Commit 4d0840afcb6900ae282ada74e49082591a834862
1 parent
4aa7a83f
Exists in
master
and in
3 other branches
Corrigindo problemas encontrados durante teste do sub-módulo.
Showing
4 changed files
with
35 additions
and
1037 deletions
Show diff stats
Makefile.in
| ... | ... | @@ -39,6 +39,9 @@ CC=@CC@ |
| 39 | 39 | LD=@CC@ |
| 40 | 40 | LN_S=@LN_S@ |
| 41 | 41 | MKDIR=@MKDIR_P@ |
| 42 | +INSTALL=@INSTALL@ | |
| 43 | +INSTALL_DATA=@INSTALL_DATA@ | |
| 44 | +INSTALL_PROGRAM=@INSTALL_PROGRAM@ | |
| 42 | 45 | |
| 43 | 46 | #---[ Paths ]---------------------------------------------------------------------------- |
| 44 | 47 | |
| ... | ... | @@ -148,6 +151,15 @@ $(BINRLS)/@DLLPREFIX@$(LIBNAME)@DLLEXT@.@PACKAGE_MAJOR_VERSION@.@PACKAGE_MINOR_V |
| 148 | 151 | $(LDFLAGS) \ |
| 149 | 152 | $(LIBS) |
| 150 | 153 | |
| 154 | +#---[ Misc Targets ]--------------------------------------------------------------------- | |
| 155 | + | |
| 156 | +src/lib3270/version.c: \ | |
| 157 | + Makefile | |
| 158 | + | |
| 159 | + @echo $(basename $@) ... | |
| 160 | + @chmod +x src/lib3270/mkversion.sh | |
| 161 | + @./src/lib3270/mkversion.sh | |
| 162 | + | |
| 151 | 163 | #---[ Install Targets ]------------------------------------------------------------------ |
| 152 | 164 | |
| 153 | 165 | |
| ... | ... | @@ -182,6 +194,7 @@ $(BINDBG)/@DLLPREFIX@$(LIBNAME)@DLLEXT@.@PACKAGE_MAJOR_VERSION@.@PACKAGE_MINOR_V |
| 182 | 194 | -shared -Wl,-soname,$(@F) \ |
| 183 | 195 | -o $@ \ |
| 184 | 196 | $(LDFLAGS) \ |
| 197 | + $(foreach SRC, $(basename $(SOURCES)), $(OBJDBG)/$(SRC).o) \ | |
| 185 | 198 | $(LIBS) |
| 186 | 199 | |
| 187 | 200 | #---[ Clean Targets ]-------------------------------------------------------------------- | ... | ... |
configure.ac
| ... | ... | @@ -146,6 +146,19 @@ AC_SUBST(PACKAGE_RELEASE,$app_cv_release) |
| 146 | 146 | AC_SUBST(PACKAGE_MAJOR_RELEASE,$app_rls_major) |
| 147 | 147 | AC_SUBST(PACKAGE_MINOR_RELEASE,$app_rls_minor) |
| 148 | 148 | |
| 149 | +rpq_build_date=`LANG=C date` | |
| 150 | +rpq_timestamp=`date +%Y%m%d%H%M%S` | |
| 151 | +rpq_revision=`date +"%Y%m%d"` | |
| 152 | +sccs_date=`date +%Y/%m/%d` | |
| 153 | +sccs_user=$USER | |
| 154 | + | |
| 155 | +AC_SUBST(RPQ_BUILD_DATE,$rpq_build_date) | |
| 156 | +AC_SUBST(RPQ_TIMESTAMP,$rpq_timestamp) | |
| 157 | +AC_SUBST(RPQ_REVISION,$rpq_revision) | |
| 158 | + | |
| 159 | +AC_SUBST(SCCS_USER,$USER) | |
| 160 | +AC_SUBST(SCCS_DATE,$sccs_date) | |
| 161 | + | |
| 149 | 162 | dnl --------------------------------------------------------------------------- |
| 150 | 163 | dnl Check for libintl |
| 151 | 164 | dnl --------------------------------------------------------------------------- |
| ... | ... | @@ -368,6 +381,7 @@ dnl Configure which files to generate. |
| 368 | 381 | dnl --------------------------------------------------------------------------- |
| 369 | 382 | |
| 370 | 383 | AC_CONFIG_FILES(sdk/lib3270.pc) |
| 384 | +AC_CONFIG_FILES(src/lib3270/version.c) | |
| 371 | 385 | AC_CONFIG_FILES(Makefile) |
| 372 | 386 | |
| 373 | 387 | dnl --------------------------------------------------------------------------- | ... | ... |
src/lib3270/proxy.c
| ... | ... | @@ -1,1037 +0,0 @@ |
| 1 | -/* | |
| 2 | - * "Software pw3270, desenvolvido com base nos códigos fontes do WC3270 e X3270 | |
| 3 | - * (Paul Mattes Paul.Mattes@usa.net), de emulação de terminal 3270 para acesso a | |
| 4 | - * aplicativos mainframe. Registro no INPI sob o nome G3270. Registro no INPI sob o nome G3270. | |
| 5 | - * | |
| 6 | - * Copyright (C) <2008> <Banco do Brasil S.A.> | |
| 7 | - * | |
| 8 | - * Este programa é software livre. Você pode redistribuí-lo e/ou modificá-lo sob | |
| 9 | - * os termos da GPL v.2 - Licença Pública Geral GNU, conforme publicado pela | |
| 10 | - * Free Software Foundation. | |
| 11 | - * | |
| 12 | - * Este programa é distribuído na expectativa de ser útil, mas SEM QUALQUER | |
| 13 | - * GARANTIA; sem mesmo a garantia implícita de COMERCIALIZAÇÃO ou de ADEQUAÇÃO | |
| 14 | - * A QUALQUER PROPÓSITO EM PARTICULAR. Consulte a Licença Pública Geral GNU para | |
| 15 | - * obter mais detalhes. | |
| 16 | - * | |
| 17 | - * Você deve ter recebido uma cópia da Licença Pública Geral GNU junto com este | |
| 18 | - * programa; se não, escreva para a Free Software Foundation, Inc., 51 Franklin | |
| 19 | - * St, Fifth Floor, Boston, MA 02110-1301 USA | |
| 20 | - * | |
| 21 | - * Este programa está nomeado como proxy.c e possui - linhas de código. | |
| 22 | - * | |
| 23 | - * Contatos: | |
| 24 | - * | |
| 25 | - * perry.werneck@gmail.com (Alexandre Perry de Souza Werneck) | |
| 26 | - * erico.mendonca@gmail.com (Erico Mascarenhas Mendonça) | |
| 27 | - * licinio@bb.com.br (Licínio Luis Branco) | |
| 28 | - * kraucer@bb.com.br (Kraucer Fernandes Mazuco) | |
| 29 | - * | |
| 30 | - */ | |
| 31 | - | |
| 32 | - | |
| 33 | -/** | |
| 34 | - * @file proxy.c | |
| 35 | - * | |
| 36 | - * This module implements various kinds of proxies. | |
| 37 | - * | |
