_user_struct.c string_functions.c \
audit_list_node_struct.c audit_list_struct.c connect_client_struct.c timeval_functions.c \
header_buffer_struct.c server_realm_struct.c server_configuration_struct.c file_server.c \
@@ -11,8 +11,7 @@ afserver_SOURCES = afserver.c network.c file.c stats.c buf_list_node_struct.c bu
afclient_LDFLAGS = ${USE_RDYNAMIC}
afclient_SOURCES = afclient.c network.c file.c stats.c buf_list_node_struct.c buf_list_struct.c \
module_struct.c client_remoteadmin.c make_ssl_handshake.c first_run.c inet_ntop.c \
- http_proxy_functions.c http_proxy_client.c http_proxy_options_struct.c \
- thread_management.c client_reverse_udp.c server_check.c client_initialization.c \
+ client_reverse_udp.c server_check.c client_initialization.c \
client_shutdown.c client_signals.c usage.c logging.c daemon.c base64.c ssl_routines.c \
connect_user_struct.c user_stats_struct.c string_functions.c ar_options_struct.c \
audit_list_node_struct.c audit_list_struct.c ssl_fd_struct.c timeval_functions.c \
diff --git a/src/afclient.c b/src/afclient.c
index e99598d..3364529 100644
--- a/src/afclient.c
+++ b/src/afclient.c
@@ -19,6 +19,7 @@
*/
#include <config.h>
+#include <unistd.h>
#include "afclient.h"
@@ -51,13 +52,6 @@ static struct option long_options[] = {
{"id", 1, 0, 'i'},
{"dateformat", 1, 0, 'D'},
{"remoteadmin", 0, 0, 'r'},
-#ifdef HAVE_LIBPTHREAD
- {"use-https", 0, 0, 'S'},
- {"proxyname", 1, 0, 'P'},
- {"proxyport", 1, 0, 'X'},
- {"pa-t-basic", 0, 0, 'B'},
- {"pa-cred", 1, 0, 'C'},
-#endif
{"version", 0, 0, 'V'},
{"keep-alive", 1, 0, 'K'},
{"ar-tries", 1, 0, 'A'},
@@ -95,8 +89,6 @@ main(int argc, char **argv)
fd_set rset, allset, wset, tmpset;
struct timeval keepAlive;
char verbose = 0;
- HttpProxyOptions* hpo = HttpProxyOptions_new();
- char hpoUsed = 0;
ArOptions* ao = ArOptions_new();
ClientRealm* pointer;
char aoUsed = 0;
@@ -133,13 +125,6 @@ main(int argc, char **argv)
* initialization
*/
-#ifdef HAVE_LIBPTHREAD
- if (hpo == NULL) {
- printf("Problems with memory allocation... exiting\n");
- exit(1);
- }
-#endif
-
if (ao == NULL) {
printf("Problems with memory allocation... exiting\n");
exit(1);
@@ -162,20 +147,11 @@ main(int argc, char **argv)
act.sa_handler = client_sig_alrm;
sigaction(SIGALRM, &act, NULL);
-#ifdef HAVE_LIBPTHREAD
- remember_mainthread();
-#endif
-
#ifdef AF_INET6
#define GETOPT_LONG_AF_INET6(x) "46"x
#else
#define GETOPT_LONG_AF_INET6(x) x
#endif
-#ifdef HAVE_LIBPTHREAD
-#define GETOPT_LONG_LIBPTHREAD(x) "SP:X:BC:"x
-#else
-#define GETOPT_LONG_LIBPTHREAD(x) x
-#endif
#ifdef HAVE_LIBDL
#define GETOPT_LONG_LIBDL(x) "l:L:"x
#else
@@ -183,8 +159,8 @@ main(int argc, char **argv)
#endif
while ((n = getopt_long(argc, argv,
- GETOPT_LONG_LIBDL(GETOPT_LONG_LIBPTHREAD(
- GETOPT_LONG_AF_INET6("huUn:m:d:p:vk:c:s:o:i:D:rP:X:VK:A:T:f:")))
+ GETOPT_LONG_LIBDL(
+ GETOPT_LONG_AF_INET6("huUn:m:d:p:vk:c:s:o:i:D:rP:X:VK:A:T:f:"))
, long_options, 0)) != -1) {
switch (n) {
case 'h': {
@@ -195,33 +171,6 @@ main(int argc, char **argv)
serverName = optarg;
break;
}
-#ifdef HAVE_LIBPTHREAD
- case 'S': {
- HttpProxyOptions_use_https(hpo);
- hpoUsed = 1;
- break;
- }
- case 'P': {
- HttpProxyOptions_set_proxyname(hpo, optarg);
- hpoUsed = 1;
- break;
- }
- case 'X': {
- HttpProxyOptions_set_proxyport(hpo, optarg);
- hpoUsed = 1;
- break;
- }
- case 'B': {
- HttpProxyOptions_set_proxyauth_type(hpo, PROXYAUTH_TYPE_BASIC);
- hpoUsed = 1;
- break;
- }
- case 'C': {
- HttpProxyOptions_set_proxyauth_cred(hpo, optarg);
- hpoUsed = 1;
- break;
- }
-#endif
case 'i': {
realmId = optarg;
break;
@@ -422,12 +371,6 @@ main(int argc, char **argv)
"Working without sense is really without sense...");
exit(1);
}
- if (hpoUsed) {
- ClientRealm_set_httpProxyOptions(pointer, hpo);
- }
- else {
- HttpProxyOptions_free(&hpo);
- }
if (aoUsed) {
ClientRealm_set_arOptions(pointer, ao);
}
@@ -531,7 +474,6 @@ main(int argc, char **argv)
ClientRealm_set_hostName(pointer, hostName);
ClientRealm_set_destinationPorts(pointer, destinationPorts);
ClientRealm_set_realmId(pointer, realmId);
- ClientRealm_set_httpProxyOptions(pointer, hpo);
ClientRealm_set_arOptions(pointer, ao);
ClientRealm_set_password(pointer, password);
ClientRealm_set_localName(pointer, localName);
@@ -587,22 +529,6 @@ main(int argc, char **argv)
if (ClientRealm_get_clientMode(pointer) == CLIENTREALM_MODE_REVERSE)
client_short_usage("Port on the server is required in reverse mode");
}
-#ifdef HAVE_LIBPTHREAD
- if ((HttpProxyOptions_get_proxyname(ClientRealm_get_httpProxyOptions(pointer))) ||
- (HttpProxyOptions_get_proxyport(ClientRealm_get_httpProxyOptions(pointer)))) {
- if (ClientRealm_get_tunnelType(pointer) == CLIENTREALM_TUNNELTYPE_DIRECT) {
- ClientRealm_set_tunnelType(pointer, CLIENTREALM_TUNNELTYPE_HTTPPROXY);
- }
- else {
- ClientRealm_set_tunnelType(pointer, CLIENTREALM_TUNNELTYPE_UNKNOWN);
- }
- }
- if (ClientRealm_get_tunnelType(pointer) == CLIENTREALM_TUNNELTYPE_HTTPPROXY) {
- if (HttpProxyOptions_get_proxyport(ClientRealm_get_httpProxyOptions(pointer)) == NULL) {
- HttpProxyOptions_set_proxyport(ClientRealm_get_httpProxyOptions(pointer), "8080");
- }
- }
-#endif
if ((ClientRealm_get_clientMode(pointer) != CLIENTREALM_MODE_REVERSE) &&
(ClientRealm_get_clientMode(pointer) != CLIENTREALM_MODE_REMOTE) &&
(ClientRealm_get_hostName(pointer) == NULL)) {
diff --git a/src/afclient.h b/src/afclient.h
index 1be222d..c5888b3 100644
--- a/src/afclient.h
+++ b/src/afclient.h
@@ -26,13 +26,9 @@
#include "client_remoteadmin.h"
#include "make_ssl_handshake.h"
#include "first_run.h"
-#include "http_proxy_client.h"
-#include "thread_management.h"
#include "client_reverse_udp.h"
#include "server_check.h"
#include "client_initialization.h"
-#include "http_proxy_functions.h"
-#include "http_proxy_options_struct.h"
#include "client_shutdown.h"
#include "client_signals.h"
#include "usage.h"
diff --git a/src/afserver.c b/src/afserver.c
index 461f476..0da7e45 100644
--- a/src/afserver.c
+++ b/src/afserver.c
@@ -54,12 +54,6 @@ static struct option long_options[] = {
{"baseport", 0, 0, 'b'},
{"dnslookups", 0, 0, 311},
{"dateformat", 1, 0, 'D'},
-#ifdef HAVE_LIBPTHREAD
- {"enableproxy", 0, 0, 'P'},
- /* FIXME: don't need it now
- {"use-https", 0, 0, 'S'},
- */
-#endif
{"version", 0, 0, 'V'},
{0, 0, 0, 0}
};
@@ -93,9 +87,6 @@ main(int argc, char **argv)
unsigned char pass[4] = {1, 2, 3, 4};
char verbose = 0;
char mode = 0;
-#ifdef HAVE_LIBPTHREAD
- char tunneltype = 0;
-#endif
char ipfam = 0;
char baseport = 0;
char audit = 0;
@@ -133,27 +124,15 @@ main(int argc, char **argv)
TYPE_SET_SSL(mode);
TYPE_SET_ZLIB(mode);
TYPE_SET_SUPPORTED_MULTI(mode);
-
-#ifdef HAVE_LIBPTHREAD
- remember_mainthread();
-#endif
#ifdef AF_INET6
#define GETOPT_LONG_AF_INET6(x) "46"x
#else
#define GETOPT_LONG_AF_INET6(x) x
#endif
-#ifdef HAVE_LIBPTHREAD
-/* FIXME: 'S' option is not needed now
-#define GETOPT_LONG_LIBPTHREAD(x) "PS"x
-*/
-#define GETOPT_LONG_LIBPTHREAD(x) "P"x
-#else
-#define GETOPT_LONG_LIBPTHREAD(x) x
-#endif
-
+
while ((n = getopt_long(argc, argv,
- GETOPT_LONG_LIBPTHREAD(GETOPT_LONG_AF_INET6("hn:l:m:vu:c:A:d:k:f:p:o:t:C:U:M:abD:R:r:V"))
+ GETOPT_LONG_AF_INET6("hn:l:m:vu:c:A:d:k:f:p:o:t:C:U:M:abD:R:r:V")
, long_options, 0)) != -1) {
switch (n) {
case 'h': {
@@ -293,30 +272,6 @@ main(int argc, char **argv)
dateformat = optarg;
break;
}
-#ifdef HAVE_LIBPTHREAD
- case 'P': {
- if ((tunneltype < 0) || (tunneltype > 2)) {
- tunneltype = -1;
- }
- else {
- if (tunneltype != 2) {
- tunneltype = 1;
- }
- }
- break;
- }
- /* FIXME: don't need it now
- case 'S': {
- if ((tunneltype < 0) || (tunneltype > 2)) {
- tunneltype = -1;
- }
- else {
- tunneltype = 2;
- }
- break;
- }
- */
-#endif
case 'V': {
printf("%s\n", (AF_VER("Active port forwarder (server)")));
exit(0);
@@ -460,9 +415,6 @@ main(int argc, char **argv)
ServerRealm_set_sClientMode(pointer, clim);
ServerRealm_set_basePortOn(pointer, baseport);
ServerRealm_set_auditOn(pointer, audit);
-#ifdef HAVE_LIBPTHREAD
- ServerRealm_set_tunnelType(pointer, tunneltype);
-#endif
ServerRealm_set_dnsLookupsOn(pointer, dnslookups);
ServerRealm_set_realmName(pointer, realmname);
ServerRealm_set_password(pointer, pass);
@@ -699,17 +651,6 @@ main(int argc, char **argv)
if (ServerRealm_get_auditOn(scRealmsTable[i]) == 0) {
ServerRealm_set_auditOn(scRealmsTable[i], audit);
}
-#ifdef HAVE_LIBPTHREAD
- /* using user's tunneltype value*/
- if (ServerRealm_get_tunnelType(scRealmsTable[i]) == 0) {
- if (tunneltype == -1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "Conflicting types of tunnel type... exiting");
- exit(1);
- }
- ServerRealm_set_tunnelType(scRealmsTable[i], tunneltype);
- }
-#endif
/* using user's dnslookups value*/
if (ServerRealm_get_dnsLookupsOn(scRealmsTable[i]) == 0) {
ServerRealm_set_dnsLookupsOn(scRealmsTable[i], dnslookups);
@@ -878,49 +819,6 @@ main(int argc, char **argv)
UsrCli_get_managePortName(srUsersClientsTable[j])));
break;
}
-#ifdef HAVE_LIBPTHREAD
- case 1:
- case 2: {
- temp = find_previousFd(srUsersClientsTable, j,
- UsrCli_get_manageHostName(srUsersClientsTable[j]),
- UsrCli_get_managePortName(srUsersClientsTable[j]));
- if (temp == -1) {
- if (initialize_http_proxy_server(&temp,
- UsrCli_get_manageHostName(srUsersClientsTable[j]) ?
