ajp_header.c revision 347c9301068524042be654db3b2b055a9ec20633
6ae232055d4d8a97267517c5e50074c2c819941and/* Copyright 1999-2005 The Apache Software Foundation or its licensors, as
6ae232055d4d8a97267517c5e50074c2c819941and * applicable.
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd *
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd * Licensed under the Apache License, Version 2.0 (the "License");
fd9abdda70912b99b24e3bf1a38f26fde908a74cnd * you may not use this file except in compliance with the License.
6ae232055d4d8a97267517c5e50074c2c819941and * You may obtain a copy of the License at
6ae232055d4d8a97267517c5e50074c2c819941and *
6ae232055d4d8a97267517c5e50074c2c819941and * http://www.apache.org/licenses/LICENSE-2.0
6ae232055d4d8a97267517c5e50074c2c819941and *
96ad5d81ee4a2cc66a4ae19893efc8aa6d06fae7jailletc * Unless required by applicable law or agreed to in writing, software
6ae232055d4d8a97267517c5e50074c2c819941and * distributed under the License is distributed on an "AS IS" BASIS,
6ae232055d4d8a97267517c5e50074c2c819941and * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
d29d9ab4614ff992b0e8de6e2b88d52b6f1f153erbowen * See the License for the specific language governing permissions and
2e545ce2450a9953665f701bb05350f0d3f26275nd * limitations under the License.
d29d9ab4614ff992b0e8de6e2b88d52b6f1f153erbowen */
d29d9ab4614ff992b0e8de6e2b88d52b6f1f153erbowen
6ae232055d4d8a97267517c5e50074c2c819941and#include "ajp_header.h"
6ae232055d4d8a97267517c5e50074c2c819941and#include "ajp.h"
6ae232055d4d8a97267517c5e50074c2c819941and
af33a4994ae2ff15bc67d19ff1a7feb906745bf8rbowenstatic const char *response_trans_headers[] = {
3f08db06526d6901aa08c110b5bc7dde6bc39905nd "Content-Type",
6ae232055d4d8a97267517c5e50074c2c819941and "Content-Language",
6ae232055d4d8a97267517c5e50074c2c819941and "Content-Length",
6ae232055d4d8a97267517c5e50074c2c819941and "Date",
b43f840409794ed298e8634f6284741f193b6c4ftakashi "Last-Modified",
6ae232055d4d8a97267517c5e50074c2c819941and "Location",
6ae232055d4d8a97267517c5e50074c2c819941and "Set-Cookie",
6ae232055d4d8a97267517c5e50074c2c819941and "Set-Cookie2",
b43f840409794ed298e8634f6284741f193b6c4ftakashi "Servlet-Engine",
45d66a3a49ac14b7f18cd4d733c1947801b55172sf "Status",
6ae232055d4d8a97267517c5e50074c2c819941and "WWW-Authenticate"
f086b4b402fa9a2fefc7dda85de2a3cc1cd0a654rjung};
6ae232055d4d8a97267517c5e50074c2c819941and
4a56677aad9b66a36f3dc9fddbca8dc1230ad471rbowenstatic const char *long_res_header_for_sc(int sc)
4a56677aad9b66a36f3dc9fddbca8dc1230ad471rbowen{
4a56677aad9b66a36f3dc9fddbca8dc1230ad471rbowen const char *rc = NULL;
4a56677aad9b66a36f3dc9fddbca8dc1230ad471rbowen sc = sc & 0X00FF;
6ae232055d4d8a97267517c5e50074c2c819941and if(sc <= SC_RES_HEADERS_NUM && sc > 0) {
6ae232055d4d8a97267517c5e50074c2c819941and rc = response_trans_headers[sc - 1];
6ae232055d4d8a97267517c5e50074c2c819941and }
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and return rc;
6ae232055d4d8a97267517c5e50074c2c819941and}
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and#define UNKNOWN_METHOD (-1)
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941andstatic int sc_for_req_header(const char *header_name)
6ae232055d4d8a97267517c5e50074c2c819941and{
6ae232055d4d8a97267517c5e50074c2c819941and char header[16];
6ae232055d4d8a97267517c5e50074c2c819941and apr_size_t len = strlen(header_name);
6ae232055d4d8a97267517c5e50074c2c819941and const char *p = header_name;
6ae232055d4d8a97267517c5e50074c2c819941and int i = 0;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar /* ACCEPT-LANGUAGE is the longest headeer
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar * that is of interest.
