]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
[MAJOR] huge rework of the HTTP request FSM
authorWilly Tarreau <w@1wt.eu>
Sun, 21 Jan 2007 18:16:41 +0000 (19:16 +0100)
committerWilly Tarreau <w@1wt.eu>
Sun, 21 Jan 2007 18:16:41 +0000 (19:16 +0100)
The HTTP parser has been rewritten for better compliance to RFC2616.
The same parser is now usable for both requests and responses, and
it now supports HTTP/0.9 as well as multi-line headers. It has also
been improved for speed ; a typicial HTTP request is parsed in about
2 microseconds on a 1 GHz processor.

The monitor-uri check has been moved so that the requests are not
logged. The httpclose option now tries to change as little as
possible in the request, and does not affect the first header if
it is already set to 'close'. HTTP/0.9 requests are converted to
HTTP/1.0 before being forwarded.

Headers and request transformations are now distinct. The headers
list is updated after each insertion/removal/transformation. The
request is re-parsed and checked after each transformation. It is
not possible anymore to remove a request, and requests which lead
to invalid request lines are now rejected.

12 files changed:
include/proto/buffers.h
include/proto/hdr_idx.h
include/proto/proto_http.h
include/types/proto_http.h
include/types/session.h
src/buffers.c
src/cfgparse.c
src/client.c
src/hdr_idx.c
src/log.c
src/proto_http.c
src/session.c

index 657786026a266d1a551d9b2272b99b78dbb20ff5..86f414aa5b509b1295567ad2abf65254d536c33f 100644 (file)
@@ -87,6 +87,7 @@ int buffer_write_chunk(struct buffer *buf, struct chunk *chunk);
 int buffer_replace(struct buffer *b, char *pos, char *end, char *str);
 int buffer_replace2(struct buffer *b, char *pos, char *end, char *str, int len);
 int chunk_printf(struct chunk *chk, int size, const char *fmt, ...);
+void buffer_dump(FILE *o, struct buffer *b, int from, int to);
 
 /*
  * frees the destination chunk if already allocated, allocates a new string,
index 881a3eb62b4c8f5beea0e45c8d7d0ecf7bce349c..9e67a003a6d69da309c4652a15f96bffe1986dcb 100644 (file)
@@ -40,6 +40,38 @@ static inline void hdr_idx_init(struct hdr_idx *list)
        list->used = list->last = 1;
 }
 
+/*
+ * Return index of the first entry in the list. Usually, it means the index of
+ * the first header just after the request or response. If zero is returned, it
+ * means that the list is empty.
+ */
+static inline int hdr_idx_first_idx(struct hdr_idx *list)
+{
+       return list->v[0].next;
+}
+
+/*
+ * Return position of the first entry in the list. Usually, it means the
+ * position of the first header just after the request, but it can also be the
+ * end of the headers if the request has no header. hdr_idx_start_idx() should
+ * be checked before to ensure there is a valid header.
+ */
+static inline int hdr_idx_first_pos(struct hdr_idx *list)
+{
+       return list->v[0].len + list->v[0].cr + 1;
+}
+
+/*
+ * Sets the information about the start line. Its length and the presence of
+ * the CR are registered so that hdr_idx_first_pos() knows exactly where to
+ * find the first header.
+ */
+static inline void hdr_idx_set_start(struct hdr_idx *list, int len, int cr)
+{
+       list->v[0].len = len;
+       list->v[0].cr = cr;
+}
+
 /*
  * Add a header entry to <list> after element <after>. <after> is ignored when
  * the list is empty or full. Common usage is to set <after> to list->tail.
index 45a42d7929bfcf89178d64e9ad854bb42cb18574..4863fe80c97f6017912e3d351d8e2b50abc5c3e1 100644 (file)
  * some macros used for the request parsing.
  * from RFC2616:
  *   CTL                 = <any US-ASCII control character (octets 0 - 31) and DEL (127)>
+ *   SEP                 = one of the 17 defined separators or SP or HT
+ *   LWS                 = CR, LF, SP or HT
+ *   SPHT                = SP or HT. Use this macro and not a boolean expression for best speed.
+ *   CRLF                = CR or LF. Use this macro and not a boolean expression for best speed.
+ *   token               = any CHAR except CTL or SEP. Use this macro and not a boolean expression for best speed.
  */
-static inline int IS_CTL(const unsigned char x) { return (x < 32)||(x == 127);}
 
+extern const char http_is_ctl[256];
+extern const char http_is_sep[256];
+extern const char http_is_lws[256];
+extern const char http_is_spht[256];
+extern const char http_is_crlf[256];
+extern const char http_is_token[256];
+
+#define HTTP_IS_CTL(x)   (http_is_ctl[(unsigned char)(x)])
+#define HTTP_IS_SEP(x)   (http_is_sep[(unsigned char)(x)])
+#define HTTP_IS_LWS(x)   (http_is_lws[(unsigned char)(x)])
+#define HTTP_IS_SPHT(x)  (http_is_spht[(unsigned char)(x)])
+#define HTTP_IS_CRLF(x)  (http_is_crlf[(unsigned char)(x)])
+#define HTTP_IS_TOKEN(x) (http_is_token[(unsigned char)(x)])
 
 int event_accept(int fd);
 int process_session(struct task *t);
@@ -49,8 +66,10 @@ int produce_content(struct session *s);
 int produce_content_stats(struct session *s);
 int produce_content_stats_proxy(struct session *s, struct proxy *px);
 void debug_hdr(const char *dir, struct session *t, const char *start, const char *end);
-void get_srv_from_appsession(struct session *t, const char *begin, const char *end);
-void apply_filters_to_session(struct session *t, struct buffer *req, struct hdr_exp *exp);
+void get_srv_from_appsession(struct session *t, const char *begin, int len);
+int apply_filter_to_req_headers(struct session *t, struct buffer *req, struct hdr_exp *exp);
+int apply_filter_to_req_line(struct session *t, struct buffer *req, struct hdr_exp *exp);
+int apply_filters_to_request(struct session *t, struct buffer *req, struct hdr_exp *exp);
 void manage_client_side_cookies(struct session *t, struct buffer *req);
 int stats_check_uri_auth(struct session *t, struct proxy *backend);
 void init_proto_http();
index 82c9692829f2616243a6d0dbcab3e4729bab1541..a00c88035d5639bc88fb1bee3f03d4ff4a560882 100644 (file)
 #define SV_STCLOSE     6
 
 
+/* The HTTP parser is more complex than it looks like, because we have to
+ * support multi-line headers and any number of spaces between the colon and
+ * the value.
+ *
+ * All those examples must work :
+
+ Hdr1:val1\r\n
+ Hdr1: val1\r\n
+ Hdr1:\t val1\r\n
+ Hdr1: \r\n
+  val1\r\n
+ Hdr1:\r\n
+  val1\n
+ \tval2\r\n
+  val3\n
+
+ *
+ */
+
 /* Possible states while parsing HTTP messages (request|response) */
-#define HTTP_PA_EMPTY      0    /* leading LF, before start line */
-#define HTTP_PA_START      1    /* inside start line */
-#define HTTP_PA_STRT_LF    2    /* LF after start line */
-#define HTTP_PA_HEADER     3    /* inside a header */
-#define HTTP_PA_HDR_LF     4    /* LF after a header */
-#define HTTP_PA_HDR_LWS    5    /* LWS after a header */
-#define HTTP_PA_LFLF       6    /* after double LF/CRLF at the end of headers */
-#define HTTP_PA_ERROR      7    /* syntax error in the message */
-#define HTTP_PA_CR_SKIP 0x10    /* ORed with other values when a CR was skipped */
-#define HTTP_PA_LF_EXP  0x20    /* ORed with other values when a CR is seen and
-                                * an LF is expected before entering the
-                                * designated state. */
+#define HTTP_MSG_RQBEFORE      0 // request: leading LF, before start line
+#define HTTP_MSG_RQBEFORE_CR   1 // request: leading CRLF, before start line
+
+/* these ones define a request start line */
+#define HTTP_MSG_RQMETH        2 // parsing the Method
+#define HTTP_MSG_RQMETH_SP     3 // space(s) after the ethod
+#define HTTP_MSG_RQURI         4 // parsing the Request URI
+#define HTTP_MSG_RQURI_SP      5 // space(s) after the Request URI
+#define HTTP_MSG_RQVER         6 // parsing the Request Version
+#define HTTP_MSG_RQLINE_END    7 // end of request line (CR or LF)
+
+#define HTTP_MSG_RPBEFORE      8 // response: leading LF, before start line
+#define HTTP_MSG_RPBEFORE_CR   9 // response: leading CRLF, before start line
+
+/* these ones define a response start line */
+#define HTTP_MSG_RPVER        10 // parsing the Response Version
+#define HTTP_MSG_RPVER_SP     11 // space(s) after the Response Version
+#define HTTP_MSG_RPCODE       12 // response code
+#define HTTP_MSG_RPCODE_SP    13 // space(s) after the response code
+#define HTTP_MSG_RPREASON     14 // response reason
+#define HTTP_MSG_RPLINE_END   15 // end of response line (CR or LF)
+
+/* common header processing */
+
+#define HTTP_MSG_HDR_FIRST    16 // waiting for first header or last CRLF (no LWS possible)
+#define HTTP_MSG_HDR_NAME     17 // parsing header name
+#define HTTP_MSG_HDR_COL      18 // parsing header colon
+#define HTTP_MSG_HDR_L1_SP    19 // parsing header LWS (SP|HT) before value
+#define HTTP_MSG_HDR_L1_LF    20 // parsing header LWS (LF) before value
+#define HTTP_MSG_HDR_L1_LWS   21 // checking whether it's a new header or an LWS
+#define HTTP_MSG_HDR_VAL      22 // parsing header value
+#define HTTP_MSG_HDR_L2_LF    23 // parsing header LWS (LF) inside/after value
+#define HTTP_MSG_HDR_L2_LWS   24 // checking whether it's a new header or an LWS
+
+#define HTTP_MSG_LAST_LF      25 // parsing last LF
+#define HTTP_MSG_BODY         26 // parsing body at end of headers
+#define HTTP_MSG_ERROR        27 // an error occurred
+
 
 /* various data sources for the responses */
 #define DATA_SRC_NONE  0
index 1302944576ec01578cb88b0aca2fde813d250d50..1edc2f8544af27c4dea8f8a3994efde951a06589 100644 (file)
@@ -93,6 +93,7 @@
 #define        SN_CACHE_SHIFT  20              /* bit shift */
 
 /* various other session flags, bits values 0x400000 and above */
+#define SN_CONN_CLOSED 0x00000800      /* "Connection: close" was present or added */
 #define SN_MONITOR     0x00400000      /* this session comes from a monitoring system */
 #define SN_ASSIGNED    0x00800000      /* no need to assign a server to this session */
 #define SN_ADDR_SET    0x01000000      /* this session's server address has been set */
@@ -134,9 +135,25 @@ typedef enum {
  */
 struct http_msg {
        int hdr_state;                  /* where we are in the current header parsing */
-       int sor, eoh;                   /* Start Of Request and End Of Headers, relative to buffer */
-       int eol;                        /* end of line */
+       char *sol, *eol;                /* start of line, end of line */
+       int sor;                        /* Start Of Request, relative to buffer */
+       int col, sov;                   /* current header: colon, start of value */
+       int eoh;                        /* End Of Headers, relative to buffer */
        char **cap;                     /* array of captured request headers (may be NULL) */
+       union {                         /* useful start line pointers, relative to buffer */
+               struct {
+                       int l;          /* request line length (not including CR) */
+                       int m_l;        /* METHOD length (method starts at ->sor) */
+                       int u, u_l;     /* URI, length */
+                       int v, v_l;     /* VERSION, length */
+               } rq;                   /* request line : field, length */
+               struct {
+                       int l;          /* status line length (not including CR) */
+                       int v_l;        /* VERSION length (version starts at ->sor) */
+                       int c, c_l;     /* CODE, length */
+                       int r, r_l;     /* REASON, length */
+               } st;                   /* status line : field, length */
+       } sl;                           /* start line */
 };
 