- UsrCli_get_manageHostName(srUsersClientsTable[j]) :
- ServerRealm_get_hostName(scRealmsTable[i]),
- UsrCli_get_managePortName(srUsersClientsTable[j]),
- (&len), ipfam,
- ServerRealm_get_clientsLimit(scRealmsTable[i]) +
- ServerRealm_get_raClientsLimit(scRealmsTable[i]),
- (ServerRealm_get_tunnelType(scRealmsTable[i]) - 1),
- ServerRealm_get_SslCtx(scRealmsTable[i]))) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
-#ifdef AF_INET6
- "http%s_proxy_listen_%s error for %s, %s",
- (ServerRealm_get_tunnelType(scRealmsTable[i]) == 2) ? "s" : "",
- (ipfam & 0x02)?"ipv4":(ipfam & 0x04)?"ipv6":"unspec",
-#else
- "http%s_proxy_listen error for %s, %s",
- (ServerRealm_get_tunnelType(scRealmsTable[i]) == 2) ? "s" : "",
-#endif
- UsrCli_get_manageHostName(srUsersClientsTable[j]) ?
- UsrCli_get_manageHostName(srUsersClientsTable[j]) :
- ServerRealm_get_hostName(scRealmsTable[i]),
- UsrCli_get_managePortName(srUsersClientsTable[j]));
- exit(1);
- }
- }
- ServerRealm_set_addressLength(scRealmsTable[i], len);
- UsrCli_set_manageFd(srUsersClientsTable[j], temp);
- flags = fcntl(UsrCli_get_manageFd(srUsersClientsTable[j]), F_GETFL, 0);
- fcntl(UsrCli_get_manageFd(srUsersClientsTable[j]), F_SETFL, flags | O_NONBLOCK);
- UsrCli_set_number(srUsersClientsTable[j], eval_UsrCliPair(srUsersClientsTable, j,
- UsrCli_get_manageHostName(srUsersClientsTable[j]),
- UsrCli_get_managePortName(srUsersClientsTable[j])));
- break;
- }
-#endif
default: {
aflog(LOG_T_INIT, LOG_I_CRIT,
"Unknown tunnel type");
@@ -2048,11 +1946,6 @@ main(int argc, char **argv)
ConnectClient_set_lastActivity(
srRaClientsTable[l],
ConnectClient_get_lastActivity(srClientsTable[k]));
-#ifdef HAVE_LIBPTHREAD
- ConnectClient_set_tunnelType(
- srRaClientsTable[l],
- ConnectClient_get_tunnelType(srClientsTable[k]));
-#endif
ConnectClient_set_clientId(
srRaClientsTable[l],
ConnectClient_get_clientId(srClientsTable[k]));
@@ -2259,11 +2152,6 @@ main(int argc, char **argv)
ConnectClient_set_lastActivity(
srClientsTable[l],
ConnectClient_get_lastActivity(srRaClientsTable[k]));
-#ifdef HAVE_LIBPTHREAD
- ConnectClient_set_tunnelType(
- srClientsTable[l],
- ConnectClient_get_tunnelType(srRaClientsTable[k]));
-#endif
ConnectClient_set_clientId(
srClientsTable[l],
ConnectClient_get_clientId(srRaClientsTable[k]));
@@ -2536,12 +2424,7 @@ main(int argc, char **argv)
aflog(LOG_T_CLIENT, LOG_I_DDEBUG,
"realm[%s]: managefd: FD_ISSET", get_realmname(config, j));
len = ServerRealm_get_addressLength(pointer);
-#ifdef HAVE_LIBPTHREAD
- sent = get_new_socket(UsrCli_get_manageFd(srUsersClientsTable[l]),
- ServerRealm_get_tunnelType(pointer),ServerRealm_get_clientAddress(pointer), &len, &tunneltype);
-#else
sent = accept(UsrCli_get_manageFd(srUsersClientsTable[l]), ServerRealm_get_clientAddress(pointer), &len);
-#endif
if (sent == -1) {
if (errno == EAGAIN) {
aflog(LOG_T_USER, LOG_I_DDEBUG,
@@ -2567,9 +2450,6 @@ main(int argc, char **argv)
time(&now);
ConnectClient_set_connectTime(srClientsTable[k], now);
ConnectClient_set_lastActivity(srClientsTable[k], now);
-#ifdef HAVE_LIBPTHREAD
- ConnectClient_set_tunnelType(srClientsTable[k], tunneltype);
-#endif
aflog(LOG_T_CLIENT, LOG_I_INFO,
"realm[%s]: new Client[%s] IP:%s", get_realmname(config, j), get_clientname(pointer, k),
sock_ntop(ServerRealm_get_clientAddress(pointer), len, ConnectClient_get_nameBuf(srClientsTable[k]),
@@ -2603,9 +2483,6 @@ main(int argc, char **argv)
time(&now);
ConnectClient_set_connectTime(srRaClientsTable[k], now);
ConnectClient_set_lastActivity(srRaClientsTable[k], now);
-#ifdef HAVE_LIBPTHREAD
- ConnectClient_set_tunnelType(srRaClientsTable[k], tunneltype);
-#endif
aflog(LOG_T_MANAGE, LOG_I_INFO,
"realm[%s]: new Client[%s] (ra) IP:%s",
get_realmname(config, j), get_raclientname(pointer, k),
diff --git a/src/afserver.h b/src/afserver.h
index bc23e75..85bd03f 100644
--- a/src/afserver.h
+++ b/src/afserver.h
@@ -34,8 +34,6 @@
#include "clientnames.h"
#include "usernames.h"
#include "server_get.h"
-#include "http_proxy_server.h"
-#include "thread_management.h"
#include "server_signals.h"
#include "usage.h"
#include "logging.h"
diff --git a/src/client_initialization.c b/src/client_initialization.c
index efde9a9..9cc8c9a 100644
--- a/src/client_initialization.c
+++ b/src/client_initialization.c
@@ -70,36 +70,6 @@ initialize_client_stage1(ClientRealm* cr, SSL_CTX* ctx, unsigned char* buff, cha
SslFd_set_fd(ClientRealm_get_masterSslFd(cr), tmp);
break;
}
-#ifdef HAVE_LIBPTHREAD
- case 1: {
- if (initialize_http_proxy_client(&tmp, cr, ctx)) {
-#ifdef AF_INET6
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http_proxy_connect_%s error for %s, %s (proxy: %s, %s)",
- (ClientRealm_get_ipFamily(cr) & 0x02) ?
- "ipv4":(ClientRealm_get_ipFamily(cr) & 0x04) ?
- "ipv6":"unspec", ClientRealm_get_serverName(cr),
- ClientRealm_get_managePort(cr),
- HttpProxyOptions_get_proxyname(ClientRealm_get_httpProxyOptions(cr)),
- HttpProxyOptions_get_proxyport(ClientRealm_get_httpProxyOptions(cr)));
-#else
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http_proxy_connect error for %s, %s (proxy: %s, %s)", ClientRealm_get_serverName(cr),
- ClientRealm_get_managePort(cr),
- HttpProxyOptions_get_proxyname(ClientRealm_get_httpProxyOptions(cr)),
- HttpProxyOptions_get_proxyport(ClientRealm_get_httpProxyOptions(cr)));
-#endif
- if (wanttoexit) {
- exit(1);
- }
- else {
- return 1;
- }
- }
- SslFd_set_fd(ClientRealm_get_masterSslFd(cr), tmp);
- break;
- }
-#endif
default: {
aflog(LOG_T_INIT, LOG_I_CRIT,
"Unknown tunnel type");
diff --git a/src/client_initialization.h b/src/client_initialization.h
index 390568f..4f981a3 100644
--- a/src/client_initialization.h
+++ b/src/client_initialization.h
@@ -23,8 +23,6 @@
#include "activefor.h"
#include "stats.h"
#include "logging.h"
-#include "http_proxy_client.h"
-#include "http_proxy_options_struct.h"
#include "ssl_fd_struct.h"
#include "client_realm_struct.h"
diff --git a/src/client_realm_struct.c b/src/client_realm_struct.c
index 5b4477e..4963671 100644
--- a/src/client_realm_struct.c
+++ b/src/client_realm_struct.c
@@ -59,12 +59,6 @@ ClientRealm_new()
ClientRealm_free(&tmp);
return NULL;
}
- tmp->httpProxyOptions = HttpProxyOptions_new();
- assert(tmp->httpProxyOptions != NULL);
- if (tmp->httpProxyOptions == NULL) {
- ClientRealm_free(&tmp);
- return NULL;
- }
#ifdef HAVE_LIBDL
tmp->userModule = Module_new();
assert(tmp->userModule != NULL);
@@ -110,7 +104,6 @@ ClientRealm_free(ClientRealm** cr)
ClientRealm_set_localDestinationName((*cr), NULL);
ClientRealm_set_clientAddress((*cr), NULL);
ClientRealm_set_masterSslFd((*cr), NULL);
- ClientRealm_set_httpProxyOptions((*cr), NULL);
ClientRealm_set_arOptions((*cr), NULL);
ClientRealm_set_destinationPorts((*cr), NULL);
ClientRealm_set_usersTable((*cr), NULL);
@@ -507,26 +500,6 @@ ClientRealm_set_masterSslFd(ClientRealm* cr, SslFd* masterSslFd)
}
/*
- * Function name: ClientRealm_set_httpProxyOptions
- * Description: Set client realm's http proxy options.
- * Arguments: cr - pointer to ClientRealm structure
- * httpProxyOptions - client realm's http proxy options
- */
-
-void
-ClientRealm_set_httpProxyOptions(ClientRealm* cr, HttpProxyOptions* httpProxyOptions)
-{
- assert(cr != NULL);
- if (cr == NULL) {
- return;
- }
- if (cr->httpProxyOptions) {
- HttpProxyOptions_free(&(cr->httpProxyOptions));
- }
- cr->httpProxyOptions = httpProxyOptions;
-}
-
-/*
* Function name: ClientRealm_set_arOptions
* Description: Set client realm's auto-reconnect options.
* Arguments: cr - pointer to ClientRealm structure
@@ -994,23 +967,6 @@ ClientRealm_get_masterSslFd(ClientRealm* cr)
}
/*
- * Function name: ClientRealm_get_httpProxyOptions
- * Description: Get client realm's http proxy options.
- * Arguments: cr - pointer to ClientRealm structure
- * Returns: Client realm's http proxy options.