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar */
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar if (len < 4 || len > 15)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and while (*p)
6ae232055d4d8a97267517c5e50074c2c819941and header[i++] = apr_toupper(*p++);
6ae232055d4d8a97267517c5e50074c2c819941and header[i] = '\0';
6ae232055d4d8a97267517c5e50074c2c819941and p = &header[1];
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
6ae232055d4d8a97267517c5e50074c2c819941and switch (header[0]) {
6ae232055d4d8a97267517c5e50074c2c819941and case 'A':
6ae232055d4d8a97267517c5e50074c2c819941and if (memcmp(p, "CCEPT", 5) == 0) {
6ae232055d4d8a97267517c5e50074c2c819941and if (!header[6])
30471a4650391f57975f60bbb6e4a90be7b284bfhumbedooh return SC_ACCEPT;
6ae232055d4d8a97267517c5e50074c2c819941and else if (header[6] == '-') {
6ae232055d4d8a97267517c5e50074c2c819941and p += 6;
6ae232055d4d8a97267517c5e50074c2c819941and if (memcmp(p, "CHARSET", 7) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_ACCEPT_CHARSET;
6ae232055d4d8a97267517c5e50074c2c819941and else if (memcmp(p, "ENCODING", 8) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_ACCEPT_ENCODING;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi else if (memcmp(p, "LANGUAGE", 8) == 0)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return SC_ACCEPT_LANGUAGE;
6ae232055d4d8a97267517c5e50074c2c819941and else
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and }
6ae232055d4d8a97267517c5e50074c2c819941and else
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and }
6ae232055d4d8a97267517c5e50074c2c819941and else if (memcmp(p, "UTHORIZATION", 12) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_AUTHORIZATION;
6ae232055d4d8a97267517c5e50074c2c819941and else
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and break;
6ae232055d4d8a97267517c5e50074c2c819941and case 'C':
6ae232055d4d8a97267517c5e50074c2c819941and if (memcmp(p, "OOKIE", 5) == 0)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return SC_COOKIE;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi else if(memcmp(p, "ONNECTION", 9) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_CONNECTION;
6ae232055d4d8a97267517c5e50074c2c819941and else if(memcmp(p, "ONTENT-TYPE", 11) == 0)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return SC_CONTENT_TYPE;
6ae232055d4d8a97267517c5e50074c2c819941and else if(memcmp(p, "ONTENT-LENGTH", 13) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_CONTENT_LENGTH;
6ae232055d4d8a97267517c5e50074c2c819941and else if(memcmp(p, "OOKIE2", 6) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_COOKIE2;
6ae232055d4d8a97267517c5e50074c2c819941and else
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and break;
6ae232055d4d8a97267517c5e50074c2c819941and case 'H':
6ae232055d4d8a97267517c5e50074c2c819941and if(memcmp(p, "OST", 3) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_HOST;
6ae232055d4d8a97267517c5e50074c2c819941and else
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return UNKNOWN_METHOD;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi break;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi case 'P':
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi if(memcmp(p, "RAGMA", 5) == 0)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return SC_PRAGMA;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi else
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return UNKNOWN_METHOD;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi break;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi case 'R':
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi if(memcmp(p, "EFERER", 6) == 0)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return SC_REFERER;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi else
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return UNKNOWN_METHOD;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi break;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi case 'U':
6ae232055d4d8a97267517c5e50074c2c819941and if(memcmp(p, "SER-AGENT", 9) == 0)
6ae232055d4d8a97267517c5e50074c2c819941and return SC_USER_AGENT;
6ae232055d4d8a97267517c5e50074c2c819941and else
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and break;
6ae232055d4d8a97267517c5e50074c2c819941and default:
6ae232055d4d8a97267517c5e50074c2c819941and return UNKNOWN_METHOD;
6ae232055d4d8a97267517c5e50074c2c819941and }
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and /* NOTREACHED */
6ae232055d4d8a97267517c5e50074c2c819941and}
