diff options
author | erdgeist <> | 2007-01-31 09:50:46 +0000 |
---|---|---|
committer | erdgeist <> | 2007-01-31 09:50:46 +0000 |
commit | 6e1ee92de6ff1f9b29453c8ae1d2d831db6a3e1a (patch) | |
tree | 436324cb02e2c08b1bb4c176462823a81d239dd6 | |
parent | 11abb03e85d6580699c4760e0267a972f78e6c03 (diff) |
Use signed size_t wherever appropriate
-rw-r--r-- | opentracker.c | 53 | ||||
-rw-r--r-- | scan_urlencoded_query.c | 9 | ||||
-rw-r--r-- | scan_urlencoded_query.h | 6 |
3 files changed, 33 insertions, 35 deletions
diff --git a/opentracker.c b/opentracker.c index 164cce8..21c32a2 100644 --- a/opentracker.c +++ b/opentracker.c | |||
@@ -130,7 +130,7 @@ static void sendmallocdata( const int64 s, char *buffer, size_t size ) { | |||
130 | 130 | ||
131 | static void senddata( const int64 s, char *buffer, size_t size ) { | 131 | static void senddata( const int64 s, char *buffer, size_t size ) { |
132 | struct http_data *h = io_getcookie( s ); | 132 | struct http_data *h = io_getcookie( s ); |
133 | size_t written_size; | 133 | ssize_t written_size; |
134 | 134 | ||
135 | /* whoever sends data is not interested in its input-array */ | 135 | /* whoever sends data is not interested in its input-array */ |
136 | if( h ) | 136 | if( h ) |
@@ -167,6 +167,7 @@ static void httpresponse( const int64 s, char *data ) { | |||
167 | int numwant, tmp, scanon, mode; | 167 | int numwant, tmp, scanon, mode; |
168 | unsigned short port = htons(6881); | 168 | unsigned short port = htons(6881); |
169 | time_t t; | 169 | time_t t; |
170 | ssize_t len; | ||
170 | size_t reply_size = 0, reply_off; | 171 | size_t reply_size = 0, reply_off; |
171 | 172 | ||
172 | #ifdef _DEBUG_HTTPERROR | 173 | #ifdef _DEBUG_HTTPERROR |
@@ -208,7 +209,7 @@ static void httpresponse( const int64 s, char *data ) { | |||
208 | } | 209 | } |
209 | 210 | ||
210 | if( !hash ) HTTPERROR_400_PARAM; | 211 | if( !hash ) HTTPERROR_400_PARAM; |
211 | if( ( reply_size = return_sync_for_torrent( hash, &reply ) ) <= 0 ) HTTPERROR_500; | 212 | if( !( reply_size = return_sync_for_torrent( hash, &reply ) ) ) HTTPERROR_500; |
212 | 213 | ||
213 | return sendmallocdata( s, reply, reply_size ); | 214 | return sendmallocdata( s, reply, reply_size ); |
214 | case 5: /* stats ? */ | 215 | case 5: /* stats ? */ |
@@ -226,8 +227,7 @@ static void httpresponse( const int64 s, char *data ) { | |||
226 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); | 227 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); |
227 | continue; | 228 | continue; |
228 | } | 229 | } |
229 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | 230 | if( scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) != 4 ) HTTPERROR_400_PARAM; |
230 | if( len <= 0 ) HTTPERROR_400_PARAM; | ||
231 | if( !byte_diff(data,4,"mrtg")) | 231 | if( !byte_diff(data,4,"mrtg")) |
232 | mode = STATS_MRTG; | 232 | mode = STATS_MRTG; |
233 | else if( !byte_diff(data,4,"top5")) | 233 | else if( !byte_diff(data,4,"top5")) |
@@ -238,7 +238,7 @@ static void httpresponse( const int64 s, char *data ) { | |||
238 | } | 238 | } |
239 | 239 | ||
240 | /* Enough for http header + whole scrape string */ | 240 | /* Enough for http header + whole scrape string */ |
241 | if( ( reply_size = return_stats_for_tracker( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, mode ) ) <= 0 ) HTTPERROR_500; | 241 | if( !( reply_size = return_stats_for_tracker( SUCCESS_HTTP_HEADER_LENGTH + static_outbuf, mode ) ) ) HTTPERROR_500; |
