1/* Licensed to the Apache Software Foundation (ASF) under one or more
2 * contributor license agreements.  See the NOTICE file distributed with
3 * this work for additional information regarding copyright ownership.
4 * The ASF licenses this file to You under the Apache License, Version 2.0
5 * (the "License"); you may not use this file except in compliance with
6 * the License.  You may obtain a copy of the License at
7 *
8 *     http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "ajp_header.h"
18#include "ajp.h"
19
20APLOG_USE_MODULE(proxy_ajp);
21
22static const char *response_trans_headers[] = {
23    "Content-Type",
24    "Content-Language",
25    "Content-Length",
26    "Date",
27    "Last-Modified",
28    "Location",
29    "Set-Cookie",
30    "Set-Cookie2",
31    "Servlet-Engine",
32    "Status",
33    "WWW-Authenticate"
34};
35
36static const char *long_res_header_for_sc(int sc)
37{
38    const char *rc = NULL;
39    sc = sc & 0X00FF;
40    if(sc <= SC_RES_HEADERS_NUM && sc > 0) {
41        rc = response_trans_headers[sc - 1];
42    }
43
44    return rc;
45}
46
47#define UNKNOWN_METHOD (-1)
48
49static int sc_for_req_header(const char *header_name)
50{
51    char header[16];
52    apr_size_t len = strlen(header_name);
53    const char *p = header_name;
54    int i = 0;
55
56    /* ACCEPT-LANGUAGE is the longest header
57     * that is of interest.
58     */
59    if (len < 4 || len > 15)
60        return UNKNOWN_METHOD;
61
62    while (*p)
63        header[i++] = apr_toupper(*p++);
64    header[i] = '\0';
65    p = &header[1];
66
67    switch (header[0]) {
68        case 'A':
69            if (memcmp(p, "CCEPT", 5) == 0) {
70                if (!header[6])
71                    return SC_ACCEPT;
72                else if (header[6] == '-') {
73                    p += 6;
74                    if (strcmp(p, "CHARSET") == 0)
75                        return SC_ACCEPT_CHARSET;
76                    else if (strcmp(p,  "ENCODING") == 0)
77                        return SC_ACCEPT_ENCODING;
78                    else if (strcmp(p, "LANGUAGE") == 0)
79                        return SC_ACCEPT_LANGUAGE;
80                    else
81                        return UNKNOWN_METHOD;
82                }
83                else
84                    return UNKNOWN_METHOD;
85            }
86            else if (strcmp(p, "UTHORIZATION") == 0)
87                return SC_AUTHORIZATION;
88            else
89                return UNKNOWN_METHOD;
90        break;
91        case 'C':
92            if(strcmp(p, "OOKIE2") == 0)
93                return SC_COOKIE2;
94            else if (strcmp(p, "OOKIE") == 0)
95                return SC_COOKIE;
96            else if(strcmp(p, "ONNECTION") == 0)
97                return SC_CONNECTION;
98            else if(strcmp(p, "ONTENT-TYPE") == 0)
99                return SC_CONTENT_TYPE;
100            else if(strcmp(p, "ONTENT-LENGTH") == 0)
101                return SC_CONTENT_LENGTH;
102            else
103                return UNKNOWN_METHOD;
104        break;
105        case 'H':
106            if(strcmp(p, "OST") == 0)
107                return SC_HOST;
108            else
109                return UNKNOWN_METHOD;
110        break;
111        case 'P':
112            if(strcmp(p, "RAGMA") == 0)
113                return SC_PRAGMA;
114            else
115                return UNKNOWN_METHOD;
116        break;
117        case 'R':
118            if(strcmp(p, "EFERER") == 0)
119                return SC_REFERER;
120            else
121                return UNKNOWN_METHOD;
122        break;
123        case 'U':
124            if(strcmp(p, "SER-AGENT") == 0)
125                return SC_USER_AGENT;
126            else
127                return UNKNOWN_METHOD;
128        break;
129        default:
130            return UNKNOWN_METHOD;
131    }
132
133    /* NOTREACHED */
134}
135
136/* Apache method number to SC methods transform table */
137static const unsigned char sc_for_req_method_table[] = {
138    SC_M_GET,
139    SC_M_PUT,
140    SC_M_POST,
141    SC_M_DELETE,
142    0,                      /* M_CONNECT */
143    SC_M_OPTIONS,
144    SC_M_TRACE,
145    0,                      /* M_PATCH  */
146    SC_M_PROPFIND,
147    SC_M_PROPPATCH,
148    SC_M_MKCOL,
149    SC_M_COPY,
150    SC_M_MOVE,
151    SC_M_LOCK,
152    SC_M_UNLOCK,
153    SC_M_VERSION_CONTROL,
154    SC_M_CHECKOUT,
155    SC_M_UNCHECKOUT,
156    SC_M_CHECKIN,
157    SC_M_UPDATE,
158    SC_M_LABEL,
159    SC_M_REPORT,
160    SC_M_MKWORKSPACE,
161    SC_M_MKACTIVITY,
162    SC_M_BASELINE_CONTROL,
163    SC_M_MERGE,
164    0                       /* M_INVALID */
165};
166
167static int sc_for_req_method_by_id(request_rec *r)
168{
169    int method_id = r->method_number;
170    if (method_id < 0 || method_id > M_INVALID) {
171        return UNKNOWN_METHOD;
172    }
173    else if (r->header_only) {
174        return SC_M_HEAD;
175    }
176    else {
177        return sc_for_req_method_table[method_id] ?