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and/* Apache method number to SC methods transform table */
6ae232055d4d8a97267517c5e50074c2c819941andstatic const unsigned char sc_for_req_method_table[] = {
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_GET,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_PUT,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_POST,
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi SC_M_DELETE,
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi 0, /* M_DELETE */
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi SC_M_OPTIONS,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_TRACE,
6ae232055d4d8a97267517c5e50074c2c819941and 0, /* M_PATCH */
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_PROPFIND,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_PROPPATCH,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_MKCOL,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_COPY,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_MOVE,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_LOCK,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_UNLOCK,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_VERSION_CONTROL,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_CHECKOUT,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_UNCHECKOUT,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_CHECKIN,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_UPDATE,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_LABEL,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_REPORT,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_MKWORKSPACE,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_MKACTIVITY,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_BASELINE_CONTROL,
6ae232055d4d8a97267517c5e50074c2c819941and SC_M_MERGE,
6ae232055d4d8a97267517c5e50074c2c819941and 0 /* M_INVALID */
6ae232055d4d8a97267517c5e50074c2c819941and};
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941andstatic int sc_for_req_method_by_id(int method_id)
6ae232055d4d8a97267517c5e50074c2c819941and{
6ae232055d4d8a97267517c5e50074c2c819941and if (method_id < 0 || method_id > M_INVALID)
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi return UNKNOWN_METHOD;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi else
6ae232055d4d8a97267517c5e50074c2c819941and return sc_for_req_method_table[method_id] ?
50c415a7ddfaf8376f956dd932b58a56221fc8f5trawick sc_for_req_method_table[method_id] : UNKNOWN_METHOD;
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi}
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi
6a3ab831a34f470b077294a173f24fcf1e5f0a3ctakashi/*
6ae232055d4d8a97267517c5e50074c2c819941and * Message structure
6ae232055d4d8a97267517c5e50074c2c819941and *
6ae232055d4d8a97267517c5e50074c2c819941and *
6ae232055d4d8a97267517c5e50074c2c819941andAJPV13_REQUEST/AJPV14_REQUEST=
6ae232055d4d8a97267517c5e50074c2c819941and request_prefix (1) (byte)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar method (byte)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar protocol (string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar req_uri (string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar remote_addr (string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar remote_host (string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar server_name (string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar server_port (short)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar is_ssl (boolean)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar num_headers (short)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar num_headers*(req_header_name header_value)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?context (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?servlet_path (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?remote_user (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?auth_type (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?query_string (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?jvm_route (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?ssl_cert (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?ssl_cipher (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?ssl_session (byte)(string)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?ssl_key_size (byte)(int) via JkOptions +ForwardKeySize
