X-Git-Url: http://git.indexdata.com/?a=blobdiff_plain;f=src%2Fcomstack.c;h=7bd72d3ddc7ae29f7c58de1ac021f1227d9cce81;hb=951fce6496397a6d8c11e15ab5b60b46abc43467;hp=ba1cad329fcf69bdb466c5603923642bb0b279ba;hpb=e12cd77c1050b5722c19f9e6d312c99e14565efe;p=yaz-moved-to-github.git diff --git a/src/comstack.c b/src/comstack.c index ba1cad3..7bd72d3 100644 --- a/src/comstack.c +++ b/src/comstack.c @@ -1,14 +1,20 @@ /* - * Copyright (c) 1995-2004, Index Data + * Copyright (C) 1995-2007, Index Data ApS * See the file LICENSE for details. * - * $Id: comstack.c,v 1.10 2004-05-03 09:00:50 adam Exp $ + * $Id: comstack.c,v 1.17 2007-01-03 08:42:15 adam Exp $ + */ + +/** + * \file comstack.c + * \brief Implements Generic COMSTACK functions */ #include #include #include +#include #include #include #include @@ -26,7 +32,8 @@ static const char *cs_errlist[] = "No data (operation would block)", "New data while half of old buffer is on the line (flow control)", "Permission denied", - "SSL error" + "SSL error", + "Too large incoming buffer" }; const char *cs_errmsg(int n) @@ -34,12 +41,12 @@ const char *cs_errmsg(int n) static char buf[250]; if (n < CSNONE || n > CSLASTERROR) { - sprintf(buf, "unknown comstack error %d", n); - return buf; + sprintf(buf, "unknown comstack error %d", n); + return buf; } if (n == CSYSERR) { - sprintf(buf, "%s: %s", cs_errlist[n], strerror(errno)); - return buf; + sprintf(buf, "%s: %s", cs_errlist[n], strerror(errno)); + return buf; } return cs_errlist[n]; } @@ -76,30 +83,30 @@ COMSTACK cs_create_host(const char *type_and_host, int blocking, void **vp) if (strncmp (type_and_host, "tcp:", 4) == 0) { - t = tcpip_type; + t = tcpip_type; host = type_and_host + 4; } else if (strncmp (type_and_host, "ssl:", 4) == 0) { #if HAVE_OPENSSL_SSL_H - t = ssl_type; + t = ssl_type; host = type_and_host + 4; #else - return 0; + return 0; #endif } else if (strncmp (type_and_host, "unix:", 5) == 0) { #ifndef WIN32 - t = unix_type; + t = unix_type; host = type_and_host + 5; #else - return 0; + return 0; #endif } else if (strncmp(type_and_host, "http:", 5) == 0) { - t = tcpip_type; + t = tcpip_type; host = type_and_host + 5; while (host[0] == '/') host++; @@ -108,28 +115,28 @@ COMSTACK cs_create_host(const char *type_and_host, int blocking, void **vp) else if (strncmp(type_and_host, "https:", 6) == 0) { #if HAVE_OPENSSL_SSL_H - t = ssl_type; + t = ssl_type; host = type_and_host + 6; while (host[0] == '/') host++; proto = PROTO_HTTP; #else - return 0; + return 0; #endif } else { - t = tcpip_type; - host = type_and_host; + t = tcpip_type; + host = type_and_host; } cs = cs_create (t, blocking, proto); if (!cs) - return 0; + return 0; if (!