| 38 | - */ | |
| 39 | - | |
| 40 | -#ifdef _WIN32 | |
| 41 | - #include <winsock2.h> | |
| 42 | - #include <windows.h> | |
| 43 | -#endif // _WIN32 | |
| 44 | - | |
| 45 | -#include "private.h" | |
| 46 | -#include "utilc.h" | |
| 47 | - | |
| 48 | -//#include "appres.h" | |
| 49 | -#include "resources.h" | |
| 50 | - | |
| 51 | -#ifndef ANDROID | |
| 52 | - #include <stdlib.h> | |
| 53 | -#endif | |
| 54 | - | |
| 55 | -#if defined(_WIN32) | |
| 56 | - #include <ws2tcpip.h> | |
| 57 | - #include "w3miscc.h" | |
| 58 | -#else | |
| 59 | - | |
| 60 | - #include <sys/socket.h> | |
| 61 | - #include <sys/ioctl.h> | |
| 62 | - #include <netinet/in.h> | |
| 63 | - #include <netdb.h> | |
| 64 | - #include <arpa/inet.h> | |
| 65 | - | |
| 66 | -// #if defined(HAVE_SYS_SELECT_H) | |
| 67 | -// #include <sys/select.h> | |
| 68 | -// #endif | |
| 69 | - | |
| 70 | -#endif | |
| 71 | - | |
| 72 | -#include "api.h" | |
| 73 | - | |
| 74 | -#include "3270ds.h" | |
| 75 | -#include "popupsc.h" | |
| 76 | -#include "proxyc.h" | |
| 77 | -#include "resolverc.h" | |
| 78 | -#include "telnetc.h" | |
| 79 | -#include "trace_dsc.h" | |
| 80 | -#include "w3miscc.h" | |
| 81 | -#include "screen.h" | |
| 82 | - | |
| 83 | -// #if defined(PR3287) | |
| 84 | -// extern char *proxy_spec; | |
| 85 | -// #endif | |
| 86 | - | |
| 87 | -/* | |
| 88 | - * Supported proxy types. | |
| 89 | - * | |
| 90 | - * At some point we will add SOCKS. | |
| 91 | - */ | |
| 92 | -enum | |
| 93 | -{ | |
| 94 | - PT_NONE, | |
| 95 | - PT_PASSTHRU, /**< Sun telnet-passthru */ | |
| 96 | - PT_HTTP, /**< RFC 2817 CONNECT tunnel */ | |
| 97 | - PT_TELNET, /**< 'connect host port' proxy */ | |
| 98 | - PT_SOCKS4, /**< SOCKS version 4 (or 4A if necessary) */ | |
| 99 | - PT_SOCKS4A, /**< SOCKS version 4A (force remote name resolution) */ | |
| 100 | - PT_SOCKS5, /**< SOCKS version 5 (RFC 1928) */ | |
| 101 | - PT_SOCKS5D, /**< SOCKS version 5 (force remote name resolution) */ | |
| 102 | - PT_MAX | |
| 103 | -} proxytype_t; | |
| 104 | - | |
| 105 | -#define PROXY_PASSTHRU "passthru" | |
| 106 | -#define PORT_PASSTHRU "3514" | |
| 107 | - | |
| 108 | -#define PROXY_HTTP "http" | |
| 109 | -#define PORT_HTTP "3128" | |
| 110 | - | |
| 111 | -#define PROXY_TELNET "telnet" | |
| 112 | - | |
| 113 | -#define PROXY_SOCKS4 "socks4" | |
| 114 | -#define PORT_SOCKS4 "1080" | |
| 115 | - | |
| 116 | -#define PROXY_SOCKS4A "socks4a" | |
| 117 | -#define PORT_SOCKS4A "1080" | |
| 118 | - | |
| 119 | -#define PROXY_SOCKS5 "socks5" | |
| 120 | -#define PORT_SOCKS5 "1080" | |
| 121 | - | |
| 122 | -#define PROXY_SOCKS5D "socks5d" | |
| 123 | -#define PORT_SOCKS5D "1080" | |
| 124 | - | |
| 125 | -static int parse_host_port(H3270 *hSession, char *s, char **phost, char **pport); | |
| 126 | - | |
| 127 | -static int proxy_passthru(H3270 *hSession, int fd, char *host, unsigned short port); | |
| 128 | -static int proxy_http(H3270 *hSession, int fd, char *host, unsigned short port); | |
| 129 | -static int proxy_telnet(H3270 *hSession, int fd, char *host, unsigned short port); | |
| 130 | -static int proxy_socks4(H3270 *hSession, int fd, char *host, unsigned short port, int force_a); | |
| 131 | -static int proxy_socks5(H3270 *hSession, int fd, char *host, unsigned short port, int force_d); | |
| 132 | - | |
| 133 | - | |
| 134 | -const char * proxy_type_name(int type) | |
| 135 | -{ | |
| 136 | - /* proxy type names -- keep these in sync with proxytype_t! */ | |
| 137 | - const char *type_name[] = | |
| 138 | - { | |
| 139 | - "unknown", | |
| 140 | - "passthru", | |
| 141 | - "HTTP", | |
| 142 | - "TELNET", | |
| 143 | - "SOCKS4", | |
| 144 | - "SOCKS4A", | |
| 145 | - "SOCKS5", | |
| 146 | - "SOCKS5D" | |
| 147 | - }; | |
| 148 | - | |
| 149 | - | |
| 150 | - if (type < 1 || type >= PT_MAX) | |
| 151 | - return "unknown"; | |
| 152 | - else | |
| 153 | - return type_name[type]; | |
| 154 | -} | |
| 155 | - | |
| 156 | -/** | |
| 157 | - * Resolve the type, hostname and port for a proxy. | |
| 158 | - * | |
| 159 | - * @return -1 for failure, 0 for no proxy, >0 (the proxy type) for success. | |
| 160 | - */ | |
| 161 | -int proxy_setup(H3270 *hSession, char **phost, char **pport) | |
| 162 | -{ | |
| 163 | - char * proxy = hSession->proxy; | |
| 164 | - char * colon; | |
| 165 | - int sl; | |
| 166 | - | |
| 167 | - if(!proxy) | |
| 168 | - return PT_NONE; | |
| 169 | - | |
| 170 | - if ((colon = strchr(proxy, ':')) == CN || (colon == proxy)) | |
| 171 | - { | |
| 172 | - popup_an_error(hSession,_( "Invalid proxy syntax" ) ); | |
| 173 | - return -1; | |
| 174 | - } | |
| 175 | - | |
| 176 | - sl = colon - proxy; | |
| 177 | - if (sl == strlen(PROXY_PASSTHRU) && !strncasecmp(proxy, PROXY_PASSTHRU, sl)) | |
| 178 | - { | |
| 179 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 180 | - return -1; | |
| 181 | - | |
| 182 | - if (*pport == CN) | |
| 183 | - *pport = NewString(PORT_PASSTHRU); | |
| 184 | - | |
| 185 | - return PT_PASSTHRU; | |
| 186 | - } | |
