static void send_forwarding_failure(FILE *client_fd);
static void tls_send_invalid_cert_message(gnutls_session_t session);
-#if 0
static void transfer_data(int client, int server);
static int read_from_write_to(int from, int to);
-#endif
static void transfer_data_tls(int client, int server,
gnutls_session_t client_session,
gnutls_session_t server_session);
LOG(LOG_DEBUG, "connection to server established");
+ /* If the -u option is used and we don't know this hostname's server
+ * certificate then just pass through the connection and let the client
+ * verify the server certificate. */
+ if (global_passthrough_unknown) {
+ char path[1024];
+ FILE *file = NULL;
+
+ if (-2 == server_certificate_path(&file, host, path, sizeof(path))) {
+ /* We've established a connection, tell the client. */
+ fprintf(client_fd, "HTTP/1.0 200 Connection established\r\n");
+ fprintf(client_fd, "\r\n");
+ fflush(client_fd);
+
+ LOG(LOG_DEBUG, "transferring data");
+
+ /* Proxy data between client and server until one suite is done
+ * (EOF or error). */
+ transfer_data(client_socket, server_socket);
+
+ LOG(LOG_DEBUG, "finished transferring data");
+
+ goto out;
+ }
+ /* server_certificate_path() may open the file, close it. */
+ if (NULL != file) {
+ fclose(file);
+ }
+ }
+
result = initialize_tls_session_server(server_socket, &server_session,
&server_x509_cred);
/* Initialize TLS client credentials to talk to the server. */
goto out;
}
- LOG(LOG_DEBUG, "transferring data");
+ LOG(LOG_DEBUG, "transferring TLS data");
/* Proxy data between client and server until one suite is done (EOF or
* error). */
transfer_data_tls(client_socket, server_socket,
client_session, server_session);
- LOG(LOG_DEBUG, "finished transferring data");
+ LOG(LOG_DEBUG, "finished transferring TLS data");
out:
/* Close TLS sessions if necessary. Use GNUTLS_SHUT_RDWR so the data is
LOG(LOG_ERROR,
"initialize_tls_session_client(): can't read CA file: '%s'",
PROXY_CA_FILE);
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
/* And certificate for this website and proxy's private key. */
"initialize_tls_session_client(): \
can't read server certificate ('%s') or key file ('%s'): %s",
path, PROXY_KEY_FILE, gnutls_strerror(result));
+ gnutls_certificate_free_credentials(*x509_cred);
/* Could be a missing certificate. */
return -2;
}
LOG(LOG_ERROR,
"initialize_tls_session_client(): gnutls_init(): %s",
gnutls_strerror(result));
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
result = gnutls_priority_set(*session, tls_priority_cache);
LOG(LOG_ERROR,
"initialize_tls_session_client(): gnutls_priority_set(): %s",
gnutls_strerror(result));
+ gnutls_deinit(*session);
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
result = gnutls_credentials_set(*session,
LOG(LOG_ERROR,
"initialize_tls_session_client(): gnutls_credentials_set(): %s",
gnutls_strerror(result));
+ gnutls_deinit(*session);
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
LOG(LOG_ERROR,
"initialize_tls_session_server(): gnutls_init(): %s",
gnutls_strerror(result));
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
gnutls_priority_set(*session, tls_priority_cache);
LOG(LOG_ERROR,
"initialize_tls_session_server(): gnutls_priority_set(): %s",
gnutls_strerror(result));
+ gnutls_deinit(*session);
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
result = gnutls_credentials_set(*session,
LOG(LOG_ERROR,
"initialize_tls_session_server(): gnutls_credentials_set(): %s",
gnutls_strerror(result));
+ gnutls_deinit(*session);
+ gnutls_certificate_free_credentials(*x509_cred);
return -1;
}
}
-#if 0
/* Transfer data between client and server sockets until one closes the
* connection. */
static void transfer_data(int client, int server) {
ssize_t size_written;
char buffer[4096];
+ LOG(LOG_DEBUG, "read_from_write_to(): %d -> %d", from, to);
+
size_read = read(from, buffer, sizeof(buffer));
if (0 > size_read) {
LOG_PERROR(LOG_WARNING, "read_from_write_to(): read()");
return 0;
}
-#endif
/* Transfer data between client and server TLS connection until one closes the
* connection. */