Browse Source

Make connection_printf_to_buf's behaviour sane

Robert Ransom 14 years ago
parent
commit
68cd0a9abe
2 changed files with 21 additions and 18 deletions
  1. 10 0
      changes/fix-connection_printf_to_buf
  2. 11 18
      src/or/control.c

+ 10 - 0
changes/fix-connection_printf_to_buf

@@ -0,0 +1,10 @@
+  * Code simplifications and refactoring:
+
+    - Make connection_printf_to_buf's behaviour sane.  Its callers
+      expect it to emit a CRLF iff the format string ends with CRLF;
+      it actually emits a CRLF iff (a) the format string ends with
+      CRLF or (b) the resulting string is over 1023 characters long or
+      (c) the format string does not end with CRLF ''and'' the
+      resulting string is 1021 characters long or longer.  Bugfix on
+      0.1.1.9-alpha; fixes bug 3407.
+

+ 11 - 18
src/or/control.c

@@ -481,33 +481,26 @@ decode_escaped_string(const char *start, size_t in_len_max,
 }
 }
 
 
 /** Acts like sprintf, but writes its formatted string to the end of
 /** Acts like sprintf, but writes its formatted string to the end of
- * <b>conn</b>-\>outbuf.  The message may be truncated if it is too long,
- * but it will always end with a CRLF sequence.
- *
- * Currently the length of the message is limited to 1024 (including the
- * ending CR LF NUL ("\\r\\n\\0"). */
+ * <b>conn</b>-\>outbuf. */
 static void
 static void
 connection_printf_to_buf(control_connection_t *conn, const char *format, ...)
 connection_printf_to_buf(control_connection_t *conn, const char *format, ...)
 {
 {
-#define CONNECTION_PRINTF_TO_BUF_BUFFERSIZE 1024
   va_list ap;
   va_list ap;
-  char buf[CONNECTION_PRINTF_TO_BUF_BUFFERSIZE];
-  int r;
-  size_t len;
+  char *buf = NULL;
+  int len;
+
   va_start(ap,format);
   va_start(ap,format);
-  r = tor_vsnprintf(buf, sizeof(buf), format, ap);
+  len = tor_vasprintf(&buf, format, ap);
   va_end(ap);
   va_end(ap);
-  if (r<0) {
+
+  if (len < 0) {
     log_warn(LD_BUG, "Unable to format string for controller.");
     log_warn(LD_BUG, "Unable to format string for controller.");
     return;
     return;
   }
   }
-  len = strlen(buf);
-  if (fast_memcmp("\r\n\0", buf+len-2, 3)) {
-    buf[CONNECTION_PRINTF_TO_BUF_BUFFERSIZE-1] = '\0';
-    buf[CONNECTION_PRINTF_TO_BUF_BUFFERSIZE-2] = '\n';
-    buf[CONNECTION_PRINTF_TO_BUF_BUFFERSIZE-3] = '\r';
-  }
-  connection_write_to_buf(buf, len, TO_CONN(conn));
+
+  connection_write_to_buf(buf, (size_t)len, TO_CONN(conn));
+
+  tor_free(buf);
 }
 }
 
 
 /** Write all of the open control ports to ControlPortWriteToFile */
 /** Write all of the open control ports to ControlPortWriteToFile */