| 187 | - | |
| 188 | - if (sl == strlen(PROXY_HTTP) && !strncasecmp(proxy, PROXY_HTTP, sl)) | |
| 189 | - { | |
| 190 | - | |
| 191 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 192 | - return -1; | |
| 193 | - if (*pport == CN) | |
| 194 | - *pport = NewString(PORT_HTTP); | |
| 195 | - return PT_HTTP; | |
| 196 | - } | |
| 197 | - | |
| 198 | - if (sl == strlen(PROXY_TELNET) && !strncasecmp(proxy, PROXY_TELNET, sl)) | |
| 199 | - { | |
| 200 | - | |
| 201 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 202 | - return -1; | |
| 203 | - if (*pport == CN) | |
| 204 | - { | |
| 205 | - popup_an_error(hSession,_( "Must specify port for telnet proxy" ) ); | |
| 206 | - return -1; | |
| 207 | - } | |
| 208 | - return PT_TELNET; | |
| 209 | - } | |
| 210 | - | |
| 211 | - if (sl == strlen(PROXY_SOCKS4) && !strncasecmp(proxy, PROXY_SOCKS4, sl)) | |
| 212 | - { | |
| 213 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 214 | - return -1; | |
| 215 | - | |
| 216 | - if (*pport == CN) | |
| 217 | - *pport = NewString(PORT_SOCKS4); | |
| 218 | - | |
| 219 | - return PT_SOCKS4; | |
| 220 | - } | |
| 221 | - | |
| 222 | - if (sl == strlen(PROXY_SOCKS4A) && !strncasecmp(proxy, PROXY_SOCKS4A, sl)) | |
| 223 | - { | |
| 224 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 225 | - return -1; | |
| 226 | - | |
| 227 | - if (*pport == CN) | |
| 228 | - *pport = NewString(PORT_SOCKS4A); | |
| 229 | - | |
| 230 | - return PT_SOCKS4A; | |
| 231 | - } | |
| 232 | - | |
| 233 | - if (sl == strlen(PROXY_SOCKS5) && !strncasecmp(proxy, PROXY_SOCKS5, sl)) | |
| 234 | - { | |
| 235 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 236 | - return -1; | |
| 237 | - | |
| 238 | - if (*pport == CN) | |
| 239 | - *pport = NewString(PORT_SOCKS5); | |
| 240 | - | |
| 241 | - return PT_SOCKS5; | |
| 242 | - } | |
| 243 | - | |
| 244 | - if (sl == strlen(PROXY_SOCKS5D) && !strncasecmp(proxy, PROXY_SOCKS5D, sl)) | |
| 245 | - { | |
| 246 | - if (parse_host_port(hSession, colon + 1, phost, pport) < 0) | |
| 247 | - return -1; | |
| 248 | - | |
| 249 | - if (*pport == CN) | |
| 250 | - *pport = NewString(PORT_SOCKS5D); | |
| 251 | - | |
| 252 | - return PT_SOCKS5D; | |
| 253 | - } | |
| 254 | - | |
| 255 | - popup_an_error(hSession,_( "Invalid proxy type '%.*s'" ), sl, proxy); | |
| 256 | - | |
| 257 | - return -1; | |
| 258 | -} | |
| 259 | - | |
| 260 | -/** | |
| 261 | - * Parse host[:port] from a string. | |
| 262 | - * | |
| 263 | - * 'host' can be in square brackets to allow numeric IPv6 addresses. | |
| 264 | - * Returns the host name and port name in heap memory. | |
| 265 | - * | |
| 266 | - * @return -1 for failure, 0 for success. | |
| 267 | - */ | |
| 268 | -static int parse_host_port(H3270 *hSession, char *s, char **phost, char **pport) | |
| 269 | -{ | |
| 270 | - char *colon; | |
| 271 | - char *hstart; | |
| 272 | - int hlen; | |
| 273 | - | |
| 274 | - if (*s == '[') { | |
| 275 | - char *rbrack; | |
| 276 | - | |
| 277 | - /* Hostname in square brackets. */ | |
| 278 | - hstart = s + 1; | |
| 279 | - rbrack = strchr(s, ']'); | |
| 280 | - if (rbrack == CN || | |
| 281 | - rbrack == s + 1 || | |
| 282 | - (*(rbrack + 1) != '\0' && *(rbrack + 1) != ':')) { | |
| 283 | - | |
| 284 | - popup_an_error(hSession,_( "Invalid proxy hostname syntax")); | |
| 285 | - return -1; | |
| 286 | - } | |
| 287 | - if (*(rbrack + 1) == ':') | |
| 288 | - colon = rbrack + 1; | |
| 289 | - else | |
| 290 | - colon = NULL; | |
| 291 | - hlen = rbrack - (s + 1); | |
| 292 | - } else { | |
| 293 | - hstart = s; | |
| 294 | - colon = strchr(s, ':'); | |
| 295 | - if (colon == s) { | |
| 296 | - popup_an_error(hSession,_("Invalid proxy hostname syntax")); | |
| 297 | - return -1; | |
| 298 | - } | |
| 299 | - if (colon == NULL) | |
| 300 | - hlen = strlen(s); | |
| 301 | - else | |
| 302 | - hlen = colon - s; | |
| 303 | - } | |
| 304 | - | |
| 305 | - /* Parse the port. */ | |
| 306 | - if (colon == CN || !*(colon + 1)) | |
| 307 | - *pport = CN; | |
| 308 | - else | |
| 309 | - *pport = NewString(colon + 1); | |
| 310 | - | |
| 311 | - /* Copy out the hostname. */ | |
| 312 | - *phost = lib3270_malloc(hlen + 1); | |
| 313 | - strncpy(*phost, hstart, hlen); | |
| 314 | - (*phost)[hlen] = '\0'; | |
| 315 | - return 0; | |
| 316 | -} | |
| 317 | - | |
| 318 | -/** | |
| 319 | - * Negotiate with the proxy server. | |
| 320 | - * | |
| 321 | - * @return -1 for failure, 0 for success. | |
| 322 | - */ | |
| 323 | -int proxy_negotiate(H3270 *hSession, int type, int fd, char *host, unsigned short port) | |
| 324 | -{ | |
| 325 | - switch (type) | |
| 326 | - { | |
| 327 | - case PT_NONE: | |
| 328 | - return 0; | |
| 329 | - case PT_PASSTHRU: | |
| 330 | - return proxy_passthru(hSession, fd, host, port); | |
| 331 | - case PT_HTTP: | |
| 332 | - return proxy_http(hSession, fd, host, port); | |
| 333 | - case PT_TELNET: | |
| 334 | - return proxy_telnet(hSession, fd, host, port); | |
| 335 | - case PT_SOCKS4: | |