178               sc_for_req_method_table[method_id] : UNKNOWN_METHOD;
179    }
180}
181
182/*
183 * Message structure
184 *
185 *
186AJPV13_REQUEST/AJPV14_REQUEST=
187    request_prefix (1) (byte)
188    method         (byte)
189    protocol       (string)
190    req_uri        (string)
191    remote_addr    (string)
192    remote_host    (string)
193    server_name    (string)
194    server_port    (short)
195    is_ssl         (boolean)
196    num_headers    (short)
197    num_headers*(req_header_name header_value)
198
199    ?context       (byte)(string)
200    ?servlet_path  (byte)(string)
201    ?remote_user   (byte)(string)
202    ?auth_type     (byte)(string)
203    ?query_string  (byte)(string)
204    ?jvm_route     (byte)(string)
205    ?ssl_cert      (byte)(string)
206    ?ssl_cipher    (byte)(string)
207    ?ssl_session   (byte)(string)
208    ?ssl_key_size  (byte)(int)      via JkOptions +ForwardKeySize
209    request_terminator (byte)
210    ?body          content_length*(var binary)
211
212 */
213
214static apr_status_t ajp_marshal_into_msgb(ajp_msg_t *msg,
215                                          request_rec *r,
216                                          apr_uri_t *uri)
217{
218    int method;
219    apr_uint32_t i, num_headers = 0;
220    apr_byte_t is_ssl;
221    char *remote_host;
222    const char *session_route, *envvar;
223    const apr_array_header_t *arr = apr_table_elts(r->subprocess_env);
224    const apr_table_entry_t *elts = (const apr_table_entry_t *)arr->elts;
225
226    ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r, "Into ajp_marshal_into_msgb");
227
228    if ((method = sc_for_req_method_by_id(r)) == UNKNOWN_METHOD) {
229        ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r, APLOGNO(02437)
230               "ajp_marshal_into_msgb - Sending unknown method %s as request attribute",
231               r->method);
232        method = SC_M_JK_STORED;
233    }
234
235    is_ssl = (apr_byte_t) ap_proxy_conn_is_https(r->connection);
236
237    if (r->headers_in && apr_table_elts(r->headers_in)) {
238        const apr_array_header_t *t = apr_table_elts(r->headers_in);
239        num_headers = t->nelts;
240    }
241
242    remote_host = (char *)ap_get_remote_host(r->connection, r->per_dir_config, REMOTE_HOST, NULL);
243
244    ajp_msg_reset(msg);
245
246    if (ajp_msg_append_uint8(msg, CMD_AJP13_FORWARD_REQUEST)     ||
247        ajp_msg_append_uint8(msg, (apr_byte_t) method)           ||
248        ajp_msg_append_string(msg, r->protocol)                  ||
249        ajp_msg_append_string(msg, uri->path)                    ||
250        ajp_msg_append_string(msg, r->useragent_ip)              ||
251        ajp_msg_append_string(msg, remote_host)                  ||
252        ajp_msg_append_string(msg, ap_get_server_name(r))        ||
253        ajp_msg_append_uint16(msg, (apr_uint16_t)r->connection->local_addr->port) ||
254        ajp_msg_append_uint8(msg, is_ssl)                        ||
255        ajp_msg_append_uint16(msg, (apr_uint16_t) num_headers)) {
256
257        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00968)
258               "ajp_marshal_into_msgb: "
259               "Error appending the message beginning");
260        return APR_EGENERAL;
261    }
262
263    for (i = 0 ; i < num_headers ; i++) {
264        int sc;
265        const apr_array_header_t *t = apr_table_elts(r->headers_in);
266        const apr_table_entry_t *elts = (apr_table_entry_t *)t->elts;
267
268        if ((sc = sc_for_req_header(elts[i].key)) != UNKNOWN_METHOD) {