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar request_terminator (byte)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ?body content_length*(var binary)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar */
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coarstatic apr_status_t ajp_marshal_into_msgb(ajp_msg_t *msg,
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar request_rec *r,
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar apr_uri_t *uri)
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar{
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar int method;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar apr_uint32_t i, num_headers = 0;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar apr_byte_t is_ssl;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar char *remote_host;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const char *session_route, *envvar;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const apr_array_header_t *arr = apr_table_elts(r->subprocess_env);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const apr_table_entry_t *elts = (const apr_table_entry_t *)arr->elts;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar "Into ajp_marshal_into_msgb");
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar if ((method = sc_for_req_method_by_id(r->method_number)) == UNKNOWN_METHOD) {
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar "ajp_marshal_into_msgb - No such method %s",
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar r->method);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return AJP_EBAD_METHOD;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar }
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar is_ssl = (apr_byte_t) ap_proxy_conn_is_https(r->connection);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar if (r->headers_in && apr_table_elts(r->headers_in)) {
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const apr_array_header_t *t = apr_table_elts(r->headers_in);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar num_headers = t->nelts;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar }
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar remote_host = (char *)ap_get_remote_host(r->connection, r->per_dir_config, REMOTE_HOST, NULL);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_reset(msg);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar if (ajp_msg_append_uint8(msg, CMD_AJP13_FORWARD_REQUEST) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_uint8(msg, method) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_string(msg, r->protocol) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_string(msg, uri->path) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_string(msg, r->connection->remote_ip) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_string(msg, remote_host) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_string(msg, ap_get_server_name(r)) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_uint16(msg, (apr_uint16_t)r->connection->local_addr->port) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_uint8(msg, is_ssl) ||
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ajp_msg_append_uint16(msg, (apr_uint16_t) num_headers)) {
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar "ajp_marshal_into_msgb: "
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar "Error appending the message begining");
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar return APR_EGENERAL;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar }
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar for (i = 0 ; i < num_headers ; i++) {
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar int sc;
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const apr_array_header_t *t = apr_table_elts(r->headers_in);
1f1b6bf13313fdd14a45e52e553d3ff28689b717coar const apr_table_entry_t *elts = (apr_table_entry_t *)t->elts;
6ae232055d4d8a97267517c5e50074c2c819941and
6ae232055d4d8a97267517c5e50074c2c819941and if ((sc = sc_for_req_header(elts[i].key)) != UNKNOWN_METHOD) {
6ae232055d4d8a97267517c5e50074c2c819941and if (ajp_msg_append_uint16(msg, (apr_uint16_t)sc)) {
b43f840409794ed298e8634f6284741f193b6c4ftakashi ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
45d66a3a49ac14b7f18cd4d733c1947801b55172sf "ajp_marshal_into_msgb: "
6ae232055d4d8a97267517c5e50074c2c819941and "Error appending the header name");
f086b4b402fa9a2fefc7dda85de2a3cc1cd0a654rjung return AJP_EOVERFLOW;
727872d18412fc021f03969b8641810d8896820bhumbedooh }