 /* This is an HTTP request, as described in RFC2616. It contains both a request
@@ -146,7 +163,6 @@ struct http_req {
        int req_state;                  /* what we are currently parsing */
        http_meth_t meth;               /* HTTP method */
        struct hdr_idx hdr_idx;         /* array of header indexes (max: MAX_HTTP_HDR) */
-       struct chunk start;             /* points to first line, called "start line" in RFC2616 */
        struct chunk auth_hdr;          /* points to 'Authorization:' header */
        struct http_msg req, rsp;       /* HTTP request and response messages */
 };
index 1ac38afdd61a7162dc1fc77c0533d42f00319c5a..8dfa857966b41a80090c0cd625a38e559a1cff7b 100644 (file)
@@ -154,6 +154,31 @@ int chunk_printf(struct chunk *chk, int size, const char *fmt, ...)
        return chk->len;
 }
 
+/*
+ * Dumps part or all of a buffer.
+ */
+void buffer_dump(FILE *o, struct buffer *b, int from, int to)
+{
+       fprintf(o, "Dumping buffer %p\n", b);
+       fprintf(o, "  data=%p l=%d r=%p w=%p h=%p lr=%p\n",
+               b->data, b->l, b->r, b->w, b->h, b->lr);
+
+       if (!to || to > b->l)
+               to = b->l;
+
+       fprintf(o, "Dumping contents from byte %d to byte %d\n", from, to);
+       for (; from < to; from++) {
+               if ((from & 15) == 0)
+                       fprintf(o, "  %04x: ", from);
+               fprintf(o, "%02x ", b->data[from]);
+               if ((from & 15) == 7)
+                       fprintf(o, "- ");
+               else if (((from & 15) == 15) && (from != to-1))
+                       fprintf(o, "\n");
+       }
+       fprintf(o, "\n--\n");
+}
+
 
 /*
  * Local variables:
index b385781b39ff50a5932b4166a445d9d4914534bf..8971ca679a3b2203d453fd9f56cb2d3176b5626e 100644 (file)
@@ -601,10 +601,9 @@ int cfg_parse_listen(const char *file, int linenum, char **args)
                if (curproxy->monitor_uri != NULL)
                        free(curproxy->monitor_uri);
 
-               curproxy->monitor_uri_len = strlen(args[1]) + 2; /* include leading and trailing spaces */
+               curproxy->monitor_uri_len = strlen(args[1]);
                curproxy->monitor_uri = (char *)calloc(1, curproxy->monitor_uri_len + 1);
-               memcpy(curproxy->monitor_uri + 1, args[1], curproxy->monitor_uri_len - 2);
-               curproxy->monitor_uri[curproxy->monitor_uri_len-1] = curproxy->monitor_uri[0] = ' ';
+               memcpy(curproxy->monitor_uri, args[1], curproxy->monitor_uri_len);
                curproxy->monitor_uri[curproxy->monitor_uri_len] = '\0';
 
                return 0;
index 7358d29628f6bcf50eb0eeb25de957b5b68730f2..8bcd1431b2a1660028146fcb02604c50161503fc 100644 (file)
@@ -205,9 +205,9 @@ int event_accept(int fd) {
                hreq->hdr_idx.size = hreq->hdr_idx.used = 0;
 
                if (p->mode == PR_MODE_HTTP) {
-                       hreq->req.hdr_state = HTTP_PA_EMPTY; /* at the very beginning of the request */
-                       hreq->req.eol = hreq->req.sor = hreq->req.eoh = 0; /* relative to the buffer */
-                       hreq->start.len = -1;
+                       hreq->req.hdr_state = HTTP_MSG_RQBEFORE; /* at the very beginning of the request */
+                       hreq->req.sol = hreq->req.eol = NULL;
+                       hreq->req.sor = hreq->req.eoh = 0; /* relative to the buffer */
                        hreq->auth_hdr.len = -1;
 
                        hreq->hdr_idx.size = MAX_HTTP_HDR;
index da6b906c9194c2c5a9d5deb38bc96e64233b7019..aceaeb13ce1ff146360d688c901a2deec69ecc29 100644 (file)
 #include <types/hdr_idx.h>
 
 
-/*
- * Initialize the list pointers.
- * list->size must already be set. If list->size is set and list->v is
- * non-null, list->v is also initialized..
- */
-static inline void hdr_idx_init(struct hdr_idx *list)
-{
-
-       if (list->size && list->v) {
-               register struct hdr_idx_elem e = { .len=0, .cr=0, .next=0};
-               list->v[0] = e;
-       }
-       list->tail = 0;
-       list->used = list->last = 1;
-}
-
 /*
  * Add a header entry to <list> after element <after>. <after> is ignored when
  * the list is empty or full. Common usage is to set <after> to list->tail.
index c8b3194782d924570c0d1c4a31a7759e0095500a..e25536fc00dbf65414ba1ed24102209c0355644f 100644 (file)
--- a/src/log.c
+++ b/src/log.c
@@ -213,6 +213,10 @@ void send_log(struct proxy *p, int level, const char *message, ...)
        }
 
        va_start(argp, message);
+       /*
+        * FIXME: we take a huge performance hit here. We might have to replace
+        * vsnprintf() for a hard-coded log writer.
+        */
        data_len = vsnprintf(dataptr, logmsg + sizeof(logmsg) - dataptr, message, argp);
        if (data_len < 0 || data_len > (logmsg + sizeof(logmsg) - dataptr))
                data_len = logmsg + sizeof(logmsg) - dataptr;
index b051467d94a611005777a325f63034af605e850f..92e818c028cb96d91a5bd1c597db2f308964dc32 100644 (file)
@@ -205,7 +205,7 @@ struct http_method_desc {
        const char text[8];
 };
 
-static struct http_method_desc http_methods[26][3] = {
+const struct http_method_desc http_methods[26][3] = {
        ['C' - 'A'] = {
                [0] = { .meth = HTTP_METH_CONNECT , .len=7, .text="CONNECT" },
        },
@@ -230,6 +230,70 @@ static struct http_method_desc http_methods[26][3] = {
         */
 };
 
+/* It is about twice as fast on recent architectures to lookup a byte in a
+ * table than two perform a boolean AND or OR between two tests. Refer to
+ * RFC2616 for those chars.
+ */
+
+const char http_is_spht[256] = {
+       [' '] = 1, ['\t'] = 1,
+};
+
+const char http_is_crlf[256] = {
+       ['\r'] = 1, ['\n'] = 1,
+};
+
+const char http_is_lws[256] = {
+       [' '] = 1, ['\t'] = 1,
+       ['\r'] = 1, ['\n'] = 1,
+};
+
+const char http_is_sep[256] = {
+       ['('] = 1, [')']  = 1, ['<']  = 1, ['>'] = 1,
+       ['@'] = 1, [',']  = 1, [';']  = 1, [':'] = 1,
+       ['"'] = 1, ['/']  = 1, ['[']  = 1, [']'] = 1,
+       ['{'] = 1, ['}']  = 1, ['?']  = 1, ['='] = 1,
+       [' '] = 1, ['\t'] = 1, ['\\'] = 1,
+};
+
+const char http_is_ctl[256] = {
+       [0 ... 31] = 1,
+       [127] = 1,
+};
+
+/*
+ * A token is any ASCII char that is neither a separator nor a CTL char.
+ * Do not overwrite values in assignment since gcc-2.95 will not handle
+ * them correctly. Instead, define every non-CTL char's status.
+ */
+const char http_is_token[256] = {
+       [' '] = 0, ['!'] = 1, ['"'] = 0, ['#'] = 1,
+       ['$'] = 1, ['%'] = 1, ['&'] = 1, ['\''] = 1,
+       ['('] = 0, [')'] = 0, ['*'] = 1, ['+'] = 1,
+       [','] = 0, ['-'] = 1, ['.'] = 1, ['/'] = 0,
+       ['0'] = 1, ['1'] = 1, ['2'] = 1, ['3'] = 1,
+       ['4'] = 1, ['5'] = 1, ['6'] = 1, ['7'] = 1,
+       ['8'] = 1, ['9'] = 1, [':'] = 0, [';'] = 0,
+       ['<'] = 0, ['='] = 0, ['>'] = 0, ['?'] = 0,
+       ['@'] = 0, ['A'] = 1, ['B'] = 1, ['C'] = 1,
+       ['D'] = 1, ['E'] = 1, ['F'] = 1, ['G'] = 1,
+       ['H'] = 1, ['I'] = 1, ['J'] = 1, ['K'] = 1,
+       ['L'] = 1, ['M'] = 1, ['N'] = 1, ['O'] = 1,
+       ['P'] = 1, ['Q'] = 1, ['R'] = 1, ['S'] = 1,
+       ['T'] = 1, ['U'] = 1, ['V'] = 1, ['W'] = 1,
+       ['X'] = 1, ['Y'] = 1, ['Z'] = 1, ['['] = 0,
+       ['\\'] = 0, [']'] = 0, ['^'] = 1, ['_'] = 1,
+       ['`'] = 1, ['a'] = 1, ['b'] = 1, ['c'] = 1,
+       ['d'] = 1, ['e'] = 1, ['f'] = 1, ['g'] = 1,
+       ['h'] = 1, ['i'] = 1, ['j'] = 1, ['k'] = 1,
+       ['l'] = 1, ['m'] = 1, ['n'] = 1, ['o'] = 1,
+       ['p'] = 1, ['q'] = 1, ['r'] = 1, ['s'] = 1,
+       ['t'] = 1, ['u'] = 1, ['v'] = 1, ['w'] = 1,
+       ['x'] = 1, ['y'] = 1, ['z'] = 1, ['{'] = 0,
+       ['|'] = 1, ['}'] = 0, ['~'] = 1, 
+};
+
+
 #ifdef DEBUG_FULL
 static char *cli_stnames[5] = {"HDR", "DAT", "SHR", "SHW", "CLS" };
 static char *srv_stnames[7] = {"IDL", "CON", "HDR", "DAT", "SHR", "SHW", "CLS" };
@@ -317,22 +381,16 @@ struct chunk *error_message(struct session *s, int msgnum)
 static http_meth_t find_http_meth(const char *str, const int len)
 {
        unsigned char m;
-       struct http_method_desc *h;
+       const struct http_method_desc *h;
 
        m = ((unsigned)*str - 'A');
 
        if (m < 26) {
-               int l;
-               for (h = http_methods[m]; (l = (h->len)) > 0; h++) {
-                       if (len <= l)
-                               continue;
-
-                       if (str[l] != ' ' && str[l] != '\t')
+               for (h = http_methods[m]; h->len > 0; h++) {
+                       if (unlikely(h->len != len))
                                continue;
-
-                       if (memcmp(str, h->text, l) == 0) {
+                       if (likely(memcmp(str, h->text, h->len) == 0))
                                return h->meth;
-                       }
                };
                return HTTP_METH_OTHER;
        }
@@ -429,9 +487,407 @@ int process_session(struct task *t)
 }
 
