summaryrefslogtreecommitdiff
path: root/src/or/or.h
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2005-11-16 23:37:35 +0000
committerRoger Dingledine <arma@torproject.org>2005-11-16 23:37:35 +0000
commitc4aa9e7941d64f75f6003dbda5bd2226766d3e12 (patch)
tree0ad72efd87013cb21b3e23af2f7c4de6a16fb059 /src/or/or.h
parent83d6b0387b198f31819cf8de128c04470689c4d8 (diff)
downloadtor-c4aa9e7941d64f75f6003dbda5bd2226766d3e12.tar.gz
tor-c4aa9e7941d64f75f6003dbda5bd2226766d3e12.zip
Add a new config option TestSocks so people can see if their
applications are using socks4, socks4a, socks5-with-ip, or socks5-with-hostname. This way they don't have to keep mucking with tcpdump and wondering if something got cached somewhere. svn:r5399
Diffstat (limited to 'src/or/or.h')
-rw-r--r--src/or/or.h4
1 files changed, 3 insertions, 1 deletions
diff --git a/src/or/or.h b/src/or/or.h
index 1ef9972dbf..04748a91f5 100644
--- a/src/or/or.h
+++ b/src/or/or.h
@@ -1307,6 +1307,8 @@ typedef struct {
#define LOG_PROTOCOL_WARN (get_options()->ProtocolWarnings ? LOG_WARN : LOG_INFO)
int ProtocolWarnings; /**< Boolean: when other parties screw up the Tor
* protocol, is it a warn or an info in our logs? */
+ int TestSocks; /**< Boolean: when we get a socks connection, do we loudly
+ * log whether it was DNS-leaking or not? */
int HardwareAccel; /**< Boolean: Should we enable OpenSSL hardware
* acceleration where available? */
int UseHelperNodes; /**< Boolean: Do we try to enter from a smallish number
@@ -1379,7 +1381,7 @@ int fetch_from_buf_http(buf_t *buf,
char **headers_out, size_t max_headerlen,
char **body_out, size_t *body_used, size_t max_bodylen,
int force_complete);
-int fetch_from_buf_socks(buf_t *buf, socks_request_t *req);
+int fetch_from_buf_socks(buf_t *buf, socks_request_t *req, int log_sockstype);
int fetch_from_buf_control0(buf_t *buf, uint32_t *len_out, uint16_t *type_out,
char **body_out, int check_for_v1);
int fetch_from_buf_line(buf_t *buf, char *data_out, size_t *data_len);