| 336 | - return proxy_socks4(hSession, fd, host, port, 0); | |
| 337 | - case PT_SOCKS4A: | |
| 338 | - return proxy_socks4(hSession, fd, host, port, 1); | |
| 339 | - case PT_SOCKS5: | |
| 340 | - return proxy_socks5(hSession, fd, host, port, 0); | |
| 341 | - case PT_SOCKS5D: | |
| 342 | - return proxy_socks5(hSession, fd, host, port, 1); | |
| 343 | - default: | |
| 344 | - return -1; | |
| 345 | - } | |
| 346 | -} | |
| 347 | - | |
| 348 | -/* Sun PASSTHRU proxy. */ | |
| 349 | -static int proxy_passthru(H3270 *hSession, int fd, char *host, unsigned short port) | |
| 350 | -{ | |
| 351 | - char *buf; | |
| 352 | - | |
| 353 | - buf = lib3270_malloc(strlen(host) + 32); | |
| 354 | - (void) sprintf(buf, "%s %u\r\n", host, port); | |
| 355 | - | |
| 356 | -#if defined(X3270_TRACE) /*[*/ | |
| 357 | - trace_dsn(hSession,"Passthru Proxy: xmit '%.*s'", (int) (strlen(buf) - 2), buf); | |
| 358 | - trace_netdata(hSession,'>', (unsigned char *)buf, (int) strlen(buf)); | |
| 359 | -#endif /*]*/ | |
| 360 | - | |
| 361 | - if (send(fd, buf, strlen(buf), 0) < 0) | |
| 362 | - { | |
| 363 | - popup_a_sockerr(hSession,_( "Passthru Proxy: send error" )); | |
| 364 | - lib3270_free(buf); | |
| 365 | - return -1; | |
| 366 | - } | |
| 367 | - lib3270_free(buf); | |
| 368 | - | |
| 369 | - return 0; | |
| 370 | -} | |
| 371 | - | |
| 372 | -/* HTTP (RFC 2817 CONNECT tunnel) proxy. */ | |
| 373 | -static int | |
| 374 | -proxy_http(H3270 *hSession, int fd, char *host, unsigned short port) | |
| 375 | -{ | |
| 376 | - char *buf; | |
| 377 | - char *colon; | |
| 378 | - char rbuf[1024]; | |
| 379 | - int nr; | |
| 380 | - int nread = 0; | |
| 381 | - char *space; | |
| 382 | - | |
| 383 | - /* Send the CONNECT request. */ | |
| 384 | - buf = lib3270_malloc(64 + strlen(host)); | |
| 385 | - colon = strchr(host, ':'); | |
| 386 | - sprintf(buf, "CONNECT %s%s%s:%u HTTP/1.1\r\n", | |
| 387 | - (colon? "[": ""), | |
| 388 | - host, | |
| 389 | - (colon? "]": ""), | |
| 390 | - port); | |
| 391 | - | |
| 392 | -#if defined(X3270_TRACE) /*[*/ | |
| 393 | - trace_dsn(hSession,"HTTP Proxy: xmit '%.*s'\n", (int) (strlen(buf) - 2), buf); | |
| 394 | - trace_netdata(hSession, '>', (unsigned char *)buf, (int) strlen(buf)); | |
| 395 | -#endif /*]*/ | |
| 396 | - | |
| 397 | - if (send(fd, buf, strlen(buf), 0) < 0) | |
| 398 | - { | |
| 399 | - popup_a_sockerr(hSession,_( "HTTP Proxy: send error" )); | |
| 400 | - lib3270_free(buf); | |
| 401 | - return -1; | |
| 402 | - } | |
| 403 | - | |
| 404 | - sprintf(buf, "Host: %s%s%s:%u\r\n", | |
| 405 | - (colon? "[": ""), | |
| 406 | - host, | |
| 407 | - (colon? "]": ""), | |
| 408 | - port); | |
| 409 | - | |
| 410 | -#if defined(X3270_TRACE) /*[*/ | |
| 411 | - trace_dsn(hSession,"HTTP Proxy: xmit '%.*s'\n", (int) (strlen(buf) - 2), buf); | |
| 412 | - trace_netdata(hSession, '>', (unsigned char *)buf, (int) strlen(buf)); | |
| 413 | -#endif /*]*/ | |
| 414 | - | |
| 415 | - if (send(fd, buf, strlen(buf), 0) < 0) | |
| 416 | - { | |
| 417 | - popup_a_sockerr(hSession,_( "HTTP Proxy: send error")); | |
| 418 | - lib3270_free(buf); | |
| 419 | - return -1; | |
| 420 | - } | |
| 421 | - | |
| 422 | - strcpy(buf, "\r\n"); | |
| 423 | -#if defined(X3270_TRACE) /*[*/ | |
| 424 | - trace_dsn(hSession,"HTTP Proxy: xmit ''\n"); | |
| 425 | - trace_netdata(hSession, '>', (unsigned char *)buf, strlen(buf)); | |
| 426 | -#endif /*]*/ | |
| 427 | - | |
| 428 | - if (send(fd, buf, strlen(buf), 0) < 0) | |
| 429 | - { | |
| 430 | - popup_a_sockerr(hSession,_( "HTTP Proxy: send error" )); | |
| 431 | - lib3270_free(buf); | |
| 432 | - return -1; | |
| 433 | - } | |
| 434 | - lib3270_free(buf); | |
| 435 | - | |
| 436 | - /* | |
| 437 | - * Process the reply. | |
| 438 | - * Read a byte at a time until \n or EOF. | |
| 439 | - */ | |
| 440 | - for (;;) | |
| 441 | - { | |
| 442 | - fd_set rfds; | |
| 443 | - struct timeval tv; | |
| 444 | - | |
| 445 | - FD_ZERO(&rfds); | |
| 446 | - FD_SET(fd, &rfds); | |
| 447 | - tv.tv_sec = 15; | |
| 448 | - tv.tv_usec = 0; | |
| 449 | - if (select(fd + 1, &rfds, NULL, NULL, &tv) < 0) { | |
| 450 | - popup_an_error(hSession,_( "HTTP Proxy: server timeout" )); | |
| 451 | -#if defined(X3270_TRACE) /*[*/ | |
| 452 | - if (nread) | |
| 453 | - trace_netdata(hSession, '<', (unsigned char *)rbuf, nread); | |
| 454 | -#endif /*]*/ | |
| 455 | - return -1; | |
| 456 | - } | |
| 457 | - | |
| 458 | - nr = recv(fd, &rbuf[nread], 1, 0); | |
| 459 | - if (nr < 0) { | |
| 460 | - popup_a_sockerr(hSession,_( "HTTP Proxy: receive error" )); | |
| 461 | -#if defined(X3270_TRACE) /*[*/ | |
| 462 | - if (nread) | |
| 463 | - trace_netdata(hSession, '<', (unsigned char *)rbuf, nread); | |
| 464 | -#endif /*]*/ | |
| 465 | - return -1; | |
| 466 | - } | |
| 467 | - if (nr == 0) | |
| 468 | - { | |
| 469 | -#if defined(X3270_TRACE) /*[*/ | |
| 470 | - if (nread) | |
| 471 | - trace_netdata(hSession, '<', (unsigned char *)rbuf, nread); | |
| 472 | -#endif /*]*/ | |