 
+/* either we find an LF at <ptr> or we jump to <bad>.
+ */
+#define EXPECT_LF_HERE(ptr, bad)       do { if (unlikely(*(ptr) != '\n')) goto bad; } while (0)
+
+/* plays with variables <ptr>, <end> and <state>. Jumps to <good> if OK,
+ * otherwise to <http_msg_ood> with <state> set to <st>.
+ */
+#define EAT_AND_JUMP_OR_RETURN(good, st)   do { \
+               ptr++;                          \
+               if (likely(ptr < end))          \
+                       goto good;              \
+               else {                          \
+                       state = (st);           \
+                       goto http_msg_ood;      \
+               }                               \
+       } while (0)
+
 /*
- * FIXME: This should move to the HTTP_flow_analyzer code
+ * This function parses a request line between <ptr> and <end>, starting with
+ * parser state <state>. Only states HTTP_MSG_RQMETH, HTTP_MSG_RQMETH_SP,
+ * HTTP_MSG_RQURI, HTTP_MSG_RQURI_SP and HTTP_MSG_RQVER are handled. Others
+ * will give undefined results.
+ * Note that it is upon the caller's responsibility to ensure that ptr < end,
+ * and that msg->sol points to the beginning of the request.
+ * If a complete line is found (which implies that at least one CR or LF is
+ * found before <end>, the updated <ptr> is returned, otherwise NULL is
+ * returned indicating an incomplete line (which does not mean that parts have
+ * not been updated). In the incomplete case, if <ret_ptr> or <ret_state> are
+ * non-NULL, they are fed with the new <ptr> and <state> values to be passed
+ * upon next call.
+ *
+ * This function was intentionnally designed to be called from
+ * http_msg_analyzer() with the lowest overhead. It should integrate perfectly
+ * within its state machine and use the same macros, hence the need for same
+ * labels and variable names.
  */
+const char *http_parse_reqline(struct http_msg *msg, const char *msg_buf, int state,
+                        const char *ptr, const char *end,
+                        char **ret_ptr, int *ret_state)
+{
+       __label__
+               http_msg_rqmeth,
+               http_msg_rqmeth_sp,
+               http_msg_rquri,
+               http_msg_rquri_sp,
+               http_msg_rqver,
+               http_msg_rqline_eol,
+               http_msg_ood,     /* out of data */
+               http_msg_invalid;
+
+       switch (state)  {
+       http_msg_rqmeth:
+       case HTTP_MSG_RQMETH:
+               if (likely(HTTP_IS_TOKEN(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqmeth, HTTP_MSG_RQMETH);
+
+               if (likely(HTTP_IS_SPHT(*ptr))) {
+                       msg->sl.rq.m_l = (ptr - msg_buf) - msg->sor;
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqmeth_sp, HTTP_MSG_RQMETH_SP);
+               }
+
+               if (likely(HTTP_IS_CRLF(*ptr))) {
+                       /* HTTP 0.9 request */
+                       msg->sl.rq.m_l = (ptr - msg_buf) - msg->sor;
+               http_msg_req09_uri:
+                       msg->sl.rq.u = ptr - msg_buf;
+               http_msg_req09_uri_e:
+                       msg->sl.rq.u_l = (ptr - msg_buf) - msg->sl.rq.u;
+               http_msg_req09_ver:
+                       msg->sl.rq.v = ptr - msg_buf;
+                       msg->sl.rq.v_l = 0;
+                       goto http_msg_rqline_eol;
+               }
+               goto http_msg_invalid;
+               
+       http_msg_rqmeth_sp:
+       case HTTP_MSG_RQMETH_SP:
+               if (likely(!HTTP_IS_LWS(*ptr))) {
+                       msg->sl.rq.u = ptr - msg_buf;
+                       goto http_msg_rquri;
+               }
+               if (likely(HTTP_IS_SPHT(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqmeth_sp, HTTP_MSG_RQMETH_SP);
+               /* so it's a CR/LF, meaning an HTTP 0.9 request */
+               goto http_msg_req09_uri;
+
+       http_msg_rquri:
+       case HTTP_MSG_RQURI:
+               if (likely(!HTTP_IS_LWS(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rquri, HTTP_MSG_RQURI);
+
+               if (likely(HTTP_IS_SPHT(*ptr))) {
+                       msg->sl.rq.u_l = (ptr - msg_buf) - msg->sl.rq.u;
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rquri_sp, HTTP_MSG_RQURI_SP);
+               }
+
+               /* so it's a CR/LF, meaning an HTTP 0.9 request */
+               goto http_msg_req09_uri_e;
+
+       http_msg_rquri_sp:
+       case HTTP_MSG_RQURI_SP:
+               if (likely(!HTTP_IS_LWS(*ptr))) {
+                       msg->sl.rq.v = ptr - msg_buf;
+                       goto http_msg_rqver;
+               }
+               if (likely(HTTP_IS_SPHT(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rquri_sp, HTTP_MSG_RQURI_SP);
+               /* so it's a CR/LF, meaning an HTTP 0.9 request */
+               goto http_msg_req09_ver;
+
+       http_msg_rqver:
+       case HTTP_MSG_RQVER:
+               if (likely(!HTTP_IS_CRLF(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqver, HTTP_MSG_RQVER);
+               msg->sl.rq.v_l = (ptr - msg_buf) - msg->sl.rq.v;
+       http_msg_rqline_eol:
+               /* We have seen the end of line. Note that we do not
+                * necessarily have the \n yet, but at least we know that we
+                * have EITHER \r OR \n, otherwise the request would not be
+                * complete. We can then record the request length and return
+                * to the caller which will be able to register it.
+                */
+               msg->sl.rq.l = ptr - msg->sol;
+               return ptr;
+
+#ifdef DEBUG_FULL
+       default:
+               fprintf(stderr, "FIXME !!!! impossible state at %s:%d = %d\n", __FILE__, __LINE__, state);
+               exit(1);
+#endif
+       }
+
+ http_msg_ood:
+       /* out of data */
+       if (ret_state)
+               *ret_state = state;
+       if (ret_ptr)
+               *ret_ptr = (char *)ptr;
+       return NULL;
+
+ http_msg_invalid:
+       /* invalid message */
+       if (ret_state)
+               *ret_state = HTTP_MSG_ERROR;
+       return NULL;
+}
+
+
+void http_msg_analyzer(struct buffer *buf, struct http_msg *msg, struct hdr_idx *idx)
+{
+       __label__
+               http_msg_rqbefore,
+               http_msg_rqbefore_cr,
+               http_msg_rqmeth,
+               http_msg_rqline_end,
+               http_msg_hdr_first,
+               http_msg_hdr_name,
+               http_msg_hdr_l1_sp,
+               http_msg_hdr_l1_lf,
+               http_msg_hdr_l1_lws,
+               http_msg_hdr_val,
+               http_msg_hdr_l2_lf,
+               http_msg_hdr_l2_lws,
+               http_msg_complete_header,
+               http_msg_last_lf,
+               http_msg_ood,     /* out of data */
+               http_msg_invalid;
+
+       int state;                /* updated only when leaving the FSM */
+       register char *ptr, *end; /* request pointers, to avoid dereferences */
+
+       state = msg->hdr_state;
+       ptr = buf->lr;
+       end = buf->r;
+
+       if (unlikely(ptr >= end))
+               goto http_msg_ood;
+
+       switch (state)  {
+       http_msg_rqbefore:
+       case HTTP_MSG_RQBEFORE:
+               if (likely(HTTP_IS_TOKEN(*ptr))) {
+                       if (likely(ptr == buf->data)) {
+                               msg->sol = ptr;
+                               msg->sor = 0;
+                               state = HTTP_MSG_RQMETH;
+                               goto http_msg_rqmeth;
+                       } else {
+#if PARSE_PRESERVE_EMPTY_LINES
+                               /* only skip empty leading lines, don't remove them */
+                               msg->sol = ptr;
+                               msg->sor = ptr - buf->data;
+#else
+                               /* Remove empty leading lines, as recommended by
+                                * RFC2616. This takes a lot of time because we
+                                * must move all the buffer backwards, but this
+                                * is rarely needed. The method above will be
+                                * cleaner when we'll be able to start sending
+                                * the request from any place in the buffer.
+                                */
+                               buf->lr = ptr;
+                               buffer_replace2(buf, buf->data, buf->lr, NULL, 0);
+                               msg->sor = 0;
+                               msg->sol = buf->data;
+                               ptr = buf->data;
+                               end = buf->r;
+#endif
+                               state = HTTP_MSG_RQMETH;
+                               goto http_msg_rqmeth;
+                       }
+               }
+
+               if (unlikely(!HTTP_IS_CRLF(*ptr)))
+                       goto http_msg_invalid;
+
+               if (unlikely(*ptr == '\n'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqbefore, HTTP_MSG_RQBEFORE);
+               EAT_AND_JUMP_OR_RETURN(http_msg_rqbefore_cr, HTTP_MSG_RQBEFORE_CR);
+               /* fall through http_msg_rqbefore_cr */
+
+       http_msg_rqbefore_cr:
+       case HTTP_MSG_RQBEFORE_CR:
+               EXPECT_LF_HERE(ptr, http_msg_invalid);
+               EAT_AND_JUMP_OR_RETURN(http_msg_rqbefore, HTTP_MSG_RQBEFORE);
+               state = HTTP_MSG_RQMETH;
+               /* fall through http_msg_rqmeth */
+
+       http_msg_rqmeth:
+       case HTTP_MSG_RQMETH:
+       case HTTP_MSG_RQMETH_SP:
+       case HTTP_MSG_RQURI:
+       case HTTP_MSG_RQURI_SP:
+       case HTTP_MSG_RQVER:
+               ptr = (char *)http_parse_reqline(msg, buf->data, state, ptr, end,
+                                                &buf->lr, &msg->hdr_state);
+               if (unlikely(!ptr))
+                       return;
+
+               /* we have a full request and we know that we have either a CR
+                * or an LF at <ptr>.
+                */
+               //fprintf(stderr,"sor=%d rq.l=%d *ptr=0x%02x\n", msg->sor, msg->sl.rq.l, *ptr);
+               hdr_idx_set_start(idx, msg->sl.rq.l, *ptr == '\r');
+
+               msg->sol = ptr;
+               if (likely(*ptr == '\r'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_rqline_end, HTTP_MSG_RQLINE_END);
+
+               goto http_msg_rqline_end;
+
+       http_msg_rqline_end:
+       case HTTP_MSG_RQLINE_END:
+               /* check for HTTP/0.9 request : no version information available.
+                * msg->sol must point to the first of CR or LF.
+                */
+               if (unlikely(msg->sl.rq.v_l == 0))
+                       goto http_msg_last_lf;
+
+               EXPECT_LF_HERE(ptr, http_msg_invalid);
+               EAT_AND_JUMP_OR_RETURN(http_msg_hdr_first, HTTP_MSG_HDR_FIRST);
+
+       http_msg_hdr_first:
+       case HTTP_MSG_HDR_FIRST:
+               msg->sol = ptr;
+               if (likely(!HTTP_IS_CRLF(*ptr))) {
+                       goto http_msg_hdr_name;
+               }
+               
+               if (likely(*ptr == '\r'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_last_lf, HTTP_MSG_LAST_LF);
+               goto http_msg_last_lf;
+
+       http_msg_hdr_name:
+       case HTTP_MSG_HDR_NAME:
+               /* assumes msg->sol points to the first char */
+               if (likely(HTTP_IS_TOKEN(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_name, HTTP_MSG_HDR_NAME);
+
+               if (likely(*ptr == ':')) {
+                       msg->col = ptr - buf->data;
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l1_sp, HTTP_MSG_HDR_L1_SP);
+               }
+
+               goto http_msg_invalid;
+
+       http_msg_hdr_l1_sp:
+       case HTTP_MSG_HDR_L1_SP:
+               /* assumes msg->sol points to the first char and msg->col to the colon */
+               if (likely(HTTP_IS_SPHT(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l1_sp, HTTP_MSG_HDR_L1_SP);
+
+               /* header value can be basically anything except CR/LF */
+               msg->sov = ptr - buf->data;
+
+               if (likely(!HTTP_IS_CRLF(*ptr))) {
+                       goto http_msg_hdr_val;
+               }
+                       
+               if (likely(*ptr == '\r'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l1_lf, HTTP_MSG_HDR_L1_LF);
+               goto http_msg_hdr_l1_lf;
+
+       http_msg_hdr_l1_lf:
+       case HTTP_MSG_HDR_L1_LF:
+               EXPECT_LF_HERE(ptr, http_msg_invalid);
+               EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l1_lws, HTTP_MSG_HDR_L1_LWS);
+
+       http_msg_hdr_l1_lws:
+       case HTTP_MSG_HDR_L1_LWS:
+               if (likely(HTTP_IS_SPHT(*ptr))) {
+                       /* replace HT,CR,LF with spaces */
+                       for (; buf->data+msg->sov < ptr; msg->sov++)
+                               buf->data[msg->sov] = ' ';
+                       goto http_msg_hdr_l1_sp;
+               }
+               goto http_msg_complete_header;
+               
+       http_msg_hdr_val:
+       case HTTP_MSG_HDR_VAL:
+               /* assumes msg->sol points to the first char, msg->col to the
+                * colon, and msg->sov points to the first character of the
+                * value.
+                */
+               if (likely(!HTTP_IS_CRLF(*ptr)))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_val, HTTP_MSG_HDR_VAL);
+
+               msg->eol = ptr;
+               /* Note: we could also copy eol into ->eoh so that we have the
+                * real header end in case it ends with lots of LWS, but is this
+                * really needed ?
+                */
+               if (likely(*ptr == '\r'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l2_lf, HTTP_MSG_HDR_L2_LF);
+               goto http_msg_hdr_l2_lf;
+
+       http_msg_hdr_l2_lf:
+       case HTTP_MSG_HDR_L2_LF:
+               EXPECT_LF_HERE(ptr, http_msg_invalid);
+               EAT_AND_JUMP_OR_RETURN(http_msg_hdr_l2_lws, HTTP_MSG_HDR_L2_LWS);
+
+       http_msg_hdr_l2_lws:
+       case HTTP_MSG_HDR_L2_LWS:
+               if (unlikely(HTTP_IS_SPHT(*ptr))) {
+                       /* LWS: replace HT,CR,LF with spaces */
+                       for (; msg->eol < ptr; msg->eol++)
+                               *msg->eol = ' ';
+                       goto http_msg_hdr_val;
+               }
+       http_msg_complete_header:
+               /*
+                * It was a new header, so the last one is finished.
+                * Assumes msg->sol points to the first char, msg->col to the
+                * colon, msg->sov points to the first character of the value
+                * and msg->eol to the first CR or LF so we know how the line
+                * ends. We insert last header into the index.
+                */
+               /*
+                 fprintf(stderr,"registering %-2d bytes : ", msg->eol - msg->sol);
+                 write(2, msg->sol, msg->eol-msg->sol);
+                 fprintf(stderr,"\n");
+               */
+
+               if (unlikely(hdr_idx_add(msg->eol - msg->sol, *msg->eol == '\r',
+                                        idx, idx->tail) < 0))
+                       goto http_msg_invalid;
+
+               msg->sol = ptr;
+               if (likely(!HTTP_IS_CRLF(*ptr))) {
+                       goto http_msg_hdr_name;
+               }
+               
+               if (likely(*ptr == '\r'))
+                       EAT_AND_JUMP_OR_RETURN(http_msg_last_lf, HTTP_MSG_LAST_LF);
+               goto http_msg_last_lf;
+
+       http_msg_last_lf:
+       case HTTP_MSG_LAST_LF:
+               /* Assumes msg->sol points to the first of either CR or LF */
+               EXPECT_LF_HERE(ptr, http_msg_invalid);
+               ptr++;
+               buf->lr = ptr;
+               msg->eoh = msg->sol - buf->data;
+               msg->hdr_state = HTTP_MSG_BODY;
+               return;
+#ifdef DEBUG_FULL
+       default:
+               fprintf(stderr, "FIXME !!!! impossible state at %s:%d = %d\n", __FILE__, __LINE__, state);
+               exit(1);
+#endif
+       }
+ http_msg_ood:
+       /* out of data */
+       msg->hdr_state = state;
+       buf->lr = ptr;
+       return;
+
+ http_msg_invalid:
+       /* invalid message */
+       msg->hdr_state = HTTP_MSG_ERROR;
+       return;
+}
     
