35#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
41#ifdef MHD_LINUX_SOLARIS_SENDFILE
42#include <sys/sendfile.h>
44#if defined(HAVE_FREEBSD_SENDFILE) || defined(HAVE_DARWIN_SENDFILE)
46#include <sys/socket.h>
52#ifdef HAVE_SYS_PARAM_H
65#define MHD_ALLOW_BARE_LF_AS_CRLF_(discp_lvl) (0 >= discp_lvl)
75#define MHD_CHUNK_HEADER_REASONABLE_LEN 24
80#define HTTP_100_CONTINUE "HTTP/1.1 100 Continue\r\n\r\n"
87#define ERR_MSG_REQUEST_TOO_BIG \
89 "<head><title>Request too big</title></head>" \
90 "<body>Request HTTP header is too big for the memory constraints " \
91 "of this webserver.</body>" \
94#define ERR_MSG_REQUEST_TOO_BIG ""
101#define ERR_MSG_REQUEST_HEADER_TOO_BIG \
103 "<head><title>Request too big</title></head>" \
104 "<body><p>The total size of the request headers, which includes the " \
105 "request target and the request field lines, exceeds the memory " \
106 "constraints of this web server.</p>" \
107 "<p>The request could be re-tried with shorter field lines, a shorter " \
108 "request target or a shorter request method token.</p></body>" \
111#define ERR_MSG_REQUEST_HEADER_TOO_BIG ""
118#define ERR_MSG_REQUEST_HEADER_WITH_COOKIES_TOO_BIG \
120 "<head><title>Request too big</title></head>" \
121 "<body><p>The total size of the request headers, which includes the " \
122 "request target and the request field lines, exceeds the memory " \
123 "constraints of this web server.</p> " \
124 "<p>The request could be re-tried with smaller " \
125 "<b>"Cookie:"</b> field value, shorter other field lines, " \
126 "a shorter request target or a shorter request method token.</p></body> " \
129#define ERR_MSG_REQUEST_HEADER_WITH_COOKIES_TOO_BIG ""
137#define ERR_MSG_REQUEST_CHUNK_LINE_EXT_TOO_BIG \
139 "<head><title>Request too big</title></head>" \
140 "<body><p>The total size of the request target, the request field lines " \
141 "and the chunk size line exceeds the memory constraints of this web " \
143 "<p>The request could be re-tried without chunk extensions, with a smaller " \
144 "chunk size, shorter field lines, a shorter request target or a shorter " \
145 "request method token.</p></body>" \
148#define ERR_MSG_REQUEST_CHUNK_LINE_EXT_TOO_BIG ""
156#define ERR_MSG_REQUEST_CHUNK_LINE_TOO_BIG \
158 "<head><title>Request too big</title></head>" \
159 "<body><p>The total size of the request target, the request field lines " \
160 "and the chunk size line exceeds the memory constraints of this web " \
162 "<p>The request could be re-tried with a smaller " \
163 "chunk size, shorter field lines, a shorter request target or a shorter " \
164 "request method token.</p></body>" \
167#define ERR_MSG_REQUEST_CHUNK_LINE_TOO_BIG ""
174#define ERR_MSG_REQUEST_FOOTER_TOO_BIG \
176 "<head><title>Request too big</title></head>" \
177 "<body><p>The total size of the request headers, which includes the " \
178 "request target, the request field lines and the chunked trailer " \
179 "section exceeds the memory constraints of this web server.</p>" \
180 "<p>The request could be re-tried with a shorter chunked trailer " \
181 "section, shorter field lines, a shorter request target or " \
182 "a shorter request method token.</p></body>" \
185#define ERR_MSG_REQUEST_FOOTER_TOO_BIG ""
192#define RQ_LINE_TOO_MANY_WSP \
194 "<head><title>Request broken</title></head>" \
195 "<body>The request line has more then two whitespaces.</body>" \
198#define RQ_LINE_TOO_MANY_WSP ""
206#define BARE_CR_IN_HEADER \
208 "<head><title>Request broken</title></head>" \
209 "<body>Request HTTP header has bare CR character without " \
210 "following LF character.</body>" \
213#define BARE_CR_IN_HEADER ""
221#define BARE_CR_IN_FOOTER \
223 "<head><title>Request broken</title></head>" \
224 "<body>Request HTTP footer has bare CR character without " \
225 "following LF character.</body>" \
228#define BARE_CR_IN_FOOTER ""
236#define BARE_LF_IN_HEADER \
238 "<head><title>Request broken</title></head>" \
239 "<body>Request HTTP header has bare LF character without " \
240 "preceding CR character.</body>" \
243#define BARE_LF_IN_HEADER ""
251#define BARE_LF_IN_FOOTER \
253 "<head><title>Request broken</title></head>" \
254 "<body>Request HTTP footer has bare LF character without " \
255 "preceding CR character.</body>" \
258#define BARE_LF_IN_FOOTER ""
265#define RQ_TARGET_INVALID_CHAR \
267 "<head><title>Request broken</title></head>" \
268 "<body>HTTP request has invalid characters in " \
269 "the request-target.</body>" \
272#define RQ_TARGET_INVALID_CHAR ""
279#define ERR_RSP_OBS_FOLD \
281 "<head><title>Request broken</title></head>" \
282 "<body>Obsolete line folding is used in HTTP request header.</body>" \
285#define ERR_RSP_OBS_FOLD ""
292#define ERR_RSP_OBS_FOLD_FOOTER \
294 "<head><title>Request broken</title></head>" \
295 "<body>Obsolete line folding is used in HTTP request footer.</body>" \
298#define ERR_RSP_OBS_FOLD_FOOTER ""
306#define ERR_RSP_WSP_BEFORE_HEADER \
308 "<head><title>Request broken</title></head>" \
309 "<body>HTTP request has whitespace between the request line and " \
310 "the first header.</body>" \
313#define ERR_RSP_WSP_BEFORE_HEADER ""
321#define ERR_RSP_WSP_BEFORE_FOOTER \
323 "<head><title>Request broken</title></head>" \
324 "<body>First HTTP footer line has whitespace at the first " \
328#define ERR_RSP_WSP_BEFORE_FOOTER ""
336#define ERR_RSP_WSP_IN_HEADER_NAME \
338 "<head><title>Request broken</title></head>" \
339 "<body>HTTP request has whitespace before the first colon " \
340 "in header line.</body>" \
343#define ERR_RSP_WSP_IN_HEADER_NAME ""
351#define ERR_RSP_WSP_IN_FOOTER_NAME \
353 "<head><title>Request broken</title></head>" \
354 "<body>HTTP request has whitespace before the first colon " \
355 "in footer line.</body>" \
358#define ERR_RSP_WSP_IN_FOOTER_NAME ""
367#define ERR_RSP_INVALID_CHAR_IN_FIELD_NAME \
369 "<head><title>Request broken</title></head>" \
370 "<body>HTTP request has invalid character in field name.</body>" \
373#define ERR_RSP_INVALID_CHAR_IN_FIELD_NAME ""
380#define ERR_RSP_INVALID_CHR_IN_HEADER \
382 "<head><title>Request broken</title></head>" \
383 "<body>HTTP request has invalid character in header.</body>" \
386#define ERR_RSP_INVALID_CHR_IN_HEADER ""
393#define ERR_RSP_INVALID_CHR_IN_FOOTER \
395 "<head><title>Request broken</title></head>" \
396 "<body>HTTP request has invalid character in footer.</body>" \
399#define ERR_RSP_INVALID_CHR_IN_FOOTER ""
406#define ERR_RSP_HEADER_WITHOUT_COLON \
408 "<head><title>Request broken</title></head>" \
409 "<body>HTTP request header line has no colon character.</body>" \
412#define ERR_RSP_HEADER_WITHOUT_COLON ""
419#define ERR_RSP_FOOTER_WITHOUT_COLON \
421 "<head><title>Request broken</title></head>" \
422 "<body>HTTP request footer line has no colon character.</body>" \
425#define ERR_RSP_FOOTER_WITHOUT_COLON ""
432#define ERR_RSP_EMPTY_HEADER_NAME \
434 "<head><title>Request broken</title></head>" \
435 "<body>HTTP request header has empty header name.</body>" \
438#define ERR_RSP_EMPTY_HEADER_NAME ""
445#define ERR_RSP_EMPTY_FOOTER_NAME \
447 "<head><title>Request broken</title></head>" \
448 "<body>HTTP request footer has empty footer name.</body>" \
451#define ERR_RSP_EMPTY_FOOTER_NAME ""
462#define REQUEST_LACKS_HOST \
464 "<head><title>"Host:" header required</title></head>" \
465 "<body>HTTP/1.1 request without <b>"Host:"</b>.</body>" \
469#define REQUEST_LACKS_HOST ""
476#define REQUEST_UNSUPPORTED_TR_ENCODING \
478 "<head><title>Unsupported Transfer-Encoding</title></head>" \
479 "<body>The Transfer-Encoding used in request is not supported.</body>" \
482#define REQUEST_UNSUPPORTED_TR_ENCODING ""
490#define REQUEST_LENGTH_WITH_TR_ENCODING \
492 "<head><title>Malformed request</title></head>" \
493 "<body>Wrong combination of the request headers: both Transfer-Encoding " \
494 "and Content-Length headers are used at the same time.</body>" \
497#define REQUEST_LENGTH_WITH_TR_ENCODING ""
508#define REQUEST_MALFORMED \
509 "<html><head><title>Request malformed</title></head>" \
510 "<body>HTTP request is syntactically incorrect.</body></html>"
512#define REQUEST_MALFORMED ""
518#define REQUEST_HAS_NUL_CHAR_IN_PATH \
519 "<html><head><title>Bad Request Path</title></head>" \
520 "<body>The request path contains invalid characters.</body></html>"
527#define REQUEST_CHUNKED_MALFORMED \
528 "<html><head><title>Request malformed</title></head>" \
529 "<body>HTTP chunked encoding is syntactically incorrect.</body></html>"
531#define REQUEST_CHUNKED_MALFORMED ""
538#define REQUEST_CHUNK_TOO_LARGE \
539 "<html><head><title>Request content too large</title></head>" \
540 "<body>The chunk size used in HTTP chunked encoded " \
541 "request is too large.</body></html>"
543#define REQUEST_CHUNK_TOO_LARGE ""
550#define REQUEST_CONTENTLENGTH_TOOLARGE \
551 "<html><head><title>Request content too large</title></head>" \
552 "<body>HTTP request has too large value for " \
553 "<b>Content-Length</b> header.</body></html>"
555#define REQUEST_CONTENTLENGTH_TOOLARGE ""
563#define REQUEST_CONTENTLENGTH_MALFORMED \
564 "<html><head><title>Request malformed</title></head>" \
565 "<body>HTTP request has wrong value for " \
566 "<b>Content-Length</b> header.</body></html>"
568#define REQUEST_CONTENTLENGTH_MALFORMED ""
578#define ERROR_MSG_DATA_NOT_HANDLED_BY_APP \
579 "<html><head><title>Internal server error</title></head>" \
580 "<body>Please ask the developer of this Web server to carefully " \
581 "read the GNU libmicrohttpd documentation about connection " \
582 "management and blocking.</body></html>"
584#define ERROR_MSG_DATA_NOT_HANDLED_BY_APP ""
591#define REQ_HTTP_VER_IS_TOO_OLD \
592 "<html><head><title>Requested HTTP version is not supported</title></head>" \
593 "<body>Requested HTTP version is too old and not " \
594 "supported.</body></html>"
596#define REQ_HTTP_VER_IS_TOO_OLD ""
603#define REQ_HTTP_VER_IS_NOT_SUPPORTED \
604 "<html><head><title>Requested HTTP version is not supported</title></head>" \
605 "<body>Requested HTTP version is not supported.</body></html>"
607#define REQ_HTTP_VER_IS_NOT_SUPPORTED ""
614#define MHD_SENFILE_CHUNK_ (0x20000)
619#define MHD_SENFILE_CHUNK_THR_P_C_ (0x200000)
628str_conn_error_ (ssize_t mhd_err_code)
630 switch (mhd_err_code)
633 return _ (
"The operation would block, retry later");
635 return _ (
"The connection was forcibly closed by remote peer");
637 return _ (
"The socket is not connected");
639 return _ (
"Not enough system resources to serve the request");
641 return _ (
"Bad FD value");
643 return _ (
"Argument value is invalid");
645 return _ (
"Argument value is not supported");
647 return _ (
"The socket is no longer available for sending");
649 return _ (
"TLS encryption or decryption error");
653 if (0 <= mhd_err_code)
654 return _ (
"Not an error code");
657 return _ (
"Wrong error code value");
677 struct MemoryPool *
const pool = c->
pool;
678 size_t need_to_be_freed = 0;
771 connection->epoll_state &=
794 else if (i > (
size_t) ret)
795 connection->epoll_state &=
809 if (
NULL != uri_size)
820 *uri = connection->
rq.
