| #define _GNU_SOURCE |
| #include <stdlib.h> |
| #include <string.h> |
| #include <stdint.h> |
| #include <errno.h> |
| #include <signal.h> |
| #include <strings.h> |
| #include <inttypes.h> |
| #include <sys/socket.h> |
| #ifndef NO_SYS_UN |
| #include <sys/un.h> |
| #endif |
| #include <netinet/in.h> |
| #include <netinet/tcp.h> |
| #include <arpa/inet.h> |
| #include <sys/tree.h> |
| |
| #include "evhtp.h" |
| |
| static int _evhtp_request_parser_start(htparser * p); |
| static int _evhtp_request_parser_path(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_args(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_header_key(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_header_val(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_hostname(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_headers(htparser * p); |
| static int _evhtp_request_parser_body(htparser * p, const char * data, size_t len); |
| static int _evhtp_request_parser_fini(htparser * p); |
| static int _evhtp_request_parser_chunk_new(htparser * p); |
| static int _evhtp_request_parser_chunk_fini(htparser * p); |
| static int _evhtp_request_parser_chunks_fini(htparser * p); |
| static int _evhtp_request_parser_headers_start(htparser * p); |
| |
| static void _evhtp_connection_readcb(evbev_t * bev, void * arg); |
| |
| static evhtp_connection_t * _evhtp_connection_new(evhtp_t * htp, int sock); |
| |
| static evhtp_uri_t * _evhtp_uri_new(void); |
| static void _evhtp_uri_free(evhtp_uri_t * uri); |
| |
| static evhtp_path_t * _evhtp_path_new(const char * data, size_t len); |
| static void _evhtp_path_free(evhtp_path_t * path); |
| |
| #define HOOK_AVAIL(var, hook_name) (var->hooks && var->hooks->hook_name) |
| #define HOOK_FUNC(var, hook_name) (var->hooks->hook_name) |
| #define HOOK_ARGS(var, hook_name) var->hooks->hook_name ## _arg |
| |
| #define HOOK_REQUEST_RUN(request, hook_name, ...) do { \ |
| if (HOOK_AVAIL(request, hook_name)) { \ |
| return HOOK_FUNC(request, hook_name) (request, __VA_ARGS__, \ |
| HOOK_ARGS(request, hook_name)); \ |
| } \ |
| \ |
| if (HOOK_AVAIL(evhtp_request_get_connection(request), hook_name)) { \ |
| return HOOK_FUNC(request->conn, hook_name) (request, __VA_ARGS__, \ |
| HOOK_ARGS(request->conn, hook_name)); \ |
| } \ |
| } while (0) |
| |
| #define HOOK_REQUEST_RUN_NARGS(request, hook_name) do { \ |
| if (HOOK_AVAIL(request, hook_name)) { \ |
| return HOOK_FUNC(request, hook_name) (request, \ |
| HOOK_ARGS(request, hook_name)); \ |
| } \ |
| \ |
| if (HOOK_AVAIL(request->conn, hook_name)) { \ |
| return HOOK_FUNC(request->conn, hook_name) (request, \ |
| HOOK_ARGS(request->conn, hook_name)); \ |
| } \ |
| } while (0); |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| #define _evhtp_lock(h) do { \ |
| if (h->lock) { \ |
| pthread_mutex_lock(h->lock); \ |
| } \ |
| } while (0) |
| |
| #define _evhtp_unlock(h) do { \ |
| if (h->lock) { \ |
| pthread_mutex_unlock(h->lock); \ |
| } \ |
| } while (0) |
| #else |
| #define _evhtp_lock(h) do {} while (0) |
| #define _evhtp_unlock(h) do {} while (0) |
| #endif |
| |
| #ifndef TAILQ_FOREACH_SAFE |
| #define TAILQ_FOREACH_SAFE(var, head, field, tvar) \ |
| for ((var) = TAILQ_FIRST((head)); \ |
| (var) && ((tvar) = TAILQ_NEXT((var), field), 1); \ |
| (var) = (tvar)) |
| #endif |
| |
| static int scode_tree_initialized = 0; |
| |
| /** |
| * @brief An RBTREE entry for the status code -> str matcher |
| */ |
| struct status_code { |
| evhtp_res code; |
| const char * str; |
| |
| RB_ENTRY(status_code) entry; |
| }; |
| |
| |
| static int |
| status_code_cmp(void * _a, void * _b) { |
| struct status_code * a = _a; |
| struct status_code * b = _b; |
| |
| return b->code - a->code; |
| } |
| |
| RB_HEAD(status_code_tree, status_code) status_code_head = RB_INITIALIZER(&status_code_head); |
| RB_GENERATE(status_code_tree, status_code, entry, status_code_cmp); |
| |
| #define scode_add(scode, cstr) do { \ |
| struct status_code * c = malloc(sizeof(struct status_code)); \ |
| \ |
| c->code = scode; \ |
| c->str = cstr; \ |
| \ |
| RB_INSERT(status_code_tree, &status_code_head, c); \ |
| } while (0) |
| |
| static void |
| status_code_init(void) { |
| if (scode_tree_initialized) { |
| /* Already initialized. */ |
| return; |
| } |
| |
| /* 100 codes */ |
| scode_add(EVHTP_RES_CONTINUE, "Continue"); |
| scode_add(EVHTP_RES_SWITCH_PROTO, "Switching Protocols"); |
| scode_add(EVHTP_RES_PROCESSING, "Processing"); |
| scode_add(EVHTP_RES_URI_TOOLONG, "URI Too Long"); |
| |
| /* 200 codes */ |
| scode_add(EVHTP_RES_200, "OK"); |
| scode_add(EVHTP_RES_CREATED, "Created"); |
| scode_add(EVHTP_RES_ACCEPTED, "Accepted"); |
| scode_add(EVHTP_RES_NAUTHINFO, "No Auth Info"); |
| scode_add(EVHTP_RES_NOCONTENT, "No Content"); |
| scode_add(EVHTP_RES_RSTCONTENT, "Reset Content"); |
| scode_add(EVHTP_RES_PARTIAL, "Partial Content"); |
