1/* Licensed to the Apache Software Foundation (ASF) under one or more 2 * contributor license agreements. See the NOTICE file distributed with 3 * this work for additional information regarding copyright ownership. 4 * The ASF licenses this file to You under the Apache License, Version 2.0 5 * (the "License"); you may not use this file except in compliance with 6 * the License. You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17#include "ajp_header.h" 18#include "ajp.h" 19 20APLOG_USE_MODULE(proxy_ajp); 21 22static const char *response_trans_headers[] = { 23 "Content-Type", 24 "Content-Language", 25 "Content-Length", 26 "Date", 27 "Last-Modified", 28 "Location", 29 "Set-Cookie", 30 "Set-Cookie2", 31 "Servlet-Engine", 32 "Status", 33 "WWW-Authenticate" 34}; 35 36static const char *long_res_header_for_sc(int sc) 37{ 38 const char *rc = NULL; 39 sc = sc & 0X00FF; 40 if(sc <= SC_RES_HEADERS_NUM && sc > 0) { 41 rc = response_trans_headers[sc - 1]; 42 } 43 44 return rc; 45} 46 47#define UNKNOWN_METHOD (-1) 48 49static int sc_for_req_header(const char *header_name) 50{ 51 char header[16]; 52 apr_size_t len = strlen(header_name); 53 const char *p = header_name; 54 int i = 0; 55 56 /* ACCEPT-LANGUAGE is the longest header 57 * that is of interest. 58 */ 59 if (len < 4 || len > 15) 60 return UNKNOWN_METHOD; 61 62 while (*p) 63 header[i++] = apr_toupper(*p++); 64 header[i] = '\0'; 65 p = &header[1]; 66 67 switch (header[0]) { 68 case 'A': 69 if (memcmp(p, "CCEPT", 5) == 0) { 70 if (!header[6]) 71 return SC_ACCEPT; 72 else if (header[6] == '-') { 73 p += 6; 74 if (strcmp(p, "CHARSET") == 0) 75 return SC_ACCEPT_CHARSET; 76 else if (strcmp(p, "ENCODING") == 0) 77 return SC_ACCEPT_ENCODING; 78 else if (strcmp(p, "LANGUAGE") == 0) 79 return SC_ACCEPT_LANGUAGE; 80 else 81 return UNKNOWN_METHOD; 82 } 83 else 84 return UNKNOWN_METHOD; 85 } 86 else if (strcmp(p, "UTHORIZATION") == 0) 87 return SC_AUTHORIZATION; 88 else 89 return UNKNOWN_METHOD; 90 break; 91 case 'C': 92 if(strcmp(p, "OOKIE2") == 0) 93 return SC_COOKIE2; 94 else if (strcmp(p, "OOKIE") == 0) 95 return SC_COOKIE; 96 else if(strcmp(p, "ONNECTION") == 0) 97 return SC_CONNECTION; 98 else if(strcmp(p, "ONTENT-TYPE") == 0) 99 return SC_CONTENT_TYPE; 100 else if(strcmp(p, "ONTENT-LENGTH") == 0) 101 return SC_CONTENT_LENGTH; 102 else 103 return UNKNOWN_METHOD; 104 break; 105 case 'H': 106 if(strcmp(p, "OST") == 0) 107 return SC_HOST; 108 else 109 return UNKNOWN_METHOD; 110 break; 111 case 'P': 112 if(strcmp(p, "RAGMA") == 0) 113 return SC_PRAGMA; 114 else 115 return UNKNOWN_METHOD; 116 break; 117 case 'R': 118 if(strcmp(p, "EFERER") == 0) 119 return SC_REFERER; 120 else 121 return UNKNOWN_METHOD; 122 break; 123 case 'U': 124 if(strcmp(p, "SER-AGENT") == 0) 125 return SC_USER_AGENT; 126 else 127 return UNKNOWN_METHOD; 128 break; 129 default: 130 return UNKNOWN_METHOD; 131 } 132 133 /* NOTREACHED */ 134} 135 136/* Apache method number to SC methods transform table */ 137static const unsigned char sc_for_req_method_table[] = { 138 SC_M_GET, 139 SC_M_PUT, 140 SC_M_POST, 141 SC_M_DELETE, 142 0, /* M_CONNECT */ 143 SC_M_OPTIONS, 144 SC_M_TRACE, 145 0, /* M_PATCH */ 146 SC_M_PROPFIND, 147 SC_M_PROPPATCH, 148 SC_M_MKCOL, 149 SC_M_COPY, 150 SC_M_MOVE, 151 SC_M_LOCK, 152 SC_M_UNLOCK, 153 SC_M_VERSION_CONTROL, 154 SC_M_CHECKOUT, 155 SC_M_UNCHECKOUT, 156 SC_M_CHECKIN, 157 SC_M_UPDATE, 158 SC_M_LABEL, 159 SC_M_REPORT, 160 SC_M_MKWORKSPACE, 161 SC_M_MKACTIVITY, 162 SC_M_BASELINE_CONTROL, 163 SC_M_MERGE, 164 0 /* M_INVALID */ 165}; 166 167static int sc_for_req_method_by_id(request_rec *r) 168{ 169 int method_id = r->method_number; 170 if (method_id < 0 || method_id > M_INVALID) { 171 return UNKNOWN_METHOD; 172 } 173 else if (r->header_only) { 174 return SC_M_HEAD; 175 } 176 else { 177 return sc_for_req_method_table[method_id] ? 