[or-cvs] change buf->buf to buf->mem

Roger Dingledine arma at seul.org
Wed Oct 15 19:17:23 UTC 2003


Update of /home/or/cvsroot/src/or
In directory moria.mit.edu:/home2/arma/work/onion/cvs/src/or

Modified Files:
	buffers.c 
Log Message:
change buf->buf to buf->mem
maybe this will mean fewer dumb errors


Index: buffers.c
===================================================================
RCS file: /home/or/cvsroot/src/or/buffers.c,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -d -r1.48 -r1.49
--- buffers.c	15 Oct 2003 19:07:07 -0000	1.48
+++ buffers.c	15 Oct 2003 19:17:21 -0000	1.49
@@ -9,7 +9,7 @@
 extern or_options_t options; /* command-line and config-file options */
 
 struct buf_t {
-  char *buf;
+  char *mem;
   size_t len;
   size_t datalen;
 };
@@ -21,13 +21,13 @@
  * out smaller than this, but they will never autoshrink to less
  * than this size. */
 #define MIN_BUF_SHRINK_SIZE (16*1024)
-#define BUF_OK(b) ((b) && (b)->buf && (b)->datalen <= (b)->len)
+#define BUF_OK(b) ((b) && (b)->mem && (b)->datalen <= (b)->len)
 
 /* Change a buffer's capacity.  Must only be called when */
 static INLINE void buf_resize(buf_t *buf, size_t new_capacity)
 {
   assert(buf->datalen <= new_capacity);
-  buf->buf = tor_realloc(buf->buf, new_capacity);
+  buf->mem = tor_realloc(buf->mem, new_capacity);
   buf->len = new_capacity;
 }
 
@@ -83,7 +83,7 @@
 static INLINE void buf_remove_from_front(buf_t *buf, size_t n) {
   assert(buf->datalen >= n);
   buf->datalen -= n;
-  memmove(buf->buf, buf->buf+n, buf->datalen);
+  memmove(buf->mem, buf->mem+n, buf->datalen);
   buf_shrink_if_underfull(buf);
 }
 
@@ -110,7 +110,7 @@
 }
 
 int find_on_inbuf(char *string, int string_len, buf_t *buf) {
-  return find_str_in_str(string, string_len, buf->buf, buf->datalen);
+  return find_str_in_str(string, string_len, buf->mem, buf->datalen);
 }
 
 /* Create and return a new buf of size 'size'
@@ -118,10 +118,10 @@
 buf_t *buf_new_with_capacity(size_t size) {
   buf_t *buf;
   buf = (buf_t*)tor_malloc(sizeof(buf_t));
-  buf->buf = (char *)tor_malloc(size);
+  buf->mem = (char *)tor_malloc(size);
   buf->len = size;
   buf->datalen = 0;
-//  memset(buf->buf,0,size);
+//  memset(buf->mem,0,size);
 
   assert(BUF_OK(buf));
   return buf;
@@ -145,12 +145,12 @@
 
 const char *_buf_peek_raw_buffer(const buf_t *buf)
 {
-  return buf->buf;
+  return buf->mem;
 }
 
 void buf_free(buf_t *buf) {
-  assert(buf && buf->buf);
-  free(buf->buf);
+  assert(buf && buf->mem);
+  free(buf->mem);
   free(buf);
 }
 
@@ -180,7 +180,7 @@
     return 0; /* we shouldn't read anything */
 
 //  log_fn(LOG_DEBUG,"reading at most %d bytes.",at_most);
-  read_result = read(s, buf->buf+buf->datalen, at_most);
+  read_result = read(s, buf->mem+buf->datalen, at_most);
   if (read_result < 0) {
     if(!ERRNO_EAGAIN(errno)) { /* it's a real error */
       return -1;
@@ -217,7 +217,7 @@
   if (at_most == 0)
     return 0;
   
-  r = tor_tls_read(tls, buf->buf+buf->datalen, at_most);
+  r = tor_tls_read(tls, buf->mem+buf->datalen, at_most);
   if (r<0) 
     return r;
   buf->datalen += r;
@@ -242,7 +242,7 @@
   if(*buf_flushlen == 0) /* nothing to flush */
     return 0;
 
-  write_result = write(s, buf->buf, *buf_flushlen);
+  write_result = write(s, buf->mem, *buf_flushlen);
   if (write_result < 0) {
     if(!ERRNO_EAGAIN(errno)) { /* it's a real error */
       return -1;
@@ -273,7 +273,7 @@
 