| 473 | - popup_an_error(hSession,_( "HTTP Proxy: unexpected EOF" )); | |
| 474 | - return -1; | |
| 475 | - } | |
| 476 | - if (rbuf[nread] == '\r') | |
| 477 | - continue; | |
| 478 | - if (rbuf[nread] == '\n') | |
| 479 | - break; | |
| 480 | - if (++nread >= sizeof(rbuf)) { | |
| 481 | - nread = sizeof(rbuf) - 1; | |
| 482 | - break; | |
| 483 | - } | |
| 484 | - } | |
| 485 | - rbuf[nread] = '\0'; | |
| 486 | - | |
| 487 | -#if defined(X3270_TRACE) /*[*/ | |
| 488 | - trace_netdata(hSession, '<', (unsigned char *)rbuf, nread); | |
| 489 | - trace_dsn(hSession,"HTTP Proxy: recv '%s'\n", rbuf); | |
| 490 | -#endif /*]*/ | |
| 491 | - | |
| 492 | - if (strncmp(rbuf, "HTTP/", 5) || (space = strchr(rbuf, ' ')) == CN) | |
| 493 | - { | |
| 494 | - popup_an_error(hSession,_( "HTTP Proxy: unrecognized reply" )); | |
| 495 | - return -1; | |
| 496 | - } | |
| 497 | - if (*(space + 1) != '2') | |
| 498 | - { | |
| 499 | - popup_an_error(hSession,_( "HTTP Proxy: CONNECT failed:\n%s"), rbuf); | |
| 500 | - return -1; | |
| 501 | - } | |
| 502 | - | |
| 503 | - return 0; | |
| 504 | -} | |
| 505 | - | |
| 506 | -/* TELNET proxy. */ | |
| 507 | -static int | |
| 508 | -proxy_telnet(H3270 *hSession, int fd, char *host, unsigned short port) | |
| 509 | -{ | |
| 510 | - char *buf; | |
| 511 | - | |
| 512 | - buf = lib3270_malloc(strlen(host) + 32); | |
| 513 | - (void) sprintf(buf, "connect %s %u\r\n", host, port); | |
| 514 | - | |
| 515 | -#if defined(X3270_TRACE) /*[*/ | |
| 516 | - trace_dsn(hSession,"TELNET Proxy: xmit '%.*s'", (int) (strlen(buf) - 2), buf); | |
| 517 | - trace_netdata(hSession, '>', (unsigned char *)buf, (int) strlen(buf)); | |
| 518 | -#endif /*]*/ | |
| 519 | - | |
| 520 | - if (send(fd, buf, strlen(buf), 0) < 0) | |
| 521 | - { | |
| 522 | - popup_a_sockerr(hSession,_( "TELNET Proxy: send error")); | |
| 523 | - lib3270_free(buf); | |
| 524 | - return -1; | |
| 525 | - } | |
| 526 | - lib3270_free(buf); | |
| 527 | - | |
| 528 | - return 0; | |
| 529 | -} | |
| 530 | - | |
| 531 | -/* SOCKS version 4 proxy. */ | |
| 532 | -#if defined(HAVE_GETADDRINFO) | |
| 533 | -static int proxy_socks4(H3270 *hSession, int fd, char *host, unsigned short port, int force_a) | |
| 534 | -{ | |
| 535 | - popup_an_error(hSession,"%s", _( "Unsupported socks 4 proxy" ) ); | |
| 536 | - return 0; | |
| 537 | -} | |
| 538 | -#else | |
| 539 | -static int proxy_socks4(H3270 *hSession, int fd, char *host, unsigned short port, int force_a) | |
| 540 | -{ | |
| 541 | - struct hostent *hp; | |
| 542 | - struct in_addr ipaddr; | |
| 543 | - int use_4a = 0; | |
| 544 | - char *user; | |
| 545 | - char *buf; | |
| 546 | - char *s; | |
| 547 | - char rbuf[8]; | |
| 548 | - int nr; | |
| 549 | - int nread = 0; | |
| 550 | -#if defined(X3270_TRACE) /*[*/ | |
| 551 | - unsigned short rport; | |
| 552 | -#endif | |
| 553 | - | |
| 554 | - /* Resolve the hostname to an IPv4 address. */ | |
| 555 | - if (force_a) | |
| 556 | - use_4a = 1; | |
| 557 | - else { | |
| 558 | - hp = gethostbyname(host); | |
| 559 | - if (hp != NULL) { | |
| 560 | - memcpy(&ipaddr, hp->h_addr, hp->h_length); | |
| 561 | - } else { | |
| 562 | - ipaddr.s_addr = inet_addr(host); | |
| 563 | - if (ipaddr.s_addr == -1) | |
| 564 | - use_4a = 1; | |
| 565 | - } | |
| 566 | - } | |
| 567 | - | |
| 568 | - /* Resolve the username. */ | |
| 569 | -#ifdef ANDROID | |
| 570 | - user = "android"; | |
| 571 | -#else | |
| 572 | - user = getenv("USER"); | |
| 573 | - if (user == CN) | |
| 574 | - user = "nobody"; | |
| 575 | -#endif // ANDROID | |
| 576 | - | |
| 577 | - /* Send the request to the server. */ | |
| 578 | - if (use_4a) { | |
| 579 | - buf = lib3270_malloc(32 + strlen(user) + strlen(host)); | |
| 580 | - s = buf; | |
| 581 | - *s++ = 0x04; | |
| 582 | - *s++ = 0x01; | |
| 583 | - SET16(s, port); | |
| 584 | - SET32(s, 0x00000001); | |
| 585 | - strcpy(s, user); | |
| 586 | - s += strlen(user) + 1; | |
| 587 | - strcpy(s, host); | |
| 588 | - s += strlen(host) + 1; | |
| 589 | - | |
| 590 | -#if defined(X3270_TRACE) /*[*/ | |
| 591 | - trace_dsn(hSession,"SOCKS4 Proxy: version 4 connect port %u address 0.0.0.1 user '%s' host '%s'\n",port, user, host); | |
| 592 | - trace_netdata(hSession,'>', (unsigned char *)buf, s - buf); | |
| 593 | -#endif /*]*/ | |
| 594 | - | |
| 595 | - if (send(fd, buf, s - buf, 0) < 0) | |
| 596 | - { | |
| 597 | - popup_a_sockerr(hSession,_( "SOCKS4 Proxy: send error" )); | |
| 598 | - lib3270_free(buf); | |
| 599 | - return -1; | |
| 600 | - } | |
| 601 | - lib3270_free(buf); | |
| 602 | - } else { | |
| 603 | - unsigned long u; | |
| 604 | - | |
| 605 | - buf = lib3270_malloc(32 + strlen(user)); | |
| 606 | - s = buf; | |
| 607 | - *s++ = 0x04; | |
| 608 | - *s++ = 0x01; | |
| 609 | - SET16(s, port); | |
| 610 | - u = ntohl(ipaddr.s_addr); | |
| 611 | - SET32(s, u); | |
| 612 | - strcpy(s, user); | |
| 613 | - s += strlen(user) + 1; | |
| 614 | - | |
| 615 | -#if defined(X3270_TRACE) /*[*/ | |