178 sc_for_req_method_table[method_id] : UNKNOWN_METHOD; 179 } 180} 181 182/* 183 * Message structure 184 * 185 * 186AJPV13_REQUEST/AJPV14_REQUEST= 187 request_prefix (1) (byte) 188 method (byte) 189 protocol (string) 190 req_uri (string) 191 remote_addr (string) 192 remote_host (string) 193 server_name (string) 194 server_port (short) 195 is_ssl (boolean) 196 num_headers (short) 197 num_headers*(req_header_name header_value) 198 199 ?context (byte)(string) 200 ?servlet_path (byte)(string) 201 ?remote_user (byte)(string) 202 ?auth_type (byte)(string) 203 ?query_string (byte)(string) 204 ?jvm_route (byte)(string) 205 ?ssl_cert (byte)(string) 206 ?ssl_cipher (byte)(string) 207 ?ssl_session (byte)(string) 208 ?ssl_key_size (byte)(int) via JkOptions +ForwardKeySize 209 request_terminator (byte) 210 ?body content_length*(var binary) 211 212 */ 213 214static apr_status_t ajp_marshal_into_msgb(ajp_msg_t *msg, 215 request_rec *r, 216 apr_uri_t *uri) 217{ 218 int method; 219 apr_uint32_t i, num_headers = 0; 220 apr_byte_t is_ssl; 221 char *remote_host; 222 const char *session_route, *envvar; 223 const apr_array_header_t *arr = apr_table_elts(r->subprocess_env); 224 const apr_table_entry_t *elts = (const apr_table_entry_t *)arr->elts; 225 226 ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r, "Into ajp_marshal_into_msgb"); 227 228 if ((method = sc_for_req_method_by_id(r)) == UNKNOWN_METHOD) { 229 ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r, APLOGNO(02437) 230 "ajp_marshal_into_msgb - Sending unknown method %s as request attribute", 231 r->method); 232 method = SC_M_JK_STORED; 233 } 234 235 is_ssl = (apr_byte_t) ap_proxy_conn_is_https(r->connection); 236 237 if (r->headers_in && apr_table_elts(r->headers_in)) { 238 const apr_array_header_t *t = apr_table_elts(r->headers_in); 239 num_headers = t->nelts; 240 } 241 242 remote_host = (char *)ap_get_remote_host(r->connection, r->per_dir_config, REMOTE_HOST, NULL); 243 244 ajp_msg_reset(msg); 245 246 if (ajp_msg_append_uint8(msg, CMD_AJP13_FORWARD_REQUEST) || 247 ajp_msg_append_uint8(msg, (apr_byte_t) method) || 248 ajp_msg_append_string(msg, r->protocol) || 249 ajp_msg_append_string(msg, uri->path) || 250 ajp_msg_append_string(msg, r->useragent_ip) || 251 ajp_msg_append_string(msg, remote_host) || 252 ajp_msg_append_string(msg, ap_get_server_name(r)) || 253 ajp_msg_append_uint16(msg, (apr_uint16_t)r->connection->local_addr->port) || 254 ajp_msg_append_uint8(msg, is_ssl) || 255 ajp_msg_append_uint16(msg, (apr_uint16_t) num_headers)) { 256 257 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00968) 258 "ajp_marshal_into_msgb: " 259 "Error appending the message beginning"); 260 return APR_EGENERAL; 261 } 262 263 for (i = 0 ; i < num_headers ; i++) { 264 int sc; 265 const apr_array_header_t *t = apr_table_elts(r->headers_in); 266 const apr_table_entry_t *elts = (apr_table_entry_t *)t->elts; 267 268 if ((sc = sc_for_req_header(elts[i].key)) != UNKNOWN_METHOD) { 269 if (ajp_msg_append_uint16(msg, (apr_uint16_t)sc)) { 270 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00969) 271 "ajp_marshal_into_msgb: " 272 "Error appending the header name"); 273 return