1
0
mirror of https://github.com/osmarks/ngircd.git synced 2024-10-28 04:46:17 +00:00

Read_Request(): Clean up code and add some more comments

No functional changes.
This commit is contained in:
Alexander Barton 2020-05-01 23:41:49 +02:00
parent 629a45ee0f
commit 9f05f5ee61

View File

@ -1550,6 +1550,7 @@ Read_Request( CONN_ID Idx )
char readbuf[READBUFFER_LEN];
time_t t;
CLIENT *c;
assert(Idx > NONE);
assert(My_Connections[Idx].sock > NONE);
@ -1568,12 +1569,14 @@ Read_Request( CONN_ID Idx )
return;
}
/* Now read new data from the network, up to READBUFFER_LEN bytes ... */
#ifdef SSL_SUPPORT
if (Conn_OPTION_ISSET(&My_Connections[Idx], CONN_SSL))
len = ConnSSL_Read(&My_Connections[Idx], readbuf, sizeof(readbuf));
else
#endif
len = read(My_Connections[Idx].sock, readbuf, sizeof(readbuf));
if (len == 0) {
LogDebug("Client \"%s:%u\" is closing connection %d ...",
My_Connections[Idx].host,
@ -1583,13 +1586,20 @@ Read_Request( CONN_ID Idx )
}
if (len < 0) {
if( errno == EAGAIN ) return;
if (errno == EAGAIN)
return;
Log(LOG_ERR, "Read error on connection %d (socket %d): %s!",
Idx, My_Connections[Idx].sock, strerror(errno));
Conn_Close(Idx, "Read error", "Client closed connection",
false);
return;
}
/* Now append the newly received data to the connection buffer.
* NOTE: This can lead to connection read buffers being bigger(!) than
* READBUFFER_LEN bytes, as we add up to READBUFFER_LEN new bytes to a
* buffer possibly being "almost" READBUFFER_LEN bytes already! */
#ifdef ZLIB
if (Conn_OPTION_ISSET(&My_Connections[Idx], CONN_ZIP)) {
if (!array_catb(&My_Connections[Idx].zip.rbuf, readbuf,