| 616 | - trace_dsn(hSession,_( "SOCKS4 Proxy: xmit version 4 connect port %u address %s user '%s'\n"),port, inet_ntoa(ipaddr), user); | |
| 617 | - trace_netdata(hSession,'>', (unsigned char *)buf, s - buf); | |
| 618 | -#endif /*]*/ | |
| 619 | - | |
| 620 | - if (send(fd, buf, s - buf, 0) < 0) | |
| 621 | - { | |
| 622 | - lib3270_free(buf); | |
| 623 | - popup_a_sockerr(hSession,_("SOCKS4 Proxy: send error")); | |
| 624 | - return -1; | |
| 625 | - } | |
| 626 | - lib3270_free(buf); | |
| 627 | - } | |
| 628 | - | |
| 629 | - /* | |
| 630 | - * Process the reply. | |
| 631 | - * Read 8 bytes of response. | |
| 632 | - */ | |
| 633 | - for (;;) { | |
| 634 | - fd_set rfds; | |
| 635 | - struct timeval tv; | |
| 636 | - | |
| 637 | - FD_ZERO(&rfds); | |
| 638 | - FD_SET(fd, &rfds); | |
| 639 | - tv.tv_sec = 15; | |
| 640 | - tv.tv_usec = 0; | |
| 641 | - if (select(fd + 1, &rfds, NULL, NULL, &tv) < 0) | |
| 642 | - { | |
| 643 | - popup_an_error(hSession,_("SOCKS4 Proxy: server timeout")); | |
| 644 | - return -1; | |
| 645 | - } | |
| 646 | - | |
| 647 | - nr = recv(fd, &rbuf[nread], 1, 0); | |
| 648 | - | |
| 649 | - if (nr < 0) | |
| 650 | - { | |
| 651 | - popup_a_sockerr(hSession,_("SOCKS4 Proxy: receive error")); | |
| 652 | - return -1; | |
| 653 | - } | |
| 654 | - if (nr == 0) | |
| 655 | - break; | |
| 656 | - | |
| 657 | - if (++nread >= sizeof(rbuf)) | |
| 658 | - break; | |
| 659 | - } | |
| 660 | - | |
| 661 | -#if defined(X3270_TRACE) /*[*/ | |
| 662 | - trace_netdata(hSession,'<', (unsigned char *)rbuf, nread); | |
| 663 | - if (use_4a) | |
| 664 | - { | |
| 665 | - struct in_addr a; | |
| 666 | - | |
| 667 | - rport = (rbuf[2] << 8) | rbuf[3]; | |
| 668 | - memcpy(&a, &rbuf[4], 4); | |
| 669 | - trace_dsn(hSession,_("SOCKS4 Proxy: recv status 0x%02x port %u address %s\n"),rbuf[1],rport,inet_ntoa(a)); | |
| 670 | - | |
| 671 | - } else | |
| 672 | - trace_dsn(hSession,_("SOCKS4 Proxy: recv status 0x%02x\n"), rbuf[1]); | |
| 673 | -#endif /*]*/ | |
| 674 | - | |
| 675 | - switch (rbuf[1]) | |
| 676 | - { | |
| 677 | - case 0x5a: | |
| 678 | - break; | |
| 679 | - case 0x5b: | |
| 680 | - popup_an_error(hSession,_("SOCKS4 Proxy: request rejected or failed")); | |
| 681 | - return -1; | |
| 682 | - case 0x5c: | |
| 683 | - popup_an_error(hSession,_("SOCKS4 Proxy: client is not reachable")); | |
| 684 | - return -1; | |
| 685 | - case 0x5d: | |
| 686 | - popup_an_error(hSession,_("SOCKS4 Proxy: userid error")); | |
| 687 | - return -1; | |
| 688 | - default: | |
| 689 | - popup_an_error(hSession,_("SOCKS4 Proxy: unknown status 0x%02x"),rbuf[1]); | |
| 690 | - return -1; | |
| 691 | - } | |
| 692 | - | |
| 693 | - return 0; | |
| 694 | -} | |
| 695 | -#endif // HAVE_GETADDRINFO | |
| 696 | - | |
| 697 | -/* SOCKS version 5 (RFC 1928) proxy. */ /* | |
| 698 | -static int proxy_socks5(H3270 *hSession, int fd, char *host, unsigned short port, int force_d) | |
| 699 | -{ | |
| 700 | - union { | |
| 701 | - struct sockaddr sa; | |
| 702 | - struct sockaddr_in sin; | |
| 703 | -#if defined(AF_INET6) | |
| 704 | - struct sockaddr_in6 sin6; | |
| 705 | -#endif | |
| 706 | - } ha; | |
| 707 | - socklen_t ha_len = 0; | |
| 708 | - int use_name = 0; | |
| 709 | - char *buf; | |
| 710 | - char *s; | |
| 711 | - unsigned char rbuf[8]; | |
| 712 | - int nr; | |
| 713 | - int nread = 0; | |
| 714 | - int n2read = 0; | |
| 715 | - char nbuf[256]; | |
| 716 | - int done = 0; | |
| 717 | - | |
| 718 | -#if defined(X3270_TRACE) | |
| 719 | - const char *atype_name[] = | |
| 720 | - { | |
| 721 | - "", | |
| 722 | - "IPv4", | |
| 723 | - "", | |
| 724 | - "domainname", | |
| 725 | - "IPv6" | |
| 726 | - }; | |
| 727 | - unsigned char *portp; | |
| 728 | -#endif | |
| 729 | - unsigned short rport; | |
| 730 | - | |
| 731 | - if (force_d) | |
| 732 | - use_name = 1; | |
| 733 | - else { | |
| 734 | - char errmsg[1024]; | |
| 735 | - int rv; | |
| 736 | - | |
| 737 | - // Resolve the hostname. | |
| 738 | - rv = resolve_host_and_port(hSession,host, CN, &rport, &ha.sa, &ha_len,errmsg, sizeof(errmsg)); | |
| 739 | - if (rv == -2) | |
| 740 | - use_name = 1; | |
| 741 | - else if (rv < 0) { | |
| 742 | - popup_an_error(hSession,_("SOCKS5 proxy: %s/%u: %s"), host, port,errmsg); | |
| 743 | - return -1; | |
| 744 | - } | |
| 745 | - } | |
| 746 | - | |
| 747 | - // Send the authentication request to the server. | |
| 748 | - strcpy((char *)rbuf, "\005\001\000"); | |
| 749 | -#if defined(X3270_TRACE) | |
| 750 | - trace_dsn(hSession,_("SOCKS5 Proxy: xmit version 5 nmethods 1 (no auth)\n")); | |
| 751 | - trace_netdata(hSession, '>', rbuf, 3); | |
| 752 | -#endif | |
| 753 | - if (send(fd, (const char *) rbuf, 3, 0) < 0) | |
| 754 | - { | |
| 755 | - popup_a_sockerr(hSession,_("SOCKS5 Proxy: send error")); | |
| 756 | - return -1; | |
| 757 | - } | |
| 758 | - | |
| 759 | - // | |
| 760 | - // Wait for the server reply. | |
| 761 | - // Read 2 bytes of response. | |
| 762 | - // | |
| 763 | - nread = 0; | |
| 764 | - for (;;) { | |