269            if (ajp_msg_append_uint16(msg, (apr_uint16_t)sc)) {
270                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00969)
271                       "ajp_marshal_into_msgb: "
272                       "Error appending the header name");
273                return AJP_EOVERFLOW;
274            }
275        }
276        else {
277            if (ajp_msg_append_string(msg, elts[i].key)) {
278                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00970)
279                       "ajp_marshal_into_msgb: "
280                       "Error appending the header name");
281                return AJP_EOVERFLOW;
282            }
283        }
284
285        if (ajp_msg_append_string(msg, elts[i].val)) {
286            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00971)
287                   "ajp_marshal_into_msgb: "
288                   "Error appending the header value");
289            return AJP_EOVERFLOW;
290        }
291        ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r,
292                   "ajp_marshal_into_msgb: Header[%d] [%s] = [%s]",
293                   i, elts[i].key, elts[i].val);
294    }
295
296/* XXXX need to figure out how to do this
297    if (s->secret) {
298        if (ajp_msg_append_uint8(msg, SC_A_SECRET) ||
299            ajp_msg_append_string(msg, s->secret)) {
300            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
301                   "Error ajp_marshal_into_msgb - "
302                   "Error appending secret");
303            return APR_EGENERAL;
304        }
305    }
306 */
307
308    if (r->user) {
309        if (ajp_msg_append_uint8(msg, SC_A_REMOTE_USER) ||
310            ajp_msg_append_string(msg, r->user)) {
311            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00972)
312                   "ajp_marshal_into_msgb: "
313                   "Error appending the remote user");
314            return AJP_EOVERFLOW;
315        }
316    }
317    if (r->ap_auth_type) {
318        if (ajp_msg_append_uint8(msg, SC_A_AUTH_TYPE) ||
319            ajp_msg_append_string(msg, r->ap_auth_type)) {
320            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00973)
321                   "ajp_marshal_into_msgb: "
322                   "Error appending the auth type");
323            return AJP_EOVERFLOW;
324        }
325    }
326    /* XXXX  ebcdic (args converted?) */
327    if (uri->query) {
328        if (ajp_msg_append_uint8(msg, SC_A_QUERY_STRING) ||
329            ajp_msg_append_string(msg, uri->query)) {
330            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00974)
331                   "ajp_marshal_into_msgb: "
332                   "Error appending the query string");
333            return AJP_EOVERFLOW;
334        }
335    }
336    if ((session_route = apr_table_get(r->notes, "session-route"))) {
337        if (ajp_msg_append_uint8(msg, SC_A_JVM_ROUTE) ||
338            ajp_msg_append_string(msg, session_route)) {
339            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00975)
340                   "ajp_marshal_into_msgb: "
341                   "Error appending the jvm route");
342            return AJP_EOVERFLOW;
343        }
344    }
345/* XXX: Is the subprocess_env a right place?
346 * <Location /examples>
347 *   ProxyPass ajp://remote:8009/servlets-examples
348 *   SetEnv SSL_SESSION_ID CUSTOM_SSL_SESSION_ID
349 * </Location>
350 */
351    /*
352     * Only lookup SSL variables if we are currently running HTTPS.
353     * Furthermore ensure that only variables get set in the AJP message
354     * that are not NULL and not empty.