 /*
  * manages the client FSM and its socket. BTW, it also tries to handle the
@@ -440,14 +896,10 @@ int process_session(struct task *t)
  */
 int process_cli(struct session *t)
 {
-       struct http_req *hreq = &t->hreq;
        int s = t->srv_state;
        int c = t->cli_state;
        struct buffer *req = t->req;
        struct buffer *rep = t->rep;
-       int delete_header = 0;
-
-       int cur_hdr;
 
        DPRINTF(stderr,"process_cli: c=%s s=%s set(r,w)=%d,%d exp(r,w)=%d.%d,%d.%d\n",
                cli_stnames[c], srv_stnames[s],
@@ -472,476 +924,77 @@ int process_cli(struct session *t)
                 * whether there's a pending CR or not. We can check it
                 * globally since all CR followed by anything but LF are
                 * errors. Each state is entered with the first character is
-                * has to process at req->lr. We also have HTTP_PA_CR_SKIP
-                * indicating that a CR has been seen on current line and
-                * skipped.
+                * has to process at req->lr.
                 *
                 * Here is the information we currently have :
                 *   req->data + req->sor  = beginning of request
-                *   req->data + req->eoh  = end of (parsed) headers
+                *   req->data + req->eoh  = end of processed headers / start of current one
+                *   req->data + req->eol  = end of current header or line (LF or CRLF)
                 *   req->lr = first non-visited byte
                 *   req->r  = end of data
                 */
 
-               char *sol, *eol; /* Start Of Line, End Of Line */
+               int cur_idx;
+               struct http_req *hreq = &t->hreq;
+               struct http_msg *msg = &hreq->req;
                struct proxy *cur_proxy;
 
-               eol = sol = req->data + hreq->req.eoh;
-
-               while (req->lr < req->r) {
-                       int parse;
-
-                       FSM_PRINTF(stderr, "WHL: hdr_st=0x%02x, hdr_used=%d hdr_tail=%d hdr_last=%d, h=%d, lr=%d, r=%d, eoh=%d\n",
-                                  hreq->req.hdr_state, hreq->hdr_idx.used, hreq->hdr_idx.tail, hreq->hdr_idx.last,
-                                  sol - req->data, req->lr - req->data, req->r - req->data, hreq->req.eoh);
-                       
-                       if (hreq->req.hdr_state & HTTP_PA_LF_EXP) {
-                               if (*req->lr != '\n') {
-                                       hreq->req.hdr_state = HTTP_PA_ERROR;
-                                       break;
-                               }
-                               hreq->req.hdr_state &= ~HTTP_PA_LF_EXP;
-                       }
-
-                       parse = hreq->req.hdr_state & ~HTTP_PA_CR_SKIP;;
-
-                       if (parse == HTTP_PA_HDR_LF) {
-                       parse_hdr_lf:
-                               /* The LF validating last header, but it
-                                * may also be an LWS, in which case we will
-                                * need more data to know if we can close this
-                                * header or not. However, we must check right
-                                * now if this LF/CRLF closes an empty line, in
-                                * which case it means the end of the request.
-                                */
-                               eol = req->lr;
-                               if (hreq->req.hdr_state & HTTP_PA_CR_SKIP)
-                                       eol--; /* Get back to the CR */
-
-                               if (eol == sol) {
-                                       /* We have found the end of the headers.
-                                        * sol points to the ending LF/CRLF,
-                                        * and req->lr points to the first byte
-                                        * after the LF, so it is easy to append
-                                        * anything there.
-                                        */
-                                       hreq->req.hdr_state = HTTP_PA_LFLF;
-                                       QUICK_JUMP(parse_lflf, continue);
-                               }
-
-                               if (req->lr + 1 >= req->r) /* LF, ?? */
-                                       break;
-                               req->lr++;
-
-                               /* Right now, we *know* that there is one char
-                                * available at req->lr.
-                                */
-
-                               if (*req->lr == ' ' || *req->lr == '\t') {
-                                       /* We have an LWS, we will replace the
-                                        * CR and LF with spaces as RFC2616
-                                        * allows it. <lr> now points to the
-                                        * first space char of the LWS part.
-                                        */
-                                       for (;eol < req->lr; eol++)
-                                               *eol = ' ';
-
-                                       hreq->req.hdr_state = HTTP_PA_HDR_LWS;
-                                       QUICK_JUMP(parse_hdr_lws, continue);
-                               }
-
-                               /**********************************************
-                                * We now have one complete header between    *
-                                * sol and eol, with a possible CR at eol, *
-                                * everything ending before req->lr. Some very*
-                                * early processing can be applied.           *
-                                **********************************************/
-
-                               /*
-                                * FIXME: insert a REQHEADER hook here.
-                                * For instance, we could check the header's
-                                * syntax such as forbidding the leading space
-                                * in the first header (Apache also has the same problem)
-                                */
-
-
-                               /* 1: we might have to print this header */
-                               if ((global.mode & MODE_DEBUG) &&
-                                   (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE)))
-                                       debug_hdr("clihdr", t, sol, eol);
-
-
-                               /* 2: maybe we have to copy this header for the logs ? */
-                               if (t->logs.logwait & LW_REQHDR) {
-                                       /* FIXME: we must *search* the value after the ':' and not
-                                        * consider that it's necessary after one single space.*/
-                                       struct cap_hdr *h;
-                                       int len;
-                                       for (h = t->fe->fiprm->req_cap; h; h = h->next) {
-                                               if ((h->namelen + 2 <= eol - sol) &&
-                                                   (sol[h->namelen] == ':') &&
-                                                   (strncasecmp(sol, h->name, h->namelen) == 0)) {
-                                                       if (hreq->req.cap[h->index] == NULL)
-                                                               hreq->req.cap[h->index] =
-                                                                       pool_alloc_from(h->pool, h->len + 1);
-
-                                                       if (hreq->req.cap[h->index] == NULL) {
-                                                               Alert("HTTP capture : out of memory.\n");
-                                                               continue;
-                                                       }
-                                                       
-                                                       len = eol - (sol + h->namelen + 2);
-                                                       if (len > h->len)
-                                                               len = h->len;
-                                                       
-                                                       memcpy(hreq->req.cap[h->index], sol + h->namelen + 2, len);
-                                                       hreq->req.cap[h->index][len]=0;
-                                               }
-                                       }
-                               }
-
-
-                               /* 3: We might need to remove "connection:" */
-                               if (!delete_header &&
-                                   ((t->fe->options | t->be->beprm->options) & PR_O_HTTP_CLOSE) &&
-                                   (strncasecmp(sol, "Connection:", 11) == 0)) {
-                                       delete_header = 1;
-                               }
-
-
-                               /* OK, that's enough processing for the first step.
-                                * Now either we index this header or we remove it.
-                                */
-
-                               if (!delete_header) {
-                                       /* we insert it into the index */
-                                       if (hdr_idx_add(eol - sol, req->lr - eol - 1,
-                                                       &hreq->hdr_idx, hreq->hdr_idx.tail) < 0) {
-                                               hreq->req.hdr_state = HTTP_PA_ERROR;
-                                               break;
-                                       }
-                               } else {
-                                       /* we remove it */
-                                       delete_header = 0;
-                                       buffer_replace2(req, sol, req->lr, NULL, 0);
-                                       /* WARNING: eol is not valid anymore, since the
-                                        * header may have been deleted or truncated ! */
-                               }
-                               
-                               /* In any case, we set the next header pointer
-                                * to the next line.
-                                */
-                               sol = req->lr;
-
-#ifdef DEBUG_PARSE_NO_SPEEDUP
-                               hreq->req.hdr_state = HTTP_PA_HEADER;
-                               continue;
-#else
-                               /*
-                                * We know that at least one character remains.
-                                * It is interesting to directly branch to the
-                                * matching state.
-                                */
-                               eol = req->lr;
-                               if (IS_CTL(*req->lr)) {
-                                       if (*eol == '\r') {
-                                               req->lr++;
-                                               hreq->req.hdr_state = HTTP_PA_LFLF | HTTP_PA_LF_EXP;
-                                               continue;
-                                       }
-                                       else if (*eol == '\n') {
-                                               hreq->req.hdr_state = HTTP_PA_LFLF;
-                                               goto parse_lflf;
-                                       }
-                                       else {
-                                               hreq->req.hdr_state = HTTP_PA_ERROR;
-                                               break;
-                                       }
-                               }
-                               hreq->req.hdr_state = HTTP_PA_HEADER;
-                               goto parse_inside_hdr;
-#endif
-
-                       } else if (parse == HTTP_PA_STRT_LF) {
-                       parse_strt_lf:
-                               /* The LF validating the request line */
-
-                               eol = req->lr;
-                               if (hreq->req.hdr_state & HTTP_PA_CR_SKIP)
-                                       eol--; /* Get back to the CR */
-
-                               /* We have the complete start line between
-                                * sol and eol (excluded). lr points to
-                                * the LF.
-                                */
+               if (likely(req->lr < req->r))
+                       http_msg_analyzer(req, msg, &hreq->hdr_idx);
 
-                               /* FIXME: insert a REQUESTURI hook here. */
+               /* 1: we might have to print this header in debug mode */
+               if (unlikely((global.mode & MODE_DEBUG) &&
+                            (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE)) &&
+                            (msg->hdr_state == HTTP_MSG_BODY || msg->hdr_state == HTTP_MSG_ERROR))) {
+                       char *eol, *sol;
 
+                       sol = req->data + msg->sor;
+                       eol = sol + msg->sl.rq.l;
+                       debug_hdr("clireq", t, sol, eol);
 