- */
-
-HttpProxyOptions*
-ClientRealm_get_httpProxyOptions(ClientRealm* cr)
-{
- assert(cr != NULL);
- if (cr == NULL) {
- return NULL;
- }
- return cr->httpProxyOptions;
-}
-
-/*
* Function name: ClientRealm_get_arOptions
* Description: Get client realm's auto-reconnect options.
* Arguments: cr - pointer to ClientRealm structure
diff --git a/src/client_realm_struct.h b/src/client_realm_struct.h
index 0fd1789..51790ef 100644
--- a/src/client_realm_struct.h
+++ b/src/client_realm_struct.h
@@ -20,7 +20,6 @@
#include "activefor.h"
#include "ssl_fd_struct.h"
-#include "http_proxy_options_struct.h"
#include "ar_options_struct.h"
#include "module_struct.h"
#include "port_list_struct.h"
@@ -36,8 +35,6 @@
#define CLIENTREALM_TUNNELTYPE_UNKNOWN -1
#define CLIENTREALM_TUNNELTYPE_DIRECT 0
-#define CLIENTREALM_TUNNELTYPE_HTTPPROXY 1
-#define CLIENTREALM_TUNNELTYPE_HTTPSPROXY 2
typedef struct {
char* serverName;
@@ -61,7 +58,6 @@ typedef struct {
socklen_t addressLength;
struct sockaddr* clientAddress;
SslFd* masterSslFd;
- HttpProxyOptions* httpProxyOptions;
ArOptions* arOptions;
PortList* destinationPorts;
ConnectUser** usersTable;
@@ -97,7 +93,6 @@ void ClientRealm_set_keepAlive(ClientRealm* cr, struct timeval keepAlive);
void ClientRealm_set_addressLength(ClientRealm* cr, socklen_t addressLength);
void ClientRealm_set_clientAddress(ClientRealm* cr, struct sockaddr* clientAddress);
void ClientRealm_set_masterSslFd(ClientRealm* cr, SslFd* masterSslFd);
-void ClientRealm_set_httpProxyOptions(ClientRealm* cr, HttpProxyOptions* httpProxyOptions);
void ClientRealm_set_arOptions(ClientRealm* cr, ArOptions* arOptions);
void ClientRealm_set_destinationPorts(ClientRealm* cr, PortList* destinationPorts);
void ClientRealm_set_usersTable(ClientRealm* cr, ConnectUser** usersTable);
@@ -127,7 +122,6 @@ struct timeval ClientRealm_get_keepAlive(ClientRealm* cr);
socklen_t ClientRealm_get_addressLength(ClientRealm* cr);
struct sockaddr* ClientRealm_get_clientAddress(ClientRealm* cr);
SslFd* ClientRealm_get_masterSslFd(ClientRealm* cr);
-HttpProxyOptions* ClientRealm_get_httpProxyOptions(ClientRealm* cr);
ArOptions* ClientRealm_get_arOptions(ClientRealm* cr);
PortList* ClientRealm_get_destinationPorts(ClientRealm* cr);
ConnectUser** ClientRealm_get_usersTable(ClientRealm* cr);
diff --git a/src/client_signals.c b/src/client_signals.c
index 04c344e..e8c7269 100644
--- a/src/client_signals.c
+++ b/src/client_signals.c
@@ -21,7 +21,6 @@
#include <config.h>
#include "client_signals.h"
-#include "thread_management.h"
#include "stats.h"
#include "logging.h"
@@ -36,11 +35,6 @@
void
client_sig_int(int signo)
{
-#ifdef HAVE_LIBPTHREAD
- if (!is_this_a_mainthread()) {
- return;
- }
-#endif
aflog(LOG_T_MAIN, LOG_I_NOTICE,
"CLIENT CLOSED cg: %ld bytes", getcg());
exit(0);
diff --git a/src/connect_client_struct.h b/src/connect_client_struct.h
index 9cf2e6d..9f598be 100644
--- a/src/connect_client_struct.h
+++ b/src/connect_client_struct.h
@@ -37,8 +37,6 @@
#define CONNECTCLIENT_TUNNELTYPE_UNKNOWN -1
#define CONNECTCLIENT_TUNNELTYPE_DIRECT 0
-#define CONNECTCLIENT_TUNNELTYPE_HTTPPROXY 1
-#define CONNECTCLIENT_TUNNELTYPE_HTTPSPROXY 2
#define CONNECTCLIENT_MULTI_ENABLED 1
#define CONNECTCLIENT_MULTI_DISABLED 0
diff --git a/src/file_client.c b/src/file_client.c
index 672eeaf..5ba1d97 100644
--- a/src/file_client.c
+++ b/src/file_client.c
@@ -144,27 +144,6 @@ cparsefile(char* name, int* status)
ClientRealm_set_clientMode(ClientConfiguration_get_realmsTable(cfg)[0], CLIENTREALM_MODE_UNKNOWN);
}
}
- else if ((strcmp(helpbuf1, "S") == 0) || (strcmp(helpbuf1, "use-https") == 0)) {
- HttpProxyOptions_use_https(ClientRealm_get_httpProxyOptions(
- ClientConfiguration_get_realmsTable(cfg)[0]));
- }
- else if ((strcmp(helpbuf1, "B") == 0) || (strcmp(helpbuf1, "pa-t-basic") == 0)) {
- HttpProxyOptions_set_proxyauth_type(ClientRealm_get_httpProxyOptions(
- ClientConfiguration_get_realmsTable(cfg)[0]), PROXYAUTH_TYPE_BASIC);
- }
-#ifdef HAVE_LIBPTHREAD
- else if (strcmp(helpbuf1, "enableproxy")==0) {
- if (ClientRealm_get_tunnelType(
- ClientConfiguration_get_realmsTable(cfg)[0]) == 0) {
- ClientRealm_set_tunnelType(
- ClientConfiguration_get_realmsTable(cfg)[0],
- 1);
- }
- else {
- return cfg;
- }
- }
-#endif
#ifdef AF_INET6
else if (strcmp(helpbuf1, "ipv4")==0) {
if (TYPE_IS_UNSPEC(ClientRealm_get_realmType(
@@ -255,18 +234,6 @@ cparsefile(char* name, int* status)
ArOptions_set_s_arDelay(ClientRealm_get_arOptions(ClientConfiguration_get_realmsTable(cfg)[0]),
helpbuf2);
}
- else if ((strcmp(helpbuf1, "P") == 0) || (strcmp(helpbuf1, "proxyname") == 0)) {
- HttpProxyOptions_set_proxyname(ClientRealm_get_httpProxyOptions(
- ClientConfiguration_get_realmsTable(cfg)[0]), helpbuf2);
- }
- else if ((strcmp(helpbuf1, "X") == 0) || (strcmp(helpbuf1, "proxyport") == 0)) {
- HttpProxyOptions_set_proxyport(ClientRealm_get_httpProxyOptions(
- ClientConfiguration_get_realmsTable(cfg)[0]), helpbuf2);
- }
- else if ((strcmp(helpbuf1, "C") == 0) || (strcmp(helpbuf1, "pa-cred") == 0)) {
- HttpProxyOptions_set_proxyauth_cred(ClientRealm_get_httpProxyOptions(
- ClientConfiguration_get_realmsTable(cfg)[0]), helpbuf2);
- }
else {
return cfg;
}
diff --git a/src/file_server.c b/src/file_server.c
index 35ed235..d027f02 100644
--- a/src/file_server.c
+++ b/src/file_server.c
@@ -206,19 +206,6 @@ parsefile(char* name, int* status)
ServerConfiguration_get_realmsTable(cfg)[ServerConfiguration_get_realmsNumber(cfg) - 1],
1);
}
-#ifdef HAVE_LIBPTHREAD
- else if (strcmp(helpbuf1, "enableproxy")==0) {
- if (ServerRealm_get_tunnelType(
- ServerConfiguration_get_realmsTable(cfg)[ServerConfiguration_get_realmsNumber(cfg) - 1]) == 0) {
- ServerRealm_set_tunnelType(
- ServerConfiguration_get_realmsTable(cfg)[ServerConfiguration_get_realmsNumber(cfg) - 1],
- 1);
- }
- else {
- return cfg;
- }
- }
-#endif
#ifdef AF_INET6
else if (strcmp(helpbuf1, "ipv4")==0) {
if (TYPE_IS_UNSPEC(ServerRealm_get_realmType(
diff --git a/src/http_proxy_client.c b/src/http_proxy_client.c
deleted file mode 100644
index 157d009..0000000
--- a/src/http_proxy_client.c
+++ /dev/null
@@ -1,565 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <config.h>
-
-#include "http_proxy_functions.h"
-#include "http_proxy_client.h"
-#include "thread_management.h"
-#include "network.h"
-#include "stats.h"
-#include "logging.h"
-#include "base64.h"
-
-#ifdef HAVE_LIBPTHREAD
-typedef struct {
- int sockfd;
- char *host;
- char *serv;
- HttpProxyOptions* hpo;
- char type;
- SSL_CTX* ctx;
-} proxy_argT;
-
-/*
- * Function name: clean_return
- * Description: Closes the connection and exits the thread.
- * Arguments: sockfd - the descriptor of the connection
- */
-
-static void
-clean_return(int sockfd)
-{
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http proxy: clean_return");
- close(sockfd);
- pthread_exit(NULL);
-}
-
-/*
- * Function name: http_proxy_client
- * Description: Function responsible for the client part of the http proxy connection.