url;
821 if (
NULL != uri_size)
849 if (
NULL == connection)
856 if ( (
NULL != iterator) &&
857 (
MHD_NO == iterator (iterator_cls,
888 if (
NULL == connection)
892 if (
NULL == iterator)
903 if (
MHD_NO == iterator (iterator_cls,
1001 ( ((key ? strlen (key) : 0) != key_size) ||
1079 (
NULL == key) ? 0 : strlen (key),
1110 const char **value_ptr,
1111 size_t *value_size_ptr)
1115 if (
NULL == connection)
1133 ( (key == pos->
header) ||
1144 if (
NULL != value_ptr)
1145 *value_ptr = pos->
value;
1147 if (
NULL != value_size_ptr)
1179 (
NULL == token) || (0 == token[0]))
1208#define MHD_lookup_header_s_token_ci(c,h,tkn) \
1209 MHD_lookup_header_token_ci ((c),(h),MHD_STATICSTR_LEN_ (h), \
1210 (tkn),MHD_STATICSTR_LEN_ (tkn))
1301#ifdef MHD_USE_THREADS
1327#if defined(HTTPS_SUPPORT) && defined(UPGRADE_SUPPORT)
1342 struct MHD_UpgradeResponseHandle *urh = connection->urh;
1344#ifdef MHD_USE_THREADS
1359 (0 != epoll_ctl (daemon->epoll_upgrade_fd,
1364 MHD_PANIC (
_ (
"Failed to remove FD from epoll set.\n"));
1366 if (urh->in_eready_list)
1369 daemon->eready_urh_tail,
1371 urh->in_eready_list =
false;
1378 (0 != epoll_ctl (daemon->epoll_upgrade_fd,
1383 MHD_PANIC (
_ (
"Failed to remove FD from epoll set.\n"));
1388 shutdown (urh->mhd.socket, SHUT_RDWR);
1416 MHD_DLOG (connection->
daemon,
1432#define CONNECTION_CLOSE_ERROR(c, emsg) connection_close_error (c, emsg)
1434#define CONNECTION_CLOSE_ERROR(c, emsg) connection_close_error (c, NULL)
1477 _ (
"Closing connection (out of memory)."));
1494#if defined(_MHD_HAVE_SENDFILE)
1495 if (MHD_resp_sender_sendfile == connection->
rp.resp_sender)
1504 (
char *) response->
data,
1514#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
1522 _ (
"Closing connection (application reported " \
1523 "error generating data)."));
1531#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
1558 static const size_t max_chunk = 0xFFFFFF;
1561 static const size_t max_chunk_hdr_len =
sizeof(chunk_hdr) + 2;
1563 static const size_t max_chunk_overhead =
sizeof(chunk_hdr) + 2 + 2;
1564 size_t chunk_hdr_len;
1565 uint64_t left_to_send;
1566 size_t size_to_fill;
1581#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
1586 _ (
"Closing connection (out of memory)."));
1590 if ( (max_chunk + max_chunk_overhead) < size)
1591 size = max_chunk + max_chunk_overhead;
1604 mhd_assert (max_chunk_overhead < connection->write_buffer_size);
1614 if (max_chunk < size_to_fill)
1615 size_to_fill = max_chunk;
1616 if (left_to_send < size_to_fill)
1617 size_to_fill = (size_t) left_to_send;
1619 if (0 == left_to_send)
1629 const size_t data_write_offset
1635 ret = (ssize_t) (response->
data_size - data_write_offset);
1636 if ( ((
size_t) ret) > size_to_fill)
1637 ret = (ssize_t) size_to_fill;
1639 &response->
data[data_write_offset],
1646#if defined(MHD_USE_THREADS)
1650 _ (
"No callback for the chunked data."));
1663#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
1667 _ (
"Closing connection (application error " \
1668 "generating response)."));
1681#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
1686 if (size_to_fill < (
size_t) ret)
1688#if defined(MHD_USE_THREADS)
1692 _ (
"Closing connection (application returned " \
1693 "more data than requested)."));
1699 mhd_assert (chunk_hdr_len <
sizeof(chunk_hdr));
1700 *p_finished =
false;
1702 (max_chunk_hdr_len - (chunk_hdr_len + 2));
1706 connection->
write_buffer[max_chunk_hdr_len - 2] =
'\r';
1707 connection->
write_buffer[max_chunk_hdr_len - 1] =
'\n';
1708 connection->
write_buffer[max_chunk_hdr_len + (size_t) ret] =
'\r';
1709 connection->
write_buffer[max_chunk_hdr_len + (size_t) ret + 1] =
'\n';
1748#ifdef UPGRADE_SUPPORT
1751 if (
NULL != r->upgrade_handler)
1809 static const char *
const days[] = {
1810 "Sun",
"Mon",
"Tue",
"Wed",
"Thu",
"Fri",
"Sat"
1812 static const char *
const mons[] = {
1813 "Jan",
"Feb",
"Mar",
"Apr",
"May",
"Jun",
1814 "Jul",
"Aug",
"Sep",
"Oct",
"Nov",
"Dec"
1816 static const size_t buf_len = 29;
1820#if ! defined(HAVE_C11_GMTIME_S) && ! defined(HAVE_W32_GMTIME_S) && \
1821 ! defined(HAVE_GMTIME_R)
1825 if ((time_t) -1 == time (&t))
1827#if defined(HAVE_C11_GMTIME_S)
1828 if (
NULL == gmtime_s (&t,
1831#elif defined(HAVE_W32_GMTIME_S)
1832 if (0 != gmtime_s (&now,
1835#elif defined(HAVE_GMTIME_R)
1836 if (
NULL == gmtime_r (&t,
1847 src = days[now.tm_wday % 7];
1855 date + 5, buf_len - 5))
1859 src = mons[now.tm_mon % 12];
1934 if (0 == avail_size)
1937 new_size = avail_size / 2;
1942 grow_size = avail_size / 8;
1943 if (def_grow_size > grow_size)
1945 const size_t left_free =
1949 if ((def_grow_size <= grow_size + left_free)
1950 && (left_free < def_grow_size))
1951 grow_size = def_grow_size - left_free;
1952 else if (! required)
1957 const size_t small_inc =
1960 if (small_inc < avail_size)
1961 grow_size = small_inc;
1963 grow_size = avail_size;
2048 struct MemoryPool *
const pool = connection->
pool;
2097connection_shrink_write_buffer (
struct MHD_Connection *connection)
2100 struct MemoryPool *
const pool = connection->
pool;
2204#ifdef UPGRADE_SUPPORT
2215 (2 == rcode / 100) )
2260#ifdef UPGRADE_SUPPORT
2273 use_chunked =
false;
2277 use_chunked =
false;
2287 use_chunked =
false;
2297 use_chunked =
false;
2322 _ (
"This reply with response code %u cannot use reply body. "
2323 "Non-empty response body is ignored and not used.\n"),
2330 _ (
"This reply with response code %u cannot use reply body. "
2331 "Application defined \"Content-Length\" header violates"
2332 "HTTP specification.\n"),
2361 if (buf_size < *ppos + append_size)
2363 memcpy (buf + *ppos, append, append_size);
2364 *ppos += append_size;
2379#define buffer_append_s(buf,ppos,buf_size,str) \
2380 buffer_append (buf,ppos,buf_size,str, MHD_STATICSTR_LEN_ (str))
2407 bool filter_transf_enc,
2408 bool filter_content_len,
2410 bool add_keep_alive)
2416 mhd_assert (! add_close || ! add_keep_alive);
2419 filter_transf_enc =
false;
2421 filter_content_len =
false;
2425 add_keep_alive =
false;
2432 size_t initial_pos = *ppos;
2435 if (filter_transf_enc)
2442 filter_transf_enc =
false;
2446 if (filter_content_len)
2462 if (buf_size < *ppos + el_size)
2466 buf[(*ppos)++] =
':';
2467 buf[(*ppos)++] =
' ';
2468 if (add_close || add_keep_alive)
2478 if (buf_size < initial_pos + el_size)
2480 memcpy (buf + *ppos,
"close, ",
2487 if (buf_size < initial_pos + el_size)
2489 memcpy (buf + *ppos,
"Keep-Alive, ",
2494 add_keep_alive =
false;
2499 buf[(*ppos)++] =
'\r';
2500 buf[(*ppos)++] =
'\n';
2501 mhd_assert (initial_pos + el_size == (*ppos));
2525 bool use_conn_close;
2526 bool use_conn_k_alive;
2537#ifdef UPGRADE_SUPPORT
2546#ifdef UPGRADE_SUPPORT
2558 use_conn_close =
true;
2559 use_conn_k_alive =
false;
2563 use_conn_close =
false;
2571 use_conn_k_alive =
true;
2573 use_conn_k_alive =
false;
2577 use_conn_close =
false;
2578 use_conn_k_alive =
false;
2617 if (buf_size < pos + 5)
2637 if (buf_size < pos + 2)
2651 if (buf_size < pos + 38)
2657 mhd_assert (! use_conn_close || ! use_conn_k_alive);
2658 mhd_assert (! use_conn_k_alive || ! use_conn_close);
2667 else if (use_conn_k_alive)
2718 if (buf_size < pos + 2)
2728 if (buf_size < pos + 2)
2770 buf[used_size++] =
'0';
2771 buf[used_size++] =
'\r';
2772 buf[used_size++] =