-                               /* 1: we might have to print this header */
-                               if ((global.mode & MODE_DEBUG) &&
-                                   (!(global.mode & MODE_QUIET) || (global.mode & MODE_VERBOSE)))
-                                       debug_hdr("clireq", t, sol, eol);
+                       sol += hdr_idx_first_pos(&hreq->hdr_idx);
+                       cur_idx = hdr_idx_first_idx(&hreq->hdr_idx);
 
-                               /* 2: maybe we have to copy the original REQURI for the logs ? */
-                               if (t->logs.logwait & LW_REQ) {
-                                       /* we have a complete HTTP request that we must log */
-                                       if ((t->logs.uri = pool_alloc(requri)) != NULL) {
-                                               int urilen = eol - sol;
-
-                                               if (urilen >= REQURI_LEN)
-                                                       urilen = REQURI_LEN - 1;
-                                               memcpy(t->logs.uri, sol, urilen);
-                                               t->logs.uri[urilen] = 0;
-
-                                               if (!(t->logs.logwait &= ~LW_REQ))
-                                                       sess_log(t);
-                                       } else {
-                                               Alert("HTTP logging : out of memory.\n");
-                                       }
-                               }
-
-                               /* 3: reference this line as the start line */
-                               if (hdr_idx_add(eol - sol, req->lr - eol,
-                                               &hreq->hdr_idx, hreq->hdr_idx.tail) < 0) {
-                                       hreq->req.hdr_state = HTTP_PA_ERROR;
-                                       break;
-                               }
-
-                               req->lr++;
-                               sol = req->lr;
-                               /* in fact, a state is missing here, we should
-                                * be able to distinguish between an empty line
-                                * and a header.
-                                */
-                               hreq->req.hdr_state = HTTP_PA_HEADER;
-#ifdef DEBUG_PARSE_NO_SPEEDUP
-                               continue;
-#else
-                               if (req->lr < req->r)
-                                       goto parse_inside_hdr;
-                               else
-                                       break;
-#endif
-
-                       } else if (parse == HTTP_PA_HEADER) {
-                               char *ptr;
-                               /* Inside a non-empty header */
-
-                       parse_inside_hdr:
-                               delete_header = 0;
-
-                               ptr = req->lr;
-
-#ifdef GCC_FINALLY_PRODUCES_EFFICIENT_WHILE_LOOPS
-                               /* This code is disabled right now because
-                                * eventhough it seems straightforward, the
-                                * object code produced by GCC is so much
-                                * suboptimal that about 10% of the time
-                                * spend parsing header is there.
-                                */
-                               while (ptr < req->r && !IS_CTL(*ptr))
-                                       ptr++;
-                               req->lr = ptr;
-                               if (ptr == req->r)
-                                       break;
-#else
-                               /* Just by using this loop instead of the previous one,
-                                * the global performance increases by about 2% ! The
-                                * code is also smaller by about 50 bytes.
-                                */
-                               goto reqhdr_loop_chk;
-                       reqhdr_loop:
-                               ptr++;
-                       reqhdr_loop_chk:
-                               if (ptr == req->r) {
-                                       req->lr = ptr;
-                                       break;
-                               }
-                               if (*ptr != 0x7F && (unsigned)*ptr >= 0x20)
-                                       goto reqhdr_loop;
-                               req->lr = ptr;
-#endif
-
-                               /* we have a CTL char */
-                               if (*ptr == '\r') {
-                                       hreq->req.hdr_state = HTTP_PA_HDR_LF | HTTP_PA_CR_SKIP | HTTP_PA_LF_EXP;
-                                       req->lr++;
-                                       continue;
-                               }
-                               else if (*ptr == '\n') {
-                                       hreq->req.hdr_state = HTTP_PA_HDR_LF;
-                                       QUICK_JUMP(parse_hdr_lf, continue);
-                               }
-                               hreq->req.hdr_state = HTTP_PA_ERROR;
-                               break;
-
-                       } else if (parse == HTTP_PA_EMPTY) {
-                               /* leading empty lines */
-
-                               if (*req->lr == '\n') {
-                                       req->lr ++;
-                                       hreq->req.hdr_state = HTTP_PA_EMPTY;
-                                       continue;
-                               }
-                               else if (*req->lr == '\r') {
-                                       req->lr ++;
-                                       hreq->req.hdr_state = HTTP_PA_EMPTY | HTTP_PA_CR_SKIP | HTTP_PA_LF_EXP;
-                                       continue;
-                               }                               
-
-                               FSM_PRINTF(stderr, "PA_EMPTY[0]: h=%d, lr=%d, r=%d\n",
-                                       sol - req->data, req->lr - req->data, req->r - req->data);
-
-#if PARSE_PRESERVE_EMPTY_LINES
-                               /* only skip empty leading lines, don't remove them */
-                               hreq->hdr_idx.v[0].len = req->lr - sol;
-                               hreq->sor = hreq->hdr_idx.v[0].len;
-#else
-                               /* remove empty leading lines, as recommended by
-                                * RFC2616. This takes a lot of time because we
-                                * must move all the buffer backwards, but this
-                                * is rarely needed. The method above will be
-                                * cleaner when we'll be able to start sending
-                                * the request from any place in the buffer.
-                                */
-                               buffer_replace2(req, sol, req->lr, NULL, 0);
-#endif
-                               sol = req->lr;
-                               FSM_PRINTF(stderr, "PA_EMPTY[1]: h=%d, lr=%d, r=%d\n",
-                                       sol - req->data, req->lr - req->data, req->r - req->data);
-
-                               hreq->req.hdr_state = HTTP_PA_START;
-                               /* we know that we still have one char available */
-                               QUICK_JUMP(parse_start, continue);
-
-                       } else if (parse == HTTP_PA_START) {
-                               char *ptr;
-                               /* Inside the start line */
-
-                       parse_start:
-                               ptr = req->lr;
-
-#ifdef GCC_FINALLY_PRODUCES_EFFICIENT_WHILE_LOOPS
-                               /* This code is disabled right now because
-                                * eventhough it seems straightforward, the
-                                * object code produced by GCC is so much
-                                * suboptimal that about 10% of the time
-                                * spend parsing header is there.
-                                */
-                               while (ptr < req->r && !IS_CTL(*ptr))
-                                       ptr++;
-                               req->lr = ptr;
-                               if (ptr == req->r)
-                                       break;
-#else
-                               /* Just by using this loop instead of the previous one,
-                                * the global performance increases by about 2% ! The
-                                * code is also smaller by about 50 bytes.
-                                */
-                               goto reqstrt_loop_chk;
-                       reqstrt_loop:
-                               ptr++;
-                       reqstrt_loop_chk:
-                               if (ptr == req->r) {
-                                       req->lr = ptr;
-                                       break;
-                               }
-                               if (*ptr != 0x7F && (unsigned)*ptr >= 0x20)
-                                       goto reqstrt_loop;
-                               req->lr = ptr;
-#endif
-
-                               /* we have a CTL char */
-                               if (*ptr == '\r') {
-                                       req->lr++;
-                                       hreq->req.hdr_state = HTTP_PA_STRT_LF | HTTP_PA_CR_SKIP | HTTP_PA_LF_EXP;
-                                       continue;
-                               }
-                               else if (*ptr == '\n') {
-                                       hreq->req.hdr_state = HTTP_PA_STRT_LF;
-                                       /* we know that we still have one char available */
-                                       QUICK_JUMP(parse_strt_lf, continue);
-                               }
-                               hreq->req.hdr_state = HTTP_PA_ERROR;
-                               break;
-
-
-                       } else if (parse == HTTP_PA_LFLF) {
-                       parse_lflf:
-                               req->lr ++;
-                               /* sol points to either CR or CRLF, and
-                                * req->lr points to 1 char after LF.
-                                */
-
-                               /*
-                                * FIXME: insert a hook here for the end of the headers
-                                */
-                               break;
-
-                       } else if (parse == HTTP_PA_HDR_LWS) {
-                       parse_hdr_lws:
-                               /* Inside an LWS. We just replace tabs with
-                                * spaces and fall back to the HEADER state
-                                * at the first non-space character
-                                */
-
-                               while (req->lr < req->r) {
-                                       if (*req->lr == '\t')
-                                               *req->lr = ' ';
-                                       else if (*req->lr != ' ') {
-                                               hreq->req.hdr_state = HTTP_PA_HEADER;
-                                               QUICK_JUMP(parse_inside_hdr, break);
-                                       }
-                                       req->lr++;
-                               }
-                               continue;
-
-                       } else if (parse == HTTP_PA_ERROR) {
-                               break;
+                       while (cur_idx) {
+                               eol = sol + hreq->hdr_idx.v[cur_idx].len;
+                               debug_hdr("clihdr", t, sol, eol);
+                               sol = eol + hreq->hdr_idx.v[cur_idx].cr + 1;
+                               cur_idx = hreq->hdr_idx.v[cur_idx].next;
                        }
+               }
 
-               } /* end of the "while(req->lr < req->r)" loop */
-
-               /* update the end of headers */
-               hreq->req.eoh = sol - req->data;
-
-               FSM_PRINTF(stderr, "END: hdr_st=0x%02x, hdr_used=%d hdr_tail=%d hdr_last=%d, h=%d, lr=%d, r=%d, eoh=%d\n",
-                       hreq->req.hdr_state, hreq->hdr_idx.used, hreq->hdr_idx.tail, hreq->hdr_idx.last,
-                       sol - req->data, req->lr - req->data, req->r - req->data, hreq->req.eoh);
-
-               /*
-                * Now, let's catch bad requests.
-                */
-
-               if (hreq->req.hdr_state == HTTP_PA_ERROR)
-                       goto return_bad_req;
 
                /*
-                * Now we quickly check if we have found a full request.
+                * Now we quickly check if we have found a full valid request.
                 * If not so, we check the FD and buffer states before leaving.
                 * A full request is indicated by the fact that we have seen
-                * the double LF/CRLF, so the state is HTTP_PA_LFLF.
+                * the double LF/CRLF, so the state is HTTP_MSG_BODY. Invalid
+                * requests are checked first.
                 *
                 */
 
-               if (hreq->req.hdr_state != HTTP_PA_LFLF) {      /* Request not complete yet */
+               if (unlikely(msg->hdr_state != HTTP_MSG_BODY)) {
+                       /*
+                        * First, let's catch bad requests.
+                        */
+                       if (unlikely(msg->hdr_state == HTTP_MSG_ERROR))
+                               goto return_bad_req;
 
                        /* 1: Since we are in header mode, if there's no space
                         *    left for headers, we won't be able to free more
                         *    later, so the session will never terminate. We
                         *    must terminate it now.
                         */
-                       if (req->l >= req->rlim - req->data) {
-                               /* FIXME: check if hreq.req.hdr_state & mask < HTTP_PA_HEADER,
-                                * and return Status 414 Request URI too long instead.
+                       if (unlikely(req->l >= req->rlim - req->data)) {
+                               /* FIXME: check if URI is set and return Status
+                                * 414 Request URI too long instead.
                                 */
                                goto return_bad_req;
                        }
 
                        /* 2: have we encountered a read error or a close ? */
-                       else if (req->flags & (BF_READ_ERROR | BF_READ_NULL)) {
-                               /* read error, or last read : give up.  */
+                       else if (unlikely(req->flags & (BF_READ_ERROR | BF_READ_NULL))) {
+                               /* read error, or last read : give up. */
                                tv_eternity(&req->rex);
                                fd_delete(t->cli_fd);
                                t->cli_state = CL_STCLOSE;
@@ -954,7 +1007,7 @@ int process_cli(struct session *t)
                        }
 
                        /* 3: has the read timeout expired ? */
-                       else if (tv_cmp2_ms(&req->rex, &now) <= 0) {
+                       else if (unlikely(tv_cmp2_ms(&req->rex, &now) <= 0)) {
                                /* read timeout : give up with an error message. */
                                t->logs.status = 408;
                                client_retnclose(t, error_message(t, HTTP_ERR_408));
@@ -967,7 +1020,7 @@ int process_cli(struct session *t)
                        }
 