- * Arguments: vptr - the structure with all the information needed for http proxy tunnel
- */
-
-void*
-http_proxy_client(void *vptr)
-{
- char tab[9000];
- connection conn;
- header hdr;
- int j, n, maxfdp1;
- fd_set rset, allset;
- struct timeval tv;
- int timeout = 5;
- int tmp;
- char *host, *serv, *proxyname, *proxyport, *credentials, *name = "";
- char b64cred[100];
- char type, authtype, https;
- SSL_CTX* ctx;
- proxy_argT *proxy_argptr;
-
- start_critical_section();
- proxy_argptr = (proxy_argT *) vptr;
-
- host = proxy_argptr->host;
- serv = proxy_argptr->serv;
- proxyname = HttpProxyOptions_get_proxyname(proxy_argptr->hpo);
- proxyport = HttpProxyOptions_get_proxyport(proxy_argptr->hpo);
- credentials = HttpProxyOptions_get_proxyauth_cred(proxy_argptr->hpo);
- type = proxy_argptr->type;
- authtype = HttpProxyOptions_get_proxyauth_type(proxy_argptr->hpo);
- conn.sockfd = proxy_argptr->sockfd;
- https = HttpProxyOptions_is_https(proxy_argptr->hpo);
- ctx = proxy_argptr->ctx;
-
- broadcast_condition();
- end_critical_section();
-
- conn.postFd = SslFd_new();
- conn.getFd = SslFd_new();
- conn.tmpFd = SslFd_new();
- if ((conn.postFd == NULL) || (conn.getFd == NULL) || (conn.tmpFd == NULL)) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
-
- if (https) {
- name = "s";
- SslFd_set_ssl(conn.postFd, SSL_new(ctx));
- SslFd_set_ssl(conn.getFd, SSL_new(ctx));
- SslFd_set_ssl(conn.tmpFd, SSL_new(ctx));
- if ((SslFd_get_ssl(conn.postFd) == NULL) ||
- (SslFd_get_ssl(conn.getFd) == NULL) ||
- (SslFd_get_ssl(conn.tmpFd) == NULL)) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- }
-
- if (authtype == PROXYAUTH_TYPE_WRONG) {
- aflog(LOG_T_MAIN, LOG_I_WARNING,
- "Wrong type of proxy authorizaton --> switching to no authorization");
- credentials = NULL;
- }
-
- if (credentials) {
- if (b64_ntop((unsigned char*)credentials, strlen(credentials), b64cred, 100) == -1) {
- aflog(LOG_T_MAIN, LOG_I_ERR,
- "Cannot encode credentials for proxy authorization");
- b64cred[0] = 0;
- }
- else {
- if (authtype == PROXYAUTH_TYPE_NOTSET) {
- authtype = PROXYAUTH_TYPE_BASIC;
- }
- }
- }
-
- FD_ZERO(&allset);
- tv.tv_usec = 0;
- tv.tv_sec = timeout;
-
- memset(conn.id, 0, 10);
- for (j = 0; j < 9; ++j) {
- conn.id[j] = myrand(65, 90);
- }
- conn.id[9] = 0;
-
- /* postfd */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: connecting (postfd)...", name);
- if (ip_connect(&tmp, proxyname, proxyport, type, NULL, NULL)) {
- clean_return(conn.sockfd);
- }
- SslFd_set_fd(conn.postFd, tmp);
- if (https) {
- if (SSL_set_fd(SslFd_get_ssl(conn.postFd), SslFd_get_fd(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: Problem with initializing ssl");
- clean_return(conn.sockfd);
- }
- if (SSL_connect(SslFd_get_ssl(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: SSL_connect has failed");
- clean_return(conn.sockfd);
- }
- }
-
- memset(tab, 0, 9000);
- switch (authtype) {
- case PROXYAUTH_TYPE_BASIC:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n"
- "Proxy-Authorization: Basic %s\r\n\r\n", host, serv, conn.id, host, serv, b64cred);
- break;
- default:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n\r\n", host, serv, conn.id, host, serv);
- }
- j = strlen (tab);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing POST request...", name);
- if (http_write(https, conn.postFd, (unsigned char*) tab, j) <= 0) {
- clean_return(conn.sockfd);
- }
-
- /* getfd */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: connecting (getfd)...", name);
- if (ip_connect(&tmp, proxyname, proxyport, type, NULL, NULL)) {
- clean_return(conn.sockfd);
- }
- SslFd_set_fd(conn.getFd, tmp);
- if (https) {
- if (SSL_set_fd(SslFd_get_ssl(conn.getFd), SslFd_get_fd(conn.getFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: Problem with initializing ssl");
- clean_return(conn.sockfd);
- }
- if (SSL_connect(SslFd_get_ssl(conn.getFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: SSL_connect has failed");
- clean_return(conn.sockfd);
- }
- }
-
- memset(tab, 0, 9000);
- switch (authtype) {
- case PROXYAUTH_TYPE_BASIC:
- sprintf(tab,
- "GET http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Connection: close\r\n"
- "Proxy-Authorization: Basic %s\r\n\r\n", host, serv, conn.id, host, serv, b64cred);
- break;
- default:
- sprintf(tab,
- "GET http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Connection: close\r\n\r\n", host, serv, conn.id, host, serv);
- }
- j = strlen (tab);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing GET request...", name);
- if (http_write(https, conn.getFd, (unsigned char*) tab, j) <= 0) {
- clean_return(conn.sockfd);
- }
-
- set_fd(conn.sockfd, &maxfdp1, &allset);
- set_fd(SslFd_get_fd(conn.postFd), &maxfdp1, &allset);
- set_fd(SslFd_get_fd(conn.getFd), &maxfdp1, &allset);
- conn.state = C_OPEN;
-
- memset(tab, 0, 9000);
-
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: parsing header from getfd", name);
- if (parse_header(conn.getFd, tab, &hdr, https)) {
- clean_return(conn.sockfd);
- }
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: checking hdr.type", name);
- if (hdr.type != H_TYPE_OK) {
- clean_return(conn.sockfd);
- }
- if (hdr.length) {
- conn.received += hdr.length;
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: reading message...", name);
- if (read_message(conn.sockfd, hdr.length, &conn, tab, hdr.ptr)) {
- clean_return(conn.sockfd);
- }
- }
-
- while (1) {
- if ((conn.state == C_OPEN) && (!(FD_ISSET(conn.sockfd, &allset)))) {
- FD_SET(conn.sockfd, &allset);
- }
- rset = allset;
-
- if (select(maxfdp1, &rset, NULL, NULL, &tv) == 0) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: timeout", name);
- tv.tv_sec = timeout;
- if (conn.sent_ptr+1 >= 90000) {
- if (conn.state == C_CLOSED) {
- continue;
- }
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: send T", name);
- http_write(https, conn.postFd, (unsigned char*) "T", 1);
- conn.sent_ptr = 0;
- clear_sslFd(conn.postFd, &allset);
- /* postfd */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: connecting (postfd)...", name);
- if (ip_connect(&tmp, proxyname, proxyport, type, NULL, NULL)) {
- clean_return(conn.sockfd);
- }
- SslFd_set_fd(conn.postFd, tmp);
- if (https) {
- if (SSL_set_fd(SslFd_get_ssl(conn.postFd), SslFd_get_fd(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: Problem with initializing ssl");
- clean_return(conn.sockfd);
- }
- if (SSL_connect(SslFd_get_ssl(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: SSL_connect has failed");
- clean_return(conn.sockfd);
- }
- }
-
- memset(tab, 0, 9000);
- switch (authtype) {
- case PROXYAUTH_TYPE_BASIC:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n"
- "Proxy-Authorization: Basic %s\r\n\r\n", host, serv, conn.id, host, serv, b64cred);
- break;
- default:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n\r\n", host, serv, conn.id, host, serv);
- }
- j = strlen (tab);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing POST request...", name);
- if (http_write(https, conn.postFd, (unsigned char *) tab, j) <= 0) {
- clean_return(conn.sockfd);
- }
- conn.sent_ptr = 0;
- conn.ptr = 0;
- conn.length = 0;
- conn.state = C_CLOSED;
-
- set_fd(SslFd_get_fd(conn.postFd), &maxfdp1, &allset);
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: send T", name);
- http_write(https, conn.postFd, (unsigned char *) "T", 1);
- conn.sent_ptr += 1;
- }
- continue;
- }
-
- /* sockfd */
- if (FD_ISSET(conn.sockfd, &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(conn.sockfd)", name);
- n = read(conn.sockfd, conn.buf+5, 8995);
- if (n <= 0) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: send Q", name);
- http_write(https, conn.postFd, (unsigned char *) "Q", 1);
- clean_return(conn.sockfd);
- }
- if ((conn.state == C_CLOSED) && (conn.sent_ptr > 70000)) {
- FD_CLR(conn.sockfd, &allset);
- }
- conn.buf[0] = 'M';
- tmp = htonl(n);
- memcpy(&conn.buf[1], &tmp, 4);
- if (conn.sent_ptr+5 + n >= 90000) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: send message", name);
- http_write(https, conn.postFd, (unsigned char *) conn.buf, 90000 - conn.sent_ptr);
- conn.ptr = 90000 - conn.sent_ptr;
- conn.length = 5+n - conn.ptr;
- conn.sent_ptr = 0;
- clear_sslFd(conn.postFd, &allset);
-
- /* postfd */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: connecting (postfd)...", name);
- if (ip_connect(&tmp, proxyname, proxyport, type, NULL, NULL)) {
- clean_return(conn.sockfd);
- }
- SslFd_set_fd(conn.postFd, tmp);
- if (https) {
- if (SSL_set_fd(SslFd_get_ssl(conn.postFd), SslFd_get_fd(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: Problem with initializing ssl");
- clean_return(conn.sockfd);
- }
- if (SSL_connect(SslFd_get_ssl(conn.postFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: SSL_connect has failed");
- clean_return(conn.sockfd);
- }
- }
-
- memset(tab, 0, 9000);
- switch (authtype) {
- case PROXYAUTH_TYPE_BASIC:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n"
- "Proxy-Authorization: Basic %s\r\n\r\n", host, serv, conn.id, host, serv, b64cred);
- break;
- default:
- sprintf(tab,
- "POST http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n\r\n", host, serv, conn.id, host, serv);
- }
- j = strlen (tab);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing POST request...", name);
- if (http_write(https, conn.postFd, (unsigned char *) tab, j) <= 0) {
- clean_return(conn.sockfd);
- }
- if (conn.length > 0) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing old data...", name);
- if (http_write(https, conn.postFd, (unsigned char *) (conn.buf+conn.ptr), conn.length) <= 0) {
- clean_return(conn.sockfd);
- }
- }
- conn.sent_ptr = conn.length;
- conn.ptr = 0;
- conn.length = 0;
- conn.state = C_CLOSED;
-
- set_fd(SslFd_get_fd(conn.postFd), &maxfdp1, &allset);
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: send message", name);
- http_write(https, conn.postFd, (unsigned char *) conn.buf, 5+n);
- conn.sent_ptr += 5+n;
- }
- }
-
- /* getfd */
- if (FD_ISSET(SslFd_get_fd(conn.getFd), &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(conn.getfd)", name);
- n = http_read(https, conn.getFd, (unsigned char*) tab, 9000);
- conn.received += n;
- if (n == 0) {
- conn.received = 0;
- clear_sslFd(conn.getFd, &allset);
-
- /* getfd */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: connecting (getfd)...", name);
- if (ip_connect(&tmp, proxyname, proxyport, type, NULL, NULL)) {
- clean_return(conn.sockfd);
- }
- SslFd_set_fd(conn.getFd, tmp);
- if (https) {
- if (SSL_set_fd(SslFd_get_ssl(conn.getFd), SslFd_get_fd(conn.getFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: Problem with initializing ssl");
- clean_return(conn.sockfd);
- }
- if (SSL_connect(SslFd_get_ssl(conn.getFd)) != 1) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "https proxy: SSL_connect has failed");
- clean_return(conn.sockfd);
- }
- }
-
- memset(tab, 0, 9000);
- switch (authtype) {
- case PROXYAUTH_TYPE_BASIC:
- sprintf(tab,
- "GET http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Connection: close\r\n"
- "Proxy-Authorization: Basic %s\r\n\r\n", host, serv, conn.id, host, serv, b64cred);
- break;
- default:
- sprintf(tab,
- "GET http://%s:%s/yahpt.html?id=%s HTTP/1.1\r\n"
- "Host: %s:%s\r\n"
- "Connection: close\r\n\r\n", host, serv, conn.id, host, serv);
- }
- j = strlen (tab);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: writing GET request...", name);
- if (http_write(https, conn.getFd, (unsigned char *) tab, j) <= 0) {
- clean_return(conn.sockfd);
- }
- memset(tab, 0, 9000);
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: parsing header from getfd", name);
- if (parse_header(conn.getFd, tab, &hdr, https)) {
- clean_return(conn.sockfd);
- }
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: checking hdr.type", name);
- if (hdr.type != H_TYPE_OK) {
- clean_return(conn.sockfd);
- }
-
- set_fd(SslFd_get_fd(conn.getFd), &maxfdp1, &allset);
- if (hdr.length) {
- conn.received += hdr.length;
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: reading message...", name);
- if (read_message(conn.sockfd, hdr.length, &conn, tab, hdr.ptr)) {
- clean_return(conn.sockfd);
- }
- }
- }
- else {
- if (read_message(conn.sockfd, n, &conn, tab, 0)) {
- clean_return(conn.sockfd);
- }
- }
- }
-
- /* postfd */
- if (FD_ISSET(SslFd_get_fd(conn.postFd), &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(conn.postfd) --> clean_return", name);
- clear_sslFd(conn.postFd, &allset);
- clean_return(conn.sockfd);
- }
- }
- clean_return(conn.sockfd);
-}
-
-/*
- * Function name: initialize_http_proxy_client
- * Description: Initializes the thread responsible for http proxy connection.