| scode_add(EVHTP_RES_MSTATUS, "Multi-Status"); |
| scode_add(EVHTP_RES_IMUSED, "IM Used"); |
| |
| /* 300 codes */ |
| scode_add(EVHTP_RES_300, "Redirect"); |
| scode_add(EVHTP_RES_MOVEDPERM, "Moved Permanently"); |
| scode_add(EVHTP_RES_FOUND, "Found"); |
| scode_add(EVHTP_RES_SEEOTHER, "See Other"); |
| scode_add(EVHTP_RES_NOTMOD, "Not Modified"); |
| scode_add(EVHTP_RES_USEPROXY, "Use Proxy"); |
| scode_add(EVHTP_RES_SWITCHPROXY, "Switch Proxy"); |
| scode_add(EVHTP_RES_TMPREDIR, "Temporary Redirect"); |
| |
| /* 400 codes */ |
| scode_add(EVHTP_RES_400, "Bad Request"); |
| scode_add(EVHTP_RES_UNAUTH, "Unauthorized"); |
| scode_add(EVHTP_RES_PAYREQ, "Payment Required"); |
| scode_add(EVHTP_RES_FORBIDDEN, "Forbidden"); |
| scode_add(EVHTP_RES_NOTFOUND, "Not Found"); |
| scode_add(EVHTP_RES_METHNALLOWED, "Not Allowed"); |
| scode_add(EVHTP_RES_NACCEPTABLE, "Not Acceptable"); |
| scode_add(EVHTP_RES_PROXYAUTHREQ, "Proxy Authentication Required"); |
| scode_add(EVHTP_RES_TIMEOUT, "Request Timeout"); |
| scode_add(EVHTP_RES_CONFLICT, "Conflict"); |
| scode_add(EVHTP_RES_GONE, "Gone"); |
| scode_add(EVHTP_RES_LENREQ, "Length Required"); |
| scode_add(EVHTP_RES_PRECONDFAIL, "Precondition Failed"); |
| scode_add(EVHTP_RES_ENTOOLARGE, "Entity Too Large"); |
| scode_add(EVHTP_RES_URITOOLARGE, "Request-URI Too Long"); |
| scode_add(EVHTP_RES_UNSUPPORTED, "Unsupported Media Type"); |
| scode_add(EVHTP_RES_RANGENOTSC, "Requested Range Not Satisfiable"); |
| scode_add(EVHTP_RES_EXPECTFAIL, "Expectation Failed"); |
| scode_add(EVHTP_RES_IAMATEAPOT, "I'm a teapot"); |
| |
| /* 500 codes */ |
| scode_add(EVHTP_RES_SERVERR, "Internal Server Error"); |
| scode_add(EVHTP_RES_NOTIMPL, "Not Implemented"); |
| scode_add(EVHTP_RES_BADGATEWAY, "Bad Gateway"); |
| scode_add(EVHTP_RES_SERVUNAVAIL, "Service Unavailable"); |
| scode_add(EVHTP_RES_GWTIMEOUT, "Gateway Timeout"); |
| scode_add(EVHTP_RES_VERNSUPPORT, "HTTP Version Not Supported"); |
| scode_add(EVHTP_RES_BWEXEED, "Bandwidth Limit Exceeded"); |
| |
| scode_tree_initialized = 1; |
| } /* status_code_init */ |
| |
| const char * |
| status_code_to_str(evhtp_res code) { |
| struct status_code c; |
| struct status_code * found; |
| |
| c.code = code; |
| |
| if (!(found = RB_FIND(status_code_tree, &status_code_head, &c))) { |
| return "DERP"; |
| } |
| |
| return found->str; |
| } |
| |
| /** |
| * @brief callback definitions for request processing from libhtparse |
| */ |
| static htparse_hooks request_psets = { |
| .on_msg_begin = _evhtp_request_parser_start, |
| .method = NULL, |
| .scheme = NULL, |
| .host = NULL, |
| .port = NULL, |
| .path = _evhtp_request_parser_path, |
| .args = _evhtp_request_parser_args, |
| .uri = NULL, |
| .on_hdrs_begin = _evhtp_request_parser_headers_start, |
| .hdr_key = _evhtp_request_parser_header_key, |
| .hdr_val = _evhtp_request_parser_header_val, |
| .hostname = _evhtp_request_parser_hostname, |
| .on_hdrs_complete = _evhtp_request_parser_headers, |
| .on_new_chunk = _evhtp_request_parser_chunk_new, |
| .on_chunk_complete = _evhtp_request_parser_chunk_fini, |
| .on_chunks_complete = _evhtp_request_parser_chunks_fini, |
| .body = _evhtp_request_parser_body, |
| .on_msg_complete = _evhtp_request_parser_fini |
| }; |
| |
| #ifndef EVHTP_DISABLE_SSL |
| static int session_id_context = 1; |
| static int ssl_num_locks; |
| static evhtp_mutex_t * ssl_locks; |
| static int ssl_locks_initialized = 0; |
| #endif |
| |
| /* |
| * COMPAT FUNCTIONS |
| */ |
| |
| #ifdef NO_STRNLEN |
| static size_t |
| strnlen(const char * s, size_t maxlen) { |
| const char * e; |
| size_t n; |
| |
| for (e = s, n = 0; *e && n < maxlen; e++, n++) { |
| ; |
| } |
| |
| return n; |
| } |
| |
| #endif |
| |
| #ifdef NO_STRNDUP |
| static char * |
| strndup(const char * s, size_t n) { |
| size_t len = strnlen(s, n); |
| char * ret; |
| |
| if (len < n) { |
| return strdup(s); |
| } |
| |
| ret = malloc(n + 1); |
| ret[n] = '\0'; |
| |
| strncpy(ret, s, n); |
| return ret; |
| } |
| |
| #endif |
| |
| /* |
| * PRIVATE FUNCTIONS |
| */ |
| |
| /** |
| * @brief a weak hash function |
| * |
| * @param str a null terminated string |
| * |
| * @return an unsigned integer hash of str |
| */ |
| static inline unsigned int |
| _evhtp_quick_hash(const char * str) { |
| unsigned int h = 0; |
| |
| for (; *str; str++) { |
| h = 31 * h + *str; |
| } |
| |
| return h; |
| } |
| |
| /** |
| * @brief helper function to determine if http version is HTTP/1.0 |
| * |
| * @param major the major version number |
| * @param minor the minor version number |
| * |
| * @return 1 if HTTP/1.0, else 0 |
| */ |
| static inline int |
| _evhtp_is_http_10(const char major, const char minor) { |
| if (major >= 1 && minor <= 0) { |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| /** |
| * @brief helper function to determine if http version is HTTP/1.1 |
| * |