   /* we want to let tls write even if flushlen is zero, because it might
    * have a partial record pending */
-  r = tor_tls_write(tls, buf->buf, *buf_flushlen);
+  r = tor_tls_write(tls, buf->mem, *buf_flushlen);
   if (r < 0) {
     return r;
   }
@@ -302,7 +302,7 @@
     return -1;
   }
 
-  memcpy(buf->buf+buf->datalen, string, string_len);
+  memcpy(buf->mem+buf->datalen, string, string_len);
   buf->datalen += string_len;
   log_fn(LOG_DEBUG,"added %d bytes to buf (now %d total).",string_len, (int)buf->datalen);
   return buf->datalen;
@@ -318,7 +318,7 @@
   assert(string && BUF_OK(buf));
   assert(string_len <= buf->datalen); /* make sure we don't ask for too much */
 
-  memcpy(string,buf->buf,string_len);
+  memcpy(string,buf->mem,string_len);
   buf_remove_from_front(buf, string_len);
   return buf->datalen;
 }
@@ -344,13 +344,13 @@
 
   assert(BUF_OK(buf));
 
-  headers = buf->buf;
+  headers = buf->mem;
   i = find_on_inbuf("\r\n\r\n", 4, buf);
   if(i < 0) {
     log_fn(LOG_DEBUG,"headers not all here yet.");
     return 0;
   }
-  body = buf->buf+i;
+  body = buf->mem+i;
   headerlen = body-headers; /* includes the CRLFCRLF */
   bodylen = buf->datalen - headerlen;
   log_fn(LOG_DEBUG,"headerlen %d, bodylen %d.",headerlen,bodylen);
@@ -380,11 +380,11 @@
   }
   /* all happy. copy into the appropriate places, and return 1 */
   if(headers_out) {
-    memcpy(headers_out,buf->buf,headerlen);
+    memcpy(headers_out,buf->mem,headerlen);
     headers_out[headerlen] = 0; /* null terminate it */
   }
   if(body_out) {
-    memcpy(body_out,buf->buf+headerlen,bodylen);
+    memcpy(body_out,buf->mem+headerlen,bodylen);
     body_out[bodylen] = 0; /* null terminate it */
   }
   buf_remove_from_front(buf, headerlen+bodylen);
@@ -419,17 +419,17 @@
 
   if(buf->datalen < 2) /* version and another byte */
     return 0;
-  switch(*(buf->buf)) { /* which version of socks? */
+  switch(*(buf->mem)) { /* which version of socks? */
 