                        /* 4: do we need to re-enable the read socket ? */
-                       else if (! MY_FD_ISSET(t->cli_fd, StaticReadEvent)) {
+                       else if (unlikely(! MY_FD_ISSET(t->cli_fd, StaticReadEvent))) {
                                /* fd in StaticReadEvent was disabled, perhaps because of a previous buffer
                                 * full. We cannot loop here since stream_sock_read will disable it only if
                                 * req->l == rlim-data
@@ -988,46 +1041,133 @@ int process_cli(struct session *t)
                 * of each header's length, so we can parse them quickly.       *
                 ****************************************************************/
 
+               /*
+                * 1: identify the method
+                */
+               hreq->meth = find_http_meth(&req->data[msg->sor], msg->sl.rq.m_l);
 
                /*
-                * 1: check if the URI matches the monitor_uri.
+                * 2: check if the URI matches the monitor_uri.
                 * We have to do this for every request which gets in, because
-                * the monitor-uri is defined by the frontend. To speed-up the
-                * test, we include the leading and trailing spaces in the
-                * comparison. This is generally not a problem because the
-                * monitor-uri is primarily used by external checkers which
-                * send pre-formatted requests too.
+                * the monitor-uri is defined by the frontend.
                 */
+               if (unlikely((t->fe->monitor_uri_len != 0) &&
+                            (t->fe->monitor_uri_len == msg->sl.rq.u_l) &&
+                            !memcmp(&req->data[msg->sl.rq.u],
+                                    t->fe->monitor_uri,
+                                    t->fe->monitor_uri_len))) {
+                       /*
+                        * We have found the monitor URI
+                        */
+                       t->flags |= SN_MONITOR;
+                       t->logs.status = 200;
+                       client_retnclose(t, &http_200_chunk);
+                       goto return_prx_cond;
+               }
+                       
+               /*
+                * 3: Maybe we have to copy the original REQURI for the logs ?
+                * Note: we cannot log anymore if the request has been
+                * classified as invalid.
+                */
+               if (unlikely(t->logs.logwait & LW_REQ)) {
+                       /* we have a complete HTTP request that we must log */
+                       if ((t->logs.uri = pool_alloc(requri)) != NULL) {
+                               int urilen = msg->sl.rq.l;
+
+                               if (urilen >= REQURI_LEN)
+                                       urilen = REQURI_LEN - 1;
+                               memcpy(t->logs.uri, &req->data[msg->sor], urilen);
+                               t->logs.uri[urilen] = 0;
 
-               hreq->start.str = req->data + hreq->req.sor;      /* start of the REQURI */
-               hreq->start.len = hreq->hdr_idx.v[hreq->hdr_idx.v[0].next].len; /* end of the REQURI */
-               hreq->meth = find_http_meth(hreq->start.str, hreq->start.len);
+                               if (!(t->logs.logwait &= ~LW_REQ))
+                                       sess_log(t);
+                       } else {
+                               Alert("HTTP logging : out of memory.\n");
+                       }
+               }
 
-               if ((t->fe->monitor_uri_len != 0) &&
-                   (hreq->start.len >= t->fe->monitor_uri_len)) {
-                       char *p = hreq->start.str;
-                       int idx = 0;
 
-                       /* skip the method so that we accept any method */
-                       while (idx < hreq->start.len && p[idx] != ' ')
-                               idx++;
-                       p += idx;
-                       
-                       if (hreq->start.len - idx >= t->fe->monitor_uri_len &&
-                           !memcmp(p, t->fe->monitor_uri, t->fe->monitor_uri_len)) {
-                               /*
-                                * We have found the monitor URI
-                                */
-                               t->flags |= SN_MONITOR;
-                               t->logs.status = 200;
-                               client_retnclose(t, &http_200_chunk);
-                               goto return_prx_cond;
+               /* 4. We may have to convert HTTP/0.9 requests to HTTP/1.0 */
+               if (unlikely(msg->sl.rq.v_l == 0)) {
+                       int delta;
+                       char *cur_end;
+                       msg->sol = req->data + msg->sor;
+                       cur_end = msg->sol + msg->sl.rq.l;
+                       delta = 0;
+
+                       if (msg->sl.rq.u_l == 0) {
+                               /* if no URI was set, add "/" */
+                               delta = buffer_replace2(req, cur_end, cur_end, " /", 2);
+                               cur_end += delta;
+                               msg->eoh += delta;
                        }
+                       /* add HTTP version */
+                       delta = buffer_replace2(req, cur_end, cur_end, " HTTP/1.0\r\n", 11);
+                       msg->eoh += delta;
+                       cur_end += delta;
+                       cur_end = (char *)http_parse_reqline(msg, req->data,
+                                                            HTTP_MSG_RQMETH,
+                                                            msg->sol, cur_end + 1,
+                                                            NULL, NULL);
+                       if (unlikely(!cur_end))
+                               goto return_bad_req;
+
+                       /* we have a full HTTP/1.0 request now and we know that
+                        * we have either a CR or an LF at <ptr>.
+                        */
+                       hdr_idx_set_start(&hreq->hdr_idx, msg->sl.rq.l, *cur_end == '\r');
                }
 
 
+               /* 5: we may need to capture headers */
+               if (unlikely((t->logs.logwait & LW_REQHDR) && t->fe->fiprm->req_cap)) {
+                       char *eol, *sol, *col, *sov;
+                       int cur_idx;
+                       struct cap_hdr *h;
+                       int len;
+
+                       sol = req->data + msg->sor + hdr_idx_first_pos(&hreq->hdr_idx);
+                       cur_idx = hdr_idx_first_idx(&hreq->hdr_idx);
+
+                       while (cur_idx) {
+                               eol = sol + hreq->hdr_idx.v[cur_idx].len;
+
+                               col = sol;
+                               while (col < eol && *col != ':')
+                                       col++;
+
+                               sov = col + 1;
+                               while (sov < eol && http_is_lws[(unsigned char)*sov])
+                                       sov++;
+                               
+                               for (h = t->fe->fiprm->req_cap; h; h = h->next) {
+                                       if ((h->namelen == col - sol) &&
+                                           (strncasecmp(sol, h->name, h->namelen) == 0)) {
+                                               if (hreq->req.cap[h->index] == NULL)
+                                                       hreq->req.cap[h->index] =
+                                                               pool_alloc_from(h->pool, h->len + 1);
+
+                                               if (hreq->req.cap[h->index] == NULL) {
+                                                       Alert("HTTP capture : out of memory.\n");
+                                                       continue;
+                                               }
+                                                       
+                                               len = eol - sov;
+                                               if (len > h->len)
+                                                       len = h->len;
+                                                       
+                                               memcpy(hreq->req.cap[h->index], sov, len);
+                                               hreq->req.cap[h->index][len]=0;
+                                       }
+                               }
+                               sol = eol + hreq->hdr_idx.v[cur_idx].cr + 1;
+                               cur_idx = hreq->hdr_idx.v[cur_idx].next;
+                       }
+               }
+
                /*
-                * 2: we will have to evaluate the filters.
+                * 6: we will have to evaluate the filters.
                 * As opposed to version 1.2, now they will be evaluated in the
                 * filters order and not in the header order. This means that
                 * each filter has to be validated among all headers.
@@ -1056,11 +1196,8 @@ int process_cli(struct session *t)
 
                        /* try headers filters */
                        if (rule_set->req_exp != NULL) {
-                               apply_filters_to_session(t, req, rule_set->req_exp);
-
-                               /* the start line might have been modified */
-                               hreq->start.len = hreq->hdr_idx.v[hreq->hdr_idx.v[0].next].len;
-                               hreq->meth = find_http_meth(hreq->start.str, hreq->start.len);
+                               if (apply_filters_to_request(t, req, rule_set->req_exp) < 0)
+                                       goto return_bad_req;
                        }
 
                        if (!(t->flags & SN_BE_ASSIGNED) && (t->be != cur_proxy)) {
@@ -1085,19 +1222,71 @@ int process_cli(struct session *t)
                                goto return_prx_cond;
                        }
 
-                       /* add request headers from the rule sets in the same order */
-                       for (cur_hdr = 0; cur_hdr < rule_set->nb_reqadd; cur_hdr++) {
-                               int len;
+                       /* We might have to check for "Connection:" */
+                       if (((t->fe->options | t->be->beprm->options) & PR_O_HTTP_CLOSE) &&
+                           !(t->flags & SN_CONN_CLOSED)) {
+                               char *cur_ptr, *cur_end, *cur_next;
+                               int cur_idx, old_idx, delta;
+                               struct hdr_idx_elem *cur_hdr;
+
+                               cur_next = req->data + hreq->req.sor + hdr_idx_first_pos(&hreq->hdr_idx);
+                               old_idx = 0;
+
+                               while ((cur_idx = hreq->hdr_idx.v[old_idx].next)) {
+                                       cur_hdr  = &hreq->hdr_idx.v[cur_idx];
+                                       cur_ptr  = cur_next;
+                                       cur_end  = cur_ptr + cur_hdr->len;
+                                       cur_next = cur_end + cur_hdr->cr + 1;
+
+                                       if (strncasecmp(cur_ptr, "Connection:", 11) == 0) {
+                                               /* 3 possibilities :
+                                                * - we have already set Connection: close,
+                                                *   so we remove this line.
+                                                * - we have not yet set Connection: close,
+                                                *   but this line indicates close. We leave
+                                                *   it untouched and set the flag.
+                                                * - we have not yet set Connection: close,
+                                                *   and this line indicates non-close. We
+                                                *   replace it.
+                                                */
+                                               if (t->flags & SN_CONN_CLOSED) {
+                                                       delta = buffer_replace2(req, cur_ptr, cur_next, NULL, 0);
+                                                       hreq->req.eoh += delta;
+                                                       cur_next += delta;
+                                                       hreq->hdr_idx.v[old_idx].next = cur_hdr->next;
+                                                       hreq->hdr_idx.used--;
+                                                       cur_hdr->len = 0;
+                                               } else {
+                                                       if (cur_ptr + 17 > cur_end ||
+                                                           !http_is_lws[(unsigned char)*(cur_ptr+17)] ||
+                                                           strncasecmp(cur_ptr+11, " close", 6)) {
+                                                               delta = buffer_replace2(req, cur_ptr+11, cur_end,
+                                                                                       " close", 6);
+                                                               cur_next += delta;
+                                                               cur_hdr->len += delta;
+                                                               hreq->req.eoh += delta;
+                                                       }
+                                                       t->flags |= SN_CONN_CLOSED;
+                                               }
+                                       }
+                                       old_idx = cur_idx;
+                               }
 
-                               len = sprintf(trash, "%s\r\n", rule_set->req_add[cur_hdr]);
-                               len = buffer_replace2(req, req->data + hreq->req.eoh,
-                                                     req->data + hreq->req.eoh, trash, len);
-                               hreq->req.eoh += len;
+                               /* add request headers from the rule sets in the same order */
+                               for (cur_idx = 0; cur_idx < rule_set->nb_reqadd; cur_idx++) {
+                                       int len;
+
+                                       len = sprintf(trash, "%s\r\n", rule_set->req_add[cur_idx]);
+                                       len = buffer_replace2(req, req->data + hreq->req.eoh,
+                                                             req->data + hreq->req.eoh, trash, len);
+                                       hreq->req.eoh += len;
                                
-                               if (hdr_idx_add(len - 2, 1, &hreq->hdr_idx, hreq->hdr_idx.tail) < 0)
-                                       goto return_bad_req;
+                                       if (unlikely(hdr_idx_add(len - 2, 1, &hreq->hdr_idx, hreq->hdr_idx.tail) < 0))
+                                               goto return_bad_req;
+                               }
                        }
 
+                       /* check if stats URI was requested, and if an auth is needed */
                        if (rule_set->uri_auth != NULL &&
                            (hreq->meth == HTTP_METH_GET || hreq->meth == HTTP_METH_HEAD)) {
                                /* we have to check the URI and auth for this request */
@@ -1132,7 +1321,6 @@ int process_cli(struct session *t)
                        t->flags |= SN_BE_ASSIGNED;
                }
 
-
                /*
                 * Right now, we know that we have processed the entire headers
                 * and that unwanted requests have been filtered out. We can do
@@ -1144,20 +1332,18 @@ int process_cli(struct session *t)
 
 
                /*
-                * 3: the appsession cookie was looked up very early in 1.2,
+                * 7: the appsession cookie was looked up very early in 1.2,
                 * so let's do the same now.
                 */
 