355     */
356    if (is_ssl) {
357        if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
358                                       AJP13_SSL_CLIENT_CERT_INDICATOR))
359            && envvar[0]) {
360            if (ajp_msg_append_uint8(msg, SC_A_SSL_CERT)
361                || ajp_msg_append_string(msg, envvar)) {
362                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00976)
363                              "ajp_marshal_into_msgb: "
364                              "Error appending the SSL certificates");
365                return AJP_EOVERFLOW;
366            }
367        }
368
369        if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
370                                       AJP13_SSL_CIPHER_INDICATOR))
371            && envvar[0]) {
372            if (ajp_msg_append_uint8(msg, SC_A_SSL_CIPHER)
373                || ajp_msg_append_string(msg, envvar)) {
374                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00977)
375                              "ajp_marshal_into_msgb: "
376                              "Error appending the SSL ciphers");
377                return AJP_EOVERFLOW;
378            }
379        }
380
381        if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
382                                       AJP13_SSL_SESSION_INDICATOR))
383            && envvar[0]) {
384            if (ajp_msg_append_uint8(msg, SC_A_SSL_SESSION)
385                || ajp_msg_append_string(msg, envvar)) {
386                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00978)
387                              "ajp_marshal_into_msgb: "
388                              "Error appending the SSL session");
389                return AJP_EOVERFLOW;
390            }
391        }
392
393        /* ssl_key_size is required by Servlet 2.3 API */
394        if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r,
395                                       AJP13_SSL_KEY_SIZE_INDICATOR))
396            && envvar[0]) {
397
398            if (ajp_msg_append_uint8(msg, SC_A_SSL_KEY_SIZE)
399                || ajp_msg_append_uint16(msg, (unsigned short) atoi(envvar))) {
400                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00979)
401                              "ajp_marshal_into_msgb: "
402                              "Error appending the SSL key size");
403                return APR_EGENERAL;
404            }
405        }
406    }
407    /* If the method was unrecognized, encode it as an attribute */
408    if (method == SC_M_JK_STORED) {
409        if (ajp_msg_append_uint8(msg, SC_A_STORED_METHOD)
410            || ajp_msg_append_string(msg, r->method)) {
411            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02438)
412                          "ajp_marshal_into_msgb: "
413                          "Error appending the method '%s' as request attribute",
414                          r->method);
415            return AJP_EOVERFLOW;
416        }
417    }
418    /* Forward the remote port information, which was forgotten
419     * from the builtin data of the AJP 13 protocol.
420     * Since the servlet spec allows to retrieve it via getRemotePort(),
421     * we provide the port to the Tomcat connector as a request
422     * attribute. Modern Tomcat versions know how to retrieve
423     * the remote port from this attribute.
424     */
425    {
426        const char *key = SC_A_REQ_REMOTE_PORT;
427        char *val = apr_itoa(r->pool, r->useragent_addr->port);
428        if (ajp_msg_append_uint8(msg, SC_A_REQ_ATTRIBUTE) ||
429            ajp_msg_append_string(msg, key)   ||
430            ajp_msg_append_string(msg, val)) {
431            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00980)
432                    "ajp_marshal_into_msgb: "
433                    "Error appending attribute %s=%s",
434                    key, val);
435            return AJP_EOVERFLOW;
436        }
437    }
438    /* Use the environment vars prefixed with AJP_
439     * and pass it to the header striping that prefix.
440     */
441    for (i = 0; i < (apr_uint32_t)arr->nelts; i++) {
442        if (!strncmp(elts[i].key, "AJP_", 4)) {
443            if (ajp_msg_append_uint8(msg, SC_A_REQ_ATTRIBUTE) ||
444                ajp_msg_append_string(msg, elts[i].key + 4)   ||
445                ajp_msg_append_string(msg, elts[i].val)) {
446                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00981)
447                        "ajp_marshal_into_msgb: "
448                        "Error appending attribute %s=%s",
449                        elts[i].key, elts[i].val);
450                return AJP_EOVERFLOW;