'\n';
2778 size_t new_used_size;
2781 if (new_used_size > buf_size)
2785 buf[used_size++] =
':';
2786 buf[used_size++] =
' ';
2789 buf[used_size++] =
'\r';
2790 buf[used_size++] =
'\n';
2794 if (used_size + 2 > buf_size)
2796 buf[used_size++] =
'\r';
2797 buf[used_size++] =
'\n';
2824 unsigned int status_code,
2825 const char *message,
2828 size_t header_name_len,
2830 size_t header_value_len)
2841 free (header_value);
2847 MHD_DLOG (connection->
daemon,
2848 _ (
"Error processing request (HTTP response code is %u ('%s')). " \
2849 "Closing connection.\n"),
2856 MHD_DLOG (connection->
daemon,
2857 _ (
"Too late to send an error response, " \
2858 "response is being sent already.\n"),
2863 _ (
"Too late for error response."));
2865 free (header_value);
2888 if (
NULL == response)
2891 MHD_DLOG (connection->
daemon,
2892 _ (
"Failed to create error response.\n"),
2899 free (header_value);
2908 if (
NULL != header_name)
2912 header_name, header_name_len,
2913 header_value, header_value_len);
2917 free (header_value);
2939 _ (
"Closing connection " \
2940 "(failed to queue error response)."));
2971 _ (
"Closing connection " \
2972 "(failed to create error response header)."));
2984# define transmit_error_response_static(c, code, msg) \
2985 transmit_error_response_len (c, code, \
2986 msg, MHD_STATICSTR_LEN_ (msg), \
2989# define transmit_error_response_static(c, code, msg) \
2990 transmit_error_response_len (c, code, \
2999# define transmit_error_response_header(c, code, m, hd_n, hd_n_l, hd_v, hd_v_l) \
3000 transmit_error_response_len (c, code, \
3001 m, MHD_STATICSTR_LEN_ (m), \
3005# define transmit_error_response_header(c, code, m, hd_n, hd_n_l, hd_v, hd_v_l) \
3006 transmit_error_response_len (c, code, \
3060#ifndef MHD_MAX_REASONABLE_HEADERS_SIZE_
3070# define MHD_MAX_REASONABLE_HEADERS_SIZE_ (6 * 1024)
3073#ifndef MHD_MAX_REASONABLE_REQ_TARGET_SIZE_
3084# define MHD_MAX_REASONABLE_REQ_TARGET_SIZE_ 8000
3087#ifndef MHD_MIN_REASONABLE_HEADERS_SIZE_
3095# define MHD_MIN_REASONABLE_HEADERS_SIZE_ 26
3098#ifndef MHD_MIN_REASONABLE_REQ_TARGET_SIZE_
3106# define MHD_MIN_REASONABLE_REQ_TARGET_SIZE_ 40
3109#ifndef MHD_MIN_REASONABLE_REQ_METHOD_SIZE_
3117# define MHD_MIN_REASONABLE_REQ_METHOD_SIZE_ 16
3120#ifndef MHD_MIN_REASONABLE_REQ_CHUNK_LINE_LENGTH_
3126# define MHD_MIN_REASONABLE_REQ_CHUNK_LINE_LENGTH_ 4
3144 const char *add_element,
3145 size_t add_element_size)
3149 size_t opt_headers_size;
3150 size_t host_field_line_size;
3178 host_field_line_size = 0;
3183 && (0 != add_element_size))
3185 static const size_t header_host_key_len =
3187 const bool is_host_header =
3188 (header_host_key_len + 1 <= add_element_size)
3189 && ( (0 == add_element[header_host_key_len])
3190 || (
':' == add_element[header_host_key_len]) )
3193 header_host_key_len);
3196 const bool is_parsed = ! (
3200 size_t actual_element_size;
3202 mhd_assert (! is_parsed || (0 == add_element[header_host_key_len]));
3208 actual_element_size = add_element_size + 1;
3210 actual_element_size = add_element_size;
3212 host_field_line_size = actual_element_size;
3213 mhd_assert (opt_headers_size >= actual_element_size);
3214 opt_headers_size -= actual_element_size;
3217 if (0 == host_field_line_size)
3219 static const size_t host_field_name_len =
3221 size_t host_field_name_value_len;
3225 host_field_name_len,
3227 &host_field_name_value_len))
3231 host_field_line_size =
3232 host_field_name_len + host_field_name_value_len + 2;
3235 if (opt_headers_size >= host_field_line_size)
3237 opt_headers_size -= host_field_line_size;
3239 if (opt_headers_size >= 2)
3240 opt_headers_size -= 2;
3243 host_field_line_size = 0;
3253 method_size = strlen (c->
rq.
method);
3260 if (opt_headers_size > (uri_size / 8))
3262 if ((opt_headers_size / 2) > method_size)
3269 if ((uri_size / 16) > method_size)
3279 if ((uri_size / 16) > method_size)
3290 if ((opt_headers_size * 4) > uri_size)
3292 if (opt_headers_size > method_size)
3299 if (uri_size > method_size * 4)
3308 if (uri_size > method_size * 4)
3327 if ((1 < opt_headers_size) || (1 < uri_size))
3329 if (opt_headers_size >= uri_size)
3337 if (0 != host_field_line_size)
3356 const char *add_header,
3357 size_t add_header_size)
3359 unsigned int err_code;
3371#ifdef COOKIE_SUPPORT
3380 unsigned int err_code;
3407 const char *chunk_size_line,
3408 size_t chunk_size_line_size)
3410 unsigned int err_code;
3412 if (
NULL != chunk_size_line)
3414 const char *semicol;
3416 semicol = memchr (chunk_size_line,
';', chunk_size_line_size);
3417 if (
NULL != semicol)
3428 chunk_size_line_size);
3447 const char *add_footer,
3448 size_t add_footer_size)
3450 (void) add_footer; (void) add_footer_size;
3505 _ (
"No space left in the read buffer when " \
3506 "receiving the initial part of " \
3507 "the request line."));
3525 _ (
"No space left in the read buffer when " \
3526 "receiving the URI in " \
3527 "the request line. " \
3528 "The request uses non-standard HTTP request " \
3627 bool rbuff_grow_desired;
3631 bool rbuff_grow_required;
3637 if (rbuff_grow_required)
3638 rbuff_grow_desired =
true;
3644 if ((rbuff_grow_desired) &&
3652 rbuff_grow_desired =
3659 rbuff_grow_desired =
3664 const uint64_t cur_chunk_left =
3669 rbuff_grow_desired =
3676 if (! rbuff_grow_desired)
3682 if (! rbuff_grow_required)
3748#ifdef UPGRADE_SUPPORT
3749 case MHD_CONNECTION_UPGRADE:
3779 switch (connection->tls_state)
3786 if (0 == gnutls_record_get_direction (connection->tls_session))
3802 MHD_PANIC (
_ (
"Invalid TLS state value.\n"));
3809 MHD_DLOG (connection->
daemon,
3810 _ (
"In function %s handling connection at state: %s\n"),
3812 MHD_state_to_string (connection->
state));
3814 switch (connection->
state)
3906#ifdef UPGRADE_SUPPORT
3907 case MHD_CONNECTION_UPGRADE:
3959 MHD_DLOG (connection->
daemon,
3960 _ (
"Not enough memory in pool to allocate header record!\n"));
3971#ifdef COOKIE_SUPPORT
3976enum _MHD_ParseCookie
3978 MHD_PARSE_COOKIE_OK =
MHD_YES,
3979 MHD_PARSE_COOKIE_OK_LAX = 2,
3980 MHD_PARSE_COOKIE_MALFORMED = -1,
3981 MHD_PARSE_COOKIE_NO_MEMORY =
MHD_NO
3997static enum _MHD_ParseCookie
3998parse_cookies_string (
char *str,
3999 const size_t str_len,
4025 while (
' ' == str[i] ||
'\t' == str[i] ||
';' == str[i])
4027 if (! allow_wsp_empty)
4028 return MHD_PARSE_COOKIE_MALFORMED;
4032 return non_strict? MHD_PARSE_COOKIE_OK_LAX : MHD_PARSE_COOKIE_OK;
4039 const char l = str[i];
4040 if ((
'=' == l) || (
' ' == l) || (
'\t' == l) || (
'"' == l) || (
',' == l) ||
4041 (
';' == l) || (0 == l))
4043 }
while (str_len > ++i);
4044 name_len = i - name_start;
4046 while (str_len > i && (
' ' == str[i] ||
'\t' == str[i]))
4048 if (! wsp_around_eq)
4049 return MHD_PARSE_COOKIE_MALFORMED;
4053 if ((str_len == i) || (
'=' != str[i]) || (0 == name_len))
4054 return MHD_PARSE_COOKIE_MALFORMED;
4059 while (str_len > i && (
' ' == str[i] ||
'\t' == str[i]))
4061 if (! wsp_around_eq)
4062 return MHD_PARSE_COOKIE_MALFORMED;
4078 val_quoted = (
'"' == str[i]);
4085 const char l = str[i];
4086 if ((
';' == l) || (
'"' == l) || (
',' == l) || (
';' == l) ||
4087 (
'\\' == l) || (0 == l))
4089 if ((
' ' == l) || (
'\t' == l))
4093 if (! wsp_in_quoted)
4094 return MHD_PARSE_COOKIE_MALFORMED;