242 | 242 | ||
243 | break; | 243 | break; |
244 | case 6: /* scrape ? */ | 244 | case 6: /* scrape ? */ |
@@ -266,19 +266,19 @@ SCRAPE_WORKAROUND: | |||
266 | 266 | ||
267 | /* Scanned whole query string, no hash means full scrape... you might want to limit that */ | 267 | /* Scanned whole query string, no hash means full scrape... you might want to limit that */ |
268 | if( !hash ) { | 268 | if( !hash ) { |
269 | if( ( reply_size = return_fullscrape_for_tracker( &reply ) ) <= 0 ) HTTPERROR_500; | 269 | if( !( reply_size = return_fullscrape_for_tracker( &reply ) ) ) HTTPERROR_500; |
270 | return sendmallocdata( s, reply, reply_size ); | 270 | return sendmallocdata( s, reply, reply_size ); |
271 | } | 271 | } |
272 | 272 | ||
273 | /* Enough for http header + whole scrape string */ | 273 | /* Enough for http header + whole scrape string */ |
274 | if( ( reply_size = return_scrape_for_torrent( hash, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) <= 0 ) HTTPERROR_500; | 274 | if( !( reply_size = return_scrape_for_torrent( hash, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) ) HTTPERROR_500; |
275 | break; | 275 | break; |
276 | case 8: | 276 | case 8: |
277 | if( byte_diff(data,8,"announce")) HTTPERROR_404; | 277 | if( byte_diff( data, 8, "announce" ) ) HTTPERROR_404; |
278 | 278 | ||
279 | ANNOUNCE_WORKAROUND: | 279 | ANNOUNCE_WORKAROUND: |
280 | 280 | ||
281 | OT_SETIP( &peer, ((struct http_data*)io_getcookie( s ))->ip); | 281 | OT_SETIP( &peer, ((struct http_data*)io_getcookie( s ) )->ip ); |
282 | OT_SETPORT( &peer, &port ); | 282 | OT_SETPORT( &peer, &port ); |
283 | OT_FLAG( &peer ) = 0; | 283 | OT_FLAG( &peer ) = 0; |
284 | numwant = 50; | 284 | numwant = 50; |
@@ -292,8 +292,8 @@ ANNOUNCE_WORKAROUND: | |||
292 | #ifdef WANT_IP_FROM_QUERY_STRING | 292 | #ifdef WANT_IP_FROM_QUERY_STRING |
293 | case 2: | 293 | case 2: |
294 | if(!byte_diff(data,2,"ip")) { | 294 | if(!byte_diff(data,2,"ip")) { |
295 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | ||
296 | unsigned char ip[4]; | 295 | unsigned char ip[4]; |
296 | len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | ||
297 | if( ( len <= 0 ) || scan_fixed_ip( data, len, ip ) ) HTTPERROR_400_PARAM; | 297 | if( ( len <= 0 ) || scan_fixed_ip( data, len, ip ) ) HTTPERROR_400_PARAM; |
298 | OT_SETIP( &peer, ip ); | 298 | OT_SETIP( &peer, ip ); |
299 | } else | 299 | } else |
@@ -301,40 +301,39 @@ ANNOUNCE_WORKAROUND: | |||
301 | break; | 301 | break; |
302 | #endif | 302 | #endif |
303 | case 4: | 303 | case 4: |
304 | if(!byte_diff(data,4,"port")) { | 304 | if( !byte_diff( data, 4, "port" ) ) { |
305 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | 305 | len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); |
306 | if( ( len <= 0 ) || scan_fixed_int( data, len, &tmp ) || ( tmp > 0xffff ) ) HTTPERROR_400_PARAM; | 306 | if( ( len <= 0 ) || scan_fixed_int( data, len, &tmp ) || ( tmp > 0xffff ) ) HTTPERROR_400_PARAM; |
307 | port = htons( tmp ); OT_SETPORT( &peer, &port ); | 307 | port = htons( tmp ); OT_SETPORT( &peer, &port ); |
308 | } else if(!byte_diff(data,4,"left")) { | 308 | } else if( !byte_diff( data, 4, "left" ) ) { |
309 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | 309 | if( ( len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) ) <= 0 ) HTTPERROR_400_PARAM; |