- * Arguments: sockfd - the new connection descriptor will be stored here
- * cr - the pointer to ClientRealm structure
- * ctx - the pointer to SSL_CTX structure
- * Returns: 0 - success,
- * !0 - failure.
- */
-
-int
-initialize_http_proxy_client(int* sockfd, ClientRealm* cr, SSL_CTX* ctx)
-{
- int retval;
- int sockets[2];
- pthread_t proxy_thread;
- static proxy_argT arg;
-
- if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets)) {
- return 1;
- }
- (*sockfd) = sockets[0];
-
- if (HttpProxyOptions_get_proxyname(ClientRealm_get_httpProxyOptions(cr)) == NULL) {
- return 1;
- }
-
- start_critical_section();
-
- arg.host = ClientRealm_get_serverName(cr);
- arg.serv = ClientRealm_get_managePort(cr);
- arg.hpo = ClientRealm_get_httpProxyOptions(cr);
- arg.type = ClientRealm_get_ipFamily(cr);
- arg.sockfd = sockets[1];
- arg.ctx = ctx;
-
- retval = pthread_create(&proxy_thread, NULL, &http_proxy_client, &arg);
-
- wait_for_condition();
-
- end_critical_section();
-
- return retval;
-}
-
-#endif
diff --git a/src/http_proxy_client.h b/src/http_proxy_client.h
deleted file mode 100644
index 15506c7..0000000
--- a/src/http_proxy_client.h
+++ /dev/null
@@ -1,29 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include "http_proxy_options_struct.h"
-#include "client_realm_struct.h"
-
-#ifndef _JS_HTTP_PROXY_CLIENT_H
-#define _JS_HTTP_PROXY_CLIENT_H
-
-int initialize_http_proxy_client(int* sockfd, ClientRealm* cr, SSL_CTX* ctx);
-
-#endif
diff --git a/src/http_proxy_functions.c b/src/http_proxy_functions.c
deleted file mode 100644
index 3e53365..0000000
--- a/src/http_proxy_functions.c
+++ /dev/null
@@ -1,395 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <config.h>
-
-#include "http_proxy_functions.h"
-#include "network.h"
-#include "stats.h"
-#include "logging.h"
-
-static char isseed;
-
-/*
- * Function name: myrand
- * Description: Returns the pseudo-random number from the given range.
- * If the lower and upper bounds are the same, the pseudo-random
- * number is returned from the range (-RAND_MAX, -RAND_MAX+down)
- * or (down, RAND_MAX).
- * Arguments: down - the lower bound of the range
- * up - the upper bound of the range
- * Returns: The pseudo-random number from the given range.
- */
-
-int
-myrand(int down, int up)
-{
- struct timeval tv;
- if (!isseed) {
- gettimeofday(&tv, 0);
- srand(tv.tv_sec);
- isseed = 1;
- }
- return ( down + ( rand() % (up - down + 1) ) );
-}
-
-/*
- * Function name: delete_user
- * Description: Deletes the user's connection from the http proxy connections.
- * Arguments: cnts - the connection to remove
- * i - the user's number
- * allset - the set of file descriptors
- */
-
-void
-delete_user(connection* cnts, int i, fd_set* allset)
-{
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http proxy: delete_user(%d)", i);
- clear_fd(&(cnts[i].sockfd), allset);
- if (!(cnts[i].state & C_POST_WAIT)) {
- clear_sslFd(cnts[i].postFd, allset);
- }
- if ((cnts[i].type == 0) && (!(cnts[i].state & C_GET_WAIT))) {
- clear_sslFd(cnts[i].getFd, allset);
- }
- cnts[i].state = C_CLOSED;
- cnts[i].sent_ptr = cnts[i].ptr = cnts[i].length = 0;
- cnts[i].type = 0;
-}
-
-/*
- * Function name: parse_header
- * Description: Reads and parses the http header.
- * Arguments: sf - the pointer to SslFd structure
- * tab - the buffer used for reading the data
- * hdr - the pointer to header structure
- * https - the flag indicating if the connection is http/https
- * Returns: 0 - success,
- * 1 - failure.
- */
-
-int
-parse_header(SslFd* sf, char* tab, header* hdr, char https)
-{
- int n, i, j, state = 0;
- char tmpt[100];
- if (https) {
- n = SSL_read(SslFd_get_ssl(sf), tab, 9000);
- }
- else {
- n = read(SslFd_get_fd(sf), tab, 9000);
- }
- hdr->allreaded = n;
- i = j = 0;
- memset(tmpt, 0, 100);
- hdr->ptr = 0;
- hdr->length = 0;
- while (i < n) {
- if (j == 99)
- return 1;
- switch (state) {
- case 0:
- if ((tab[i] != ' ') && (tab[i] != '\t')) {
- tmpt[j] = tab[i];
- ++j;
- }
- else {
- tmpt[j] = 0;
- if (strcmp(tmpt, "GET") == 0) {
- hdr->type = H_TYPE_GET;
- state = 1;
- break;
- }
- if (strcmp(tmpt, "POST") == 0) {
- hdr->type = H_TYPE_POST;
- state = 1;
- break;
- }
- if ((strcmp(tmpt, "HTTP/1.0") == 0) || (strcmp(tmpt, "HTTP/1.1") == 0)) {
- hdr->type = H_TYPE_OK;
- state = 6;
- break;
- }
- return 1;
- }
- break;
- case 1:
- if ((tab[i] != ' ') && (tab[i] != '\t')) {
- tmpt[0] = tab[i];
- j = 1;
- state = 2;
- }
- break;
- case 2:
- if (tab[i] != '=') {
- tmpt[j] = tab[i];
- ++j;
- }
- else {
- tmpt[j] = 0;
- if (strcmp(tmpt, "/yahpt.html?id")) {
- return 1;
- }
- j = 0;
- state = 3;
- }
- break;
- case 3:
- if ((tab[i] != ' ') && (tab[i] != '\t')) {
- if (j == 9) {
- return 1;
- }
- hdr->id[j] = tab[i];
- ++j;
- }
- else {
- if (j != 9) {
- return 1;
- }
- hdr->id[j] = 0;
- state = 4;
- }
- break;
- case 4:
- if (tab[i] == '\n')
- state = 5;
- break;
- case 5:
- if (tab[i] == '\n') {
- hdr->ptr = i+1;
- hdr->length = n - hdr->ptr;
- return 0;
- }
- if (tab[i] != '\r') {
- state = 4;
- }
- break;
- case 6:
- if ((tab[i] != ' ') && (tab[i] != '\t')) {
- tmpt[0] = tab[i];
- j = 1;
- state = 7;
- }
- break;
- case 7:
- if ((tab[i] == ' ') || (tab[i] == '\t')) {
- tmpt[j] = 0;
- if (strcmp(tmpt, "200")) {
- return 1;
- }
- state = 4;
- }
- else {
- tmpt[j] = tab[i];
- ++j;
- }
- break;
- }
- ++i;
- }
- return 1;
-}
-
-/*
- * Function name: set_fd
- * Description: Starts watching the file descriptor.
- * Arguments: fd - the file descriptor
- * maxfdp1 - the upper limit of the file descriptor numbers
- * allset - the set of file descriptors
- */
-
-void
-set_fd(int fd, int* maxfdp1, fd_set* allset)
-{
- FD_SET(fd, allset);
- (*maxfdp1) = ((*maxfdp1) > fd) ? (*maxfdp1) : (fd + 1);
-}
-
-/*
- * Function name: close_fd
- * Description: Closes the file descriptor.
- * Arguments: fd - the file descriptor to close
- */
-
-void
-close_fd(int* fd)
-{
- close(*fd);
-}
-
-/*
- * Function name: clear_fd
- * Description: Removes the file descriptor from the set and closes it.
- * Arguments: fd - the file descriptor to remove and close
- * set - the set of file descriptors
- */
-
-void
-clear_fd(int* fd, fd_set* set)
-{
- FD_CLR(*fd, set);
- close_fd(fd);
-}
-
-/*
- * Function name: read_message
- * Description: Reads the message from the http proxy connection and writes it
- * to the file descriptor.
- * Arguments: fd - the file descriptor
- * length - the length of the buffer
- * client - the http proxy connection
- * tab - the buffer with the readed data
- * ptr - the offset from which the data reading will start
- * Returns: 0 - success,
- * 1 - failure.
- */
-
-int
-read_message(int fd, int length, connection* client, char* tab, int ptr)
-{
- int j = 0;
- int tmp = 0;
- while (j < length) {
- if (client->curreceived + length-j > client->toreceive) {
- if (client->toreceive - client->curreceived > 0) {
- writen(fd, (unsigned char*) (tab+ptr+j), client->toreceive - client->curreceived);
- j += client->toreceive - client->curreceived;
- client->curreceived += client->toreceive - client->curreceived;
- }
- if (client->read_state == 0) {
- switch (tab[ptr + j]) {
- case 'M': {
- if (j + 5 <= length) {
- memcpy(&tmp, &tab[ptr + j + 1], 4);
- client->toreceive = ntohl(tmp);
- client->curreceived = 0;
- j += 5;
- }
- else if (j + 1 < length) {
- memcpy(client->readed_length, &tab[ptr + j + 1], length - j - 1);
- client->read_state = length - j;
- j += length - j;
- }
- else {
- ++j;
- client->read_state = 1;
- }
- break;
- }
- case 'T': {
- ++j;
- break;
- }
- case 'A': {
- ++j;
- if (client->state == C_CLOSED) {
- client->state = C_OPEN;
- }
- break;
- }
- default: {
- return 1;
- }
- }
- }
- else {
- if (j + 5 - client->read_state <= length) {
- memcpy(&client->readed_length[client->read_state-1], &tab[ptr + j], 5 - client->read_state);
- memcpy(&tmp, client->readed_length, 4);
- client->toreceive = ntohl(tmp);
- client->curreceived = 0;
- j += 5 - client->read_state;
- client->read_state = 0;
- }
- else {
- memcpy(&client->readed_length[client->read_state-1], &tab[ptr + j], length - j);
- client->read_state += length - j;
- j += length -j;
- }
- }
- }
- else if (length-j > 0) {
- client->curreceived += length-j;
- writen(fd, (unsigned char*) (tab+ptr+j), length-j);
- j += length-j;
- }
- }
- return 0;
-}
-
-/*
- * Function name: clear_sslFd
- * Description: Close the socket encapsulated in SslFd structure, remove this file descriptor
- * from fd_set and clear ssl structure.
- * Arguments: sf - pointer to SslFd structure
- * set - pointer to fd_set structure
- */
-
-void
-clear_sslFd(SslFd* sf, fd_set* set)
-{
- clear_fd((&(sf->fd)), set);
- if (SslFd_get_ssl(sf)) {
- SSL_clear(SslFd_get_ssl(sf));
- }
-}
-
-/*
- * Function name: http_write
- * Description: Write the message via http/https proxy.
- * Arguments: https - if the https proxy will be used instead of http proxy
- * sf - pointer to SslFd structure
- * buf - buffer containing the data to send
- * amount - how much butes will be send
- * Returns: The result of writen or SSL_writen function, depending on 'https' value.
- */
-
-int
-http_write(char https, SslFd* sf, unsigned char* buf, int amount)
-{
- if (https) {
- return SSL_writen(SslFd_get_ssl(sf), buf, amount);
- }
- else {
- return writen(SslFd_get_fd(sf), buf, amount);
- }
-}
-
-/*
- * Function name: http_read
- * Description: Read the message via http/https proxy.
- * Arguments: https - if the https proxy will be used instead of http proxy
- * sf - pointer to SslFd structure
- * buf - buffer for the received data
- * amount - how much bytes will be received
- * Returns: The result of read or SSL_read function, depending on 'https' value.