451            }
452        }
453    }
454
455    if (ajp_msg_append_uint8(msg, SC_A_ARE_DONE)) {
456        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00982)
457               "ajp_marshal_into_msgb: "
458               "Error appending the message end");
459        return AJP_EOVERFLOW;
460    }
461
462    ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r,
463            "ajp_marshal_into_msgb: Done");
464    return APR_SUCCESS;
465}
466
467/*
468AJPV13_RESPONSE/AJPV14_RESPONSE:=
469    response_prefix (2)
470    status          (short)
471    status_msg      (short)
472    num_headers     (short)
473    num_headers*(res_header_name header_value)
474    *body_chunk
475    terminator      boolean <! -- recycle connection or not  -->
476
477req_header_name :=
478    sc_req_header_name | (string)
479
480res_header_name :=
481    sc_res_header_name | (string)
482
483header_value :=
484    (string)
485
486body_chunk :=
487    length  (short)
488    body    length*(var binary)
489
490 */
491
492static int addit_dammit(void *v, const char *key, const char *val)
493{
494    apr_table_addn(v, key, val);
495    return 1;
496}
497
498static apr_status_t ajp_unmarshal_response(ajp_msg_t *msg,
499                                           request_rec *r,
500                                           proxy_dir_conf *dconf)
501{
502    apr_uint16_t status;
503    apr_status_t rc;
504    const char *ptr;
505    apr_uint16_t  num_headers;
506    int i;
507
508    rc = ajp_msg_get_uint16(msg, &status);
509
510    if (rc != APR_SUCCESS) {
511         ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00983)
512                "ajp_unmarshal_response: Null status");
513        return rc;
514    }
515    r->status = status;
516
517    rc = ajp_msg_get_string(msg, &ptr);
518    if (rc == APR_SUCCESS) {
519#if APR_CHARSET_EBCDIC /* copy only if we have to */
520        ptr = apr_pstrdup(r->pool, ptr);
521        ap_xlate_proto_from_ascii(ptr, strlen(ptr));
522#endif
523        r->status_line =  apr_psprintf(r->pool, "%d %s", status, ptr);
524    } else {
525        r->status_line = NULL;
526    }
527
528    ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r,
529           "ajp_unmarshal_response: status = %d", status);
530
531    rc = ajp_msg_get_uint16(msg, &num_headers);
532    if (rc == APR_SUCCESS) {
533        apr_table_t *save_table;
534
535        /* First, tuck away all already existing cookies */
536        /*
537         * Could optimize here, but just in case we want to
538         * also save other headers, keep this logic.
539         */
540        save_table = apr_table_make(r->pool, num_headers + 2);
541        apr_table_do(addit_dammit, save_table, r->headers_out,
542                     "Set-Cookie", NULL);
543        r->headers_out = save_table;
544    } else {
545        r->headers_out = NULL;
546        num_headers = 0;
547    }
548
549    ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r,
550           "ajp_unmarshal_response: Number of headers is = %d",
551           num_headers);
552
553    for(i = 0 ; i < (int) num_headers ; i++) {
554        apr_uint16_t name;
555        const char *stringname;
556        const char *value;
557        rc  = ajp_msg_peek_uint16(msg, &name);
558        if (rc != APR_SUCCESS) {
559            return rc;
560        }
561
562        if ((name & 0XFF00) == 0XA000) {
563            ajp_msg_get_uint16(msg, &name);
564            stringname = long_res_header_for_sc(name);
565            if (stringname == NULL) {
566                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00984)
567                       "ajp_unmarshal_response: "
568                       "No such sc (%08x)",
569                       name);
570                return AJP_EBAD_HEADER;
571            }
572        } else {
573            name = 0;
574            rc = ajp_msg_get_string(msg, &stringname);
575            if (rc != APR_SUCCESS) {
576                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00985)
577                       "ajp_unmarshal_response: "
578                       "Null header name");
579                return rc;
580            }
581            ap_xlate_proto_from_ascii(stringname, strlen(stringname));
582        }
583
584        rc = ajp_msg_get_string(msg, &value);
585        if (rc != APR_SUCCESS) {
586            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00986)
587                   "ajp_unmarshal_response: "
588                   "Null header value");
589            return rc;
590        }
591
592        /* Set-Cookie need additional processing */
