/* Responsible for reading the request * * if returns >= 0 : the connection will be released * * if returns < 0 : the connection will be released as BAD / broken */ static int tcp_read_req(struct tcp_connection* con, int* bytes_read) { int bytes; int total_bytes; struct tcp_req* req; bytes=-1; total_bytes=0; if (con->con_req) { req=con->con_req; LM_DBG("Using the per connection buff \n"); } else { LM_DBG("Using the global ( per process ) buff \n"); init_tcp_req(&tcp_current_req, 0); req=&tcp_current_req; } again: if(req->error==TCP_REQ_OK){ /* if we still have some unparsed part, parse it first, * don't do the read*/ if (req->parsed<req->pos){ bytes=0; }else{ bytes=tcp_read(con,req); if (bytes<0) { LM_ERR("failed to read \n"); goto error; } } tcp_parse_headers(req, tcp_crlf_pingpong, tcp_crlf_drop); #ifdef EXTRA_DEBUG /* if timeout state=0; goto end__req; */ LM_DBG("read= %d bytes, parsed=%d, state=%d, error=%d\n", bytes, (int)(req->parsed-req->start), req->state, req->error ); LM_DBG("last char=0x%02X, parsed msg=\n%.*s\n", *(req->parsed-1), (int)(req->parsed-req->start), req->start); #endif total_bytes+=bytes; /* eof check: * is EOF if eof on fd and req. not complete yet, * if req. is complete we might have a second unparsed * request after it, so postpone release_with_eof */ if ((con->state==S_CONN_EOF) && (req->complete==0)) { LM_DBG("EOF received\n"); goto done; } } if (req->error!=TCP_REQ_OK){ LM_ERR("bad request, state=%d, error=%d " "buf:\n%.*s\nparsed:\n%.*s\n", req->state, req->error, (int)(req->pos-req->buf), req->buf, (int)(req->parsed-req->start), req->start); LM_DBG("- received from: port %d\n", con->rcv.src_port); print_ip("- received from: ip ",&con->rcv.src_ip, "\n"); goto error; } switch (tcp_handle_req(req, con, tcp_max_msg_chunks) ) { case 1: goto again; case -1: goto error; } LM_DBG("tcp_read_req end\n"); done: if (bytes_read) *bytes_read=total_bytes; /* connection will be released */ return 0; error: /* connection will be released as ERROR */ return -1; }
static int tls_read_req(struct tcp_connection* con, int* bytes_read) { int ret; int bytes; int total_bytes; struct tcp_req* req; struct tls_data* data; bytes=-1; total_bytes=0; if (con->con_req) { req=con->con_req; LM_DBG("Using the per connection buff \n"); } else { LM_DBG("Using the global ( per process ) buff \n"); init_tcp_req(&tls_current_req, 0); req=&tls_current_req; } /* do this trick in order to trace whether if it's an error or not */ ret=tls_fix_read_conn(con); /* if there is pending tracing data on an accepted connection, flush it * As this is a read op, we look only for accepted conns, not to conflict * with connected conns (flushed on write op) */ if ( con->flags&F_CONN_ACCEPTED && con->proto_flags & F_TLS_TRACE_READY ) { data = con->proto_data; /* send the message if set from tls_mgm */ if ( data->message ) { send_trace_message( data->message, t_dst); data->message = NULL; } /* don't allow future traces for this connection */ data->tprot = 0; data->dest = 0; con->proto_flags &= ~( F_TLS_TRACE_READY ); } if ( ret != 0 ) { LM_ERR("failed to do pre-tls reading\n"); goto error; } if(con->state!=S_CONN_OK) goto done; /* not enough data */ again: if(req->error==TCP_REQ_OK){ /* if we still have some unparsed part, parse it first, * don't do the read*/ if (req->parsed<req->pos){ bytes=0; }else{ bytes=tls_read(con,req); if (bytes<0) { LM_ERR("failed to read \n"); goto error; } } tcp_parse_headers(req, tls_crlf_pingpong, tls_crlf_drop); #ifdef EXTRA_DEBUG /* if timeout state=0; goto end__req; */ LM_DBG("read= %d bytes, parsed=%d, state=%d, error=%d\n", bytes, (int)(req->parsed-req->start), req->state, req->error ); LM_DBG("last char=0x%02X, parsed msg=\n%.*s\n", *(req->parsed-1), (int)(req->parsed-req->start), req->start); #endif total_bytes+=bytes; /* eof check: * is EOF if eof on fd and req. not complete yet, * if req. is complete we might have a second unparsed * request after it, so postpone release_with_eof */ if ((con->state==S_CONN_EOF) && (req->complete==0)) { LM_DBG("EOF received\n"); goto done; } } if (req->error!=TCP_REQ_OK){ LM_ERR("bad request, state=%d, error=%d " "buf:\n%.*s\nparsed:\n%.*s\n", req->state, req->error, (int)(req->pos-req->buf), req->buf, (int)(req->parsed-req->start), req->start); LM_DBG("- received from: port %d\n", con->rcv.src_port); print_ip("- received from: ip ",&con->rcv.src_ip, "\n"); goto error; } switch (tcp_handle_req(req, con, tls_max_msg_chunks) ) { case 1: goto again; case -1: goto error; } LM_DBG("tls_read_req end\n"); done: if (bytes_read) *bytes_read=total_bytes; /* connection will be released */ return 0; error: /* connection will be released as ERROR */ return -1; }