310 | if( len <= 0 ) HTTPERROR_400_PARAM; | ||
311 | if( scan_fixed_int( data, len, &tmp ) ) tmp = 0; | 310 | if( scan_fixed_int( data, len, &tmp ) ) tmp = 0; |
312 | if( !tmp ) OT_FLAG( &peer ) |= PEER_FLAG_SEEDING; | 311 | if( !tmp ) OT_FLAG( &peer ) |= PEER_FLAG_SEEDING; |
313 | } else | 312 | } else |
314 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); | 313 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); |
315 | break; | 314 | break; |
316 | case 5: | 315 | case 5: |
317 | if(byte_diff(data,5,"event")) | 316 | if( byte_diff( data, 5, "event" ) ) |
318 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); | 317 | scan_urlencoded_query( &c, NULL, SCAN_SEARCHPATH_VALUE ); |
319 | else switch( scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) ) { | 318 | else switch( scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ) ) { |
320 | case -1: | 319 | case -1: |
321 | HTTPERROR_400_PARAM; | 320 | HTTPERROR_400_PARAM; |
322 | case 7: | 321 | case 7: |
323 | if(!byte_diff(data,7,"stopped")) OT_FLAG( &peer ) |= PEER_FLAG_STOPPED; | 322 | if( !byte_diff( data, 7, "stopped" ) ) OT_FLAG( &peer ) |= PEER_FLAG_STOPPED; |
324 | break; | 323 | break; |
325 | case 9: | 324 | case 9: |
326 | if(!byte_diff(data,9,"completed")) OT_FLAG( &peer ) |= PEER_FLAG_COMPLETED; | 325 | if( !byte_diff( data, 9, "completed" ) ) OT_FLAG( &peer ) |= PEER_FLAG_COMPLETED; |
327 | default: /* Fall through intended */ | 326 | default: /* Fall through intended */ |
328 | break; | 327 | break; |
329 | } | 328 | } |
330 | break; | 329 | break; |
331 | case 7: | 330 | case 7: |
332 | if(!byte_diff(data,7,"numwant")) { | 331 | if(!byte_diff(data,7,"numwant")) { |
333 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | 332 | len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); |
334 | if( ( len <= 0 ) || scan_fixed_int( data, len, &numwant ) ) HTTPERROR_400_PARAM; | 333 | if( ( len <= 0 ) || scan_fixed_int( data, len, &numwant ) ) HTTPERROR_400_PARAM; |
335 | if( numwant > 200 ) numwant = 200; | 334 | if( numwant > 200 ) numwant = 200; |
336 | } else if(!byte_diff(data,7,"compact")) { | 335 | } else if(!byte_diff(data,7,"compact")) { |
337 | size_t len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); | 336 | len = scan_urlencoded_query( &c, data = c, SCAN_SEARCHPATH_VALUE ); |
338 | if( ( len <= 0 ) || scan_fixed_int( data, len, &tmp ) ) HTTPERROR_400_PARAM; | 337 | if( ( len <= 0 ) || scan_fixed_int( data, len, &tmp ) ) HTTPERROR_400_PARAM; |
339 | if( !tmp ) HTTPERROR_400_COMPACT; | 338 | if( !tmp ) HTTPERROR_400_COMPACT; |
340 | } else | 339 | } else |
@@ -352,7 +351,7 @@ ANNOUNCE_WORKAROUND: | |||
352 | } | 351 | } |
353 | } | 352 | } |
354 | 353 | ||
355 | /* Scanned whole query string */ | 354 | /* Scanned whole query string XXX better send Error */ |
356 | if( !hash ) HTTPERROR_400_PARAM; | 355 | if( !hash ) HTTPERROR_400_PARAM; |
357 | 356 | ||
358 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) { | 357 | if( OT_FLAG( &peer ) & PEER_FLAG_STOPPED ) { |
@@ -360,15 +359,15 @@ ANNOUNCE_WORKAROUND: | |||
360 | reply_size = sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, "d8:completei0e10:incompletei0e8:intervali%ie5:peers0:e", OT_CLIENT_REQUEST_INTERVAL_RANDOM ); | 359 | reply_size = sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, "d8:completei0e10:incompletei0e8:intervali%ie5:peers0:e", OT_CLIENT_REQUEST_INTERVAL_RANDOM ); |
