login-proxy.c revision 45312f52ff3a3d4c137447be4c7556500c2f8bf2
/* Copyright (c) 2004-2009 Dovecot authors, see the included COPYING file */
#include "common.h"
#include "ioloop.h"
#include "istream.h"
#include "ostream.h"
#include "llist.h"
#include "str-sanitize.h"
#include "client-common.h"
#include "login-proxy.h"
#define MAX_PROXY_INPUT_SIZE 4096
#define OUTBUF_THRESHOLD 1024
struct login_proxy {
struct istream *server_input;
unsigned int port;
void *context;
unsigned int destroying:1;
};
static unsigned int login_proxy_count = 0;
{
unsigned char buf[OUTBUF_THRESHOLD];
/* client's output buffer is already quite full.
don't send more until we're below threshold. */
return;
}
}
{
unsigned char buf[OUTBUF_THRESHOLD];
/* proxy's output buffer is already quite full.
don't send more until we're below threshold. */
return;
}
}
{
return 1;
}
/* there's again space in proxy's output buffer, so we can
read more from client. */
}
return 1;
}
{
return 1;
}
/* there's again space in client's output buffer, so we can
read more from proxy. */
}
return 1;
}
{
}
{
int err;
if (err != 0) {
i_error("proxy: connect(%s, %u) failed: %s",
return;
}
/* connect successful */
FALSE);
}
struct login_proxy *
{
struct login_proxy *proxy;
int fd;
return NULL;
}
i_error("proxy(%s): %s is not a valid IP",
return NULL;
}
if (fd < 0) {
i_error("proxy(%s): connect(%s, %u) failed: %m",
return NULL;
}
return proxy;
}
{
const char *ipstr;
if (proxy->destroying)
return;
/* detached proxy */
main_unref();
i_info("proxy(%s): disconnecting %s",
} else {
}
}
{
return FALSE;
return FALSE;
return FALSE;
}
{
}
{
}
unsigned int login_proxy_get_count(void)
{
return login_proxy_count;
}
struct ostream *client_output)
{
const unsigned char *data;
/* send all pending client input to proxy and get rid of the stream */
if (size != 0)
/* from now on, just do dummy proxying */
main_ref();
}
void login_proxy_deinit(void)
{
struct login_proxy *proxy;
while (login_proxies != NULL) {
}
}