| * @param major the major version number |
| * @param minor the minor version number |
| * |
| * @return 1 if HTTP/1.1, else 0 |
| */ |
| static inline int |
| _evhtp_is_http_11(const char major, const char minor) { |
| if (major >= 1 && minor >= 1) { |
| return 1; |
| } |
| |
| return 0; |
| } |
| |
| /** |
| * @brief returns the HTTP protocol version |
| * |
| * @param major the major version number |
| * @param minor the minor version number |
| * |
| * @return EVHTP_PROTO_10 if HTTP/1.0, EVHTP_PROTO_11 if HTTP/1.1, otherwise |
| * EVHTP_PROTO_INVALID |
| */ |
| static inline evhtp_proto |
| _evhtp_protocol(const char major, const char minor) { |
| if (_evhtp_is_http_10(major, minor)) { |
| return EVHTP_PROTO_10; |
| } |
| |
| if (_evhtp_is_http_11(major, minor)) { |
| return EVHTP_PROTO_11; |
| } |
| |
| return EVHTP_PROTO_INVALID; |
| } |
| |
| /** |
| * @brief runs the user-defined on_path hook for a request |
| * |
| * @param request the request structure |
| * @param path the path structure |
| * |
| * @return EVHTP_RES_OK on success, otherwise something else. |
| */ |
| static inline evhtp_res |
| _evhtp_path_hook(evhtp_request_t * request, evhtp_path_t * path) { |
| HOOK_REQUEST_RUN(request, on_path, path); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief runs the user-defined on_header hook for a request |
| * |
| * once a full key: value header has been parsed, this will call the hook |
| * |
| * @param request the request strucutre |
| * @param header the header structure |
| * |
| * @return EVHTP_RES_OK on success, otherwise something else. |
| */ |
| static inline evhtp_res |
| _evhtp_header_hook(evhtp_request_t * request, evhtp_header_t * header) { |
| HOOK_REQUEST_RUN(request, on_header, header); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief runs the user-defined on_Headers hook for a request after all headers |
| * have been parsed. |
| * |
| * @param request the request structure |
| * @param headers the headers tailq structure |
| * |
| * @return EVHTP_RES_OK on success, otherwise something else. |
| */ |
| static inline evhtp_res |
| _evhtp_headers_hook(evhtp_request_t * request, evhtp_headers_t * headers) { |
| HOOK_REQUEST_RUN(request, on_headers, headers); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief runs the user-defined on_body hook for requests containing a body. |
| * the data is stored in the request->buffer_in so the user may either |
| * leave it, or drain upon being called. |
| * |
| * @param request the request strucutre |
| * @param buf a evbuffer containing body data |
| * |
| * @return EVHTP_RES_OK on success, otherwise something else. |
| */ |
| static inline evhtp_res |
| _evhtp_body_hook(evhtp_request_t * request, evbuf_t * buf) { |
| HOOK_REQUEST_RUN(request, on_read, buf); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief runs the user-defined hook called just prior to a request been |
| * free()'d |
| * |
| * @param request therequest structure |
| * |
| * @return EVHTP_RES_OK on success, otherwise treated as an error |
| */ |
| static inline evhtp_res |
| _evhtp_request_fini_hook(evhtp_request_t * request) { |
| HOOK_REQUEST_RUN_NARGS(request, on_request_fini); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| static inline evhtp_res |
| _evhtp_chunk_new_hook(evhtp_request_t * request, uint64_t len) { |
| HOOK_REQUEST_RUN(request, on_new_chunk, len); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| static inline evhtp_res |
| _evhtp_chunk_fini_hook(evhtp_request_t * request) { |
| HOOK_REQUEST_RUN_NARGS(request, on_chunk_fini); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| static inline evhtp_res |
| _evhtp_chunks_fini_hook(evhtp_request_t * request) { |
| HOOK_REQUEST_RUN_NARGS(request, on_chunks_fini); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| static inline evhtp_res |
| _evhtp_headers_start_hook(evhtp_request_t * request) { |
| HOOK_REQUEST_RUN_NARGS(request, on_headers_start); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief runs the user-definedhook called just prior to a connection being |
| * closed |
| * |
| * @param connection the connection structure |
| * |
| * @return EVHTP_RES_OK on success, but pretty much ignored in any case. |
| */ |
| static inline evhtp_res |
| _evhtp_connection_fini_hook(evhtp_connection_t * connection) { |
| if (connection->hooks && connection->hooks->on_connection_fini) { |
| return (connection->hooks->on_connection_fini)(connection, |
| connection->hooks->on_connection_fini_arg); |
| } |
| |
| return EVHTP_RES_OK; |
| } |
| |
| static inline evhtp_res |
| _evhtp_hostname_hook(evhtp_request_t * r, const char * hostname) { |
| HOOK_REQUEST_RUN(r, on_hostname, hostname); |
| |
| return EVHTP_RES_OK; |
| } |
| |
| /** |
| * @brief glob/wildcard type pattern matching. |
| * |
| * Note: This code was derived from redis's (v2.6) stringmatchlen() function. |