| 765 | - fd_set rfds; | |
| 766 | - struct timeval tv; | |
| 767 | - | |
| 768 | - FD_ZERO(&rfds); | |
| 769 | - FD_SET(fd, &rfds); | |
| 770 | - tv.tv_sec = 15; | |
| 771 | - tv.tv_usec = 0; | |
| 772 | - if (select(fd + 1, &rfds, NULL, NULL, &tv) < 0) | |
| 773 | - { | |
| 774 | - popup_an_error(hSession,_("SOCKS5 Proxy: server timeout")); | |
| 775 | -#if defined(X3270_TRACE) | |
| 776 | - if (nread) | |
| 777 | - trace_netdata(hSession, '<', rbuf, nread); | |
| 778 | -#endif | |
| 779 | - return -1; | |
| 780 | - } | |
| 781 | - | |
| 782 | - nr = recv(fd, (char *) &rbuf[nread], 1, 0); | |
| 783 | - if (nr < 0) | |
| 784 | - { | |
| 785 | - popup_a_sockerr(hSession,_("SOCKS5 Proxy: receive error")); | |
| 786 | -#if defined(X3270_TRACE) | |
| 787 | - if (nread) | |
| 788 | - trace_netdata(hSession, '<', rbuf, nread); | |
| 789 | -#endif | |
| 790 | - return -1; | |
| 791 | - } | |
| 792 | - if (nr == 0) | |
| 793 | - { | |
| 794 | - popup_a_sockerr(hSession,_("SOCKS5 Proxy: unexpected EOF")); | |
| 795 | -#if defined(X3270_TRACE) | |
| 796 | - if (nread) | |
| 797 | - trace_netdata(hSession, '<', rbuf, nread); | |
| 798 | -#endif | |
| 799 | - return -1; | |
| 800 | - } | |
| 801 | - if (++nread >= 2) | |
| 802 | - break; | |
| 803 | - } | |
| 804 | - | |
| 805 | -#if defined(X3270_TRACE) | |
| 806 | - trace_netdata(hSession, '<', rbuf, nread); | |
| 807 | -#endif | |
| 808 | - | |
| 809 | - if (rbuf[0] != 0x05 || (rbuf[1] != 0 && rbuf[1] != 0xff)) | |
| 810 | - { | |
| 811 | - popup_an_error(hSession,_("SOCKS5 Proxy: bad authentication response")); | |
| 812 | - return -1; | |
| 813 | - } | |
| 814 | - | |
| 815 | -#if defined(X3270_TRACE) | |
| 816 | - trace_dsn(hSession,"SOCKS5 Proxy: recv version %d method %d\n", rbuf[0],rbuf[1]); | |
| 817 | -#endif | |
| 818 | - | |
| 819 | - if (rbuf[1] == 0xff) | |
| 820 | - { | |
| 821 | - popup_an_error(hSession,_("SOCKS5 Proxy: authentication failure")); | |
| 822 | - return -1; | |
| 823 | - } | |
| 824 | - | |
| 825 | - // Send the request to the server. | |
| 826 | - buf = lib3270_malloc(32 + strlen(host)); | |
| 827 | - s = buf; | |
| 828 | - *s++ = 0x05; // protocol version 5 | |
| 829 | - *s++ = 0x01; // CONNECT | |
| 830 | - *s++ = 0x00; // reserved | |
| 831 | - if (use_name) { | |
| 832 | - *s++ = 0x03; // domain name | |
| 833 | - *s++ = strlen(host); | |
| 834 | - strcpy(s, host); | |
| 835 | - s += strlen(host); | |
| 836 | - } else if (ha.sa.sa_family == AF_INET) { | |
| 837 | - *s++ = 0x01; // IPv4 | |
| 838 | - memcpy(s, &ha.sin.sin_addr, 4); | |
| 839 | - s += 4; | |
| 840 | - strcpy(nbuf, inet_ntoa(ha.sin.sin_addr)); | |
| 841 | -#if defined(AF_INET6) | |
| 842 | - } else { | |
| 843 | - *s++ = 0x04; // IPv6 | |
| 844 | - memcpy(s, &ha.sin6.sin6_addr, sizeof(struct in6_addr)); | |
| 845 | - s += sizeof(struct in6_addr); | |
| 846 | - (void) inet_ntop(AF_INET6, &ha.sin6.sin6_addr, nbuf, sizeof(nbuf)); | |
| 847 | -#endif | |
| 848 | - } | |
| 849 | - SET16(s, port); | |
| 850 | - | |
| 851 | -#if defined(X3270_TRACE) | |
| 852 | - trace_dsn(hSession,"SOCKS5 Proxy: xmit version 5 connect %s %s port %u\n", | |
| 853 | - use_name? "domainname": | |
| 854 | - ((ha.sa.sa_family == AF_INET)? "IPv4": "IPv6"), | |
| 855 | - use_name? host: nbuf, | |
| 856 | - port); | |
| 857 | - trace_netdata(hSession, '>', (unsigned char *)buf, s - buf); | |
| 858 | -#endif | |
| 859 | - | |
| 860 | - if (send(fd, buf, s - buf, 0) < 0) { | |
| 861 | - popup_a_sockerr(hSession,_("SOCKS5 Proxy: send error")); | |
| 862 | - lib3270_free(buf); | |
| 863 | - return -1; | |
| 864 | - } | |
| 865 | - lib3270_free(buf); | |
| 866 | - | |
| 867 | - // | |
| 868 | - // Process the reply. | |
| 869 | - // Only the first two bytes of the response are interesting; | |
| 870 | - // skip the rest. | |
| 871 | - // | |
| 872 | - nread = 0; | |
| 873 | - done = 0; | |
| 874 | - buf = NULL; | |
| 875 | - while (!done) | |
| 876 | - { | |
| 877 | - fd_set rfds; | |
| 878 | - struct timeval tv; | |
| 879 | - unsigned char r; | |
| 880 | - | |
| 881 | - FD_ZERO(&rfds); | |
| 882 | - FD_SET(fd, &rfds); | |
| 883 | - tv.tv_sec = 15; | |
| 884 | - tv.tv_usec = 0; | |
| 885 | - if (select(fd + 1, &rfds, NULL, NULL, &tv) < 0) | |
| 886 | - { | |
| 887 | - popup_an_error(hSession,_("SOCKS5 Proxy: server timeout")); | |
| 888 | - return -1; | |
| 889 | - } | |
| 890 | - | |
| 891 | - nr = recv(fd, (char *) &r, 1, 0); | |
| 892 | - if (nr < 0) | |
| 893 | - { | |
| 894 | - popup_a_sockerr(hSession,_("SOCKS5 Proxy: receive error")); | |
| 895 | -#if defined(X3270_TRACE) | |
| 896 | - if (nread) | |
| 897 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 898 | -#endif | |
| 899 | - return -1; | |
| 900 | - } | |
| 901 | - if (nr == 0) | |
| 902 | - { | |
| 903 | - popup_an_error(hSession, _("SOCKS5 Proxy: unexpected EOF")); | |
| 904 | -#if defined(X3270_TRACE) | |
| 905 | - if (nread) | |
| 906 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 907 | -#endif | |
| 908 | - return -1; | |