4099 value_len = i - value_start;
4102 if ((str_len == i) || (
'"' != str[i]))
4103 return MHD_PARSE_COOKIE_MALFORMED;
4107 if ((str_len > i) && ((
' ' == str[i]) || (
'\t' == str[i])))
4112 }
while (str_len > i && (
' ' == str[i] ||
'\t' == str[i]));
4116 if (! allow_wsp_empty)
4117 return MHD_PARSE_COOKIE_MALFORMED;
4122 valid_cookie =
true;
4123 else if (
';' == str[i])
4124 valid_cookie =
true;
4126 valid_cookie =
false;
4129 return MHD_PARSE_COOKIE_MALFORMED;
4132 str[name_start + name_len] = 0;
4135 mhd_assert (value_start + value_len <= str_len);
4136 str[value_start + value_len] = 0;
4144 return MHD_PARSE_COOKIE_NO_MEMORY;
4155 return MHD_PARSE_COOKIE_NO_MEMORY;
4161 mhd_assert (
';' != str[i] || val_quoted || non_strict || 0 == value_len);
4165 if (! allow_wsp_empty)
4166 return MHD_PARSE_COOKIE_MALFORMED;
4169 else if (
' ' != str[i])
4171 if ((
'\t' == str[i]) && tab_as_sp)
4173 else if (! allow_no_space)
4174 return MHD_PARSE_COOKIE_MALFORMED;
4182 if (! allow_wsp_empty)
4183 return MHD_PARSE_COOKIE_MALFORMED;
4189 return non_strict? MHD_PARSE_COOKIE_OK_LAX : MHD_PARSE_COOKIE_OK;
4199static enum _MHD_ParseCookie
4206 enum _MHD_ParseCookie parse_res;
4209 const bool allow_partially_correct_cookie =
4220 return MHD_PARSE_COOKIE_OK;
4222 return MHD_PARSE_COOKIE_OK;
4227 parse_res = MHD_PARSE_COOKIE_NO_MEMORY;
4233 cpy[hdr_len] =
'\0';
4237 while (i < hdr_len && (
' ' == cpy[i] ||
'\t' == cpy[i]))
4240 parse_res = parse_cookies_string (cpy + i, hdr_len - i, connection);
4245 case MHD_PARSE_COOKIE_OK:
4247 case MHD_PARSE_COOKIE_OK_LAX:
4250 MHD_DLOG (connection->
daemon,
4251 _ (
"The Cookie header has been parsed, but it is not fully "
4252 "compliant with the standard.\n"));
4255 case MHD_PARSE_COOKIE_MALFORMED:
4258 if (! allow_partially_correct_cookie)
4265 MHD_DLOG (connection->
daemon,
4266 _ (
"The Cookie header has been ignored as it contains "
4267 "malformed data.\n"));
4272 MHD_DLOG (connection->
daemon,
4273 _ (
"The Cookie header has been only partially parsed as it "
4274 "contains malformed data.\n"));
4279 MHD_DLOG (connection->
daemon,
4280 _ (
"The Cookie header has malformed data.\n"));
4283 case MHD_PARSE_COOKIE_NO_MEMORY:
4285 MHD_DLOG (connection->
daemon,
4286 _ (
"Not enough memory in the connection pool to "
4287 "parse client cookies!\n"));
4294#ifndef HAVE_MESSAGES
4308#define HTTP_VER_LEN (MHD_STATICSTR_LEN_ (MHD_HTTP_VERSION_1_1))
4321 const char *http_string,
4324 const char *
const h = http_string;
4330 (
'H' != h[0]) || (
'T' != h[1]) || (
'T' != h[2]) || (
'P' != h[3]) ||
4333 ((
'0' > h[5]) || (
'9' < h[5])) ||
4334 ((
'0' > h[7]) || (
'9' < h[7])))
4342 if (1 == h[5] -
'0')
4345 if (1 == h[7] -
'0')
4347 else if (0 == h[7] -
'0')
4355 if (0 == h[5] -
'0')
4385 const char *
const m = method;
4449 _ (
"Application reported internal error, " \
4450 "closing connection."));
4474 const bool bare_lf_as_crlf = (-2 > discp_lvl);
4477 const bool allow_bws = (2 > discp_lvl);
4485 size_t to_be_processed;
4486 size_t left_unprocessed;
4487 size_t processed_size;
4489 instant_retry =
false;
4502 if ( (2 <= available) &&
4503 (
'\r' == buffer_head[0]) &&
4504 (
'\n' == buffer_head[1]) )
4506 else if (bare_lf_as_crlf && (
'\n' == buffer_head[0]))
4508 else if (2 > available)
4528 uint64_t cur_chunk_left;
4534 if (cur_chunk_left > available)
4535 to_be_processed = available;
4538 to_be_processed = (size_t) cur_chunk_left;
4539 if (available > to_be_processed)
4540 instant_retry =
true;
4547 uint64_t chunk_size;
4561 if (num_dig == available)
4564 broken = (0 == num_dig);
4579 size_t chunk_size_line_len;
4581 chunk_size_line_len = 0;
4582 if ((
';' == buffer_head[num_dig]) ||
4584 ((
' ' == buffer_head[num_dig]) ||
4585 (
'\t' == buffer_head[num_dig]))))
4590 for (i = num_dig; i < available; ++i)
4592 if ((
' ' != buffer_head[i]) && (
'\t' != buffer_head[i]))
4597 if (
';' == buffer_head[i])
4600 for (++i; i < available; ++i)
4602 if ((
'\r' == buffer_head[i]) ||
4603 (
'\n' == buffer_head[i]))
4610 if (
'\r' == buffer_head[i])
4612 if (i + 1 == available)
4614 if (
'\n' == buffer_head[i + 1])
4615 chunk_size_line_len = i;
4620 if (bare_lf_as_crlf)
4621 chunk_size_line_len = i;
4636 if ((2 <= (available - num_dig)) &&
4637 (
'\r' == buffer_head[num_dig]) &&
4638 (
'\n' == buffer_head[num_dig + 1]))
4639 chunk_size_line_len = num_dig + 2;
4640 else if (bare_lf_as_crlf &&
4641 (
'\n' == buffer_head[num_dig]))
4642 chunk_size_line_len = num_dig + 1;
4643 else if (2 > (available - num_dig))
4647 if (0 != chunk_size_line_len)
4649 mhd_assert (chunk_size_line_len <= available);
4654 available -= chunk_size_line_len;
4655 buffer_head += chunk_size_line_len;
4657 if (0 == chunk_size)
4663 instant_retry =
true;
4688 to_be_processed = available;
4690 left_unprocessed = to_be_processed;
4706 _ (
"Application reported internal error, " \
4707 "closing connection."));
4712 if (left_unprocessed > to_be_processed)
4713 MHD_PANIC (
_ (
"libmicrohttpd API violation.\n"));
4716 (left_unprocessed != to_be_processed);
4718 if (0 != left_unprocessed)
4720 instant_retry =
false;
4730 _ (
"WARNING: Access Handler Callback has not processed " \
4731 "any upload data and connection is not suspended. " \
4732 "This may result in hung connection.\n"));
4736 processed_size = to_be_processed - left_unprocessed;
4738 buffer_head += processed_size;
4739 available -= processed_size;
4750 }
while (instant_retry);
4752 if ( (available > 0) &&
4783 connection->
state = next_state;
4802#ifdef COOKIE_SUPPORT
4803 if (MHD_PARSE_COOKIE_NO_MEMORY == parse_cookie_header (connection))
4805 handle_req_cookie_no_space (connection);
4821 MHD_DLOG (connection->
daemon,
4822 _ (
"Received HTTP/1.1 request without `Host' header.\n"));
4874 MHD_DLOG (connection->
daemon,
4875 _ (
"The 'Content-Length' request header is ignored "
4876 "as chunked Transfer-Encoding is used "
4877 "for this request.\n"));
4899 if (((0 == num_digits) &&
4901 (
'0' <= clen[0]) && (
'9' >= clen[0]))
4906 MHD_DLOG (connection->
daemon,
4907 _ (
"Too large value of 'Content-Length' header. " \
4908 "Closing connection.\n"));
4914 else if ((val_len != num_digits) ||
4919 MHD_DLOG (connection->
daemon,
4920 _ (
"Failed to parse 'Content-Length' header. " \
4921 "Closing connection.\n"));
4938_MHD_static_inline
void
4949_MHD_static_inline
void
4958#ifndef MHD_MAX_EMPTY_LINES_SKIP
4963#define MHD_MAX_EMPTY_LINES_SKIP 1024
4980 const bool skip_empty_lines = (1 >= discp_lvl);
4983 const bool skip_several_empty_lines = (skip_empty_lines && (0 >= discp_lvl));
4986 const bool skip_unlimited_empty_lines =
4987 (skip_empty_lines && (-3 >= discp_lvl));
4993 const bool tab_as_wsp = (0 >= discp_lvl);
4996 const bool other_wsp_as_wsp = (-1 >= discp_lvl);
4999 const bool wsp_blocks = (-1 >= discp_lvl);
5002 const bool wsp_in_uri = (0 >= discp_lvl);
5006 const bool wsp_in_uri_keep = (-2 >= discp_lvl);
5009 const bool bare_cr_keep = (wsp_in_uri_keep && (-3 >= discp_lvl));
5012 const bool bare_cr_as_sp = ((! bare_cr_keep) && (-1 >= discp_lvl));
5034 && (skip_empty_lines))
5048 is_empty_line =
false;
5055 is_empty_line =
true;
5065 is_empty_line =
true;
5073 if ((! skip_unlimited_empty_lines) &&
5074 (((
unsigned int) ((skip_several_empty_lines) ?