     case 5: /* socks5 */
 
       if(*socks_version != 5) { /* we need to negotiate a method */
-        unsigned char nummethods = (unsigned char)*(buf->buf+1);
+        unsigned char nummethods = (unsigned char)*(buf->mem+1);
         assert(!*socks_version);
         log_fn(LOG_DEBUG,"socks5: learning offered methods");
         if(buf->datalen < 2+nummethods)
           return 0;
-        if(!nummethods || !memchr(buf->buf+2, 0, nummethods)) {
+        if(!nummethods || !memchr(buf->mem+2, 0, nummethods)) {
           log_fn(LOG_WARN,"socks5: offered methods don't include 'no auth'. Rejecting.");
           *replylen = 2; /* 2 bytes of response */
           *reply = 5; /* socks5 reply */
@@ -449,16 +449,16 @@
       log_fn(LOG_DEBUG,"socks5: checking request");
       if(buf->datalen < 8) /* basic info plus >=2 for addr plus 2 for port */
         return 0; /* not yet */
-      if(*(buf->buf+1) != 1) { /* not a connect? we don't support it. */
-        log_fn(LOG_WARN,"socks5: command %d not '1'.",*(buf->buf+1));
+      if(*(buf->mem+1) != 1) { /* not a connect? we don't support it. */
+        log_fn(LOG_WARN,"socks5: command %d not '1'.",*(buf->mem+1));
         return -1;
       }
-      switch(*(buf->buf+3)) { /* address type */
+      switch(*(buf->mem+3)) { /* address type */
         case 1: /* IPv4 address */
           log_fn(LOG_DEBUG,"socks5: ipv4 address type");
           if(buf->datalen < 10) /* ip/port there? */
             return 0; /* not yet */
-          destip = ntohl(*(uint32_t*)(buf->buf+4));
+          destip = ntohl(*(uint32_t*)(buf->mem+4));
           in.s_addr = htonl(destip);
           tmpbuf = inet_ntoa(in);
           if(strlen(tmpbuf)+1 > max_addrlen) {
@@ -467,12 +467,12 @@
             return -1;
           }
           strcpy(addr_out,tmpbuf);
-          *port_out = ntohs(*(uint16_t*)(buf->buf+8));
+          *port_out = ntohs(*(uint16_t*)(buf->mem+8));
           buf_remove_from_front(buf, 10);
           return 1;
         case 3: /* fqdn */
           log_fn(LOG_DEBUG,"socks5: fqdn address type");
-          len = (unsigned char)*(buf->buf+4);
+          len = (unsigned char)*(buf->mem+4);
           if(buf->datalen < 7+len) /* addr/port there? */
             return 0; /* not yet */
           if(len+1 > max_addrlen) {
@@ -480,13 +480,13 @@
                    len+1,max_addrlen);
             return -1;
           }
-          memcpy(addr_out,buf->buf+5,len);
+          memcpy(addr_out,buf->mem+5,len);
           addr_out[len] = 0;
-          *port_out = ntohs(*(uint16_t*)(buf->buf+5+len));
+          *port_out = ntohs(*(uint16_t*)(buf->mem+5+len));
           buf_remove_from_front(buf, 5+len+2);
           return 1;
         default: /* unsupported */
-          log_fn(LOG_WARN,"socks5: unsupported address type %d",*(buf->buf+3));
+          log_fn(LOG_WARN,"socks5: unsupported address type %d",*(buf->mem+3));
           return -1;
       }
       assert(0);
@@ -496,13 +496,13 @@
       if(buf->datalen < SOCKS4_NETWORK_LEN) /* basic info available? */
         return 0; /* not yet */
 
-      if(*(buf->buf+1) != 1) { /* not a connect? we don't support it. */
-        log_fn(LOG_WARN,"socks4: command %d not '1'.",*(buf->buf+1));
+      if(*(buf->mem+1) != 1) { /* not a connect? we don't support it. */
+        log_fn(LOG_WARN,"socks4: command %d not '1'.",*(buf->mem+1));
         return -1;
       }
 
-      *port_out = ntohs(*(uint16_t*)(buf->buf+2));
-      destip = ntohl(*(uint32_t*)(buf->buf+4));
+      *port_out = ntohs(*(uint16_t*)(buf->mem+2));
+      destip = ntohl(*(uint32_t*)(buf->mem+4));
       if(!*port_out || !destip) {
         log_fn(LOG_WARN,"socks4: Port or DestIP is zero.");
         return -1;
@@ -519,7 +519,7 @@
         socks4_prot = socks4;
       }
 
-      next = memchr(buf->buf+SOCKS4_NETWORK_LEN, 0, buf->datalen);
+      next = memchr(buf->mem+SOCKS4_NETWORK_LEN, 0, buf->datalen);
       if(!next) {
         log_fn(LOG_DEBUG,"Username not here yet.");
         return 0;
@@ -527,7 +527,7 @@
 
       startaddr = next+1;
       if(socks4_prot == socks4a) {
-        next = memchr(startaddr, 0, buf->buf+buf->datalen-startaddr);
+        next = memchr(startaddr, 0, buf->mem+buf->datalen-startaddr);
         if(!next) {
           log_fn(LOG_DEBUG,"Destaddr not here yet.");
           return 0;
@@ -539,11 +539,11 @@
       }
       log_fn(LOG_DEBUG,"Everything is here. Success.");
       strcpy(addr_out, socks4_prot == socks4 ? tmpbuf : startaddr);
-      buf_remove_from_front(buf, next-buf->buf+1); /* next points to the final \0 on inbuf */
+      buf_remove_from_front(buf, next-buf->mem+1); /* next points to the final \0 on inbuf */
       return 1;
 
     default: /* version is not socks4 or socks5 */
-      log_fn(LOG_WARN,"Socks version %d not recognized. (Tor is not an httpd proxy.)",*(buf->buf));
+      log_fn(LOG_WARN,"Socks version %d not recognized. (Tor is not an httpd proxy.)",*(buf->mem));
       return -1;
   }
 }



More information about the tor-commits mailing list