361 | } else { | 360 | } else { |
362 | torrent = add_peer_to_torrent( hash, &peer ); | 361 | torrent = add_peer_to_torrent( hash, &peer ); |
363 | if( !torrent || ( reply_size = return_peers_for_torrent( torrent, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) <= 0 ) HTTPERROR_500; | 362 | if( !torrent || !( reply_size = return_peers_for_torrent( torrent, numwant, SUCCESS_HTTP_HEADER_LENGTH + static_outbuf ) ) ) HTTPERROR_500; |
364 | } | 363 | } |
365 | ot_overall_successfulannounces++; | 364 | ot_overall_successfulannounces++; |
366 | break; | 365 | break; |
367 | case 10: | 366 | case 10: |
368 | if( byte_diff(data,10,"scrape.php")) HTTPERROR_404; | 367 | if( byte_diff( data, 10, "scrape.php" ) ) HTTPERROR_404; |
369 | goto SCRAPE_WORKAROUND; | 368 | goto SCRAPE_WORKAROUND; |
370 | case 11: | 369 | case 11: |
371 | if( byte_diff(data,11,"mrtg_scrape")) HTTPERROR_404; | 370 | if( byte_diff( data, 11, "mrtg_scrape" ) ) HTTPERROR_404; |
372 | 371 | ||
373 | t = time( NULL ) - ot_start_time; | 372 | t = time( NULL ) - ot_start_time; |
374 | reply_size = sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, | 373 | reply_size = sprintf( static_outbuf + SUCCESS_HTTP_HEADER_LENGTH, |
@@ -376,13 +375,13 @@ ANNOUNCE_WORKAROUND: | |||
376 | ot_overall_connections, ot_overall_successfulannounces, (int)t, (int)(t / 3600), (int)ot_overall_connections / ( (int)t ? (int)t : 1 ) ); | 375 | ot_overall_connections, ot_overall_successfulannounces, (int)t, (int)(t / 3600), (int)ot_overall_connections / ( (int)t ? (int)t : 1 ) ); |
377 | break; | 376 | break; |
378 | case 12: | 377 | case 12: |
379 | if( byte_diff(data,12,"announce.php")) HTTPERROR_404; | 378 | if( byte_diff( data, 12, "announce.php" ) ) HTTPERROR_404; |
380 | goto ANNOUNCE_WORKAROUND; | 379 | goto ANNOUNCE_WORKAROUND; |
381 | default: /* neither *scrape nor announce */ | 380 | default: /* neither *scrape nor announce */ |
382 | HTTPERROR_404; | 381 | HTTPERROR_404; |
383 | } | 382 | } |
384 | 383 | ||
385 | if( reply_size <= 0 ) HTTPERROR_500; | 384 | if( !reply_size ) HTTPERROR_500; |
386 | 385 | ||
387 | /* This one is rather ugly, so I take you step by step through it. | 386 | /* This one is rather ugly, so I take you step by step through it. |
388 | 387 | ||
@@ -449,7 +448,7 @@ static void help( char *name ) { | |||
449 | 448 | ||
450 | static void handle_read( const int64 clientsocket ) { | 449 | static void handle_read( const int64 clientsocket ) { |
451 | struct http_data* h = io_getcookie( clientsocket ); | 450 | struct http_data* h = io_getcookie( clientsocket ); |
452 | int64 l; | 451 | ssize_t l; |
453 | 452 | ||
454 | if( ( l = io_tryread( clientsocket, static_inbuf, sizeof static_inbuf ) ) <= 0 ) { | 453 | if( ( l = io_tryread( clientsocket, static_inbuf, sizeof static_inbuf ) ) <= 0 ) { |
455 | if( h ) { | 454 | if( h ) { |
diff --git a/scan_urlencoded_query.c b/scan_urlencoded_query.c index dc43b61..d89e610 100644 --- a/scan_urlencoded_query.c +++ b/scan_urlencoded_query.c | |||
@@ -21,7 +21,7 @@ static int is_unreserved( unsigned char c ) { | |||
21 | if( ( c <= 32 ) || ( c >= 127 ) ) return 0; return 1&(reserved_matrix[(c-32)>>3]>>(c&7)); | 21 | if( ( c <= 32 ) || ( c >= 127 ) ) return 0; return 1&(reserved_matrix[(c-32)>>3]>>(c&7)); |
22 | } | 22 | } |
23 | 23 | ||