- */
-
-int
-http_read(char https, SslFd* sf, unsigned char* buf, int amount)
-{
- if (https) {
- return SSL_read(SslFd_get_ssl(sf), buf, amount);
- }
- else {
- return read(SslFd_get_fd(sf), buf, amount);
- }
-}
diff --git a/src/http_proxy_functions.h b/src/http_proxy_functions.h
deleted file mode 100644
index 1b10f9a..0000000
--- a/src/http_proxy_functions.h
+++ /dev/null
@@ -1,85 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-#include <sys/time.h>
-#include <sys/select.h>
-#include <unistd.h>
-
-#include "ssl_fd_struct.h"
-
-#ifndef _JS_HTTP_PROXY_FUNCTIONS_H
-#define _JS_HTTP_PROXY_FUNCTIONS_H
-
-#define C_CLOSED 0
-#define C_POST_WAIT 1
-#define C_GET_WAIT 2
-#define C_OPEN 4
-#define C_DELAYED_A 8
-
-#define H_TYPE_GET 0
-#define H_TYPE_POST 1
-#define H_TYPE_OK 2
-#define H_TYPE_ERROR 3
-
-typedef struct {
- char type;
- char id[10];
- int ptr;
- int length;
- int allreaded;
-} header;
-
-typedef struct {
- char read_state;
- char readed_length[4];
- char state;
- char id[10];
- SslFd* postFd;
- SslFd* getFd;
- int sent_ptr;
- int sockfd;
- char buf[9000];
- char tmpbuf[9000];
- char tmpstate;
- SslFd* tmpFd;
- char type;
- header tmpheader;
- int ptr;
- int length;
- int curreceived;
- int toreceive;
- int received;
-} connection;
-
-int myrand(int, int);
-int parse_header(SslFd*, char*, header*, char);
-int read_message(int, int, connection*, char*, int);
-void delete_user(connection*, int, fd_set*);
-void set_fd(int, int*, fd_set*);
-void close_fd(int*);
-void clear_fd(int*, fd_set*);
-void clear_sslFd(SslFd*, fd_set*);
-int http_write(char, SslFd*, unsigned char*, int);
-int http_read(char, SslFd*, unsigned char*, int);
-
-#endif
diff --git a/src/http_proxy_options_struct.c b/src/http_proxy_options_struct.c
deleted file mode 100644
index e1dcc4d..0000000
--- a/src/http_proxy_options_struct.c
+++ /dev/null
@@ -1,254 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <config.h>
-
-#include <stdlib.h>
-#include <string.h>
-#include <assert.h>
-
-#include "http_proxy_options_struct.h"
-#include "string_functions.h"
-
-/*
- * Function name: HttpProxyOptions_new
- * Description: Create and initialize new HttpProxyOptions structure.
- * Returns: Pointer to newly created HttpProxyOptions structure.
- */
-
-HttpProxyOptions*
-HttpProxyOptions_new()
-{
- HttpProxyOptions* tmp = calloc(1, sizeof(HttpProxyOptions));
- assert(tmp != NULL);
- if (tmp == NULL) {
- return NULL;
- }
- tmp->proxyauth_type = PROXYAUTH_TYPE_NOTSET;
- return tmp;
-}
-
-/*
- * Function name: HttpProxyOptions_free
- * Description: Free the memory allocated for HttpProxyOptions structure.
- * Arguments: hpo - pointer to pointer to HttpProxyOptions structure
- */
-
-void
-HttpProxyOptions_free(HttpProxyOptions** hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- assert((*hpo) != NULL);
- if ((*hpo) == NULL) {
- return;
- }
- if ((*hpo)->proxyname) {
- free((*hpo)->proxyname);
- (*hpo)->proxyname = NULL;
- }
- if ((*hpo)->proxyport) {
- free((*hpo)->proxyport);
- (*hpo)->proxyport = NULL;
- }
- if ((*hpo)->proxyauth_cred) {
- free((*hpo)->proxyauth_cred);
- (*hpo)->proxyauth_cred = NULL;
- }
- free((*hpo));
- (*hpo) = NULL;
-}
-
-/*
- * Function name: HttpProxyOptions_set_proxyname
- * Description: Set name of the http proxy server.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * proxyname - name of the http proxy server
- */
-
-void
-HttpProxyOptions_set_proxyname(HttpProxyOptions* hpo, char* proxyname)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- string_cp(&(hpo->proxyname), proxyname);
-}
-
-/*
- * Function name: HttpProxyOptions_set_proxyport
- * Description: Set port on which http proxy server is listening.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * proxyport - port on which http proxy server is listening
- */
-
-void
-HttpProxyOptions_set_proxyport(HttpProxyOptions* hpo, char* proxyport)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- string_cp(&(hpo->proxyport), proxyport);
-}
-
-/*
- * Function name: HttpProxyOptions_set_proxyauth_cred
- * Description: Set credentials for http proxy server.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * proxyauth_cred - credentials for http proxy server
- */
-
-void
-HttpProxyOptions_set_proxyauth_cred(HttpProxyOptions* hpo, char* proxyauth_cred)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- string_cp(&(hpo->proxyauth_cred), proxyauth_cred);
-}
-
-/*
- * Function name: HttpProxyOptions_set_proxyauth_type
- * Description: Set type of the proxy authorization.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * proxyauth_type - type of the proxy authorization
- */
-
-void
-HttpProxyOptions_set_proxyauth_type(HttpProxyOptions* hpo, char proxyauth_type)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- assert(hpo->proxyauth_type == PROXYAUTH_TYPE_NOTSET);
- if (hpo->proxyauth_type != PROXYAUTH_TYPE_NOTSET) {
- hpo->proxyauth_type = PROXYAUTH_TYPE_WRONG;
- return;
- }
- hpo->proxyauth_type = proxyauth_type;
-}
-
-/*
- * Function name: HttpProxyOptions_get_proxyname
- * Description: Get name of the http proxy server
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * Returns: Name of the http proxy server or NULL, if name not set.
- */
-
-char*
-HttpProxyOptions_get_proxyname(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return NULL;
- }
- return hpo->proxyname;
-}
-
-/*
- * Function name: HttpProxyOptions_get_proxyport
- * Description: Get port on which http proxy server is listening.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * Returns: Port on which http proxy server is listening or NULL, if port not set.
- */
-
-char*
-HttpProxyOptions_get_proxyport(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return NULL;
- }
- return hpo->proxyport;
-}
-
-/*
- * Function name: HttpProxyOptions_get_proxyauth_cred
- * Description: Get credentials for http proxy server.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * Returns: Credentials for http proxy server or NULL, if not set.
- */
-
-char*
-HttpProxyOptions_get_proxyauth_cred(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return NULL;
- }
- return hpo->proxyauth_cred;
-}
-
-/*
- * Function name: HttpProxyOptions_get_proxyauth_type
- * Description: Get type of the proxy authorization.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * Returns: Type of the proxy authorization.
- */
-
-char
-HttpProxyOptions_get_proxyauth_type(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return PROXYAUTH_TYPE_WRONG;
- }
- return hpo->proxyauth_type;
-}
-
-/*
- * Function name: HttpProxyOptions_use_https
- * Description: Enable use of https proxy instead of http proxy.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- */
-
-void
-HttpProxyOptions_use_https(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return;
- }
- hpo->useHttps = USEHTTPS_ON;
-}
-
-/*
- * Function name: HttpProxyOptions_is_https
- * Description: Check if the use of https proxy is enabled.
- * Arguments: hpo - pointer to HttpProxyOptions structure
- * Returns: USEHTTPS_OFF - http proxy will be used
- * USEHTTPS_ON - https proxy will be used
- */
-
-char
-HttpProxyOptions_is_https(HttpProxyOptions* hpo)
-{
- assert(hpo != NULL);
- if (hpo == NULL) {
- return USEHTTPS_OFF;
- }
- return hpo->useHttps;
-}
diff --git a/src/http_proxy_options_struct.h b/src/http_proxy_options_struct.h
deleted file mode 100644
index db0208c..0000000
--- a/src/http_proxy_options_struct.h
+++ /dev/null
@@ -1,58 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#ifndef _JS_HTTP_PROXY_OPTIONS_STRUCT_H
-#define _JS_HTTP_PROXY_OPTIONS_STRUCT_H
-
-#define PROXYAUTH_TYPE_NOTSET 0
-#define PROXYAUTH_TYPE_WRONG -1
-#define PROXYAUTH_TYPE_BASIC 1
-
-#define USEHTTPS_OFF 0
-#define USEHTTPS_ON 1
-
-typedef struct {
- char* proxyname;
- char* proxyport;
- char* proxyauth_cred;
- char proxyauth_type;
- char useHttps;
-} HttpProxyOptions;
-
-/* 'constructor' */
-HttpProxyOptions* HttpProxyOptions_new();
-/* 'destructor' */
-void HttpProxyOptions_free(HttpProxyOptions** hpo);
-/* setters */
-void HttpProxyOptions_set_proxyname(HttpProxyOptions* hpo, char* proxyname);
-void HttpProxyOptions_set_proxyport(HttpProxyOptions* hpo, char* proxyport);
-void HttpProxyOptions_set_proxyauth_cred(HttpProxyOptions* hpo, char* proxyauth_cred);
-void HttpProxyOptions_set_proxyauth_type(HttpProxyOptions* hpo, char proxyauth_type);
-/* getters */
-char* HttpProxyOptions_get_proxyname(HttpProxyOptions* hpo);
-char* HttpProxyOptions_get_proxyport(HttpProxyOptions* hpo);
-char* HttpProxyOptions_get_proxyauth_cred(HttpProxyOptions* hpo);
-char HttpProxyOptions_get_proxyauth_type(HttpProxyOptions* hpo);
-/* other */
-void HttpProxyOptions_use_https(HttpProxyOptions* hpo);
-char HttpProxyOptions_is_https(HttpProxyOptions* hpo);
-
-#endif
-
diff --git a/src/http_proxy_server.c b/src/http_proxy_server.c
deleted file mode 100644
index 17baf5a..0000000
--- a/src/http_proxy_server.c
+++ /dev/null
@@ -1,585 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <config.h>
-
-#include "make_ssl_handshake.h"
-#include "http_proxy_server.h"
-#include "thread_management.h"
-#include "stats.h"
-#include "logging.h"
-#include "network.h"
-
-#ifdef HAVE_LIBPTHREAD
-
-typedef struct {
- int sockfd;
- char *host;
- char *serv;
- socklen_t *addrlenp;
- char type;
- int limit;
- char https;
- SSL_CTX* ctx;
-} sproxy_argT;
-
-/*
- * Function name: afserver_connect
- * Description: Connects new http proxy connection to the afserver.
- * Arguments: sockfd - the file descriptor which will be used for communication with afserver
- * afserverfd - the afserver's file descriptor
- * cliaddr - pointer to sockaddr structure
- * addrlenp - pointer to the length of the sockaddr structure
- * type - the type of the connection
- */
-
-int
-afserver_connect(int* sockfd, int afserverfd, struct sockaddr* cliaddr, socklen_t* addrlenp, char type)
-{
- int sockets[2];
- if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets)) {
- return 1;
- }
- if (write(afserverfd, &sockets[0], 4) != 4) {
- return 2;
- }
- if (write(afserverfd, &type, 1) != 1) {
- return 3;
- }
- if (write(afserverfd, addrlenp, 4) != 4) {
- return 4;
- }
- if (write(afserverfd, cliaddr, *addrlenp) != *addrlenp) {
- return 5;
- }
- (*sockfd) = sockets[1];
- return 0;
-}
-
-/*
- * Function name: http_proxy_server
- * Description: Function responsible for the server part of the http proxy connection.
- * Arguments: vptr - the structure with all the information needed for http proxy tunnel.