5079 _ (
"Too many meaningless extra empty lines " \
5080 "received before the request"));
5086 }
while (is_empty_line);
5094 while (p < c->read_buffer_offset)
5113 end_of_line =
false;
5142 else if (! bare_cr_keep)
5154 _ (
"Bare CR characters are not allowed " \
5155 "in the request line.\n"));
5160 else if (
'\n' == chr)
5164 if (bare_lf_as_crlf)
5181 _ (
"Bare LF characters are not allowed " \
5182 "in the request line.\n"));
5306 _ (
"The request line is malformed.\n"));
5312 if ((! wsp_blocks) &&
5349 || ((
'\t' == chr) && (tab_as_wsp))
5350 || ((other_wsp_as_wsp) && ((0xb == chr) || (0xc == chr))))
5369 _ (
"The request line starts with "
5370 "a whitespace.\n"));
5407 _ (
"The request line has more than "
5408 "two whitespaces.\n"));
5483 else if ((0xb == chr) || (0xc == chr))
5496 _ (
"Invalid character is in the "
5497 "request line.\n"));
5505 _ (
"The NUL character is in the "
5506 "request line.\n"));
5519#ifndef MHD_MAX_FIXED_URI_LEN
5523#define MHD_MAX_FIXED_URI_LEN (64 * 1024)
5537 size_t fixed_uri_len;
5541 size_t hdr_name_len;
5551 (
NULL == (b = malloc (fixed_uri_len + 1))) )
5554 _ (
"The request has whitespace character is " \
5555 "in the URI and the URI is too large to " \
5556 "send automatic redirect to fixed URI.\n"));
5595 }
while (i < c->rq.req_target_len);
5600 hdr_name = malloc (hdr_name_len + 1);
5601 if (
NULL != hdr_name)
5618 _ (
"The request has whitespace character is in the " \
5720 const bool wsp_in_uri = (0 >= discp_lvl);
5723 const bool wsp_in_uri_keep = (-2 >= discp_lvl);
5759 if (! wsp_in_uri_keep)
5906 bool process_footers,
5918 const bool bare_cr_keep = (-3 >= discp_lvl);
5921 const bool bare_cr_as_sp = ((! bare_cr_keep) && (-1 >= discp_lvl));
5924 const bool nul_as_sp = (-1 >= discp_lvl);
5927 const bool allow_folded = (0 >= discp_lvl);
5933 const bool allow_wsp_at_start = allow_folded && (-1 >= discp_lvl);
5936 const bool allow_wsp_in_name = (-2 >= discp_lvl);
5939 const bool allow_empty_name = (-2 >= discp_lvl);
5942 const bool allow_extended_charset = (-2 >= discp_lvl);
5945 const bool allow_wsp_before_colon = (-3 >= discp_lvl);
5949 const bool allow_line_without_colon = (-2 >= discp_lvl);
5953#if ! defined (HAVE_MESSAGES) && ! defined(_DEBUG)
5954 (void) process_footers;
5964 while (p < c->read_buffer_offset)
6013 else if (! bare_cr_keep)
6015 if (! process_footers)
6025 end_of_line =
false;
6028 else if (
'\n' == chr)
6032 if (bare_lf_as_crlf)
6044 if (! process_footers)
6056 end_of_line =
false;
6064 const size_t line_len = p + ((
'\r' == chr) ? 2 : 1);
6065 char next_line_char;
6066 mhd_assert (line_len <= c->read_buffer_offset);
6085 mhd_assert (line_len < c->read_buffer_offset);
6089 if ((
' ' == next_line_char) ||
6090 (
'\t' == next_line_char))
6095 if (! process_footers)
6116 bool skip_line =
false;
6126 _ (
"Whitespace-prefixed first header line " \
6127 "has been skipped.\n"));
6133 if (! allow_line_without_colon)
6135 if (! process_footers)
6192 hdr_value->
len = value_len;
6202 else if ((
' ' == chr) || (
'\t' == chr))
6206 if (! allow_wsp_at_start)
6208 if (! process_footers)
6224 if (allow_wsp_in_name || allow_wsp_before_colon)
6231 if (! process_footers)
6254 if (! process_footers)
6278 if ( (! allow_extended_charset) &&
6294 mhd_assert (allow_wsp_in_name || allow_wsp_before_colon);
6295 if (! allow_wsp_before_colon)
6297 if (! process_footers)
6308#ifndef MHD_FAVOR_SMALL_CODE
6314 if (! process_footers)
6332 mhd_assert (allow_wsp_in_name || allow_wsp_before_colon);
6333 if (! allow_wsp_in_name)
6335 if (! process_footers)
6346#ifndef MHD_FAVOR_SMALL_CODE
6357#ifndef MHD_FAVOR_SMALL_CODE
6361#ifdef MHD_FAVOR_SMALL_CODE
6399 res =
get_req_header (c, process_footers, &hdr_name, &hdr_value);
6414 (hdr_name.
str[hdr_name.
len - 1] !=
' '));
6416 (hdr_name.
str[hdr_name.
len - 1] !=
'\t'));
6420 (hdr_value.
str[hdr_value.
len - 1] !=
' '));
6422 (hdr_value.
str[hdr_value.
len - 1] !=
'\t'));
6426 (! process_footers) ?
6429 hdr_name.
str, hdr_name.
len,
6430 hdr_value.
str, hdr_value.
len))
6432 size_t add_element_size;
6438 _ (
"Failed to allocate memory in the connection memory " \
6439 "pool to store %s.\n"),
6440 (! process_footers) ?
_ (
"header") :
_ (
"footer"));
6443 add_element_size = hdr_value.
len
6444 + (size_t) (hdr_value.
str - hdr_name.
str);
6446 if (! process_footers)
6486 _ (
"One bare CR character has been replaced with space " \
6488 (! process_footers) ?
6489 _ (
"the request line or in the request headers") :
6490 _ (
"the request footers"));
6495 _ (
"%" PRIu64 " bare CR characters have been replaced with " \
6496 "spaces in the request line and/or in the request %s.\n"),
6498 (! process_footers) ?
_ (
"headers") :
_ (
"footers"));
6503 _ (
"One %s line without colon has been skipped.\n"),
6504 (! process_footers) ?
_ (
"header") :
_ (
"footer"));
6509 _ (
"%" PRIu64 " %s lines without colons has been skipped.\n"),
6511 (! process_footers) ?
_ (
"header") :
_ (
"footer"));
6516 if (! process_footers)
6535 const char *last_elmnt_end;
6536 size_t shift_back_size;
6544 shift_back_size = (size_t) (c->
read_buffer - (last_elmnt_end + 1));
6571#if defined(MHD_USE_THREADS)
6587#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
6597#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
6636 bytes_read = connection->
recv_cls (connection,
6641 if ((bytes_read < 0) || socket_error)
6645 if ((bytes_read > 0) && connection->
sk_nonblck)
6648 bytes_read = connection->
recv_cls (connection, &dummy,
sizeof (dummy));
6656 MHD_DLOG (connection->
daemon,
6657 _ (
"Socket has been disconnected when reading request.\n"));
6668 MHD_DLOG (connection->
daemon,
6669 _ (
"Connection socket is closed when reading " \
6670 "request due to the error: %s\n"),
6671 (bytes_read < 0) ? str_conn_error_ (bytes_read) :
6672 "detected connection closure");
6679 if (0 == bytes_read)
6686 MHD_DLOG (connection->
daemon,
6687 _ (
"Connection was closed by remote side with incomplete "
6707 MHD_DLOG (connection->
daemon,
6708 _ (
"In function %s handling connection at state: %s\n"),
6710 MHD_state_to_string (connection->
state));
6713 switch (connection->
state)
6731#ifdef UPGRADE_SUPPORT
6732 case MHD_CONNECTION_UPGRADE:
6805 MHD_DLOG (connection->
daemon,
6806 _ (
"In function %s handling connection at state: %s\n"),
6808 MHD_state_to_string (connection->
state));
6810 switch (connection->
state)
6832 MHD_DLOG (connection->
daemon,
6833 _ (
"Failed to send data in request for %s.\n"),
6834 connection->
rq.