0d0ba3a410038e179b695446bb149cce6264e0abnd }
727872d18412fc021f03969b8641810d8896820bhumbedooh else {
cc7e1025de9ac63bd4db6fe7f71c158b2cf09fe4humbedooh if (ajp_msg_append_string(msg, elts[i].key)) {
0d0ba3a410038e179b695446bb149cce6264e0abnd ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
cc7e1025de9ac63bd4db6fe7f71c158b2cf09fe4humbedooh "ajp_marshal_into_msgb: "
727872d18412fc021f03969b8641810d8896820bhumbedooh "Error appending the header name");
0d0ba3a410038e179b695446bb149cce6264e0abnd return AJP_EOVERFLOW;
0d0ba3a410038e179b695446bb149cce6264e0abnd }
0d0ba3a410038e179b695446bb149cce6264e0abnd }
ac082aefa89416cbdc9a1836eaf3bed9698201c8humbedooh
0d0ba3a410038e179b695446bb149cce6264e0abnd if (ajp_msg_append_string(msg, elts[i].val)) {
0d0ba3a410038e179b695446bb149cce6264e0abnd ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
0d0ba3a410038e179b695446bb149cce6264e0abnd "ajp_marshal_into_msgb: "
727872d18412fc021f03969b8641810d8896820bhumbedooh "Error appending the header value");
0d0ba3a410038e179b695446bb149cce6264e0abnd return AJP_EOVERFLOW;
0d0ba3a410038e179b695446bb149cce6264e0abnd }
30471a4650391f57975f60bbb6e4a90be7b284bfhumbedooh ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
205f749042ed530040a4f0080dbcb47ceae8a374rjung "ajp_marshal_into_msgb: Header[%d] [%s] = [%s]",
af33a4994ae2ff15bc67d19ff1a7feb906745bf8rbowen i, elts[i].key, elts[i].val);
0d0ba3a410038e179b695446bb149cce6264e0abnd }
7fec19672a491661b2fe4b29f685bc7f4efa64d4nd
7fec19672a491661b2fe4b29f685bc7f4efa64d4nd/* XXXX need to figure out how to do this
7fec19672a491661b2fe4b29f685bc7f4efa64d4nd if (s->secret) {
6ae232055d4d8a97267517c5e50074c2c819941and if (ajp_msg_append_uint8(msg, SC_A_SECRET) ||
ajp_msg_append_string(msg, s->secret)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"Error ajp_marshal_into_msgb - "
"Error appending secret");
return APR_EGENERAL;
}
}
*/
if (r->user) {
if (ajp_msg_append_uint8(msg, SC_A_REMOTE_USER) ||
ajp_msg_append_string(msg, r->user)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the remote user");
return AJP_EOVERFLOW;
}
}
if (r->ap_auth_type) {
if (ajp_msg_append_uint8(msg, SC_A_AUTH_TYPE) ||
ajp_msg_append_string(msg, r->ap_auth_type)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the auth type");
return AJP_EOVERFLOW;
}
}
/* XXXX ebcdic (args converted?) */
if (uri->query) {
if (ajp_msg_append_uint8(msg, SC_A_QUERY_STRING) ||
ajp_msg_append_string(msg, uri->query)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the query string");
return AJP_EOVERFLOW;
}
}
if ((session_route = apr_table_get(r->notes, "session-route"))) {
if (ajp_msg_append_uint8(msg, SC_A_JVM_ROUTE) ||
ajp_msg_append_string(msg, session_route)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the jvm route");
return AJP_EOVERFLOW;
}
}
/* XXX: Is the subprocess_env a right place?
* <Location /examples>
* ProxyPass ajp://remote:8009/servlets-examples
* SetEnv SSL_SESSION_ID CUSTOM_SSL_SESSION_ID
* </Location>
*/
/*
* Only lookup SSL variables if we are currently running HTTPS.
* Furthermore ensure that only variables get set in the AJP message
* that are not NULL and not empty.
*/
if (is_ssl) {
if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
AJP13_SSL_CLIENT_CERT_INDICATOR))
&& envvar[0]) {
if (ajp_msg_append_uint8(msg, SC_A_SSL_CERT)
|| ajp_msg_append_string(msg, envvar)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the SSL certificates");
return AJP_EOVERFLOW;
}
}
if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
AJP13_SSL_CIPHER_INDICATOR))
&& envvar[0]) {
if (ajp_msg_append_uint8(msg, SC_A_SSL_CIPHER)
|| ajp_msg_append_string(msg, envvar)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the SSL ciphers");
return AJP_EOVERFLOW;
}
}
if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
AJP13_SSL_SESSION_INDICATOR))
&& envvar[0]) {
if (ajp_msg_append_uint8(msg, SC_A_SSL_SESSION)
|| ajp_msg_append_string(msg, envvar)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the SSL session");
return AJP_EOVERFLOW;
}
}
/* ssl_key_size is required by Servlet 2.3 API */
if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
AJP13_SSL_KEY_SIZE_INDICATOR))
&& envvar[0]) {
if (ajp_msg_append_uint8(msg, SC_A_SSL_KEY_SIZE)
|| ajp_msg_append_uint16(msg, (unsigned short) atoi(envvar))) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"Error ajp_marshal_into_msgb - "
"Error appending the SSL key size");
return APR_EGENERAL;
}
}
}
/* Use the environment vars prefixed with AJP_
* and pass it to the header striping that prefix.