- */
-
-void*
-http_proxy_server(void *vptr)
-{
- int listenfd, afserverfd;
- SslFd* connFd;
- struct sockaddr* cliaddr;
- char tab[9000];
- connection* table;
- header hdr;
- int i, n, maxfdp1;
- fd_set rset, allset;
- struct timeval tv;
- int maxclients, tmp;
- int timeout = 5;
- socklen_t *addrlenp;
- socklen_t addrlen;
- char type, nothttp, https;
- char *host, *serv, *name = "";
- SSL_CTX* ctx;
- sproxy_argT *proxy_argptr;
-
- start_critical_section();
- proxy_argptr = (sproxy_argT *) vptr;
-
- afserverfd = proxy_argptr->sockfd;
- host = proxy_argptr->host;
- serv = proxy_argptr->serv;
- addrlenp = proxy_argptr->addrlenp;
- type = proxy_argptr->type;
- maxclients = proxy_argptr->limit+1;
- https = proxy_argptr->https;
- ctx = proxy_argptr->ctx;
-
- if (https) {
- name = "s";
- }
-
- table = calloc(maxclients, sizeof(connection));
- if (table == NULL) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- for (i = 0; i < maxclients; ++i) {
- table[i].postFd = SslFd_new();
- table[i].getFd = SslFd_new();
- table[i].tmpFd = SslFd_new();
- if ((table[i].postFd == NULL) || (table[i].getFd == NULL) || (table[i].tmpFd == NULL)) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- if (https) {
- SslFd_set_ssl(table[i].postFd, SSL_new(ctx));
- SslFd_set_ssl(table[i].getFd, SSL_new(ctx));
- SslFd_set_ssl(table[i].tmpFd, SSL_new(ctx));
- if ((SslFd_get_ssl(table[i].postFd) == NULL) ||
- (SslFd_get_ssl(table[i].getFd) == NULL) ||
- (SslFd_get_ssl(table[i].tmpFd) == NULL)) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- }
- }
- connFd = SslFd_new();
- if (connFd == NULL) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- if (https) {
- SslFd_set_ssl(connFd, SSL_new(ctx));
- if (SslFd_get_ssl(connFd) == NULL) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't allocate memory... exiting.", name);
- exit(1);
- }
- }
-
- if (ip_listen(&listenfd, host, serv, addrlenp, type)) {
- aflog(LOG_T_INIT, LOG_I_CRIT,
- "http%s proxy: Can't listen on %s:%s", name, host, serv);
- exit(1);
- }
- cliaddr = malloc(*addrlenp);
- addrlen = (*addrlenp);
- addrlenp = &addrlen;
-
- broadcast_condition();
- end_critical_section();
-
- FD_ZERO(&allset);
- FD_SET(listenfd, &allset);
- maxfdp1 = listenfd + 1;
- tv.tv_usec = 0;
- tv.tv_sec = timeout;
-
- while (1) {
- rset = allset;
-
- if (select(maxfdp1, &rset, NULL, NULL, &tv) == 0) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: timeout", name);
- tv.tv_sec = timeout;
- for (i = 0; i < maxclients; ++i) {
- if ((table[i].state == C_CLOSED) || (table[i].state & C_GET_WAIT) || (table[i].type == 1)) {
- continue;
- }
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: send T to table[%d].getfd", name, i);
- if (table[i].sent_ptr+1 >= 90000) {
- http_write(https, table[i].getFd, (unsigned char*) "T", 1);
- table[i].sent_ptr = 0;
- clear_sslFd(table[i].getFd, &allset);
- FD_CLR(table[i].sockfd, &allset);
- table[i].state |= C_GET_WAIT;
- }
- else {
- http_write(https, table[i].getFd, (unsigned char*) "T", 1);
- table[i].sent_ptr += 1;
- }
- }
- continue;
- }
-
- /* http proxy tunnels */
- for (i = 0; i < maxclients; ++i) {
- if ((table[i].state == C_CLOSED) || (table[i].type == 1)) {
- continue;
- }
-
- /* sockfd */
- if ((!(table[i].state & C_GET_WAIT)) && (FD_ISSET(table[i].sockfd, &rset))) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(table[%d].sockfd)", name, i);
- n = read(table[i].sockfd, table[i].buf+5, 8995);
- if (n <= 0) {
- http_write(https, table[i].getFd, (unsigned char*) "Q", 1);
- delete_user(table, i, &allset);
- continue;
- }
- table[i].buf[0] = 'M';
- tmp = htonl(n);
- memcpy(&table[i].buf[1], &tmp, 4);
- if (table[i].sent_ptr+5 + n >= 90000) {
- http_write(https, table[i].getFd, (unsigned char*) table[i].buf, 90000 - table[i].sent_ptr);
- table[i].ptr = 90000 - table[i].sent_ptr;
- table[i].length = 5+n - table[i].ptr;
- table[i].sent_ptr = 0;
- clear_sslFd(table[i].getFd, &allset);
- FD_CLR(table[i].sockfd, &allset);
- table[i].state |= C_GET_WAIT;
- continue;
- }
- else {
- http_write(https, table[i].getFd, (unsigned char*) table[i].buf, n+5);
- table[i].sent_ptr += n+5;
- }
- }
-
- /* getfd */
- if (FD_ISSET(SslFd_get_fd(table[i].getFd), &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(table[%d].getfd)", name, i);
- delete_user(table, i, &allset);
- continue;
- }
-
- /* postfd */
- if (FD_ISSET(SslFd_get_fd(table[i].postFd), &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(table[%d].postfd)", name, i);
- n = http_read(https, table[i].postFd, (unsigned char*) tab, 9000);
- if (n != 0) {
- table[i].received += n;
- if (read_message(table[i].sockfd, n, &table[i], tab, 0)) {
- delete_user(table, i, &allset);
- }
- }
- if ((n == 0) || (table[i].received == 90000)) {
- table[i].received = 0;
- clear_sslFd(table[i].postFd, &allset);
- table[i].state |= C_POST_WAIT;
-
- if (!(table[i].state & C_GET_WAIT)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: send A to table[%d].getfd", name, i);
- if (table[i].sent_ptr+1 >= 90000) {
- http_write(https, table[i].getFd, (unsigned char*) "A", 1);
- table[i].sent_ptr = 0;
- clear_sslFd(table[i].getFd, &allset);
- FD_CLR(table[i].sockfd, &allset);
- table[i].state |= C_GET_WAIT;
- }
- else {
- http_write(https, table[i].getFd, (unsigned char*) "A", 1);
- table[i].sent_ptr += 1;
- }
- }
- else {
- table[i].state |= C_DELAYED_A;
- }
-
- if (table[i].tmpstate == 1) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: get old POST request...", name);
- table[i].state &= ~C_POST_WAIT;
- SslFd_swap_content(table[i].postFd, table[i].tmpFd);
- set_fd(SslFd_get_fd(table[i].postFd), &maxfdp1, &allset);
- table[i].tmpstate = 0;
- if (table[i].tmpheader.length) {
- table[i].received += table[i].tmpheader.length;
- if (read_message(table[i].sockfd, table[i].tmpheader.length, &table[i],
- table[i].tmpbuf, table[i].tmpheader.ptr)) {
- delete_user(table, i, &allset);
- }
- }
- }
- continue;
- }
- }
- }
-
- /* direct tunnels */
- for (i = 0; i < maxclients; ++i) {
- if ((table[i].state == C_OPEN) && (table[i].type == 1)) {
-
- if (FD_ISSET(table[i].sockfd, &rset)) {
- n = read(table[i].sockfd, table[i].buf, 9000);
- if (n > 0) {
- writen(SslFd_get_fd(table[i].postFd), (unsigned char*) table[i].buf, n);
- }
- else {
- delete_user(table, i, &allset);
- continue;
- }
- }
-
- if (FD_ISSET(SslFd_get_fd(table[i].postFd), &rset)) {
- n = read(SslFd_get_fd(table[i].postFd), tab, 9000);
- if (n > 0) {
- writen(table[i].sockfd, (unsigned char*) tab, n);
- }
- else {
- delete_user(table, i, &allset);
- continue;
- }
- }
-
- }
- }
-
- /* listen */
- if (FD_ISSET(listenfd, &rset)) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: FD_ISSET(listenfd)", name);
- tmp = accept(listenfd, cliaddr, addrlenp);
- if (tmp != -1) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: New connection...", name);
- SslFd_set_fd(connFd, tmp);
- if (https) {
- make_ssl_initialize(connFd);
- if (make_ssl_accept(connFd)) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "https proxy: DENIED by SSL_accept");
- close(SslFd_get_fd(connFd));
- SSL_clear(SslFd_get_ssl(connFd));
- continue;
- }
- }
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: New connection --> EAGAIN", name);
- continue;
- }
- memset(tab, 0, 9000);
- nothttp = 0;
- if (parse_header(connFd, tab, &hdr, https)) {
- nothttp = 1;
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: no http header...", name);
- }
- n = -1;
- for (i = 0; i < maxclients; ++i) {
- if (table[i].state == C_CLOSED) {
- if (n == -1)
- n = i;
- }
- else {
- if ((!nothttp) && (strcmp(table[i].id, hdr.id) == 0)) {
- break;
- }
- }
- }
- if (i < maxclients) { /* the client exists */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: the client exist...", name);
- if (hdr.type == H_TYPE_GET) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: type GET...", name);
- if (!(table[i].state & C_GET_WAIT)) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: not waiting for GET...", name);
- table[i].sent_ptr = 0;
- FD_CLR(table[i].sockfd, &allset);
- clear_sslFd(table[i].getFd, &allset);
- table[i].state |= C_GET_WAIT;
- }
- if (!(table[i].state & C_OPEN)) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: not opened...", name);
- if (afserver_connect(&table[i].sockfd, afserverfd, cliaddr, addrlenp, 1)) {
- memset(tab, 0, 9000);
- sprintf(tab,"HTTP/1.1 400 Bad Request\r\n\r\n");
- n = strlen (tab);
- http_write(https, connFd, (unsigned char*) tab, n);
- close_fd((&(connFd->fd)));
- SSL_clear(SslFd_get_ssl(connFd));
- clear_sslFd(table[i].postFd, &allset);
- table[i].state = C_CLOSED;
- continue;
- }
- table[i].state |= C_OPEN;
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: OPEN...", name);
- }
- table[i].state &= ~C_GET_WAIT;
- table[i].sent_ptr = 0;
- SslFd_swap_content(table[i].getFd, connFd);
- set_fd(table[i].sockfd, &maxfdp1, &allset);
- set_fd(SslFd_get_fd(table[i].getFd), &maxfdp1, &allset);
- memset(tab, 0, 9000);
- sprintf(tab,
- "HTTP/1.1 200 OK\r\n"
- "Content-Length: 90000\r\n"
- "Connection: close\r\n"
- "Pragma: no-cache\r\n"
- "Cache-Control: no-cache, no-store, must-revalidate\r\n"
- "Expires: 0\r\n"
- "Content-Type: text/html\r\n\r\n");
- n = strlen(tab);
- if (writen(SslFd_get_fd(table[i].getFd), (unsigned char*) tab, n) <= 0) {
- delete_user(table, i, &allset);
- continue;
- }
- if (table[i].length) {
- if (writen(SslFd_get_fd(table[i].getFd),
- (unsigned char*) (table[i].buf+table[i].ptr), table[i].length) <= 0) {
- delete_user(table, i, &allset);
- continue;
- }
- }
- table[i].sent_ptr = table[i].length;
- table[i].ptr = 0;
- table[i].length = 0;
- if (table[i].state & C_DELAYED_A) {
- aflog(LOG_T_MAIN, LOG_I_DDEBUG,
- "http%s proxy: send A to table[%d].getfd", name, i);
- http_write(https, table[i].getFd, (unsigned char*) "A", 1);
- table[i].sent_ptr += 1;
- table[i].state &= ~C_DELAYED_A;
- }
- }
- else if (hdr.type == H_TYPE_POST) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: type POST...", name);
- if (!(table[i].state & C_POST_WAIT)) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: unexpected POST request...", name);
- if (table[i].tmpstate == 0) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: buffering POST request...", name);
- table[i].tmpstate = 1;
- SslFd_swap_content(table[i].tmpFd, connFd);
- memcpy(table[i].tmpbuf, tab, 9000);
- table[i].tmpheader = hdr;
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: no space to buffer POST request (received from first postfd: %d)", name,
- table[i].received);
- delete_user(table, i, &allset);
- }
- }
- else {
- if (hdr.length) {
- table[i].received += hdr.length;
- if (read_message(table[i].sockfd, hdr.length, &table[i], tab, hdr.ptr)) {
- delete_user(table, i, &allset);
- }
- }
- table[i].state &= ~C_POST_WAIT;
- SslFd_swap_content(table[i].postFd, connFd);
- set_fd(SslFd_get_fd(table[i].postFd), &maxfdp1, &allset);
- }
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: unrecognized type...", name);
- delete_user(table, i, &allset);
- }
- }
- else if (n != -1) { /* there are free slots */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: there are free slots...", name);
- if (!nothttp) {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: http header...", name);
- if (hdr.type == H_TYPE_POST) { /* POST request must be first */
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: type POST...", name);
- table[n].state = C_GET_WAIT;
- memcpy(table[n].id,hdr.id, 9);
- SslFd_swap_content(table[n].postFd, connFd);
- set_fd(SslFd_get_fd(table[n].postFd), &maxfdp1, &allset);
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: closing this connection... (not POST type)", name);
- close_fd((&(connFd->fd)));
- if (https) {
- SSL_clear(SslFd_get_ssl(connFd));
- }
- continue;
- }
- }
- else {
- table[n].state = C_OPEN;
- SslFd_set_fd(table[n].postFd, SslFd_get_fd(connFd));
- table[n].type = 1;
- set_fd(SslFd_get_fd(table[n].postFd), &maxfdp1, &allset);
- if (afserver_connect(&table[n].sockfd, afserverfd, cliaddr, addrlenp, 0)) {
- clear_sslFd(table[n].postFd, &allset);
- table[n].state = C_CLOSED;
- continue;
- }
- set_fd(table[n].sockfd, &maxfdp1, &allset);
- write(table[n].sockfd, tab, hdr.allreaded);
- }
- }
- else {
- aflog(LOG_T_MAIN, LOG_I_DEBUG,
- "http%s proxy: closing this connection... (no free slots)", name);
- close_fd((&(connFd->fd)));
- continue;
- }
- }
- }
-
- return 0;
-}
-
-/*
- * Function name: initialize_http_proxy_server
- * Description: Initializes the thread responsible for http proxy connection.
