1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
|
#include <nserve.h>
int slurpsock(char *buf, size_t buf_sz, int sock)
{
ssize_t bytes;
bytes = recv(sock, buf, buf_sz, 0);
check(bytes >= 0, "Failed to read from socket: %d", sock);
return bytes;
error:
return -1;
}
int barfsock(char *buf, size_t buf_sz, int sock)
{
ssize_t bytes = 0;
bytes = send(sock, buf, buf_sz, 0);
check(bytes >= 0, "barfsock: send failed");
return bytes;
error:
return -1;
}
int sanitize(char *cmd)
{
check(cmd != NULL, "cmd is NULL");
size_t len = strlen(cmd);
check(len > 0, "cmd empty");
// strip newline character at the end.
cmd[len - 1] = '\0';
return 0;
error:
return -1;
}
char *check_cmd(char *cmd)
{
char *err = NULL;
check(cmd != NULL, "cmd is NULL");
int rc = sanitize(cmd);
check(rc != -1, "sanitize failed");
size_t len = strlen(cmd);
if (len >= CMD_MIN_SIZE && len <= CMD_MAX_SIZE) {
return NULL;
}
if (len == 0) {
err = "closing connection\n";
} else {
err = "command size invalid\n";
}
return err;
error:
err = "internal error\n";
return err;
}
void nserve(int sock)
{
size_t cmd_sz = 200;
char *cmd = calloc(sizeof(char), cmd_sz);
check_mem(cmd);
// Read command from socket.
ssize_t bytes = slurpsock(cmd, cmd_sz, sock);
check(bytes >= 0, "nserve: slurpsock failed");
int rc = check_cmd_size(cmd, sock);
check(rc != -1, "command size check failed");
// Quit immediately if cmd size is too large.
if (rc == 1) {
goto error;
}
// Write response to socket.
rc = barfsock(cmd, bytes, sock);
check(rc != -1, "nserve: echo failed");
// Close socket.
rc = close(sock);
check(rc == 0, "nserve: close failed");
// Cleanup.
free(cmd);
exit(0);
error:
rc = close(sock);
check(rc == 0, "nserve: close failed");
// Cleanup if needed.
if (cmd)
free(cmd);
exit(1);
}
|