(*vp = cs_straddr(cs, host))) { - cs_close (cs); - return 0; + cs_close (cs); + return 0; } return cs; } @@ -143,16 +150,23 @@ int cs_look (COMSTACK cs) int cs_complete_auto(const unsigned char *buf, int len) { if (len > 5 && buf[0] >= 0x20 && buf[0] < 0x7f - && buf[1] >= 0x20 && buf[1] < 0x7f - && buf[2] >= 0x20 && buf[2] < 0x7f) + && buf[1] >= 0x20 && buf[1] < 0x7f + && buf[2] >= 0x20 && buf[2] < 0x7f) { /* deal with HTTP request/response */ - int i = 2, content_len = 0, chunked = 0; + int i = 2, content_len = 0, chunked = 0; + + /* if dealing with HTTP responses - then default + content length is unlimited (socket close) */ + if (!memcmp(buf, "HTTP/", 5)) + content_len = -1; while (i <= len-4) { - if (i > 8192) - return i; /* do not allow more than 8K HTTP header */ + if (i > 8192) + { + return i; /* do not allow more than 8K HTTP header */ + } if (buf[i] == '\r' && buf[i+1] == '\n') { i += 2; @@ -160,7 +174,7 @@ int cs_complete_auto(const unsigned char *buf, int len) { if (chunked) { - /* inside chunked body .. */ + /* inside chunked body .. */ while(1) { int j, chunk_len = 0; @@ -170,13 +184,13 @@ int cs_complete_auto(const unsigned char *buf, int len) if (i >>\n"); } #endif - /* read chunk length */ + /* read chunk length */ while (1) if (i >= len-2) { #if CHUNK_DEBUG @@ -196,48 +210,52 @@ int cs_complete_auto(const unsigned char *buf, int len) (buf[i++] - ('a'-10)); else break; - /* move forward until CRLF - skip chunk ext */ - j = 0; - while (buf[i] != '\r' && buf[i+1] != '\n') - { - if (i >= len-2) - return 0; /* need more buffer .. */ - if (++j > 1000) - return i; /* enough.. stop */ - i++; - } - /* got CRLF */ + /* move forward until CRLF - skip chunk ext */ + j = 0; + while (buf[i] != '\r' && buf[i+1] != '\n') + { + if (i >= len-2) + return 0; /* need more buffer .. */ + if (++j > 1000) + return i; /* enough.. stop */ + i++; + } + /* got CRLF */ #if CHUNK_DEBUG - printf ("XXXXXX chunk_len=%d\n", chunk_len); -#endif - if (chunk_len < 0) - return i+2; /* bad chunk_len */ + printf ("XXXXXX chunk_len=%d\n", chunk_len); +#endif + if (chunk_len < 0) + return i+2; /* bad chunk_len */ if (chunk_len == 0) - break; + break; i += chunk_len+2; } - /* consider trailing headers .. */ - while(i <= len-4) - { - if (buf[i] == '\r' && buf[i+1] == '\n' && - buf[i+2] == '\r' && buf[i+3] == '\n') - if (len >= i+4) - return i+4; - i++; - } + /* consider trailing headers .. */ + while(i <= len-4) + { + if (buf[i] == '\r' && buf[i+1] == '\n' && + buf[i+2] == '\r' && buf[i+3] == '\n') + if (len >= i+4) + return i+4; + i++; + } #if CHUNK_DEBUG /* debugging */ - printf ("XXXXXXXXX not there yet 2\n"); - printf ("i=%d len=%d\n", i, len); + printf ("XXXXXXXXX not there yet 2\n"); + printf ("i=%d len=%d\n", i, len); #endif - return 0; + return 0; } else { /* not chunked ; inside body */ /* i += 2 seems not to work with GCC -O2 .. so i+2 is used instead .. */ - if (len >= (i+2)+ content_len) + if (content_len == -1) + return 0; /* no content length */ + else if (len >= (i+2)+ content_len) + { return (i+2)+ content_len; + } } break; } @@ -273,3 +291,17 @@ int cs_complete_auto(const unsigned char *buf, int len) } return completeBER(buf, len); } + +void cs_set_max_recv_bytes(COMSTACK cs, int max_recv_bytes) +{ + cs->max_recv_bytes = max_recv_bytes; +} + +/* + * Local variables: + * c-basic-offset: 4 + * indent-tabs-mode: nil + * End: + * vim: shiftwidth=4 tabstop=8 expandtab + */ +