| * |
| * @param pattern |
| * @param string |
| * |
| * @return |
| */ |
| static int |
| _evhtp_glob_match(const char * pattern, const char * string) { |
| size_t pat_len; |
| size_t str_len; |
| |
| if (!pattern || !string) { |
| return 0; |
| } |
| |
| pat_len = strlen(pattern); |
| str_len = strlen(string); |
| |
| while (pat_len) { |
| if (pattern[0] == '*') { |
| while (pattern[1] == '*') { |
| pattern++; |
| pat_len--; |
| } |
| |
| if (pat_len == 1) { |
| return 1; |
| } |
| |
| while (str_len) { |
| if (_evhtp_glob_match(pattern + 1, string)) { |
| return 1; |
| } |
| |
| string++; |
| str_len--; |
| } |
| |
| return 0; |
| } else { |
| if (pattern[0] != string[0]) { |
| return 0; |
| } |
| |
| string++; |
| str_len--; |
| } |
| |
| pattern++; |
| pat_len--; |
| |
| if (str_len == 0) { |
| while (*pattern == '*') { |
| pattern++; |
| pat_len--; |
| } |
| break; |
| } |
| } |
| |
| if (pat_len == 0 && str_len == 0) { |
| return 1; |
| } |
| |
| return 0; |
| } /* _evhtp_glob_match */ |
| |
| static evhtp_callback_t * |
| _evhtp_callback_find(evhtp_callbacks_t * cbs, |
| const char * path, |
| unsigned int * start_offset, |
| unsigned int * end_offset) { |
| #ifndef EVHTP_DISABLE_REGEX |
| regmatch_t pmatch[28]; |
| #endif |
| evhtp_callback_t * callback; |
| |
| if (cbs == NULL) { |
| return NULL; |
| } |
| |
| TAILQ_FOREACH(callback, cbs, next) { |
| switch (callback->type) { |
| case evhtp_callback_type_hash: |
| if (strcmp(callback->val.path, path) == 0) { |
| *start_offset = 0; |
| *end_offset = (unsigned int)strlen(path); |
| return callback; |
| } |
| break; |
| #ifndef EVHTP_DISABLE_REGEX |
| case evhtp_callback_type_regex: |
| if (regexec(callback->val.regex, path, callback->val.regex->re_nsub + 1, pmatch, 0) == 0) { |
| *start_offset = pmatch[callback->val.regex->re_nsub].rm_so; |
| *end_offset = pmatch[callback->val.regex->re_nsub].rm_eo; |
| |
| return callback; |
| } |
| |
| break; |
| #endif |
| case evhtp_callback_type_glob: |
| if (_evhtp_glob_match(callback->val.glob, path) == 1) { |
| *start_offset = 0; |
| *end_offset = (unsigned int)strlen(path); |
| return callback; |
| } |
| default: |
| break; |
| } /* switch */ |
| } |
| |
| return NULL; |
| } /* _evhtp_callback_find */ |
| |
| /** |
| * @brief Creates a new evhtp_request_t |
| * |
| * @param c |
| * |
| * @return evhtp_request_t structure on success, otherwise NULL |
| */ |
| static evhtp_request_t * |
| _evhtp_request_new(evhtp_connection_t * c) { |
| evhtp_request_t * req; |
| |
| if (!(req = calloc(sizeof(evhtp_request_t), 1))) { |
| return NULL; |
| } |
| |
| req->conn = c; |
| req->htp = c->htp; |
| req->status = EVHTP_RES_OK; |
| req->buffer_in = evbuffer_new(); |
| req->buffer_out = evbuffer_new(); |
| req->headers_in = malloc(sizeof(evhtp_headers_t)); |
| req->headers_out = malloc(sizeof(evhtp_headers_t)); |
| |
| TAILQ_INIT(req->headers_in); |
| TAILQ_INIT(req->headers_out); |
| |
| return req; |
| } |
| |
| /** |
| * @brief frees all data in an evhtp_request_t along with calling finished hooks |
| * |
| * @param request the request structure |
| */ |
| static void |
| _evhtp_request_free(evhtp_request_t * request) { |
| if (request == NULL) { |
| return; |
| } |
| |
| _evhtp_request_fini_hook(request); |
| _evhtp_uri_free(request->uri); |
| |
| evhtp_headers_free(request->headers_in); |
| evhtp_headers_free(request->headers_out); |
| |
| |
| if (request->buffer_in) { |
| evbuffer_free(request->buffer_in); |
| } |
| |
| if (request->buffer_out) { |
| evbuffer_free(request->buffer_out); |
| } |
| |
| free(request->hooks); |
| free(request); |
| } |
| |
| /** |
| * @brief create an overlay URI structure |
| * |
| * @return evhtp_uri_t |
| */ |
| static evhtp_uri_t * |
| _evhtp_uri_new(void) { |
| evhtp_uri_t * uri; |
| |
| if (!(uri = calloc(sizeof(evhtp_uri_t), 1))) { |
| return NULL; |
| } |
| |
| return uri; |
| } |
| |
| /** |
| * @brief frees an overlay URI structure |
| * |
| * @param uri evhtp_uri_t |
| */ |
| static void |
| _evhtp_uri_free(evhtp_uri_t * uri) { |
| if (uri == NULL) { |
| return; |
| } |
| |
| evhtp_query_free(uri->query); |
| _evhtp_path_free(uri->path); |
| |
| free(uri->fragment); |
| free(uri->query_raw); |
| free(uri); |
| } |
| |
| /** |
| * @brief parses the path and file from an input buffer |
| * |
| * @details in order to properly create a structure that can match |
| * both a path and a file, this will parse a string into |
| * what it considers a path, and a file. |
| * |
| * @details if for example the input was "/a/b/c", the parser will |
| * consider "/a/b/" as the path, and "c" as the file. |
| * |
| * @param data raw input data (assumes a /path/[file] structure) |
| * @param len length of the input data |
| * |
| * @return evhtp_request_t * on success, NULL on error. |
| */ |
| static evhtp_path_t * |