                /* It needs to look into the URI */
                if (t->be->beprm->appsession_name) {
-                       get_srv_from_appsession(t,
-                                               hreq->start.str,
-                                               hreq->start.str + hreq->start.len);
+                       get_srv_from_appsession(t, &req->data[msg->sor], msg->sl.rq.l);
                }
 
 
                /*
-                * 4: Now we can work with the cookies.
+                * 8: Now we can work with the cookies.
                 * Note that doing so might move headers in the request, but
                 * the fields will stay coherent and the URI will not move.
                 * This should only be performed in the backend.
@@ -1167,7 +1353,7 @@ int process_cli(struct session *t)
 
 
                /*
-                * 5: add X-Forwarded-For : Should depend on the backend only.
+                * 9: add X-Forwarded-For : Should depend on the backend only.
                 */
                if (t->be->beprm->options & PR_O_FWDFOR) {
                        if (t->cli_addr.ss_family == AF_INET) {
@@ -1199,16 +1385,11 @@ int process_cli(struct session *t)
                        }
                }
 
-
                /*
-                * 6: add "Connection:"
-                */
-
-               /* add a "connection: close" line if needed.
-                * FIXME: this should depend on both the frontend and the backend.
-                * Header removals should be performed when the filters are run.
+                * 10: add "Connection: close" if needed and not yet set.
                 */
-               if ((t->fe->options | t->be->beprm->options) & PR_O_HTTP_CLOSE) {
+               if (((t->fe->options | t->be->beprm->options) & PR_O_HTTP_CLOSE) &&
+                   !(t->flags & SN_CONN_CLOSED)) {
                        int len;
                        len = buffer_replace2(req, req->data + hreq->req.eoh,
                                              req->data + hreq->req.eoh, "Connection: close\r\n", 19);
@@ -1218,11 +1399,6 @@ int process_cli(struct session *t)
                                goto return_bad_req;
                }
 
-
-
-
-               
-
                /*************************************************************
                 * OK, that's finished for the headers. We have done what we *
                 * could. Let's switch to the DATA state.                    *
@@ -1233,7 +1409,6 @@ int process_cli(struct session *t)
 
                t->logs.t_request = tv_diff(&t->logs.tv_accept, &now);
 
-
                if (!t->fe->clitimeout ||
                    (t->srv_state < SV_STDATA && t->be->beprm->srvtimeout)) {
                        /* If the client has no timeout, or if the server is not ready yet,
@@ -1248,7 +1423,6 @@ int process_cli(struct session *t)
                        tv_eternity(&req->rex);
                }
 
-
                /* When a connection is tarpitted, we use the queue timeout for the
                 * tarpit delay, which currently happens to be the server's connect
                 * timeout. If unset, then set it to zero because we really want it
@@ -1263,39 +1437,11 @@ int process_cli(struct session *t)
                                     t->be->beprm->contimeout ? t->be->beprm->contimeout : 0);
                }
 
-#if DEBUG_HTTP_PARSER
-               /* example: dump each line */
-
-               fprintf(stderr, "t->flags=0x%08x\n", t->flags & (SN_CLALLOW|SN_CLDENY|SN_CLTARPIT));
-
-               fprintf(stderr, "sol=%d\n", sol - req->data);
-               sol = req->data + hreq->sor;
-               cur_hdr = 0;
-
-               cur_idx = hreq->hdr_idx.v[0].next;
-               cur_hdr = 1;
-
-               while (cur_hdr < hreq->hdr_idx.used) {
-                       eol = sol + hreq->hdr_idx.v[cur_idx].len + hreq->hdr_idx.v[cur_idx].cr + 1;
-                       fprintf(stderr, "lr=%d r=%d hdr=%d idx=%d adr=%d..%d len=%d cr=%d data:\n",
-                               req->lr - req->data, req->r - req->data,
-                               cur_hdr, cur_idx,
-                               sol - req->data,
-                               sol - req->data + hreq->hdr_idx.v[cur_idx].len + hreq->hdr_idx.v[cur_idx].cr,
-                               hreq->hdr_idx.v[cur_idx].len,
-                               hreq->hdr_idx.v[cur_idx].cr);
-                       write(2, sol, eol - sol);
-
-                       sol = eol;
-                       cur_idx = hreq->hdr_idx.v[cur_idx].next;
-                       cur_hdr++;
-               }
-#endif
-
+               /* OK let's go on with the BODY now */
                goto process_data;
 
        return_bad_req: /* let's centralize all bad requests */
-               hreq->req.hdr_state = HTTP_PA_ERROR;
+               hreq->req.hdr_state = HTTP_MSG_ERROR;
                t->logs.status = 400;
                client_retnclose(t, error_message(t, HTTP_ERR_400));
                t->fe->failed_req++;
@@ -1689,7 +1835,6 @@ int process_srv(struct session *t)
                                        t->logs.t_queue = tv_diff(&t->logs.tv_accept, &now);
                                        return t->srv_state != SV_STIDLE;
                                }
-
                        } while (1);
                }
        }
@@ -2335,7 +2480,6 @@ int process_srv(struct session *t)
                                t->srv->failed_resp++;
                        }
                        t->be->failed_resp++;
-
                        t->srv_state = SV_STCLOSE;
                        t->logs.status = 502;
                        client_return(t, error_message(t, HTTP_ERR_502));
@@ -3266,162 +3410,286 @@ int produce_content_stats_proxy(struct session *s, struct proxy *px)
 }
 
 
-
-/*
- * Apply all the req filters <exp> to all headers in buffer <req> of session <t>
+/* Iterate the same filter through all request headers.
+ * Returns 1 if this filter can be stopped upon return, otherwise 0.
  */
-
-void apply_filters_to_session(struct session *t, struct buffer *req, struct hdr_exp *exp)
+int apply_filter_to_req_headers(struct session *t, struct buffer *req, struct hdr_exp *exp)
 {
+       char term;
+       char *cur_ptr, *cur_end, *cur_next;
+       int cur_idx, old_idx, last_hdr;
        struct http_req *hreq = &t->hreq;
+       struct hdr_idx_elem *cur_hdr;
+       int len, delta;
 
-       /* iterate through the filters in the outer loop */
-       while (exp && !(t->flags & (SN_CLDENY|SN_CLTARPIT))) {
-               char term;
-               char *cur_ptr, *cur_end, *cur_next;
-               int cur_idx, old_idx, abort_filt;
-               
-                               
-               /*
-                * The interleaving of transformations and verdicts
-                * makes it difficult to decide to continue or stop
-                * the evaluation.
+       last_hdr = 0;
+
+       cur_next = req->data + hreq->req.sor + hdr_idx_first_pos(&hreq->hdr_idx);
+       old_idx = 0;
+
+       while (!last_hdr) {
+               if (unlikely(t->flags & (SN_CLDENY | SN_CLTARPIT)))
+                       return 1;
+               else if (unlikely(t->flags & SN_CLALLOW) &&
+                        (exp->action == ACT_ALLOW ||
+                         exp->action == ACT_DENY ||
+                         exp->action == ACT_TARPIT))
+                       return 0;
+
+               cur_idx = hreq->hdr_idx.v[old_idx].next;
+               if (!cur_idx)
+                       break;
+
+               cur_hdr  = &hreq->hdr_idx.v[cur_idx];
+               cur_ptr  = cur_next;
+               cur_end  = cur_ptr + cur_hdr->len;
+               cur_next = cur_end + cur_hdr->cr + 1;
+
+               /* Now we have one header between cur_ptr and cur_end,
+                * and the next header starts at cur_next.
                 */
 
-               if ((t->flags & SN_CLALLOW) &&
-                   (exp->action == ACT_ALLOW || exp->action == ACT_DENY ||
-                    exp->action == ACT_TARPIT || exp->action == ACT_PASS)) {
-                       exp = exp->next;
-                       continue;
+               /* The annoying part is that pattern matching needs
+                * that we modify the contents to null-terminate all
+                * strings before testing them.
+                */
+
+               term = *cur_end;
+               *cur_end = '\0';
+
+               if (regexec(exp->preg, cur_ptr, MAX_MATCH, pmatch, 0) == 0) {
+                       switch (exp->action) {
+                       case ACT_SETBE:
+                               /* It is not possible to jump a second time.
+                                * FIXME: should we return an HTTP/500 here so that
+                                * the admin knows there's a problem ?
+                                */
+                               if (t->be != t->fe)
+                                       break;
+
+                               /* Swithing Proxy */
+                               t->be = (struct proxy *) exp->replace;
+
+                               /* right now, the backend switch is not too much complicated
+                                * because we have associated req_cap and rsp_cap to the
+                                * frontend, and the beconn will be updated later.
+                                */
+
+                               t->rep->rto = t->req->wto = t->be->beprm->srvtimeout;
+                               t->req->cto = t->be->beprm->contimeout;
+                               last_hdr = 1;
+                               break;
+
+                       case ACT_ALLOW:
+                               t->flags |= SN_CLALLOW;
+                               last_hdr = 1;
+                               break;
+
+                       case ACT_DENY:
+                               t->flags |= SN_CLDENY;
+                               last_hdr = 1;
+                               t->be->beprm->denied_req++;
+                               break;
+
+                       case ACT_TARPIT:
+                               t->flags |= SN_CLTARPIT;
+                               last_hdr = 1;
+                               t->be->beprm->denied_req++;
+                               break;
+
+                       case ACT_REPLACE:
+                               len = exp_replace(trash, cur_ptr, exp->replace, pmatch);
+                               delta = buffer_replace2(req, cur_ptr, cur_end, trash, len);
+                               /* FIXME: if the user adds a newline in the replacement, the
+                                * index will not be recalculated for now, and the new line
+                                * will not be counted as a new header.
+                                */
+
+                               cur_end += delta;
+                               cur_next += delta;
+                               cur_hdr->len += delta;
+                               hreq->req.eoh += delta;
+                               break;
+
+                       case ACT_REMOVE:
+                               delta = buffer_replace2(req, cur_ptr, cur_next, NULL, 0);
+                               cur_next += delta;
+
+                               /* FIXME: this should be a separate function */
+                               hreq->req.eoh += delta;
+                               hreq->hdr_idx.v[old_idx].next = cur_hdr->next;
+                               hreq->hdr_idx.used--;
+                               cur_hdr->len = 0;
+                               cur_end = NULL; /* null-term has been rewritten */
+                               break;
+
+                       }
                }
+               if (cur_end)
+                       *cur_end = term; /* restore the string terminator */
 
-               /* Iterate through the headers in the inner loop.
-                * we start with the start line.
+               /* keep the link from this header to next one in case of later
+                * removal of next header.
                 */
-               old_idx = cur_idx = 0;
-               cur_next = req->data + hreq->req.sor;
-               abort_filt = 0;
-
-               while (!abort_filt && (cur_idx = hreq->hdr_idx.v[cur_idx].next)) {
-                       struct hdr_idx_elem *cur_hdr = &hreq->hdr_idx.v[cur_idx];
-                       cur_ptr = cur_next;
-                       cur_end = cur_ptr + cur_hdr->len;
-                       cur_next = cur_end + cur_hdr->cr + 1;
-
-                       /* Now we have one header between cur_ptr and cur_end,
-                        * and the next header starts at cur_next.
-                        */
+               old_idx = cur_idx;
+       }
+       return 0;
+}
+
+
+/* Apply the filter to the request line.
+ * Returns 0 if nothing has been done, 1 if the filter has been applied,
+ * or -1 if a replacement resulted in an invalid request line.
+ */
+int apply_filter_to_req_line(struct session *t, struct buffer *req, struct hdr_exp *exp)
+{
+       char term;
+       char *cur_ptr, *cur_end;
+       int done;
+       struct http_req *hreq = &t->hreq;
+       int len, delta;
+
+
+       if (unlikely(t->flags & (SN_CLDENY | SN_CLTARPIT)))
+               return 1;
+       else if (unlikely(t->flags & SN_CLALLOW) &&
+                (exp->action == ACT_ALLOW ||
+                 exp->action == ACT_DENY ||
+                 exp->action == ACT_TARPIT))
+               return 0;
+       else if (exp->action == ACT_REMOVE)
+               return 0;
+
+       done = 0;
+
+       cur_ptr = req->data + hreq->req.sor;
+       cur_end = cur_ptr + hreq->req.sl.rq.l;
+
+       /* Now we have the request line between cur_ptr and cur_end */
+
+       /* The annoying part is that pattern matching needs
+        * that we modify the contents to null-terminate all
+        * strings before testing them.
+        */
 