593        if (!strcasecmp(stringname, "Set-Cookie")) {
594            value = ap_proxy_cookie_reverse_map(r, dconf, value);
595        }
596        /* Location, Content-Location, URI and Destination need additional
597         * processing */
598        else if (!strcasecmp(stringname, "Location")
599                 || !strcasecmp(stringname, "Content-Location")
600                 || !strcasecmp(stringname, "URI")
601                 || !strcasecmp(stringname, "Destination"))
602        {
603          value = ap_proxy_location_reverse_map(r, dconf, value);
604        }
605
606        ap_xlate_proto_from_ascii(value, strlen(value));
607        ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r,
608               "ajp_unmarshal_response: Header[%d] [%s] = [%s]",
609                       i, stringname, value);
610
611        apr_table_add(r->headers_out, stringname, value);
612
613        /* Content-type needs an additional handling */
614        if (strcasecmp(stringname, "Content-Type") == 0) {
615             /* add corresponding filter */
616            ap_set_content_type(r, apr_pstrdup(r->pool, value));
617            ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r,
618               "ajp_unmarshal_response: ap_set_content_type to '%s'", value);
619        }
620    }
621
622    return APR_SUCCESS;
623}
624
625/*
626 * Build the ajp header message and send it
627 */
628apr_status_t ajp_send_header(apr_socket_t *sock,
629                             request_rec *r,
630                             apr_size_t buffsize,
631                             apr_uri_t *uri)
632{
633    ajp_msg_t *msg;
634    apr_status_t rc;
635
636    rc = ajp_msg_create(r->pool, buffsize, &msg);
637    if (rc != APR_SUCCESS) {
638        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00987)
639               "ajp_send_header: ajp_msg_create failed");
640        return rc;
641    }
642
643    rc = ajp_marshal_into_msgb(msg, r, uri);
644    if (rc != APR_SUCCESS) {
645        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00988)
646               "ajp_send_header: ajp_marshal_into_msgb failed");
647        return rc;
648    }
649
650    rc = ajp_ilink_send(sock, msg);
651    ajp_msg_log(r, msg, "ajp_send_header: ajp_ilink_send packet dump");
652    if (rc != APR_SUCCESS) {
653        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00989)
654               "ajp_send_header: ajp_ilink_send failed");
655        return rc;
656    }
657
658    return APR_SUCCESS;
659}
660
661/*
662 * Read the ajp message and return the type of the message.
663 */
664apr_status_t ajp_read_header(apr_socket_t *sock,
665                             request_rec  *r,
666                             apr_size_t buffsize,
667                             ajp_msg_t **msg)
668{
669    apr_byte_t result;
670    apr_status_t rc;
671
672    if (*msg) {
673        rc = ajp_msg_reuse(*msg);
674        if (rc != APR_SUCCESS) {
675            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00990)
676                   "ajp_read_header: ajp_msg_reuse failed");
677            return rc;
678        }
679    }
680    else {
681        rc = ajp_msg_create(r->pool, buffsize, msg);
682        if (rc != APR_SUCCESS) {
683            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00991)
684                   "ajp_read_header: ajp_msg_create failed");
685            return rc;
686        }
687    }
688    ajp_msg_reset(*msg);
689    rc = ajp_ilink_receive(sock, *msg);
690    if (rc != APR_SUCCESS) {
691        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00992)
692               "ajp_read_header: ajp_ilink_receive failed");
693        return rc;
694    }
695    ajp_msg_log(r, *msg, "ajp_read_header: ajp_ilink_receive packet dump");
696    rc = ajp_msg_peek_uint8(*msg, &result);
697    if (rc != APR_SUCCESS) {
698        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00993)
699                      "ajp_read_header: ajp_msg_peek_uint8 failed");
700        return rc;
701    }
702    ap_log_rerror(APLOG_MARK, APLOG_TRACE1, 0, r,
703               "ajp_read_header: ajp_ilink_received %s (0x%02x)",
704               ajp_type_str(result), result);
705    return APR_SUCCESS;
706}
707
708/* parse the msg to read the type */
709int ajp_parse_type(request_rec  *r, ajp_msg_t *msg)
710{
711    apr_byte_t result;
712    ajp_msg_peek_uint8(msg, &result);
713    ap_log_rerror(APLOG_MARK, APLOG_TRACE6, 0, r,
714               "ajp_parse_type: got %s (0x%02x)",
715               ajp_type_str(result), result);
716    return (int) result;
717}
718
719/* parse the header */