url);
6840#if _MHD_DEBUG_SEND_DATA
6842 _ (
"Sent 100 continue response: `%.*s'\n"),
6918 MHD_DLOG (connection->
daemon,
6919 _ (
"Failed to send the response headers for the " \
6920 "request for `%s'. Error: %s\n"),
6922 str_conn_error_ (ret));
6929 if (((
size_t) ret) > wb_ready)
6955 uint64_t data_write_offset;
6957#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
6966#if defined(_MHD_HAVE_SENDFILE)
6967 if (MHD_resp_sender_sendfile == connection->
rp.resp_sender)
6970 ret = MHD_send_sendfile_ (connection);
6984 if (data_write_offset > (uint64_t)
SIZE_MAX)
6985 MHD_PANIC (
_ (
"Data offset exceeds limit.\n"));
6988 [(
size_t) data_write_offset],
6990 - (
size_t) data_write_offset,
6992#if _MHD_DEBUG_SEND_DATA
6995 _ (
"Sent %d-byte DATA response: `%.*s'\n"),
6999 - rp.response->data_start]);
7002#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7011 MHD_DLOG (connection->
daemon,
7012 _ (
"Failed to send the response body for the " \
7013 "request for `%s'. Error: %s\n"),
7015 str_conn_error_ (ret));
7043 MHD_DLOG (connection->
daemon,
7044 _ (
"Failed to send the chunked response body for the " \
7045 "request for `%s'. Error: %s\n"),
7047 str_conn_error_ (ret));
7079 MHD_DLOG (connection->
daemon,
7080 _ (
"Failed to send the footers for the " \
7081 "request for `%s'. Error: %s\n"),
7083 str_conn_error_ (ret));
7101#ifdef UPGRADE_SUPPORT
7102 case MHD_CONNECTION_UPGRADE:
7109 _ (
"Internal error.\n"));
7127 uint64_t since_actv;
7137 if (timeout < since_actv)
7144 if (5000 >= jump_back)
7148 _ (
"Detected system clock %u milliseconds jump back.\n"),
7149 (
unsigned int) jump_back);
7155 _ (
"Detected too large system clock %" PRIu64 " milliseconds "
7178#ifdef MHD_USE_THREADS
7192#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7224#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7232 if ( (MHD_ITC_IS_VALID_ (daemon->
itc)) &&
7233 (! MHD_itc_activate_ (daemon->
itc,
"c")) )
7237 _ (
"Failed to signal end of connection via inter-thread " \
7238 "communication channel.\n"));
7253 size_t read_buf_size;
7266 memset (&c->
rq, 0,
sizeof(c->
rq));
7267 memset (&c->
rp, 0,
sizeof(c->
rp));
7318 size_t new_read_buf_size;
7340 memset (&c->
rq, 0,
sizeof(c->
rq));
7343 memset (&c->
rp, 0,
sizeof(c->
rp));
7385#ifdef MHD_USE_THREADS
7405 _ (
"In function %s handling connection at state: %s\n"),
7407 MHD_state_to_string (connection->
state));
7409 switch (connection->
state)
7551 _ (
"Closing connection (failed to create "
7552 "response header).\n"));
7562#ifdef UPGRADE_SUPPORT
7565 connection->
state = MHD_CONNECTION_UPGRADE;
7606#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7612#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7624#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7644#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7652#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7664#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
7685 _ (
"Closing connection (failed to create " \
7686 "response footer)."));
7718#ifdef UPGRADE_SUPPORT
7719 case MHD_CONNECTION_UPGRADE:
7742 ret = MHD_connection_epoll_update_ (connection);
7771 daemon->eready_tail,
7784 struct epoll_event event;
7786 event.events = EPOLLIN | EPOLLOUT | EPOLLPRI | EPOLLET;
7787 event.data.ptr = connection;
7788 if (0 != epoll_ctl (daemon->epoll_fd,
7796 _ (
"Call to epoll_ctl failed: %s\n"),
7845 if (
NULL == connection->tls_session)
7849 gnutls_cipher_algorithm_t res;
7850 res = gnutls_cipher_get (connection->tls_session);
7855 if (
NULL == connection->tls_session)
7859 gnutls_protocol_t res;
7860 res = gnutls_protocol_get_version (connection->tls_session);
7865 if (
NULL == connection->tls_session)
7883 sizeof(connection->
addr));
7903#if SIZEOF_UNSIGNED_INT <= (SIZEOF_UINT64_T - 2)
7944 unsigned int ui_val;
7946 daemon = connection->
daemon;
7952 va_start (ap, option);
7953 ui_val = va_arg (ap,
unsigned int);
7955#if (SIZEOF_UINT64_T - 2) <= SIZEOF_UNSIGNED_INT
7959 MHD_DLOG (connection->
daemon,
7960 _ (
"The specified connection timeout (%u) is too " \
7961 "large. Maximum allowed value (%" PRIu64 ") will be used " \
7971#if defined(MHD_USE_THREADS)
7994#if defined(MHD_USE_THREADS)
8052 unsigned int status_code,
8058 if ((
NULL == connection) || (
NULL == response))
8061 daemon = connection->
daemon;
8069#if defined(MHD_USE_POSIX_THREADS) || defined(MHD_USE_W32_THREADS)
8076 _ (
"Attempted to queue response on wrong thread!\n"));
8092#ifdef UPGRADE_SUPPORT
8093 if (
NULL != response->upgrade_handler)
8100 _ (
"Attempted 'upgrade' connection on daemon without" \
8101 " MHD_ALLOW_UPGRADE option!\n"));
8109 _ (
"Application used invalid status code for" \
8110 " 'upgrade' response!\n"));
8118 _ (
"Application used invalid response" \
8119 " without \"Connection\" header!\n"));
8132 _ (
"Application used invalid response" \
8133 " without \"upgrade\" token in" \
8134 " \"Connection\" header!\n"));
8142 _ (
"Connection \"Upgrade\" can be used only " \
8143 "with HTTP/1.1 connections!\n"));
8151#ifdef UPGRADE_SUPPORT
8152 if (
NULL == response->upgrade_handler)
8156 _ (
"Application used status code 101 \"Switching Protocols\" " \
8157 "with non-'upgrade' response!\n"));
8164 _ (
"Application used status code 101 \"Switching Protocols\", " \
8165 "but this MHD was built without \"Upgrade\" support!\n"));
8170 if ( (100 > status_code) ||
8171 (999 < status_code) )
8175 _ (
"Refused wrong status code (%u). " \
8176 "HTTP requires three digits status code!\n"),
8181 if (200 > status_code)
8187 _ (
"Wrong status code (%u) refused. " \
8188 "HTTP/1.0 clients do not support 1xx status codes!\n"),
8198 _ (
"Wrong status code (%u) refused. " \
8199 "HTTP/1.0 reply mode does not support 1xx status codes!\n"),
8206 (2 == status_code / 100) )
8210 _ (
"Successful (%u) response code cannot be used to answer " \
8211 "\"CONNECT\" request!\n"),
8222 _ (
"HEAD-only response cannot be used when the request requires "
8223 "reply body to be sent!\n"));
8233 _ (
"The response has application-defined \"Content-Length\" " \
8234 "header. The reply to the request will be not " \
8235 "HTTP-compliant and may result in hung connection or " \
8236 "other problems!\n"));
8244#if defined(_MHD_HAVE_SENDFILE)
8245 if ( (response->
fd == -1) ||
8249 defined(MHD_SEND_SPIPE_SUPPRESS_POSSIBLE)
8254 connection->
rp.resp_sender = MHD_resp_sender_std;
8256 connection->
rp.resp_sender = MHD_resp_sender_sendfile;
#define ERR_MSG_REQUEST_CHUNK_LINE_TOO_BIG
#define REQUEST_CONTENTLENGTH_TOOLARGE
static enum MHD_Result build_connection_chunked_response_footer(struct MHD_Connection *connection)
static ssize_t recv_param_adapter(struct MHD_Connection *connection, void *other, size_t i)
#define ERR_RSP_EMPTY_FOOTER_NAME
static enum MHD_Result build_header_response(struct MHD_Connection *connection)
static void connection_close_error(struct MHD_Connection *connection, const char *emsg)
static bool char_legal_in_field_name(char chr)
static bool process_request_target(struct MHD_Connection *c)
void MHD_connection_set_initial_state_(struct MHD_Connection *c)
#define MHD_CHUNK_HEADER_REASONABLE_LEN
#define MHD_lookup_header_s_token_ci(c, h, tkn)
@ MHD_PROC_RECV_BODY_CHUNKED
@ MHD_PROC_RECV_BODY_NORMAL
#define REQUEST_CHUNK_TOO_LARGE
void MHD_connection_handle_write(struct MHD_Connection *connection)
static void MHD_connection_update_event_loop_info(struct MHD_Connection *connection)
#define buffer_append_s(buf, ppos, buf_size, str)
void * MHD_connection_alloc_memory_(struct MHD_Connection *connection, size_t size)
#define MHD_MAX_FIXED_URI_LEN
static enum MHD_Result try_ready_normal_body(struct MHD_Connection *connection)
#define REQUEST_CHUNKED_MALFORMED
#define REQ_HTTP_VER_IS_NOT_SUPPORTED
#define MHD_MAX_REASONABLE_HEADERS_SIZE_
#define RQ_LINE_TOO_MANY_WSP
static void call_connection_handler(struct MHD_Connection *connection)
static enum MHD_Result connection_add_header(void *cls, const char *key, size_t key_size, const char *value, size_t value_size, enum MHD_ValueKind kind)
static void process_request_body(struct MHD_Connection *connection)
#define ERR_RSP_INVALID_CHR_IN_FOOTER
static void setup_reply_properties(struct MHD_Connection *connection)
#define ERR_RSP_INVALID_CHAR_IN_FIELD_NAME
#define HTTP_100_CONTINUE
static void send_redirect_fixed_rq_target(struct MHD_Connection *c)
static void handle_recv_no_space(struct MHD_Connection *c, enum MHD_ProcRecvDataStage stage)
#define transmit_error_response_static(c, code, msg)
#define REQUEST_MALFORMED
static bool get_request_line(struct MHD_Connection *c)
@ MHD_HDR_LINE_READING_NEED_MORE_DATA
@ MHD_HDR_LINE_READING_GOT_END_OF_HEADER
@ MHD_HDR_LINE_READING_GOT_HEADER
@ MHD_HDR_LINE_READING_DATA_ERROR
_MHD_static_inline void reset_rq_header_processing_state(struct MHD_Connection *c)
#define ERR_RSP_HEADER_WITHOUT_COLON
