|
@@ -7039,11 +7039,15 @@ static int is_valid_uri(const char *uri)
|
|
return uri[0] == '/' || (uri[0] == '*' && uri[1] == '\0');
|
|
return uri[0] == '/' || (uri[0] == '*' && uri[1] == '\0');
|
|
}
|
|
}
|
|
|
|
|
|
-static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int timeout)
|
|
|
|
|
|
+static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int timeout, int *err)
|
|
{
|
|
{
|
|
const char *cl;
|
|
const char *cl;
|
|
struct pollfd pfd;
|
|
struct pollfd pfd;
|
|
|
|
|
|
|
|
+ if (ebuf_len > 0) {
|
|
|
|
+ ebuf[0] = '\0';
|
|
|
|
+ }
|
|
|
|
+ *err = 0;
|
|
reset_per_request_attributes(conn);
|
|
reset_per_request_attributes(conn);
|
|
if (timeout >= 0) {
|
|
if (timeout >= 0) {
|
|
pfd.fd = conn->client.sock;
|
|
pfd.fd = conn->client.sock;
|
|
@@ -7064,16 +7068,27 @@ static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int t
|
|
|
|
|
|
if (conn->request_len == 0 && conn->data_len == conn->buf_size) {
|
|
if (conn->request_len == 0 && conn->data_len == conn->buf_size) {
|
|
snprintf(ebuf, ebuf_len, "%s", "Request Too Large");
|
|
snprintf(ebuf, ebuf_len, "%s", "Request Too Large");
|
|
|
|
+ *err = 400;
|
|
|
|
+ return 0;
|
|
} else if (conn->request_len <= 0) {
|
|
} else if (conn->request_len <= 0) {
|
|
snprintf(ebuf, ebuf_len, "%s", "Client sent malformed request");
|
|
snprintf(ebuf, ebuf_len, "%s", "Client sent malformed request");
|
|
|
|
+ return 0;
|
|
} else if (parse_http_message(conn->buf, conn->buf_size,
|
|
} else if (parse_http_message(conn->buf, conn->buf_size,
|
|
&conn->request_info) <= 0) {
|
|
&conn->request_info) <= 0) {
|
|
snprintf(ebuf, ebuf_len, "Bad request: [%.*s]", conn->data_len, conn->buf);
|
|
snprintf(ebuf, ebuf_len, "Bad request: [%.*s]", conn->data_len, conn->buf);
|
|
|
|
+ *err = 400;
|
|
|
|
+ return 0;
|
|
} else {
|
|
} else {
|
|
/* Message is a valid request or response */
|
|
/* Message is a valid request or response */
|
|
if ((cl = get_header(&conn->request_info, "Content-Length")) != NULL) {
|
|
if ((cl = get_header(&conn->request_info, "Content-Length")) != NULL) {
|
|
/* Request/response has content length set */
|
|
/* Request/response has content length set */
|
|
- conn->content_len = strtoll(cl, NULL, 10);
|
|
|
|
|
|
+ char *endptr;
|
|
|
|
+ conn->content_len = strtoll(cl, &endptr, 10);
|
|
|
|
+ if (endptr == cl) {
|
|
|
|
+ snprintf(ebuf, ebuf_len, "%s", "Bad Request");
|
|
|
|
+ *err = 400;
|
|
|
|
+ return 0;
|
|
|
|
+ }
|
|
/* Publish the content length back to the request info. */
|
|
/* Publish the content length back to the request info. */
|
|
conn->request_info.content_length = conn->content_len;
|
|
conn->request_info.content_length = conn->content_len;
|
|
} else if (!mg_strcasecmp(conn->request_info.request_method, "POST") ||
|
|
} else if (!mg_strcasecmp(conn->request_info.request_method, "POST") ||
|
|
@@ -7089,7 +7104,7 @@ static int getreq(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int t
|
|
}
|
|
}
|
|
conn->birth_time = time(NULL);
|
|
conn->birth_time = time(NULL);
|
|
}
|
|
}
|
|
- return ebuf[0] == '\0';
|
|
|
|
|
|
+ return 1;
|
|
}
|
|
}
|
|
|
|
|
|
int mg_get_response(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int timeout)
|
|
int mg_get_response(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int timeout)
|
|
@@ -7097,7 +7112,8 @@ int mg_get_response(struct mg_connection *conn, char *ebuf, size_t ebuf_len, int
|
|
/* Implementation of API function for HTTP clients */
|
|
/* Implementation of API function for HTTP clients */
|
|
/* TODO: Define proper return values - maybe return length?
|
|
/* TODO: Define proper return values - maybe return length?
|
|
For the first test use <0 for error and >0 for OK */
|
|
For the first test use <0 for error and >0 for OK */
|
|
- return (getreq(conn, ebuf, ebuf_len, timeout) == 0) ? -1 : +1;
|
|
|
|
|
|
+ int err;
|
|
|
|
+ return (getreq(conn, ebuf, ebuf_len, timeout, &err) == 0) ? -1 : +1;
|
|
}
|
|
}
|
|
|
|
|
|
struct mg_connection *mg_download(const char *host, int port, int use_ssl,
|
|
struct mg_connection *mg_download(const char *host, int port, int use_ssl,
|
|
@@ -7119,7 +7135,8 @@ struct mg_connection *mg_download(const char *host, int port, int use_ssl,
|
|
if (i <= 0) {
|
|
if (i <= 0) {
|
|
snprintf(ebuf, ebuf_len, "%s", "Error sending request");
|
|
snprintf(ebuf, ebuf_len, "%s", "Error sending request");
|
|
} else {
|
|
} else {
|
|
- getreq(conn, ebuf, ebuf_len, TIMEOUT_INFINITE);
|
|
|
|
|
|
+ int err;
|
|
|
|
+ getreq(conn, ebuf, ebuf_len, TIMEOUT_INFINITE, &err);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -7245,11 +7262,14 @@ static void process_new_connection(struct mg_connection *conn)
|
|
to crule42. */
|
|
to crule42. */
|
|
conn->data_len = 0;
|
|
conn->data_len = 0;
|
|
do {
|
|
do {
|
|
- if (!getreq(conn, ebuf, sizeof(ebuf), TIMEOUT_INFINITE)) {
|
|
|
|
|
|
+ int err;
|
|
|
|
+ if (!getreq(conn, ebuf, sizeof(ebuf), TIMEOUT_INFINITE, &err)) {
|
|
/* The request sent by the client could not be understood by the server,
|
|
/* The request sent by the client could not be understood by the server,
|
|
or it was incomplete or a timeout. Send an error message and close
|
|
or it was incomplete or a timeout. Send an error message and close
|
|
the connection. */
|
|
the connection. */
|
|
- send_http_error(conn, 400, "%s", ebuf);
|
|
|
|
|
|
+ if (err > 0) {
|
|
|
|
+ send_http_error(conn, 400, "%s", ebuf);
|
|
|
|
+ }
|
|
conn->must_close = 1;
|
|
conn->must_close = 1;
|
|
} else if (!is_valid_uri(conn->request_info.uri)) {
|
|
} else if (!is_valid_uri(conn->request_info.uri)) {
|
|
snprintf(ebuf, sizeof(ebuf), "Invalid URI: [%s]", ri->uri);
|
|
snprintf(ebuf, sizeof(ebuf), "Invalid URI: [%s]", ri->uri);
|