720apr_status_t ajp_parse_header(request_rec  *r, proxy_dir_conf *conf,
721                              ajp_msg_t *msg)
722{
723    apr_byte_t result;
724    apr_status_t rc;
725
726    rc = ajp_msg_get_uint8(msg, &result);
727    if (rc != APR_SUCCESS) {
728        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00994)
729               "ajp_parse_headers: ajp_msg_get_byte failed");
730        return rc;
731    }
732    if (result != CMD_AJP13_SEND_HEADERS) {
733        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00995)
734               "ajp_parse_headers: wrong type %s (0x%02x) expecting %s (0x%02x)",
735               ajp_type_str(result), result,
736               ajp_type_str(CMD_AJP13_SEND_HEADERS), CMD_AJP13_SEND_HEADERS);
737        return AJP_EBAD_HEADER;
738    }
739    return ajp_unmarshal_response(msg, r, conf);
740}
741
742/* parse the body and return data address and length */
743apr_status_t  ajp_parse_data(request_rec  *r, ajp_msg_t *msg,
744                             apr_uint16_t *len, char **ptr)
745{
746    apr_byte_t result;
747    apr_status_t rc;
748    apr_uint16_t expected_len;
749
750    rc = ajp_msg_get_uint8(msg, &result);
751    if (rc != APR_SUCCESS) {
752        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00996)
753               "ajp_parse_data: ajp_msg_get_byte failed");
754        return rc;
755    }
756    if (result != CMD_AJP13_SEND_BODY_CHUNK) {
757        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00997)
758               "ajp_parse_data: wrong type %s (0x%02x) expecting %s (0x%02x)",
759               ajp_type_str(result), result,
760               ajp_type_str(CMD_AJP13_SEND_BODY_CHUNK), CMD_AJP13_SEND_BODY_CHUNK);
761        return AJP_EBAD_HEADER;
762    }
763    rc = ajp_msg_get_uint16(msg, len);
764    if (rc != APR_SUCCESS) {
765        return rc;
766    }
767    /*
768     * msg->len contains the complete length of the message including all
769     * headers. So the expected length for a CMD_AJP13_SEND_BODY_CHUNK is
770     * msg->len minus the sum of
771     * AJP_HEADER_LEN    : The length of the header to every AJP message.
772     * AJP_HEADER_SZ_LEN : The header giving the size of the chunk.
773     * 1                 : The CMD_AJP13_SEND_BODY_CHUNK indicator byte (0x03).
774     * 1                 : The last byte of this message always seems to be
775     *                     0x00 and is not part of the chunk.
776     */
777    expected_len = msg->len - (AJP_HEADER_LEN + AJP_HEADER_SZ_LEN + 1 + 1);
778    if (*len != expected_len) {
779        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00998)
780               "ajp_parse_data: Wrong chunk length. Length of chunk is %i,"
781               " expected length is %i.", *len, expected_len);
782        return AJP_EBAD_HEADER;
783    }
784    *ptr = (char *)&(msg->buf[msg->pos]);
785    return APR_SUCCESS;
786}
787
788/* Check the reuse flag in CMD_AJP13_END_RESPONSE */
789apr_status_t ajp_parse_reuse(request_rec *r, ajp_msg_t *msg,
790                             apr_byte_t *reuse)
791{
792    apr_byte_t result;
793    apr_status_t rc;
794
795    rc = ajp_msg_get_uint8(msg, &result);
796    if (rc != APR_SUCCESS) {
797        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00999)
798               "ajp_parse_reuse: ajp_msg_get_byte failed");
799        return rc;
800    }
801    if (result != CMD_AJP13_END_RESPONSE) {
802        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01000)
803               "ajp_parse_reuse: wrong type %s (0x%02x) expecting %s (0x%02x)",
804               ajp_type_str(result), result,
805               ajp_type_str(CMD_AJP13_END_RESPONSE), CMD_AJP13_END_RESPONSE);
806        return AJP_EBAD_HEADER;
807    }
808    return ajp_msg_get_uint8(msg, reuse);
809}
810
811/*
812 * Allocate a msg to send data
813 */
814apr_status_t  ajp_alloc_data_msg(apr_pool_t *pool, char **ptr, apr_size_t *len,
815                                 ajp_msg_t **msg)
816{
817    apr_status_t rc;
818
819    if ((rc = ajp_msg_create(pool, *len, msg)) != APR_SUCCESS)
820        return rc;
821    ajp_msg_reset(*msg);
822    *ptr = (char *)&((*msg)->buf[6]);
823    *len =  *len - 6;
824
825    return APR_SUCCESS;
826}
827
828/*
829 * Send the data message
830 */
831apr_status_t  ajp_send_data_msg(apr_socket_t *sock,
832                                ajp_msg_t *msg, apr_size_t len)
833{
834
835    msg->buf[4] = (apr_byte_t)((len >> 8) & 0xFF);
836    msg->buf[5] = (apr_byte_t)(len & 0xFF);
837
838    msg->len += len + 2; /* + 1 XXXX where is '\0' */
839
840    return ajp_ilink_send(sock, msg);
841
842}
843