static void connection_shrink_read_buffer(struct MHD_Connection *connection)
#define ERR_RSP_WSP_IN_FOOTER_NAME
#define MHD_ALLOW_BARE_LF_AS_CRLF_(discp_lvl)
static enum replyBodyUse is_reply_body_needed(struct MHD_Connection *connection, unsigned int rcode)
void MHD_set_http_callbacks_(struct MHD_Connection *connection)
static void transmit_error_response_len(struct MHD_Connection *connection, unsigned int status_code, const char *message, size_t message_len, char *header_name, size_t header_name_len, char *header_value, size_t header_value_len)
#define REQ_HTTP_VER_IS_TOO_OLD
#define ERR_MSG_REQUEST_TOO_BIG
#define MHD_MAX_REASONABLE_REQ_TARGET_SIZE_
#define ERR_MSG_REQUEST_FOOTER_TOO_BIG
#define ERR_MSG_REQUEST_CHUNK_LINE_EXT_TOO_BIG
static bool connection_check_timedout(struct MHD_Connection *c)
static enum MHD_ConnKeepAlive keepalive_possible(struct MHD_Connection *connection)
static void handle_req_chunk_size_line_no_space(struct MHD_Connection *c, const char *chunk_size_line, size_t chunk_size_line_size)
#define REQUEST_LACKS_HOST
#define BARE_CR_IN_FOOTER
static bool try_grow_read_buffer(struct MHD_Connection *connection, bool required)
static bool parse_http_version(struct MHD_Connection *connection, const char *http_string, size_t len)
#define BARE_LF_IN_HEADER
#define ERR_RSP_EMPTY_HEADER_NAME
static bool need_100_continue(struct MHD_Connection *connection)
#define ERR_RSP_WSP_IN_HEADER_NAME
static bool get_req_headers(struct MHD_Connection *c, bool process_footers)
#define ERROR_MSG_DATA_NOT_HANDLED_BY_APP
#define MHD_MIN_REASONABLE_REQ_METHOD_SIZE_
static unsigned int get_no_space_err_status_code(struct MHD_Connection *c, enum MHD_ProcRecvDataStage stage, const char *add_element, size_t add_element_size)
#define REQUEST_UNSUPPORTED_TR_ENCODING
enum MHD_Result MHD_connection_handle_idle(struct MHD_Connection *connection)
static void cleanup_connection(struct MHD_Connection *connection)
#define ERR_RSP_OBS_FOLD_FOOTER
static void parse_http_std_method(struct MHD_Connection *connection, const char *method, size_t len)
static bool check_and_grow_read_buffer_space(struct MHD_Connection *c)
static enum MHD_Result try_ready_chunked_body(struct MHD_Connection *connection, bool *p_finished)
static bool get_date_str(char *date)
#define BARE_LF_IN_FOOTER
static void connection_reset(struct MHD_Connection *connection, bool reuse)
#define REQUEST_LENGTH_WITH_TR_ENCODING
#define MHD_MIN_REASONABLE_REQ_TARGET_SIZE_
#define RQ_TARGET_INVALID_CHAR
static bool get_request_line_inner(struct MHD_Connection *c)
static void handle_req_footers_no_space(struct MHD_Connection *c, const char *add_footer, size_t add_footer_size)
void MHD_connection_handle_read(struct MHD_Connection *connection, bool socket_error)
static void connection_switch_from_recv_to_send(struct MHD_Connection *connection)
#define ERR_RSP_WSP_BEFORE_FOOTER
static void parse_connection_headers(struct MHD_Connection *connection)
#define ERR_RSP_INVALID_CHR_IN_HEADER
void MHD_update_last_activity_(struct MHD_Connection *connection)
#define MHD_MAX_EMPTY_LINES_SKIP
#define MHD_MIN_REASONABLE_HEADERS_SIZE_
#define REQUEST_HAS_NUL_CHAR_IN_PATH
#define BARE_CR_IN_HEADER
#define ERR_MSG_REQUEST_HEADER_TOO_BIG
static bool add_user_headers(char *buf, size_t *ppos, size_t buf_size, struct MHD_Response *response, bool filter_transf_enc, bool filter_content_len, bool add_close, bool add_keep_alive)
#define REQUEST_CONTENTLENGTH_MALFORMED
static enum MHD_HdrLineReadRes_ get_req_header(struct MHD_Connection *c, bool process_footers, struct _MHD_str_w_len *hdr_name, struct _MHD_str_w_len *hdr_value)
static void check_connection_reply(struct MHD_Connection *connection)
static void handle_req_headers_no_space(struct MHD_Connection *c, const char *add_header, size_t add_header_size)
void MHD_connection_close_(struct MHD_Connection *connection, enum MHD_RequestTerminationCode termination_code)
static size_t connection_maximize_write_buffer(struct MHD_Connection *connection)
static bool has_unprocessed_upload_body_data_in_buffer(struct MHD_Connection *c)
void MHD_connection_mark_closed_(struct MHD_Connection *connection)
#define CONNECTION_CLOSE_ERROR(c, emsg)
#define transmit_error_response_header(c, code, m, hd_n, hd_n_l, hd_v, hd_v_l)
static bool buffer_append(char *buf, size_t *ppos, size_t buf_size, const char *append, size_t append_size)
static enum MHD_Result check_write_done(struct MHD_Connection *connection, enum MHD_CONNECTION_STATE next_state)
#define ERR_RSP_WSP_BEFORE_HEADER
#define ERR_MSG_REQUEST_HEADER_WITH_COOKIES_TOO_BIG
_MHD_static_inline void switch_to_rq_headers_processing(struct MHD_Connection *c)
static bool get_date_header(char *header)
static bool MHD_lookup_header_token_ci(const struct MHD_Connection *connection, const char *header, size_t header_len, const char *token, size_t token_len)
#define ERR_RSP_FOOTER_WITHOUT_COLON
#define MHD_MIN_REASONABLE_REQ_CHUNK_LINE_LENGTH_
Methods for managing connections.
#define MHD_ERR_CONNRESET_
#define MHD_connection_finish_forward_(conn)
#define MHD_ERR_OPNOTSUPP_
bool MHD_tls_connection_shutdown(struct MHD_Connection *connection)
bool MHD_run_tls_handshake_(struct MHD_Connection *connection)
Methods for managing connections.
#define MHD_HTTP_INTERNAL_SERVER_ERROR
#define MHD_HTTP_MOVED_PERMANENTLY
#define MHD_HTTP_URI_TOO_LONG
#define MHD_HTTP_REQUEST_HEADER_FIELDS_TOO_LARGE
#define MHD_HTTP_PROCESSING
#define MHD_HTTP_NOT_IMPLEMENTED
#define MHD_HTTP_SWITCHING_PROTOCOLS
#define MHD_HTTP_HTTP_VERSION_NOT_SUPPORTED
#define MHD_HTTP_CONTENT_TOO_LARGE
#define MHD_HTTP_NOT_MODIFIED
#define MHD_HTTP_NO_CONTENT
#define MHD_HTTP_BAD_REQUEST
#define MHD_HTTP_METHOD_TRACE
#define MHD_HTTP_METHOD_OPTIONS
#define MHD_HTTP_METHOD_GET
#define MHD_HTTP_METHOD_HEAD
#define MHD_HTTP_METHOD_POST
#define MHD_HTTP_METHOD_PUT
#define MHD_HTTP_METHOD_CONNECT
#define MHD_HTTP_METHOD_DELETE
_MHD_EXTERN enum MHD_Result MHD_set_connection_value(struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key, const char *value)
enum MHD_Result(* MHD_KeyValueIterator)(void *cls, enum MHD_ValueKind kind, const char *key, const char *value)
_MHD_EXTERN const char * MHD_lookup_connection_value(struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key)
enum MHD_Result(* MHD_KeyValueIteratorN)(void *cls, enum MHD_ValueKind kind, const char *key, size_t key_size, const char *value, size_t value_size)
_MHD_EXTERN int MHD_get_connection_values_n(struct MHD_Connection *connection, enum MHD_ValueKind kind, MHD_KeyValueIteratorN iterator, void *iterator_cls)
_MHD_EXTERN int MHD_get_connection_values(struct MHD_Connection *connection, enum MHD_ValueKind kind, MHD_KeyValueIterator iterator, void *iterator_cls)
static enum MHD_Result MHD_set_connection_value_n_nocheck_(struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key, size_t key_size, const char *value, size_t value_size)
_MHD_EXTERN enum MHD_Result MHD_get_connection_URI_path_n(struct MHD_Connection *connection, const char **uri, size_t *uri_size)
_MHD_EXTERN enum MHD_Result MHD_set_connection_value_n(struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key, size_t key_size, const char *value, size_t value_size)
_MHD_EXTERN enum MHD_Result MHD_lookup_connection_value_n(struct MHD_Connection *connection, enum MHD_ValueKind kind, const char *key, size_t key_size, const char **value_ptr, size_t *value_size_ptr)
MHD_RequestTerminationCode
@ MHD_CONNECTION_INFO_CONNECTION_TIMEOUT
@ MHD_CONNECTION_INFO_SOCKET_CONTEXT
@ MHD_CONNECTION_INFO_GNUTLS_SESSION
@ MHD_CONNECTION_INFO_REQUEST_HEADER_SIZE
@ MHD_CONNECTION_INFO_CIPHER_ALGO
@ MHD_CONNECTION_INFO_CONNECTION_SUSPENDED
@ MHD_CONNECTION_INFO_CLIENT_ADDRESS
@ MHD_CONNECTION_INFO_DAEMON
@ MHD_CONNECTION_INFO_GNUTLS_CLIENT_CERT
@ MHD_CONNECTION_INFO_HTTP_STATUS
@ MHD_CONNECTION_INFO_CONNECTION_FD
@ MHD_CONNECTION_INFO_PROTOCOL
@ MHD_REQUEST_TERMINATED_TIMEOUT_REACHED
@ MHD_REQUEST_TERMINATED_COMPLETED_OK
@ MHD_REQUEST_TERMINATED_WITH_ERROR
@ MHD_REQUEST_TERMINATED_READ_ERROR
@ MHD_REQUEST_TERMINATED_CLIENT_ABORT
_MHD_EXTERN enum MHD_Result MHD_queue_response(struct MHD_Connection *connection, unsigned int status_code, struct MHD_Response *response)
_MHD_EXTERN void MHD_destroy_response(struct MHD_Response *response)
_MHD_EXTERN struct MHD_Response * MHD_create_response_from_buffer_static(size_t size, const void *buffer)
_MHD_EXTERN enum MHD_Result MHD_set_connection_option(struct MHD_Connection *connection, enum MHD_CONNECTION_OPTION option,...)
_MHD_EXTERN const union MHD_ConnectionInfo * MHD_get_connection_info(struct MHD_Connection *connection, enum MHD_ConnectionInfoType info_type,...)
#define MHD_HTTP_VERSION_1_0
#define MHD_HTTP_VERSION_1_1
enum MHD_Result MHD_parse_arguments_(struct MHD_Connection *connection, enum MHD_ValueKind kind, char *args, MHD_ArgumentIterator_ cb, void *cls)
MHD internal shared structures.