-                       /* The annoying part is that pattern matching needs
-                        * that we modify the contents to null-terminate all
-                        * strings before testing them.
+       term = *cur_end;
+       *cur_end = '\0';
+
+       if (regexec(exp->preg, cur_ptr, MAX_MATCH, pmatch, 0) == 0) {
+               switch (exp->action) {
+               case ACT_SETBE:
+                       /* It is not possible to jump a second time.
+                        * FIXME: should we return an HTTP/500 here so that
+                        * the admin knows there's a problem ?
                         */
+                       if (t->be != t->fe)
+                               break;
 
-                       term = *cur_end;
-                       *cur_end = '\0';
+                       /* Swithing Proxy */
+                       t->be = (struct proxy *) exp->replace;
 
-                       if (regexec(exp->preg, cur_ptr, MAX_MATCH, pmatch, 0) == 0) {
-                               switch (exp->action) {
-                               case ACT_SETBE:
-                                       /* It is not possible to jump a second time.
-                                        * FIXME: should we return an HTTP/500 here so that
-                                        * the admin knows there's a problem ?
-                                        */
-                                       if (t->be != t->fe)
-                                               break;
+                       /* right now, the backend switch is not too much complicated
+                        * because we have associated req_cap and rsp_cap to the
+                        * frontend, and the beconn will be updated later.
+                        */
+
+                       t->rep->rto = t->req->wto = t->be->beprm->srvtimeout;
+                       t->req->cto = t->be->beprm->contimeout;
+                       done = 1;
+                       break;
+
+               case ACT_ALLOW:
+                       t->flags |= SN_CLALLOW;
+                       done = 1;
+                       break;
+
+               case ACT_DENY:
+                       t->flags |= SN_CLDENY;
+                       t->be->beprm->denied_req++;
+                       done = 1;
+                       break;
+
+               case ACT_TARPIT:
+                       t->flags |= SN_CLTARPIT;
+                       t->be->beprm->denied_req++;
+                       done = 1;
+                       break;
+
+               case ACT_REPLACE:
+                       *cur_end = term; /* restore the string terminator */
+                       len = exp_replace(trash, cur_ptr, exp->replace, pmatch);
+                       delta = buffer_replace2(req, cur_ptr, cur_end, trash, len);
+                       /* FIXME: if the user adds a newline in the replacement, the
+                        * index will not be recalculated for now, and the new line
+                        * will not be counted as a new header.
+                        */
 
-                                       if (!(t->flags & (SN_CLDENY | SN_CLTARPIT))) {
-                                               struct proxy *target = (struct proxy *) exp->replace;
+                       hreq->req.eoh += delta;
+                       cur_end += delta;
 
-                                               /* Swithing Proxy */
-                                               *cur_end = term;
-                                               cur_end = NULL;
+                       cur_end = (char *)http_parse_reqline(&hreq->req, req->data,
+                                                            HTTP_MSG_RQMETH,
+                                                            cur_ptr, cur_end + 1,
+                                                            NULL, NULL);
+                       if (unlikely(!cur_end))
+                               return -1;
 
-                                               /* right now, the backend switch is not too much complicated
-                                                * because we have associated req_cap and rsp_cap to the
-                                                * frontend, and the beconn will be updated later.
-                                                */
+                       /* we have a full request and we know that we have either a CR
+                        * or an LF at <ptr>.
+                        */
+                       hreq->meth = find_http_meth(cur_ptr, hreq->req.sl.rq.m_l);
+                       hdr_idx_set_start(&hreq->hdr_idx, hreq->req.sl.rq.l, *cur_end == '\r');
+                       /* there is no point trying this regex on headers */
+                       return 1;
+               }
+       }
+       *cur_end = term; /* restore the string terminator */
+       return done;
+}
 
-                                               t->rep->rto = t->req->wto = target->beprm->srvtimeout;
-                                               t->req->cto = target->beprm->contimeout;
 
-                                               t->be = target;
 
-                                               //t->logs.logwait |= LW_REQ | (target->to_log & (LW_REQHDR | LW_COOKIE));
-                                               /* FIXME: should we use the backend's log options or not ?
-                                                * It would seem far too complicated to configure a service with
-                                                * logs defined both in the frontend and the backend.
-                                                */
-                                               //t->logs.logwait |= (target->to_log | target->beprm->to_log);
+/*
+ * Apply all the req filters <exp> to all headers in buffer <req> of session <t>.
+ * Returns 0 if everything is alright, or -1 in case a replacement lead to an
+ * unparsable request.
+ */
+int apply_filters_to_request(struct session *t, struct buffer *req, struct hdr_exp *exp)
+{
+       /* iterate through the filters in the outer loop */
+       while (exp && !(t->flags & (SN_CLDENY|SN_CLTARPIT))) {
+               int ret;
 
-                                               abort_filt = 1;
-                                       }
-                                       break;
-                               case ACT_ALLOW:
-                                       if (!(t->flags & (SN_CLDENY | SN_CLTARPIT))) {
-                                               t->flags |= SN_CLALLOW;
-                                               abort_filt = 1;
-                                       }
-                                       break;
-                               case ACT_REPLACE:
-                                       if (!(t->flags & (SN_CLDENY | SN_CLTARPIT))) {
-                                               int len, delta;
-                                               len = exp_replace(trash, cur_ptr, exp->replace, pmatch);
-                                               delta = buffer_replace2(req, cur_ptr, cur_end, trash, len);
-                                               /* FIXME: if the user adds a newline in the replacement, the
-                                                * index will not be recalculated for now, and the new line
-                                                * will not be counted for a new header.
-                                                */
-                                               cur_end += delta;
-                                               cur_next += delta;
-                                               cur_hdr->len += delta;
-                                               hreq->req.eoh += delta;
-                                       }
-                                       break;
-                               case ACT_REMOVE:
-                                       if (!(t->flags & (SN_CLDENY | SN_CLTARPIT))) {
-                                               int delta = buffer_replace2(req, cur_ptr, cur_next, NULL, 0);
-                                               cur_next += delta;
+               /*
+                * The interleaving of transformations and verdicts
+                * makes it difficult to decide to continue or stop
+                * the evaluation.
+                */
 
-                                               /* FIXME: this should be a separate function */
-                                               hreq->req.eoh += delta;
-                                               hreq->hdr_idx.v[old_idx].next = cur_hdr->next;
-                                               hreq->hdr_idx.used--;
-                                               cur_hdr->len = 0;
+               if ((t->flags & SN_CLALLOW) &&
+                   (exp->action == ACT_ALLOW || exp->action == ACT_DENY ||
+                    exp->action == ACT_TARPIT || exp->action == ACT_PASS)) {
+                       exp = exp->next;
+                       continue;
+               }
 
-                                               cur_end = NULL; /* null-term has been rewritten */
-                                       }
-                                       break;
-                               case ACT_DENY:
-                                       if (!(t->flags & (SN_CLALLOW | SN_CLTARPIT))) {
-                                               t->flags |= SN_CLDENY;
-                                               abort_filt = 1;
-                                       }
-                                       t->be->beprm->denied_req++;
-                                       break;
-                               case ACT_TARPIT:
-                                       if (!(t->flags & (SN_CLALLOW | SN_CLDENY))) {
-                                               t->flags |= SN_CLTARPIT;
-                                               abort_filt = 1;
-                                       }
-                                       t->be->beprm->denied_req++;
-                                       break;
-                                       //case ACT_PASS: /* FIXME: broken as of now. We should mark the header as "ignored". */
-                                       //      break;
-                               }
-                       }
-                       if (cur_end)
-                               *cur_end = term; /* restore the string terminator */
+               /* Apply the filter to the request line. */
+               ret = apply_filter_to_req_line(t, req, exp);
+               if (unlikely(ret < 0))
+                       return -1;
 
-                       /* keep the link from this header to next one */
-                       old_idx = cur_idx;
+               if (likely(ret == 0)) {
+                       /* The filter did not match the request, it can be
+                        * iterated through all headers.
+                        */
+                       apply_filter_to_req_headers(t, req, exp);
                }
                exp = exp->next;
        }
+       return 0;
 }
 
 
-
 /*
  * Manager client-side cookie
  */
@@ -3436,7 +3704,7 @@ void manage_client_side_cookies(struct session *t, struct buffer *req)
        appsess local_asession;
 
        char *cur_ptr, *cur_end, *cur_next;
-       int cur_idx, old_idx, abort_filt;
+       int cur_idx, old_idx;
 
        if (t->be->beprm->cookie_name == NULL &&
            t->be->beprm->appsession_name ==NULL &&
@@ -3448,7 +3716,6 @@ void manage_client_side_cookies(struct session *t, struct buffer *req)
         */
        old_idx = cur_idx = 0;
        cur_next = req->data + hreq->req.sor;
-       abort_filt = 0;
 
        while ((cur_idx = hreq->hdr_idx.v[cur_idx].next)) {
                struct hdr_idx_elem *cur_hdr;
@@ -3763,13 +4030,11 @@ void manage_client_side_cookies(struct session *t, struct buffer *req)
 }
 
 
-
 /*
  * Try to retrieve a known appsession in the URI, then the associated server.
  * If the server is found, it's assigned to the session.
  */
-
-void get_srv_from_appsession(struct session *t, const char *begin, const char *end)
+void get_srv_from_appsession(struct session *t, const char *begin, int len)
 {
        appsess *asession_temp = NULL;
        appsess local_asession;
@@ -3777,8 +4042,8 @@ void get_srv_from_appsession(struct session *t, const char *begin, const char *e
 
        if (t->be->beprm->appsession_name == NULL ||
            (t->hreq.meth != HTTP_METH_GET && t->hreq.meth != HTTP_METH_POST) ||
-           (request_line = memchr(begin, ';', end - begin)) == NULL ||
-           ((1 + t->be->beprm->appsession_name_len + 1 + t->be->beprm->appsession_len) > (end - request_line)))
+           (request_line = memchr(begin, ';', len)) == NULL ||
+           ((1 + t->be->beprm->appsession_name_len + 1 + t->be->beprm->appsession_len) > (begin + len - request_line)))
                return;
 
        /* skip ';' */
@@ -3852,7 +4117,6 @@ void get_srv_from_appsession(struct session *t, const char *begin, const char *e
 }
 
 
-
 /*
  * In a GET or HEAD request, check if the requested URI matches the stats uri
  * for the current backend, and if an authorization has been passed and is valid.
@@ -3869,23 +4133,14 @@ int stats_check_uri_auth(struct session *t, struct proxy *backend)
        struct uri_auth *uri_auth = backend->uri_auth;
        struct user_auth *user;
        int authenticated, cur_idx;
-       char *h, *e;
-
-       /* FIXME: this will soon be easier */
-       /* skip the method */
-       h = hreq->start.str;
-       e = h + hreq->start.len - uri_auth->uri_len;
-
-       while (h < e && *h != ' ' && *h != '\t')
-               h++;
+       char *h;
 
-       /* find the URI */
-       while (h < e && (*h == ' ' || *h == '\t'))
-               h++;
-
-       if (h >= e)
+       /* check URI size */
+       if (uri_auth->uri_len > hreq->req.sl.rq.u_l)
                return 0;
 
+       h = t->req->data + hreq->req.sl.rq.u;
+
        /* the URI is in h */
        if (memcmp(h, uri_auth->uri_prefix, uri_auth->uri_len) != 0)
                return 0;
@@ -3961,7 +4216,6 @@ int stats_check_uri_auth(struct session *t, struct proxy *backend)
 }
 
 
-
 /*
  * Print a debug line with a header
  */
index 5372b7dbc5e2b1accf4baf764349fe4ba994f70f..3e1cc61614e2e8612659071d356b7a97d7afc8e8 100644 (file)
@@ -21,6 +21,7 @@
 #include <types/proxy.h>
 #include <types/server.h>
 
+#include <proto/hdr_idx.h>
 #include <proto/session.h>
 #include <proto/queue.h>