24 | size_t scan_urlencoded_query(char **string, char *deststring, int flags) { | 24 | ssize_t scan_urlencoded_query(char **string, char *deststring, int flags) { |
25 | register const unsigned char* s=*(const unsigned char**) string; | 25 | register const unsigned char* s=*(const unsigned char**) string; |
26 | unsigned char *d = (unsigned char*)deststring; | 26 | unsigned char *d = (unsigned char*)deststring; |
27 | register unsigned char b, c; | 27 | register unsigned char b, c; |
@@ -62,18 +62,17 @@ found_terminator: | |||
62 | return d - (unsigned char*)deststring; | 62 | return d - (unsigned char*)deststring; |
63 | } | 63 | } |
64 | 64 | ||
65 | size_t scan_fixed_int( char *data, size_t len, int *tmp ) { | 65 | ssize_t scan_fixed_int( char *data, size_t len, int *tmp ) { |
66 | *tmp = 0; | 66 | *tmp = 0; |
67 | while( (len > 0) && (*data >= '0') && (*data <= '9') ) { --len; *tmp = 10**tmp + *data++-'0'; } | 67 | while( (len > 0) && (*data >= '0') && (*data <= '9') ) { --len; *tmp = 10**tmp + *data++-'0'; } |
68 | return len; | 68 | return len; |
69 | } | 69 | } |
70 | 70 | ||
71 | size_t scan_fixed_ip( char *data, size_t len, unsigned char ip[4] ) { | 71 | ssize_t scan_fixed_ip( char *data, size_t len, unsigned char ip[4] ) { |
72 | int u, i; | 72 | int u, i; |
73 | 73 | ||
74 | for( i=0; i<4; ++i ) { | 74 | for( i=0; i<4; ++i ) { |
75 | register unsigned int j; | 75 | ssize_t j = scan_fixed_int( data, len, &u ); |
76 | j = scan_fixed_int( data, len, &u ); | ||
77 | if( j == len ) return len; | 76 | if( j == len ) return len; |
78 | ip[i] = u; | 77 | ip[i] = u; |
79 | data += len - j; | 78 | data += len - j; |
diff --git a/scan_urlencoded_query.h b/scan_urlencoded_query.h index e20cbef..56d93c8 100644 --- a/scan_urlencoded_query.h +++ b/scan_urlencoded_query.h | |||
@@ -14,20 +14,20 @@ | |||
14 | returns number of valid converted characters in deststring | 14 | returns number of valid converted characters in deststring |
15 | or -1 for parse error | 15 | or -1 for parse error |
16 | */ | 16 | */ |
17 | size_t scan_urlencoded_query(char **string, char *deststring, int flags); | 17 | ssize_t scan_urlencoded_query(char **string, char *deststring, int flags); |
18 | 18 | ||
19 | /* data pointer to len chars of string | 19 | /* data pointer to len chars of string |
20 | len length of chars in data to parse | 20 | len length of chars in data to parse |
21 | number number to receive result | 21 | number number to receive result |
22 | returns number of bytes not parsed, mostly !=0 means fail | 22 | returns number of bytes not parsed, mostly !=0 means fail |
23 | */ | 23 | */ |
24 | size_t scan_fixed_int( char *data, size_t len, int *number ); | 24 | ssize_t scan_fixed_int( char *data, size_t len, int *number ); |
25 | 25 | ||
26 | /* data pointer to len chars of string | 26 | /* data pointer to len chars of string |
27 | len length of chars in data to parse | 27 | len length of chars in data to parse |
28 | ip buffer to receive result | 28 | ip buffer to receive result |
29 | returns number of bytes not parsed, mostly !=0 means fail | 29 | returns number of bytes not parsed, mostly !=0 means fail |
30 | */ | 30 | */ |
31 | size_t scan_fixed_ip( char *data, size_t len, unsigned char ip[4] ); | 31 | ssize_t scan_fixed_ip( char *data, size_t len, unsigned char ip[4] ); |
32 | 32 | ||
33 | #endif | 33 | #endif |