| _evhtp_path_new(const char * data, size_t len) { |
| evhtp_path_t * req_path; |
| const char * data_end = (const char *)(data + len); |
| char * path = NULL; |
| char * file = NULL; |
| |
| if (!(req_path = calloc(sizeof(evhtp_path_t), 1))) { |
| return NULL; |
| } |
| |
| if (len == 0) { |
| /* |
| * odd situation here, no preceding "/", so just assume the path is "/" |
| */ |
| path = strdup("/"); |
| } else if (*data != '/') { |
| /* request like GET stupid HTTP/1.0, treat stupid as the file, and |
| * assume the path is "/" |
| */ |
| path = strdup("/"); |
| file = strndup(data, len); |
| } else { |
| if (data[len - 1] != '/') { |
| /* |
| * the last character in data is assumed to be a file, not the end of path |
| * loop through the input data backwards until we find a "/" |
| */ |
| size_t i; |
| |
| for (i = (len - 1); i != 0; i--) { |
| if (data[i] == '/') { |
| /* |
| * we have found a "/" representing the start of the file, |
| * and the end of the path |
| */ |
| size_t path_len; |
| size_t file_len; |
| |
| path_len = (size_t)(&data[i] - data) + 1; |
| file_len = (size_t)(data_end - &data[i + 1]); |
| |
| /* check for overflow */ |
| if ((const char *)(data + path_len) > data_end) { |
| fprintf(stderr, "PATH Corrupted.. (path_len > len)\n"); |
| free(req_path); |
| return NULL; |
| } |
| |
| /* check for overflow */ |
| if ((const char *)(&data[i + 1] + file_len) > data_end) { |
| fprintf(stderr, "FILE Corrupted.. (file_len > len)\n"); |
| free(req_path); |
| return NULL; |
| } |
| |
| path = strndup(data, path_len); |
| file = strndup(&data[i + 1], file_len); |
| |
| break; |
| } |
| } |
| |
| if (i == 0 && data[i] == '/' && !file && !path) { |
| /* drops here if the request is something like GET /foo */ |
| path = strdup("/"); |
| |
| if (len > 1) { |
| file = strndup((const char *)(data + 1), len); |
| } |
| } |
| } else { |
| /* the last character is a "/", thus the request is just a path */ |
| path = strndup(data, len); |
| } |
| } |
| |
| if (len != 0) { |
| req_path->full = strndup(data, len); |
| } |
| |
| req_path->path = path; |
| req_path->file = file; |
| |
| return req_path; |
| } /* _evhtp_path_new */ |
| |
| static void |
| _evhtp_path_free(evhtp_path_t * path) { |
| if (path == NULL) { |
| return; |
| } |
| |
| free(path->full); |
| |
| free(path->path); |
| free(path->file); |
| free(path->match_start); |
| free(path->match_end); |
| |
| free(path); |
| } |
| |
| static int |
| _evhtp_request_parser_start(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| if (c->request) { |
| if (c->request->finished == 1) { |
| _evhtp_request_free(c->request); |
| } else { |
| return -1; |
| } |
| } |
| |
| if (!(c->request = _evhtp_request_new(c))) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_args(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| evhtp_uri_t * uri = c->request->uri; |
| |
| if (!(uri->query = evhtp_parse_query(data, len))) { |
| c->request->status = EVHTP_RES_ERROR; |
| return -1; |
| } |
| |
| uri->query_raw = calloc(len + 1, 1); |
| memcpy(uri->query_raw, data, len); |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_headers_start(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| if ((c->request->status = _evhtp_headers_start_hook(c->request)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_header_key(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| char * key_s; /* = strndup(data, len); */ |
| evhtp_header_t * hdr; |
| |
| key_s = malloc(len + 1); |
| key_s[len] = '\0'; |
| memcpy(key_s, data, len); |
| |
| if ((hdr = evhtp_header_key_add(c->request->headers_in, key_s, 0)) == NULL) { |
| c->request->status = EVHTP_RES_FATAL; |
| return -1; |
| } |
| |
| hdr->k_heaped = 1; |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_header_val(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| char * val_s; |
| evhtp_header_t * header; |
| |
| val_s = malloc(len + 1); |
| val_s[len] = '\0'; |
| memcpy(val_s, data, len); |
| |
| if ((header = evhtp_header_val_add(c->request->headers_in, val_s, 0)) == NULL) { |
| c->request->status = EVHTP_RES_FATAL; |
| return -1; |
| } |
| |
| header->v_heaped = 1; |
| |
| if ((c->request->status = _evhtp_header_hook(c->request, header)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static inline evhtp_t * |
| _evhtp_request_find_vhost(evhtp_t * evhtp, const char * name) { |
| evhtp_t * evhtp_vhost; |
| evhtp_alias_t * evhtp_alias; |
| |
| TAILQ_FOREACH(evhtp_vhost, &evhtp->vhosts, next_vhost) { |
| if (evhtp_vhost->server_name == NULL) { |
| continue; |
| } |
| |
| if (_evhtp_glob_match(evhtp_vhost->server_name, name) == 1) { |
| return evhtp_vhost; |
| } |
| |
| TAILQ_FOREACH(evhtp_alias, &evhtp_vhost->aliases, next) { |
| if (evhtp_alias->alias == NULL) { |
| continue; |
| } |
| |
| if (_evhtp_glob_match(evhtp_alias->alias, name) == 1) { |
| return evhtp_vhost; |