AJP_EOVERFLOW; 274 } 275 } 276 else { 277 if (ajp_msg_append_string(msg, elts[i].key)) { 278 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00970) 279 "ajp_marshal_into_msgb: " 280 "Error appending the header name"); 281 return AJP_EOVERFLOW; 282 } 283 } 284 285 if (ajp_msg_append_string(msg, elts[i].val)) { 286 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00971) 287 "ajp_marshal_into_msgb: " 288 "Error appending the header value"); 289 return AJP_EOVERFLOW; 290 } 291 ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r, 292 "ajp_marshal_into_msgb: Header[%d] [%s] = [%s]", 293 i, elts[i].key, elts[i].val); 294 } 295 296/* XXXX need to figure out how to do this 297 if (s->secret) { 298 if (ajp_msg_append_uint8(msg, SC_A_SECRET) || 299 ajp_msg_append_string(msg, s->secret)) { 300 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, 301 "Error ajp_marshal_into_msgb - " 302 "Error appending secret"); 303 return APR_EGENERAL; 304 } 305 } 306 */ 307 308 if (r->user) { 309 if (ajp_msg_append_uint8(msg, SC_A_REMOTE_USER) || 310 ajp_msg_append_string(msg, r->user)) { 311 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00972) 312 "ajp_marshal_into_msgb: " 313 "Error appending the remote user"); 314 return AJP_EOVERFLOW; 315 } 316 } 317 if (r->ap_auth_type) { 318 if (ajp_msg_append_uint8(msg, SC_A_AUTH_TYPE) || 319 ajp_msg_append_string(msg, r->ap_auth_type)) { 320 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00973) 321 "ajp_marshal_into_msgb: " 322 "Error appending the auth type"); 323 return AJP_EOVERFLOW; 324 } 325 } 326 /* XXXX ebcdic (args converted?) */ 327 if (uri->query) { 328 if (ajp_msg_append_uint8(msg, SC_A_QUERY_STRING) || 329 ajp_msg_append_string(msg, uri->query)) { 330 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00974) 331 "ajp_marshal_into_msgb: " 332 "Error appending the query string"); 333 return AJP_EOVERFLOW; 334 } 335 } 336 if ((session_route = apr_table_get(r->notes, "session-route"))) { 337 if (ajp_msg_append_uint8(msg, SC_A_JVM_ROUTE) || 338 ajp_msg_append_string(msg, session_route)) { 339 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00975) 340 "ajp_marshal_into_msgb: " 341 "Error appending the jvm route"); 342 return AJP_EOVERFLOW; 343 } 344 } 345/* XXX: Is the subprocess_env a right place? 346 * <Location /examples> 347 * ProxyPass ajp://remote:8009/servlets-examples 348 * SetEnv SSL_SESSION_ID CUSTOM_SSL_SESSION_ID 349 * </Location> 350 */ 351 /* 352 * Only lookup SSL variables if we are currently running HTTPS. 353 * Furthermore ensure that only variables get set in the AJP message 354 * that are not NULL and not empty. 355 */ 356 if (is_ssl) { 357 if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r, 358 AJP13_SSL_CLIENT_CERT_INDICATOR)) 359 && envvar[0]) { 360 if (ajp_msg_append_uint8(msg, SC_A_SSL_CERT) 361 || ajp_msg_append_string(msg, envvar)) { 362 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00976) 363 "ajp_marshal_into_msgb: " 364 "Error appending the SSL certificates"); 365 return AJP_EOVERFLOW; 366 } 367 } 368 369 if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r, 370 AJP13_SSL_CIPHER_INDICATOR)) 371 && envvar[0]) { 372 if (ajp_msg_append_uint8(msg, SC_A_SSL_CIPHER) 373 || ajp_msg_append_string(msg, envvar)) { 374 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00977) 375 "ajp_marshal_into_msgb: " 376 "Error appending the SSL ciphers"); 377 return AJP_EOVERFLOW; 378 } 379 } 380 381 if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r, 