- * Arguments: sockfd - the new connection descriptor will be stored here
- * host - the name of the host on which we will be listening on
- * serv - the port on which we will be listening on
- * addrlenp - pointer to the length of the sockaddr structure
- * type - the type of the connection
- * limit - the limit for user's connections
- * https - if the connection should be https instead of http
- * ctx - the pointer to SSL_CTX structure
- * Returns: 0 - success,
- * !0 - failure.
- */
-
-int
-initialize_http_proxy_server(int* sockfd, const char *host, const char *serv, socklen_t *addrlenp, const char type, int limit, char https, SSL_CTX* ctx)
-{
- int retval;
- int sockets[2];
- pthread_t proxy_thread;
- static sproxy_argT arg;
-
- if (socketpair(AF_UNIX, SOCK_STREAM, 0, sockets)) {
- return 1;
- }
- (*sockfd) = sockets[0];
-
- start_critical_section();
-
- arg.host = (char*) host;
- arg.serv = (char*) serv;
- arg.addrlenp = addrlenp;
- arg.limit = limit;
- arg.type = (char) type;
- arg.sockfd = sockets[1];
- arg.https = https;
- arg.ctx = ctx;
-
- retval = pthread_create(&proxy_thread, NULL, &http_proxy_server, &arg);
-
- wait_for_condition();
-
- end_critical_section();
-
- return retval;
-}
-
-#endif
diff --git a/src/http_proxy_server.h b/src/http_proxy_server.h
deleted file mode 100644
index 22c121c..0000000
--- a/src/http_proxy_server.h
+++ /dev/null
@@ -1,29 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#ifndef _JS_HTTP_PROXY_SERVER_H
-#define _JS_HTTP_PROXY_SERVER_H
-
-#include "http_proxy_functions.h"
-#include "network.h"
-
-int initialize_http_proxy_server(int* sockfd, const char *host, const char *serv, socklen_t *addrlenp, const char type, int limit, char https, SSL_CTX* ctx);
-
-#endif
diff --git a/src/network.h b/src/network.h
index b8c0273..132b780 100644
--- a/src/network.h
+++ b/src/network.h
@@ -30,9 +30,6 @@
#include <arpa/inet.h>
#include <netinet/in.h>
#include <unistd.h>
-#ifdef HAVE_LIBPTHREAD
-#include <pthread.h>
-#endif
#include <netdb.h>
#include <openssl/ssl.h>
diff --git a/src/server_remoteadmin.c b/src/server_remoteadmin.c
index 1d10520..de778f6 100644
--- a/src/server_remoteadmin.c
+++ b/src/server_remoteadmin.c
@@ -388,14 +388,6 @@ serve_admin(ServerConfiguration* config, int realm, int client, unsigned char* b
add_to_message(buff, "tunneltype: direct");
break;
}
- case CONNECTCLIENT_TUNNELTYPE_HTTPPROXY: {
- add_to_message(buff, "tunneltype: http proxy");
- break;
- }
- case CONNECTCLIENT_TUNNELTYPE_HTTPSPROXY: {
- add_to_message(buff, "tunneltype: https proxy");
- break;
- }
default: {
add_to_message(buff, "tunneltype: UNKNOWN");
}
@@ -452,14 +444,6 @@ serve_admin(ServerConfiguration* config, int realm, int client, unsigned char* b
add_to_message(buff, "tunneltype: direct");
break;
}
- case CONNECTCLIENT_TUNNELTYPE_HTTPPROXY: {
- add_to_message(buff, "tunneltype: http proxy");
- break;
- }
- case CONNECTCLIENT_TUNNELTYPE_HTTPSPROXY: {
- add_to_message(buff, "tunneltype: https proxy");
- break;
- }
default: {
add_to_message(buff, "tunneltype: UNKNOWN");
}
diff --git a/src/server_signals.c b/src/server_signals.c
index 84cf5ec..b21d467 100644
--- a/src/server_signals.c
+++ b/src/server_signals.c
@@ -19,11 +19,10 @@
*/
#include <config.h>
+#include <unistd.h>
#include "server_signals.h"
#include "activefor.h"
-#include "thread_management.h"
-#include "http_proxy_functions.h"
#include "stats.h"
#include "logging.h"
#include "server_configuration_struct.h"
@@ -44,12 +43,6 @@ server_sig_int(int signo)
int i, j;
unsigned char buff[5];
ServerRealm** scRealmsTable;
-
-#ifdef HAVE_LIBPTHREAD
- if (!is_this_a_mainthread()) {
- return;
- }
-#endif
for (j = 0; j < ServerConfiguration_get_realmsNumber(config); ++j) {
scRealmsTable = ServerConfiguration_get_realmsTable(config);
diff --git a/src/thread_management.c b/src/thread_management.c
deleted file mode 100644
index d423ca6..0000000
--- a/src/thread_management.c
+++ /dev/null
@@ -1,102 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#include <config.h>
-
-#include "thread_management.h"
-
-#ifdef HAVE_LIBPTHREAD
-
-static pthread_t mainthread;
-static pthread_mutex_t mainmutex = PTHREAD_MUTEX_INITIALIZER;
-static pthread_cond_t maincond = PTHREAD_COND_INITIALIZER;
-
-/*
- * Function name: remember_mainthread
- * Description: Remembers the current thread as a main thread.
- */
-
-void
-remember_mainthread(void)
-{
- mainthread = pthread_self();
-}
-
-/*
- * Function name: is_this_a_mainthread
- * Description: Checks, if the current thread is a main thread.
- * Returns: 0 - this is not a main thread,
- * 1 - this is a main thread.
- */
-
-int
-is_this_a_mainthread(void)
-{
- if (pthread_self() == mainthread) {
- return 1;
- }
- return 0;
-}
-
-/*
- * Function name: start_critical_section
- * Description: Starts the critical section of the code by locking the mutex.
- */
-
-void
-start_critical_section(void)
-{
- pthread_mutex_lock( &mainmutex);
-}
-
-/*
- * Function name: end_critical_section
- * Description: Ends the critical section of the code by unlocking the mutex.
- */
-
-void
-end_critical_section(void)
-{
- pthread_mutex_unlock( &mainmutex);
-}
-
-/*
- * Function name: wait_for_condition
- * Description: Starts waiting for the condition.
- */
-
-void
-wait_for_condition(void)
-{
- pthread_cond_wait(&maincond, &mainmutex);
-}
-
-/*
- * Function name: broadcast_condition
- * Description: Broadcast the met of the condition.
- */
-
-void
-broadcast_condition(void)
-{
- pthread_cond_broadcast(&maincond);
-}
-
-#endif
diff --git a/src/thread_management.h b/src/thread_management.h
deleted file mode 100644
index 9ea87fb..0000000
--- a/src/thread_management.h
+++ /dev/null
@@ -1,34 +0,0 @@
-/*
- * active port forwarder - software for secure forwarding
- * Copyright (C) 2003-2007 jeremian <jeremian [at] poczta.fm>
- *
- * This program is free software; you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation; either version 2 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- *
- */
-
-#ifndef _JS_THREAD_MANAGEMENT_H
-#define _JS_THREAD_MANAGEMENT_H
-
-#include <pthread.h>
-
-void remember_mainthread(void);
-int is_this_a_mainthread(void);
-void start_critical_section(void);
-void end_critical_section(void);
-void wait_for_condition(void);
-void broadcast_condition(void);
-
-#endif
-
diff --git a/src/usage.c b/src/usage.c
index 08a85b8..e32f6f8 100644
--- a/src/usage.c
+++ b/src/usage.c
@@ -110,15 +110,7 @@ server_long_usage(char* info)
printf(" -4, --ipv4 - use ipv4 only\n");
printf(" -6, --ipv6 - use ipv6 only\n\n");
#endif
-#ifdef HAVE_LIBPTHREAD
- printf(" HTTP PROXY:\n\n");
- printf(" -P, --enableproxy - enable http proxy mode\n\n");
- /* FIXME: afclient is always trying to get http page, so this option is not needed now
- printf(" -S, --use-https - use https proxy instead of http proxy. '-P' option\n");
- printf(" will be set implicitly\n\n");
- */
-#endif
-
+
exit(0);
}
@@ -213,15 +205,6 @@ client_long_usage(char* info)
printf(" -l, --load - load a module for user's packets filtering\n");
printf(" -L, --Load - load a module for service's packets filtering\n\n");
#endif
-#ifdef HAVE_LIBPTHREAD
- printf(" HTTP/HTTPS PROXY:\n\n");
- printf(" -S, --use-https - use https proxy instead of http proxy\n");
- printf(" -P, --proxyname - the name of the machine with proxy server\n");
- printf(" -X, --proxyport - the port used by proxy server (default: 8080)\n");
- printf(" -C, --pa-cred U:P - the user (U) and password (P) used in proxy\n");
- printf(" authorization\n");
- printf(" -B, --pa-t-basic - the Basic type of proxy authorization (default)\n\n");
-#endif
-
+
exit(0);
}