*/
for (i = 0; i < (apr_uint32_t)arr->nelts; i++) {
if (!strncmp(elts[i].key, "AJP_", 4)) {
if (ajp_msg_append_uint8(msg, SC_A_REQ_ATTRIBUTE) ||
ajp_msg_append_string(msg, elts[i].key + 4) ||
ajp_msg_append_string(msg, elts[i].val)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending attribute %s=%s",
elts[i].key, elts[i].val);
return AJP_EOVERFLOW;
}
}
}
if (ajp_msg_append_uint8(msg, SC_A_ARE_DONE)) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_marshal_into_msgb: "
"Error appending the message end");
return AJP_EOVERFLOW;
}
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_marshal_into_msgb: Done");
return APR_SUCCESS;
}
/*
AJPV13_RESPONSE/AJPV14_RESPONSE:=
response_prefix (2)
status (short)
status_msg (short)
num_headers (short)
num_headers*(res_header_name header_value)
*body_chunk
terminator boolean <! -- recycle connection or not -->
req_header_name :=
sc_req_header_name | (string)
res_header_name :=
sc_res_header_name | (string)
header_value :=
(string)
body_chunk :=
length (short)
body length*(var binary)
*/
static apr_status_t ajp_unmarshal_response(ajp_msg_t *msg,
request_rec *r,
proxy_dir_conf *dconf)
{
apr_uint16_t status;
apr_status_t rc;
const char *ptr;
apr_uint16_t num_headers;
int i;
rc = ajp_msg_get_uint16(msg, &status);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_unmarshal_response: Null status");
return rc;
}
r->status = status;
rc = ajp_msg_get_string(msg, &ptr);
if (rc == APR_SUCCESS) {
r->status_line = apr_psprintf(r->pool, "%d %s", status, ptr);
#if defined(AS400) || defined(_OSD_POSIX)
ap_xlate_proto_from_ascii(r->status_line, strlen(r->status_line));
#endif
} else {
r->status_line = NULL;
}
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_unmarshal_response: status = %d", status);
rc = ajp_msg_get_uint16(msg, &num_headers);
if (rc == APR_SUCCESS) {
r->headers_out = apr_table_make(r->pool, num_headers);
} else {
r->headers_out = NULL;
num_headers = 0;
}
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_unmarshal_response: Number of headers is = %d",
num_headers);
for(i = 0 ; i < (int) num_headers ; i++) {
apr_uint16_t name;
const char *stringname;
const char *value;
rc = ajp_msg_peek_uint16(msg, &name);
if (rc != APR_SUCCESS) {
return rc;
}
if ((name & 0XFF00) == 0XA000) {
ajp_msg_peek_uint16(msg, &name);
stringname = long_res_header_for_sc(name);
if (stringname == NULL) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_unmarshal_response: "
"No such sc (%08x)",
name);
return AJP_EBAD_HEADER;
}
} else {
name = 0;
rc = ajp_msg_get_string(msg, &stringname);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_unmarshal_response: "
"Null header name");
return rc;
}
#if defined(AS400) || defined(_OSD_POSIX)
ap_xlate_proto_from_ascii(stringname, strlen(stringname));
#endif
}
rc = ajp_msg_get_string(msg, &value);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_unmarshal_response: "
"Null header value");
return rc;
}
/* Set-Cookie need additional processing */
if (!strcasecmp(stringname, "Set-Cookie")) {
value = ap_proxy_cookie_reverse_map(r, dconf, value);
}
/* Location, Content-Location, URI and Destination need additional
* processing */
else if (!strcasecmp(stringname, "Location")
|| !strcasecmp(stringname, "Content-Location")
|| !strcasecmp(stringname, "URI")
|| !strcasecmp(stringname, "Destination"))
{
value = ap_proxy_location_reverse_map(r, dconf, value);
}
#if defined(AS400) || defined(_OSD_POSIX)
ap_xlate_proto_from_ascii(value, strlen(value));
#endif
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_unmarshal_response: Header[%d] [%s] = [%s]",
i, stringname, value);
apr_table_add(r->headers_out, stringname, value);
/* Content-type needs an additional handling */
if (memcmp(stringname, "Content-Type", 12) == 0) {
/* add corresponding filter */
ap_set_content_type(r, apr_pstrdup(r->pool, value));
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_unmarshal_response: ap_set_content_type done");
}
}
return APR_SUCCESS;
}
/*
* Build the ajp header message and send it
*/
apr_status_t ajp_send_header(apr_socket_t *sock,
request_rec *r,
apr_uri_t *uri)
{
ajp_msg_t *msg;
apr_status_t rc;
rc = ajp_msg_create(r->pool, &msg);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_send_header: ajp_msg_create failed");
return rc;
}
rc = ajp_marshal_into_msgb(msg, r, uri);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_send_header: ajp_marshal_into_msgb failed");
return rc;
}
rc = ajp_ilink_send(sock, msg);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_send_header: ajp_ilink_send failed");
return rc;
}
return APR_SUCCESS;
}
/*
* Read the ajp message and return the type of the message.