382 AJP13_SSL_SESSION_INDICATOR)) 383 && envvar[0]) { 384 if (ajp_msg_append_uint8(msg, SC_A_SSL_SESSION) 385 || ajp_msg_append_string(msg, envvar)) { 386 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00978) 387 "ajp_marshal_into_msgb: " 388 "Error appending the SSL session"); 389 return AJP_EOVERFLOW; 390 } 391 } 392 393 /* ssl_key_size is required by Servlet 2.3 API */ 394 if ((envvar = ap_proxy_ssl_val(r->pool, r->server, r->connection, r, 395 AJP13_SSL_KEY_SIZE_INDICATOR)) 396 && envvar[0]) { 397 398 if (ajp_msg_append_uint8(msg, SC_A_SSL_KEY_SIZE) 399 || ajp_msg_append_uint16(msg, (unsigned short) atoi(envvar))) { 400 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00979) 401 "ajp_marshal_into_msgb: " 402 "Error appending the SSL key size"); 403 return APR_EGENERAL; 404 } 405 } 406 } 407 /* If the method was unrecognized, encode it as an attribute */ 408 if (method == SC_M_JK_STORED) { 409 if (ajp_msg_append_uint8(msg, SC_A_STORED_METHOD) 410 || ajp_msg_append_string(msg, r->method)) { 411 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(02438) 412 "ajp_marshal_into_msgb: " 413 "Error appending the method '%s' as request attribute", 414 r->method); 415 return AJP_EOVERFLOW; 416 } 417 } 418 /* Forward the remote port information, which was forgotten 419 * from the builtin data of the AJP 13 protocol. 420 * Since the servlet spec allows to retrieve it via getRemotePort(), 421 * we provide the port to the Tomcat connector as a request 422 * attribute. Modern Tomcat versions know how to retrieve 423 * the remote port from this attribute. 424 */ 425 { 426 const char *key = SC_A_REQ_REMOTE_PORT; 427 char *val = apr_itoa(r->pool, r->useragent_addr->port); 428 if (ajp_msg_append_uint8(msg, SC_A_REQ_ATTRIBUTE) || 429 ajp_msg_append_string(msg, key) || 430 ajp_msg_append_string(msg, val)) { 431 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00980) 432 "ajp_marshal_into_msgb: " 433 "Error appending attribute %s=%s", 434 key, val); 435 return AJP_EOVERFLOW; 436 } 437 } 438 /* Use the environment vars prefixed with AJP_ 439 * and pass it to the header striping that prefix. 440 */ 441 for (i = 0; i < (apr_uint32_t)arr->nelts; i++) { 442 if (!strncmp(elts[i].key, "AJP_", 4)) { 443 if (ajp_msg_append_uint8(msg, SC_A_REQ_ATTRIBUTE) || 444 ajp_msg_append_string(msg, elts[i].key + 4) || 445 ajp_msg_append_string(msg, elts[i].val)) { 446 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00981) 447 "ajp_marshal_into_msgb: " 448 "Error appending attribute %s=%s", 449 elts[i].key, elts[i].val); 450 return AJP_EOVERFLOW; 451 } 452 } 453 } 454 455 if (ajp_msg_append_uint8(msg, SC_A_ARE_DONE)) { 456 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00982) 457 "ajp_marshal_into_msgb: " 458 "Error appending the message end"); 459 return AJP_EOVERFLOW; 460 } 461 462 ap_log_rerror(APLOG_MARK, APLOG_TRACE8, 0, r, 463 "ajp_marshal_into_msgb: Done"); 464 return APR_SUCCESS; 465} 466 467/* 468AJPV13_RESPONSE/AJPV14_RESPONSE:= 469 response_prefix (2) 470 status (short) 471 status_msg (short) 472 num_headers (short) 473 num_headers*(res_header_name header_value) 474 *body_chunk 475 terminator boolean <! -- recycle connection or not --> 476 477req_header_name := 478 sc_req_header_name | (string) 479 480res_header_name := 481 sc_res_header_name | (string) 482 483header_value := 484 (string) 485 486body_chunk := 487 length (short) 488 body length*(var binary) 489 490 */ 491 492static int addit_dammit(void *v, const char *key, const