| } |
| } |
| } |
| |
| return NULL; |
| } |
| |
| static inline int |
| _evhtp_request_set_callbacks(evhtp_request_t * request) { |
| evhtp_t * evhtp; |
| evhtp_connection_t * conn; |
| evhtp_uri_t * uri; |
| evhtp_path_t * path; |
| evhtp_hooks_t * hooks; |
| evhtp_callback_t * callback; |
| evhtp_callback_cb cb; |
| void * cbarg; |
| |
| if (request == NULL) { |
| return -1; |
| } |
| |
| if ((evhtp = request->htp) == NULL) { |
| return -1; |
| } |
| |
| if ((conn = request->conn) == NULL) { |
| return -1; |
| } |
| |
| if ((uri = request->uri) == NULL) { |
| return -1; |
| } |
| |
| if ((path = uri->path) == NULL) { |
| return -1; |
| } |
| |
| hooks = NULL; |
| callback = NULL; |
| cb = NULL; |
| cbarg = NULL; |
| |
| if ((callback = _evhtp_callback_find(evhtp->callbacks, path->full, |
| &path->matched_soff, &path->matched_eoff))) { |
| /* matched a callback using both path and file (/a/b/c/d) */ |
| cb = callback->cb; |
| cbarg = callback->cbarg; |
| hooks = callback->hooks; |
| } else if ((callback = _evhtp_callback_find(evhtp->callbacks, path->path, |
| &path->matched_soff, &path->matched_eoff))) { |
| /* matched a callback using *just* the path (/a/b/c/) */ |
| cb = callback->cb; |
| cbarg = callback->cbarg; |
| hooks = callback->hooks; |
| } else { |
| /* no callbacks found for either case, use defaults */ |
| cb = evhtp->defaults.cb; |
| cbarg = evhtp->defaults.cbarg; |
| |
| path->matched_soff = 0; |
| path->matched_eoff = (unsigned int)strlen(path->full); |
| } |
| |
| if (path->match_start == NULL) { |
| path->match_start = calloc(strlen(path->full) + 1, 1); |
| } |
| |
| if (path->match_end == NULL) { |
| path->match_end = calloc(strlen(path->full) + 1, 1); |
| } |
| |
| if (path->matched_eoff - path->matched_soff) { |
| memcpy(path->match_start, (void *)(path->full + path->matched_soff), |
| path->matched_eoff - path->matched_soff); |
| } else { |
| memcpy(path->match_start, (void *)(path->full + path->matched_soff), |
| strlen((const char *)(path->full + path->matched_soff))); |
| } |
| |
| memcpy(path->match_end, |
| (void *)(path->full + path->matched_eoff), |
| strlen(path->full) - path->matched_eoff); |
| |
| if (hooks != NULL) { |
| if (request->hooks == NULL) { |
| request->hooks = malloc(sizeof(evhtp_hooks_t)); |
| } |
| |
| memcpy(request->hooks, hooks, sizeof(evhtp_hooks_t)); |
| } |
| |
| request->cb = cb; |
| request->cbarg = cbarg; |
| |
| return 0; |
| } /* _evhtp_request_set_callbacks */ |
| |
| static int |
| _evhtp_request_parser_hostname(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| evhtp_t * evhtp; |
| evhtp_t * evhtp_vhost; |
| |
| #ifndef EVHTP_DISABLE_SSL |
| if (c->vhost_via_sni == 1 && c->ssl != NULL) { |
| /* use the SNI set hostname instead of the header hostname */ |
| const char * host; |
| |
| host = SSL_get_servername(c->ssl, TLSEXT_NAMETYPE_host_name); |
| |
| if ((c->request->status = _evhtp_hostname_hook(c->request, host)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| #endif |
| |
| evhtp = c->htp; |
| |
| /* since this is called after _evhtp_request_parser_path(), which already |
| * setup callbacks for the URI, we must now attempt to find callbacks which |
| * are specific to this host. |
| */ |
| _evhtp_lock(evhtp); |
| { |
| if ((evhtp_vhost = _evhtp_request_find_vhost(evhtp, data))) { |
| _evhtp_lock(evhtp_vhost); |
| { |
| /* if we found a match for the host, we must set the htp |
| * variables for both the connection and the request. |
| */ |
| c->htp = evhtp_vhost; |
| c->request->htp = evhtp_vhost; |
| |
| _evhtp_request_set_callbacks(c->request); |
| } |
| _evhtp_unlock(evhtp_vhost); |
| } |
| } |
| _evhtp_unlock(evhtp); |
| |
| if ((c->request->status = _evhtp_hostname_hook(c->request, data)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } /* _evhtp_request_parser_hostname */ |
| |
| static int |
| _evhtp_request_parser_path(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| evhtp_uri_t * uri; |
| evhtp_path_t * path; |
| |
| if (!(uri = _evhtp_uri_new())) { |
| c->request->status = EVHTP_RES_FATAL; |
| return -1; |
| } |
| |
| if (!(path = _evhtp_path_new(data, len))) { |
| _evhtp_uri_free(uri); |
| c->request->status = EVHTP_RES_FATAL; |
| return -1; |
| } |
| |
| uri->path = path; |
| uri->scheme = htparser_get_scheme(p); |
| |
| c->request->method = htparser_get_method(p); |
| c->request->uri = uri; |
| |
| _evhtp_lock(c->htp); |
| { |
| _evhtp_request_set_callbacks(c->request); |
| } |
| _evhtp_unlock(c->htp); |
| |
| if ((c->request->status = _evhtp_path_hook(c->request, path)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } /* _evhtp_request_parser_path */ |
| |
| static int |
| _evhtp_request_parser_headers(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| /* XXX proto should be set with htparsers on_hdrs_begin hook */ |
| c->request->keepalive = htparser_should_keep_alive(p); |