@ MHD_CONNECTION_BODY_RECEIVED
@ MHD_CONNECTION_CHUNKED_BODY_SENT
@ MHD_CONNECTION_REQ_HEADERS_RECEIVING
@ MHD_CONNECTION_BODY_RECEIVING
@ MHD_CONNECTION_HEADERS_SENDING
@ MHD_CONNECTION_FOOTERS_SENDING
@ MHD_CONNECTION_FOOTERS_RECEIVED
@ MHD_CONNECTION_FULL_REPLY_SENT
@ MHD_CONNECTION_HEADERS_SENT
@ MHD_CONNECTION_HEADERS_PROCESSED
@ MHD_CONNECTION_REQ_LINE_RECEIVED
@ MHD_CONNECTION_NORMAL_BODY_UNREADY
@ MHD_CONNECTION_HEADERS_RECEIVED
@ MHD_CONNECTION_NORMAL_BODY_READY
@ MHD_CONNECTION_START_REPLY
@ MHD_CONNECTION_FOOTERS_RECEIVING
@ MHD_CONNECTION_CHUNKED_BODY_READY
@ MHD_CONNECTION_FULL_REQ_RECEIVED
@ MHD_CONNECTION_CHUNKED_BODY_UNREADY
@ MHD_CONNECTION_CONTINUE_SENDING
@ MHD_CONNECTION_REQ_LINE_RECEIVING
#define XDLL_insert(head, tail, element)
@ MHD_EPOLL_STATE_SUSPENDED
@ MHD_EPOLL_STATE_IN_EREADY_EDLL
@ MHD_EPOLL_STATE_READ_READY
@ MHD_EPOLL_STATE_IN_EPOLL_SET
@ MHD_EPOLL_STATE_WRITE_READY
@ MHD_TLS_CONN_TLS_CLOSING
@ MHD_TLS_CONN_WR_CLOSING
@ MHD_TLS_CONN_INVALID_STATE
@ MHD_TLS_CONN_TLS_CLOSED
@ MHD_TLS_CONN_TLS_FAILED
@ MHD_TLS_CONN_HANDSHAKING
#define DLL_insert(head, tail, element)
@ MHD_EVENT_LOOP_INFO_PROCESS_READ
@ MHD_EVENT_LOOP_INFO_PROCESS
@ MHD_EVENT_LOOP_INFO_READ
@ MHD_EVENT_LOOP_INFO_WRITE
@ MHD_EVENT_LOOP_INFO_CLEANUP
#define EDLL_insert(head, tail, element)
struct MHD_IoVec MHD_iovec_
#define MHD_IS_HTTP_VER_SUPPORTED(ver)
_MHD_static_inline struct MHD_Daemon * MHD_get_master(struct MHD_Daemon *const daemon)
@ MHD_RAF_HAS_CONTENT_LENGTH
@ MHD_RAF_HAS_CONNECTION_CLOSE
@ MHD_RAF_HAS_TRANS_ENC_CHUNKED
@ MHD_RAF_HAS_CONNECTION_HDR
@ MHD_CONN_KEEPALIVE_UNKOWN
#define MHD_IS_HTTP_VER_1_1_COMPAT(ver)
@ MHD_HTTP_MTHD_NO_METHOD
#define EDLL_remove(head, tail, element)
#define XDLL_remove(head, tail, element)
#define MHD_D_IS_USING_THREAD_PER_CONN_(d)
#define DLL_remove(head, tail, element)
#define MHD_D_IS_USING_THREADS_(d)
#define MHD_D_IS_USING_EPOLL_(d)
void * MHD_pool_reallocate(struct MemoryPool *pool, void *old, size_t old_size, size_t new_size)
void MHD_pool_destroy(struct MemoryPool *pool)
bool MHD_pool_is_resizable_inplace(struct MemoryPool *pool, void *block, size_t block_size)
void MHD_pool_deallocate(struct MemoryPool *pool, void *block, size_t block_size)
void * MHD_pool_try_alloc(struct MemoryPool *pool, size_t size, size_t *required_bytes)
size_t MHD_pool_get_free(struct MemoryPool *pool)
void * MHD_pool_reset(struct MemoryPool *pool, void *keep, size_t copy_bytes, size_t new_size)
void * MHD_pool_allocate(struct MemoryPool *pool, size_t size, bool from_end)
memory pool; mostly used for efficient (de)allocation for each connection and bounding memory use for...
#define mhd_assert(ignore)
Header for platform missing functions.
Header for platform-independent inter-thread communication.
limits values definitions
Header for platform-independent locks abstraction.
#define MHD_mutex_unlock_chk_(ignore)
#define MHD_mutex_lock_chk_(ignore)
uint64_t MHD_monotonic_msec_counter(void)
internal monotonic clock functions implementations
ssize_t MHD_send_hdr_and_body_(struct MHD_Connection *connection, const char *header, size_t header_size, bool never_push_hdr, const char *body, size_t body_size, bool complete_response)
ssize_t MHD_send_iovec_(struct MHD_Connection *connection, struct MHD_iovec_track_ *const r_iov, bool push_data)
ssize_t MHD_send_data_(struct MHD_Connection *connection, const char *buffer, size_t buffer_size, bool push_data)
Declarations of send() wrappers.
#define MHD_SCKT_ERR_IS_(err, code)
#define MHD_SCKT_ERR_IS_EAGAIN_(err)
#define MHD_SCKT_ERR_IS_LOW_RESOURCES_(err)
#define MHD_socket_last_strerr_()
#define MHD_SCKT_EOPNOTSUPP_
#define MHD_socket_get_error_()
#define MHD_SCKT_ERR_IS_REMOTE_DISCNN_(err)
#define MHD_SCKT_ERR_IS_EINTR_(err)
#define MHD_SCKT_SEND_MAX_SIZE_
#define MHD_SCKT_ENOTCONN_
#define MHD_recv_(s, b, l)
#define MHD_SEND_SPIPE_SUPPRESS_NEEDED
int MHD_str_equal_caseless_(const char *str1, const char *str2)
size_t MHD_uint8_to_str_pad(uint8_t val, uint8_t min_digits, char *buf, size_t buf_size)
size_t MHD_uint16_to_str(uint16_t val, char *buf, size_t buf_size)
size_t MHD_str_to_uint64_n_(const char *str, size_t maxlen, uint64_t *out_val)
size_t MHD_uint64_to_str(uint64_t val, char *buf, size_t buf_size)
size_t MHD_strx_to_uint64_n_(const char *str, size_t maxlen, uint64_t *out_val)
int MHD_str_equal_caseless_n_(const char *const str1, const char *const str2, size_t maxlen)
bool MHD_str_has_token_caseless_(const char *str, const char *const token, size_t token_len)
bool MHD_str_equal_caseless_bin_n_(const char *const str1, const char *const str2, size_t len)
size_t MHD_uint32_to_strx(uint32_t val, char *buf, size_t buf_size)
Header for string manipulating helpers.
#define MHD_str_has_s_token_caseless_(str, tkn)
#define MHD_STATICSTR_LEN_(macro)
#define MHD_thread_handle_ID_is_current_thread_(hndl_id)
#define MHD_CONTENT_READER_END_OF_STREAM
_MHD_EXTERN size_t MHD_get_reason_phrase_len_for(unsigned int code)
#define MHD_INVALID_SOCKET
_MHD_EXTERN const char * MHD_get_reason_phrase_for(unsigned int code)
#define MHD_CONTENT_READER_END_WITH_ERROR
@ MHD_USE_SUPPRESS_DATE_NO_CLOCK
@ MHD_RF_SEND_KEEP_ALIVE_HEADER
@ MHD_RF_HEAD_ONLY_RESPONSE
@ MHD_RF_HTTP_1_0_COMPATIBLE_STRICT
@ MHD_RF_INSANITY_HEADER_CONTENT_LENGTH
@ MHD_CONNECTION_OPTION_TIMEOUT
bool MHD_add_response_entry_no_alloc_(struct MHD_Response *response, enum MHD_ValueKind kind, char *header, size_t header_len, char *content, size_t content_len)
void MHD_increment_response_rc(struct MHD_Response *response)
Methods for managing response objects.
enum MHD_Result MHD_response_execute_upgrade_(struct MHD_Response *response, struct MHD_Connection *connection)
size_t write_buffer_send_offset
enum MHD_ConnectionEventLoopInfo event_loop_info
size_t write_buffer_append_offset
enum MHD_ConnKeepAlive keepalive
union MHD_ConnectionInfo connection_info_dummy
size_t continue_message_write_offset
size_t read_buffer_offset
enum MHD_CONNECTION_STATE state
struct MHD_Daemon * daemon
uint64_t connection_timeout_ms
struct sockaddr_storage * addr
MHD_AccessHandlerCallback default_handler
LogCallback uri_log_callback
struct MHD_Connection * normal_timeout_tail
void * unescape_callback_cls
struct MHD_Connection * connections_tail
struct MHD_Connection * suspended_connections_tail
struct MHD_Connection * manual_timeout_head
struct MHD_Connection * normal_timeout_head
MHD_RequestCompletedCallback notify_completed
struct MHD_Connection * cleanup_head
uint64_t connection_timeout_ms
struct MHD_Connection * manual_timeout_tail
struct MHD_Connection * cleanup_tail
UnescapeCallback unescape_callback
void * notify_completed_cls
struct MHD_Connection * suspended_connections_head
void * default_handler_cls
struct MHD_Connection * connections_head
void * uri_log_callback_cls
bool use_reply_body_headers
uint64_t rsp_write_position
struct MHD_iovec_track_ resp_iov
struct MHD_Response * response
unsigned int responseCode
struct MHD_Reply_Properties props
unsigned int skipped_empty_lines
struct MHD_HTTP_Req_Header * headers_received
union MHD_HeadersProcessing hdrs
uint64_t current_chunk_size
uint64_t current_chunk_offset
bool some_payload_processed
size_t skipped_broken_lines
size_t num_cr_sp_replaced
enum MHD_HTTP_Version http_ver
union MHD_StartOrSize field_lines
struct MHD_HTTP_Req_Header * headers_received_tail
enum MHD_HTTP_Method http_mthd
const char * url_for_callback
uint64_t remaining_upload_size
MHD_ContentReaderCallback crc
enum MHD_ResponseAutoFlags flags_auto
enum MHD_ResponseFlags flags
struct MHD_HTTP_Res_Header * first_header
unsigned int connection_timeout
struct MHD_Daemon * daemon
struct sockaddr * client_addr