char *val) 493{ 494 apr_table_addn(v, key, val); 495 return 1; 496} 497 498static apr_status_t ajp_unmarshal_response(ajp_msg_t *msg, 499 request_rec *r, 500 proxy_dir_conf *dconf) 501{ 502 apr_uint16_t status; 503 apr_status_t rc; 504 const char *ptr; 505 apr_uint16_t num_headers; 506 int i; 507 508 rc = ajp_msg_get_uint16(msg, &status); 509 510 if (rc != APR_SUCCESS) { 511 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00983) 512 "ajp_unmarshal_response: Null status"); 513 return rc; 514 } 515 r->status = status; 516 517 rc = ajp_msg_get_string(msg, &ptr); 518 if (rc == APR_SUCCESS) { 519#if APR_CHARSET_EBCDIC /* copy only if we have to */ 520 ptr = apr_pstrdup(r->pool, ptr); 521 ap_xlate_proto_from_ascii(ptr, strlen(ptr)); 522#endif 523 r->status_line = apr_psprintf(r->pool, "%d %s", status, ptr); 524 } else { 525 r->status_line = NULL; 526 } 527 528 ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r, 529 "ajp_unmarshal_response: status = %d", status); 530 531 rc = ajp_msg_get_uint16(msg, &num_headers); 532 if (rc == APR_SUCCESS) { 533 apr_table_t *save_table; 534 535 /* First, tuck away all already existing cookies */ 536 /* 537 * Could optimize here, but just in case we want to 538 * also save other headers, keep this logic. 539 */ 540 save_table = apr_table_make(r->pool, num_headers + 2); 541 apr_table_do(addit_dammit, save_table, r->headers_out, 542 "Set-Cookie", NULL); 543 r->headers_out = save_table; 544 } else { 545 r->headers_out = NULL; 546 num_headers = 0; 547 } 548 549 ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r, 550 "ajp_unmarshal_response: Number of headers is = %d", 551 num_headers); 552 553 for(i = 0 ; i < (int) num_headers ; i++) { 554 apr_uint16_t name; 555 const char *stringname; 556 const char *value; 557 rc = ajp_msg_peek_uint16(msg, &name); 558 if (rc != APR_SUCCESS) { 559 return rc; 560 } 561 562 if ((name & 0XFF00) == 0XA000) { 563 ajp_msg_get_uint16(msg, &name); 564 stringname = long_res_header_for_sc(name); 565 if (stringname == NULL) { 566 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00984) 567 "ajp_unmarshal_response: " 568 "No such sc (%08x)", 569 name); 570 return AJP_EBAD_HEADER; 571 } 572 } else { 573 name = 0; 574 rc = ajp_msg_get_string(msg, &stringname); 575 if (rc != APR_SUCCESS) { 576 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00985) 577 "ajp_unmarshal_response: " 578 "Null header name"); 579 return rc; 580 } 581 ap_xlate_proto_from_ascii(stringname, strlen(stringname)); 582 } 583 584 rc = ajp_msg_get_string(msg, &value); 585 if (rc != APR_SUCCESS) { 586 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00986) 587 "ajp_unmarshal_response: " 588 "Null header value"); 589 return rc; 590 } 591 592 /* Set-Cookie need additional processing */ 593 if (!strcasecmp(stringname, "Set-Cookie")) { 594 value = ap_proxy_cookie_reverse_map(r, dconf, value); 595 } 596 /* Location, Content-Location, URI and Destination need additional 597 * processing */ 598 else if (!strcasecmp(stringname, "Location") 599 || !strcasecmp(stringname, "Content-Location") 600 || !strcasecmp(stringname, "URI") 601 || !strcasecmp(stringname, "Destination")) 602 { 603 value = ap_proxy_location_reverse_map(r, dconf, value); 604 } 605 606 ap_xlate_proto_from_ascii(value, strlen(value)); 607 ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r, 608 "ajp_unmarshal_response: Header[%d] [%s] = [%s]", 609 i, stringname, value); 610 611 apr_table_add(r->headers_out, stringname, value); 612 613 /* Content-type needs an additional handling */ 614 if (strcasecmp(stringname, "Content-Type") == 0) { 615 /* add corresponding filter */ 616 ap_set_content_type(r, apr_pstrdup(r->pool, value)); 617 ap_log_rerror(APLOG_MARK, APLOG_TRACE5, 0, r, 618 "ajp_unmarshal_response: ap_set_content_type to '%s'", value); 619 } 620 } 621 622 return APR_SUCCESS; 623} 624 625/* 626 * Build the ajp header message and send it 627 */ 628apr_status_t ajp_send_header(apr_socket_t *sock, 629 request_rec *r, 630 apr_size_t buffsize, 631 apr_uri_t *uri) 632{ 633 ajp_msg_t *msg; 634 apr_status_t rc; 635 636 rc = ajp_msg_create(r->pool, buffsize, &msg); 637 if (rc != APR_SUCCESS) { 638 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00987) 639 "ajp_send_header: ajp_msg_create failed"); 640 return rc; 641 } 642 643 rc = ajp_marshal_into_msgb(msg, r, uri); 644 if (rc != APR_SUCCESS) { 645 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00988) 646 "ajp_send_header: ajp_marshal_into_msgb failed"); 647 return rc; 648 } 649 650 rc = ajp_ilink_send(sock, msg); 651 ajp_msg_log(r, msg, "ajp_send_header: ajp_ilink_send packet dump"); 652 if (rc != APR_SUCCESS) { 653 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00989) 654 "ajp_send_header: ajp_ilink_send failed"); 655 return rc; 656 } 657 658 return APR_SUCCESS; 659} 660 661/* 662 * Read the ajp message and return the type of the message. 663 */ 664apr_status_t ajp_read_header(apr_socket_t *sock, 665 request_rec *r, 666 apr_size_t buffsize, 667 ajp_msg_t **msg) 668{ 669 apr_byte_t result; 670 apr_status_t rc; 671 672 if (*msg) { 673 rc = ajp_msg_reuse(*msg); 674 if (rc != APR_SUCCESS) { 675 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00990) 676 "ajp_read_header: ajp_msg_reuse failed"); 677 return rc; 678 } 679 } 680 else { 681 rc = ajp_msg_create(r->pool, buffsize, msg); 682 if (rc != APR_SUCCESS) { 683 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00991) 684 "ajp_read_header: ajp_msg_create failed"); 685 return rc; 686 } 687 } 688 ajp_msg_reset(*msg); 689 rc = ajp_ilink_receive(sock, *msg); 690 if (rc != APR_SUCCESS) { 691 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00992) 692 "ajp_read_header: ajp_ilink_receive failed"); 693 return rc; 694 } 695 ajp_msg_log(r, *msg, "ajp_read_header: ajp_ilink_receive packet dump"); 696 rc = ajp_msg_peek_uint8(*msg, &result); 697 if (rc != APR_SUCCESS) { 698 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00993) 699 "ajp_read_header: ajp_msg_peek_uint8 failed"); 700 return rc; 701 } 702 ap_log_rerror(APLOG_MARK, APLOG_TRACE1, 0, r, 703 "ajp_read_header: ajp_ilink_received %s (0x%02x)", 704 ajp_type_str(result), result); 705 return APR_SUCCESS; 706} 707 708/* parse the msg to read the type */ 709int ajp_parse_type(request_rec *r, ajp_msg_t *msg) 710{ 711 apr_byte_t result; 712 ajp_msg_peek_uint8(msg, &result); 713 ap_log_rerror(APLOG_MARK, APLOG_TRACE6, 0, r, 714 "ajp_parse_type: got %s (0x%02x)", 715 ajp_type_str(result), result); 716 return (int) result; 717} 718 719/* parse the header */ 720apr_status_t ajp_parse_header(request_rec *r, proxy_dir_conf *conf, 721 ajp_msg_t *msg) 722{ 723 apr_byte_t result; 724 apr_status_t rc; 725 726 rc = ajp_msg_get_uint8(msg, &result); 727 if (rc != APR_SUCCESS) { 728 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00994) 729 "ajp_parse_headers: ajp_msg_get_byte failed"); 730 return rc; 731 } 732 if (result != CMD_AJP13_SEND_HEADERS) { 733 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00995) 