*/
apr_status_t ajp_read_header(apr_socket_t *sock,
request_rec *r,
ajp_msg_t **msg)
{
apr_byte_t result;
apr_status_t rc;
if (*msg) {
rc = ajp_msg_reuse(*msg);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_read_header: ajp_msg_reuse failed");
return rc;
}
}
else {
rc = ajp_msg_create(r->pool, msg);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_read_header: ajp_msg_create failed");
return rc;
}
}
ajp_msg_reset(*msg);
rc = ajp_ilink_receive(sock, *msg);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_read_header: ajp_ilink_receive failed");
return rc;
}
rc = ajp_msg_peek_uint8(*msg, &result);
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_read_header: ajp_ilink_received %02x", result);
return APR_SUCCESS;
}
/* parse the msg to read the type */
int ajp_parse_type(request_rec *r, ajp_msg_t *msg)
{
apr_byte_t result;
ajp_msg_peek_uint8(msg, &result);
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, r->server,
"ajp_parse_type: got %02x", result);
return (int) result;
}
/* parse the header */
apr_status_t ajp_parse_header(request_rec *r, proxy_dir_conf *conf,
ajp_msg_t *msg)
{
apr_byte_t result;
apr_status_t rc;
rc = ajp_msg_get_uint8(msg, &result);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_parse_headers: ajp_msg_get_byte failed");
return rc;
}
if (result != CMD_AJP13_SEND_HEADERS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_parse_headers: wrong type %02x expecting 0x04", result);
return AJP_EBAD_HEADER;
}
return ajp_unmarshal_response(msg, r, conf);
}
/* parse the body and return data address and length */
apr_status_t ajp_parse_data(request_rec *r, ajp_msg_t *msg,
apr_uint16_t *len, char **ptr)
{
apr_byte_t result;
apr_status_t rc;
rc = ajp_msg_get_uint8(msg, &result);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_parse_data: ajp_msg_get_byte failed");
return rc;
}
if (result != CMD_AJP13_SEND_BODY_CHUNK) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, r->server,
"ajp_parse_data: wrong type %02x expecting 0x03", result);
return AJP_EBAD_HEADER;
}
rc = ajp_msg_get_uint16(msg, len);
if (rc != APR_SUCCESS) {
return rc;
}
*ptr = (char *)&(msg->buf[msg->pos]);
return APR_SUCCESS;
}
/*
* Allocate a msg to send data
*/
apr_status_t ajp_alloc_data_msg(apr_pool_t *pool, char **ptr, apr_size_t *len,
ajp_msg_t **msg)
{
apr_status_t rc;
if ((rc = ajp_msg_create(pool, msg)) != APR_SUCCESS)
return rc;
ajp_msg_reset(*msg);
*ptr = (char *)&((*msg)->buf[6]);
*len = AJP_MSG_BUFFER_SZ-6;
return APR_SUCCESS;
}
/*
* Send the data message
*/
apr_status_t ajp_send_data_msg(apr_socket_t *sock,
ajp_msg_t *msg, apr_size_t len)
{
msg->buf[4] = (apr_byte_t)((len >> 8) & 0xFF);
msg->buf[5] = (apr_byte_t)(len & 0xFF);
msg->len += len + 2; /* + 1 XXXX where is '\0' */
return ajp_ilink_send(sock, msg);
}