| c->request->proto = _evhtp_protocol(htparser_get_major(p), htparser_get_minor(p)); |
| c->request->status = _evhtp_headers_hook(c->request, c->request->headers_in); |
| |
| if (c->request->status != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| if (!evhtp_header_find(c->request->headers_in, "Expect")) { |
| return 0; |
| } |
| |
| evbuffer_add_printf(bufferevent_get_output(c->bev), |
| "HTTP/%d.%d 100 Continue\r\n\r\n", |
| htparser_get_major(p), |
| htparser_get_minor(p)); |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_body(htparser * p, const char * data, size_t len) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| evbuf_t * buf; |
| int res = 0; |
| |
| if (c->max_body_size > 0 && c->body_bytes_read + len >= c->max_body_size) { |
| c->error = 1; |
| c->request->status = EVHTP_RES_DATA_TOO_LONG; |
| |
| return -1; |
| } |
| |
| buf = evbuffer_new(); |
| evbuffer_add(buf, data, len); |
| |
| if ((c->request->status = _evhtp_body_hook(c->request, buf)) != EVHTP_RES_OK) { |
| res = -1; |
| } |
| |
| if (evbuffer_get_length(buf)) { |
| evbuffer_add_buffer(c->request->buffer_in, buf); |
| } |
| |
| evbuffer_free(buf); |
| |
| c->body_bytes_read += len; |
| |
| return res; |
| } |
| |
| static int |
| _evhtp_request_parser_chunk_new(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| if ((c->request->status = _evhtp_chunk_new_hook(c->request, |
| htparser_get_content_length(p))) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_chunk_fini(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| if ((c->request->status = _evhtp_chunk_fini_hook(c->request)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_chunks_fini(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| if ((c->request->status = _evhtp_chunks_fini_hook(c->request)) != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_request_parser_fini(htparser * p) { |
| evhtp_connection_t * c = htparser_get_userdata(p); |
| |
| /* c->request->finished = 1; */ |
| |
| /* |
| * XXX c->request should never be NULL, but we have found some path of |
| * execution where this actually happens. We will check for now, but the bug |
| * path needs to be tracked down. |
| * |
| */ |
| if (c->request && c->request->cb) { |
| (c->request->cb)(c->request, c->request->cbarg); |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_create_headers(evhtp_header_t * header, void * arg) { |
| evbuf_t * buf = arg; |
| |
| evbuffer_add(buf, header->key, header->klen); |
| evbuffer_add(buf, ": ", 2); |
| evbuffer_add(buf, header->val, header->vlen); |
| evbuffer_add(buf, "\r\n", 2); |
| return 0; |
| } |
| |
| static evbuf_t * |
| _evhtp_create_reply(evhtp_request_t * request, evhtp_res code) { |
| evbuf_t * buf = evbuffer_new(); |
| const char * content_type = evhtp_header_find(request->headers_out, "Content-Type"); |
| |
| if (htparser_get_multipart(request->conn->parser) == 1) { |
| goto check_proto; |
| } |
| |
| if (evbuffer_get_length(request->buffer_out) && request->chunked == 0) { |
| /* add extra headers (like content-length/type) if not already present */ |
| |
| if (!evhtp_header_find(request->headers_out, "Content-Length")) { |
| char lstr[128]; |
| int sres; |
| |
| sres = snprintf(lstr, sizeof(lstr), "%zu", |
| evbuffer_get_length(request->buffer_out)); |
| |
| if (sres >= sizeof(lstr) || sres < 0) { |
| /* overflow condition, this should never happen, but if it does, |
| * well lets just shut the connection down */ |
| request->keepalive = 0; |
| goto check_proto; |
| } |
| |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Content-Length", lstr, 0, 1)); |
| } |
| |
| if (!content_type) { |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Content-Type", "text/plain", 0, 0)); |
| } |
| } else { |
| if (!evhtp_header_find(request->headers_out, "Content-Length")) { |
| const char * chunked = evhtp_header_find(request->headers_out, |
| "transfer-encoding"); |
| |
| if (!chunked || !strstr(chunked, "chunked")) { |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Content-Length", "0", 0, 0)); |
| } |
| } |
| } |
| |
| check_proto: |
| /* add the proper keep-alive type headers based on http version */ |
| switch (request->proto) { |
| case EVHTP_PROTO_11: |
| if (request->keepalive == 0) { |
| /* protocol is HTTP/1.1 but client wanted to close */ |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Connection", "close", 0, 0)); |
| } |
| break; |
| case EVHTP_PROTO_10: |
| if (request->keepalive == 1) { |
| /* protocol is HTTP/1.0 and clients wants to keep established */ |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Connection", "keep-alive", 0, 0)); |
| } |
| break; |
| default: |
| /* this sometimes happens when a response is made but paused before |
| * the method has been parsed */ |
| htparser_set_major(request->conn->parser, 1); |
| htparser_set_minor(request->conn->parser, 0); |