734 "ajp_parse_headers: wrong type %s (0x%02x) expecting %s (0x%02x)", 735 ajp_type_str(result), result, 736 ajp_type_str(CMD_AJP13_SEND_HEADERS), CMD_AJP13_SEND_HEADERS); 737 return AJP_EBAD_HEADER; 738 } 739 return ajp_unmarshal_response(msg, r, conf); 740} 741 742/* parse the body and return data address and length */ 743apr_status_t ajp_parse_data(request_rec *r, ajp_msg_t *msg, 744 apr_uint16_t *len, char **ptr) 745{ 746 apr_byte_t result; 747 apr_status_t rc; 748 apr_uint16_t expected_len; 749 750 rc = ajp_msg_get_uint8(msg, &result); 751 if (rc != APR_SUCCESS) { 752 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00996) 753 "ajp_parse_data: ajp_msg_get_byte failed"); 754 return rc; 755 } 756 if (result != CMD_AJP13_SEND_BODY_CHUNK) { 757 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00997) 758 "ajp_parse_data: wrong type %s (0x%02x) expecting %s (0x%02x)", 759 ajp_type_str(result), result, 760 ajp_type_str(CMD_AJP13_SEND_BODY_CHUNK), CMD_AJP13_SEND_BODY_CHUNK); 761 return AJP_EBAD_HEADER; 762 } 763 rc = ajp_msg_get_uint16(msg, len); 764 if (rc != APR_SUCCESS) { 765 return rc; 766 } 767 /* 768 * msg->len contains the complete length of the message including all 769 * headers. So the expected length for a CMD_AJP13_SEND_BODY_CHUNK is 770 * msg->len minus the sum of 771 * AJP_HEADER_LEN : The length of the header to every AJP message. 772 * AJP_HEADER_SZ_LEN : The header giving the size of the chunk. 773 * 1 : The CMD_AJP13_SEND_BODY_CHUNK indicator byte (0x03). 774 * 1 : The last byte of this message always seems to be 775 * 0x00 and is not part of the chunk. 776 */ 777 expected_len = msg->len - (AJP_HEADER_LEN + AJP_HEADER_SZ_LEN + 1 + 1); 778 if (*len != expected_len) { 779 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00998) 780 "ajp_parse_data: Wrong chunk length. Length of chunk is %i," 781 " expected length is %i.", *len, expected_len); 782 return AJP_EBAD_HEADER; 783 } 784 *ptr = (char *)&(msg->buf[msg->pos]); 785 return APR_SUCCESS; 786} 787 788/* Check the reuse flag in CMD_AJP13_END_RESPONSE */ 789apr_status_t ajp_parse_reuse(request_rec *r, ajp_msg_t *msg, 790 apr_byte_t *reuse) 791{ 792 apr_byte_t result; 793 apr_status_t rc; 794 795 rc = ajp_msg_get_uint8(msg, &result); 796 if (rc != APR_SUCCESS) { 797 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(00999) 798 "ajp_parse_reuse: ajp_msg_get_byte failed"); 799 return rc; 800 } 801 if (result != CMD_AJP13_END_RESPONSE) { 802 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01000) 803 "ajp_parse_reuse: wrong type %s (0x%02x) expecting %s (0x%02x)", 804 ajp_type_str(result), result, 805 ajp_type_str(CMD_AJP13_END_RESPONSE), CMD_AJP13_END_RESPONSE); 806 return AJP_EBAD_HEADER; 807 } 808 return ajp_msg_get_uint8(msg, reuse); 809} 810 811/* 812 * Allocate a msg to send data 813 */ 814apr_status_t ajp_alloc_data_msg(apr_pool_t *pool, char **ptr, apr_size_t *len, 815 ajp_msg_t **msg) 816{ 817 apr_status_t rc; 818 819 if ((rc = ajp_msg_create(pool, *len, msg)) != APR_SUCCESS) 820 return rc; 821 ajp_msg_reset(*msg); 822 *ptr = (char *)&((*msg)->buf[6]); 823 *len = *len - 6; 824 825 return APR_SUCCESS; 826} 827 828/* 829 * Send the data message 830 */ 831apr_status_t ajp_send_data_msg(apr_socket_t *sock, 832 ajp_msg_t *msg, apr_size_t len) 833{ 834 835 msg->buf[4] = (apr_byte_t)((len >> 8) & 0xFF); 836 msg->buf[5] = (apr_byte_t)(len & 0xFF); 837 838 msg->len += len + 2; /* + 1 XXXX where is '\0' */ 839 840 return ajp_ilink_send(sock, msg); 841 842} 843