pike.git / lib / modules / Protocols.pmod / HTTP.pmod / module.pmod

version» Context lines:

pike.git/lib/modules/Protocols.pmod/HTTP.pmod/module.pmod:105: Inside #if constant(SSL.sslfile)
  #endif    if (!con || (con->host != url->host) || (con->port != url->port)) {    // Make a CONNECT request to the proxy,    // and use keep-alive to stack the real request on top.    proxy->path = url->host + ":" + url->port;    if (!proxy_headers) proxy_headers = ([]);    proxy_headers->connection = "keep-alive";    m_delete(proxy_headers, "authorization"); // Keep the proxy in the dark.    con = do_method("CONNECT", proxy, 0, proxy_headers);    con->data(0); -  if (con->status/100 > 2) { +  if (con->status >= 300) { +  // Proxy did not like us or failed to connect to the remote.    return con;    }    con->headers["connect"] = "keep-alive";    con->headers["content-length"] = "0";    con->host = url->host;    con->port = url->port;    con->https = 1;    con->start_tls(1);    }    proxy_headers = request_headers;
pike.git/lib/modules/Protocols.pmod/HTTP.pmod/module.pmod:375:    con->request_fail(con, @con->extra_args);   }      protected void https_proxy_connect_ok(Protocols.HTTP.Query con,    array(mixed) orig_cb_info,    Standards.URI url, string method,    mapping(string:string) query_variables,    mapping(string:string) request_headers,    string data)   { +  if (con->status >= 300) { +  // Proxy did not like us or failed to connect to the remote. +  https_proxy_connect_fail(con, orig_cb_info, url, method, +  query_variables, request_headers, +  data); +  return; +  }    con->set_callbacks(@orig_cb_info);       con->headers["connect"] = "keep-alive";    con->headers["content-length"] = "0";    con->host = url->host;    con->port = url->port;    con->https = 1;    con->start_tls(0, 1);       do_async_method(method, url, query_variables, request_headers, con, data);