| 909 | - } | |
| 910 | - | |
| 911 | - buf = Realloc(buf, nread + 1); | |
| 912 | - buf[nread] = r; | |
| 913 | - | |
| 914 | - switch (nread++) { | |
| 915 | - case 0: | |
| 916 | - if (r != 0x05) | |
| 917 | - { | |
| 918 | - popup_an_error(hSession, _("SOCKS5 Proxy: incorrect reply version 0x%02x"), r); | |
| 919 | -#if defined(X3270_TRACE) | |
| 920 | - if (nread) | |
| 921 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 922 | -#endif | |
| 923 | - return -1; | |
| 924 | - } | |
| 925 | - break; | |
| 926 | - case 1: | |
| 927 | -#if defined(X3270_TRACE) | |
| 928 | - if (r != 0x00) | |
| 929 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 930 | -#endif | |
| 931 | - switch (r) | |
| 932 | - { | |
| 933 | - case 0x00: | |
| 934 | - break; | |
| 935 | - case 0x01: | |
| 936 | - popup_an_error(hSession, _("SOCKS5 Proxy: server failure")); | |
| 937 | - return -1; | |
| 938 | - case 0x02: | |
| 939 | - popup_an_error(hSession, _("SOCKS5 Proxy: connection not allowed")); | |
| 940 | - return -1; | |
| 941 | - case 0x03: | |
| 942 | - popup_an_error(hSession, _("SOCKS5 Proxy: network unreachable")); | |
| 943 | - return -1; | |
| 944 | - case 0x04: | |
| 945 | - popup_an_error(hSession, _("SOCKS5 Proxy: host unreachable")); | |
| 946 | - return -1; | |
| 947 | - case 0x05: | |
| 948 | - popup_an_error(hSession, _("SOCKS5 Proxy: connection refused")); | |
| 949 | - return -1; | |
| 950 | - case 0x06: | |
| 951 | - popup_an_error(hSession, _("SOCKS5 Proxy: ttl expired")); | |
| 952 | - return -1; | |
| 953 | - case 0x07: | |
| 954 | - popup_an_error(hSession, _("SOCKS5 Proxy: command not supported")); | |
| 955 | - return -1; | |
| 956 | - case 0x08: | |
| 957 | - popup_an_error(hSession, _("SOCKS5 Proxy: address type not supported")); | |
| 958 | - return -1; | |
| 959 | - default: | |
| 960 | - popup_an_error(hSession, _("SOCKS5 Proxy: unknown server error 0x%02x"), r); | |
| 961 | - return -1; | |
| 962 | - } | |
| 963 | - break; | |
| 964 | - | |
| 965 | - case 2: | |
| 966 | - break; | |
| 967 | - case 3: | |
| 968 | - switch (r) | |
| 969 | - { | |
| 970 | - case 0x01: | |
| 971 | - n2read = 6; | |
| 972 | - break; | |
| 973 | - case 0x03: | |
| 974 | - n2read = -1; | |
| 975 | - break; | |
| 976 | -#if defined(AF_INET6) | |
| 977 | - case 0x04: | |
| 978 | - n2read = sizeof(struct in6_addr) + 2; | |
| 979 | - break; | |
| 980 | -#endif | |
| 981 | - default: | |
| 982 | - popup_an_error(hSession, _("SOCKS5 Proxy: unknown server address type 0x%02x"), r); | |
| 983 | -#if defined(X3270_TRACE) | |
| 984 | - if (nread) | |
| 985 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 986 | -#endif | |
| 987 | - return -1; | |
| 988 | - } | |
| 989 | - break; | |
| 990 | - default: | |
| 991 | - if (n2read == -1) | |
| 992 | - n2read = r + 2; | |
| 993 | - else if (!--n2read) | |
| 994 | - done = 1; | |
| 995 | - break; | |
| 996 | - } | |
| 997 | - } | |
| 998 | - | |
| 999 | -#if defined(X3270_TRACE) | |
| 1000 | - trace_netdata(hSession, '<', (unsigned char *)buf, nread); | |
| 1001 | - switch (buf[3]) { | |
| 1002 | - case 0x01: // IPv4 | |
| 1003 | - memcpy(&ha.sin.sin_addr, &buf[4], 4); | |
| 1004 | - strcpy(nbuf, inet_ntoa(ha.sin.sin_addr)); | |
| 1005 | - portp = (unsigned char *)&buf[4 + 4]; | |
| 1006 | - break; | |
| 1007 | - case 0x03: // domainname | |
| 1008 | - strncpy(nbuf, &buf[5], buf[4]); | |
| 1009 | - nbuf[(unsigned char)buf[4]] = '\0'; | |
| 1010 | - portp = (unsigned char *)&buf[5 + (unsigned char)buf[4]]; | |
| 1011 | - break; | |
| 1012 | -#if defined(AF_INET6) | |
| 1013 | - case 0x04: // IPv6 | |
| 1014 | - memcpy(&ha.sin6.sin6_addr, &buf[4], sizeof(struct in6_addr)); | |
| 1015 | - (void) inet_ntop(AF_INET6, &ha.sin6.sin6_addr, nbuf, | |
| 1016 | - sizeof(nbuf)); | |
| 1017 | - portp = (unsigned char *)&buf[4 + sizeof(struct in6_addr)]; | |
| 1018 | - break; | |
| 1019 | -#endif | |
| 1020 | - default: | |
| 1021 | - // can't happen | |
| 1022 | - nbuf[0] = '\0'; | |
| 1023 | - portp = (unsigned char *)buf; | |
| 1024 | - break; | |
| 1025 | - } | |
| 1026 | - rport = (*portp << 8) + *(portp + 1); | |
| 1027 | - trace_dsn(hSession,"SOCKS5 Proxy: recv version %d status 0x%02x address %s %s port %u\n", | |
| 1028 | - buf[0], buf[1], | |
| 1029 | - atype_name[(unsigned char)buf[3]], | |
| 1030 | - nbuf, | |
| 1031 | - rport); | |
| 1032 | -#endif | |
| 1033 | - lib3270_free(buf); | |
| 1034 | - | |
| 1035 | - return 0; | |
| 1036 | -} | |
| 1037 | -*/ |
| ... | ... | @@ -0,0 +1,8 @@ |
| 1 | +char *build = "@PACKAGE_TARNAME@ v@PACKAGE_VERSION@ @RPQ_BUILD_DATE@ @SCCS_USER@"; | |
| 2 | +char *app_defaults_version = "@PACKAGE_VERSION@"; | |
| 3 | +char *sccsid = "@(#)@PACKAGE_TARNAME@ v@PACKAGE_VERSION@ @SCCS_DATE@ @SCCS_USER@"; | |
| 4 | + | |
| 5 | +const char *build_rpq_timestamp = "@RPQ_TIMESTAMP@"; | |
| 6 | +const char *build_rpq_version = "@PACKAGE_VERSION@"; | |
| 7 | +const char *build_rpq_revision = "@RPQ_REVISION@"; | |
| 8 | + | ... | ... |