| break; |
| } /* switch */ |
| |
| /* add the status line */ |
| evbuffer_add_printf(buf, "HTTP/%d.%d %d %s\r\n", |
| htparser_get_major(request->conn->parser), |
| htparser_get_minor(request->conn->parser), |
| code, status_code_to_str(code)); |
| |
| evhtp_headers_for_each(request->headers_out, _evhtp_create_headers, buf); |
| evbuffer_add(buf, "\r\n", 2); |
| |
| if (evbuffer_get_length(request->buffer_out)) { |
| evbuffer_add_buffer(buf, request->buffer_out); |
| } |
| |
| return buf; |
| } /* _evhtp_create_reply */ |
| |
| static void |
| _evhtp_connection_resumecb(int fd, short events, void * arg) { |
| evhtp_connection_t * c = arg; |
| |
| if (c->request) { |
| c->request->status = EVHTP_RES_OK; |
| } |
| |
| return _evhtp_connection_readcb(c->bev, c); |
| } |
| |
| static void |
| _evhtp_connection_readcb(evbev_t * bev, void * arg) { |
| evhtp_connection_t * c = arg; |
| void * buf; |
| size_t nread; |
| size_t avail; |
| |
| avail = evbuffer_get_length(bufferevent_get_input(bev)); |
| |
| if (c->request) { |
| c->request->status = EVHTP_RES_OK; |
| } |
| |
| |
| buf = evbuffer_pullup(bufferevent_get_input(bev), avail); |
| |
| bufferevent_disable(bev, EV_WRITE); |
| { |
| nread = htparser_run(c->parser, &request_psets, (const char *)buf, avail); |
| } |
| bufferevent_enable(bev, EV_WRITE); |
| |
| if (c->owner != 1) { |
| /* |
| * someone has taken the ownership of this connection, we still need to |
| * drain the input buffer that had been read up to this point. |
| */ |
| evbuffer_drain(bufferevent_get_input(bev), nread); |
| return evhtp_connection_free(c); |
| } |
| |
| if (c->request) { |
| switch (c->request->status) { |
| case EVHTP_RES_DATA_TOO_LONG: |
| if (c->request->hooks && c->request->hooks->on_error) { |
| (*c->request->hooks->on_error)(c->request, -1, c->request->hooks->on_error_arg); |
| } |
| return evhtp_connection_free(c); |
| default: |
| break; |
| } |
| } |
| |
| if (avail != nread) { |
| if (c->request && c->request->status == EVHTP_RES_PAUSE) { |
| evhtp_request_pause(c->request); |
| } else { |
| return evhtp_connection_free(c); |
| } |
| } |
| |
| evbuffer_drain(bufferevent_get_input(bev), nread); |
| } /* _evhtp_connection_readcb */ |
| |
| static void |
| _evhtp_connection_writecb(evbev_t * bev, void * arg) { |
| evhtp_connection_t * c = arg; |
| |
| if (c->request == NULL) { |
| return; |
| } |
| |
| if (c->request->finished == 0 || evbuffer_get_length(bufferevent_get_output(bev))) { |
| return; |
| } |
| |
| /* |
| * if there is a set maximum number of keepalive requests configured, check |
| * to make sure we are not over it. If we have gone over the max we set the |
| * keepalive bit to 0, thus closing the connection. |
| */ |
| if (c->htp->max_keepalive_requests) { |
| if (++c->num_requests >= c->htp->max_keepalive_requests) { |
| c->request->keepalive = 0; |
| } |
| } |
| |
| if (c->request->keepalive) { |
| _evhtp_request_free(c->request); |
| |
| c->request = NULL; |
| c->body_bytes_read = 0; |
| |
| if (c->htp->parent && c->vhost_via_sni == 0) { |
| /* this request was servied by a virtual host evhtp_t structure |
| * which was *NOT* found via SSL SNI lookup. In this case we want to |
| * reset our connections evhtp_t structure back to the original so |
| * that subsequent requests can have a different Host: header. |
| */ |
| evhtp_t * orig_htp = c->htp->parent; |
| |
| c->htp = orig_htp; |
| } |
| |
| htparser_init(c->parser, htp_type_request); |
| |
| |
| return htparser_set_userdata(c->parser, c); |
| } else { |
| return evhtp_connection_free(c); |
| } |
| |
| return; |
| } /* _evhtp_connection_writecb */ |
| |
| static void |
| _evhtp_connection_eventcb(evbev_t * bev, short events, void * arg) { |
| evhtp_connection_t * c; |
| |
| if ((events & BEV_EVENT_CONNECTED)) { |
| return; |
| } |
| |
| c = arg; |
| |
| if (c->ssl && !(events & BEV_EVENT_EOF)) { |
| /* XXX need to do better error handling for SSL specific errors */ |
| c->error = 1; |
| |
| if (c->request) { |
| c->request->error = 1; |
| } |
| } |
| |
| c->error = 1; |
| |
| if (c->request && c->request->hooks && c->request->hooks->on_error) { |
| (*c->request->hooks->on_error)(c->request, events, |
| c->request->hooks->on_error_arg); |
| } |
| |
| return evhtp_connection_free((evhtp_connection_t *)arg); |
| } |
| |
| static int |
| _evhtp_run_pre_accept(evhtp_t * htp, evhtp_connection_t * conn) { |
| void * args; |
| evhtp_res res; |
| |
| if (htp->defaults.pre_accept == NULL) { |
| return 0; |
| } |
| |
| args = htp->defaults.pre_accept_cbarg; |
| res = htp->defaults.pre_accept(conn, args); |
| |
| if (res != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| static int |
| _evhtp_connection_accept(evbase_t * evbase, evhtp_connection_t * connection) { |
| struct timeval * c_recv_timeo; |
| struct timeval * c_send_timeo; |
| |
| if (_evhtp_run_pre_accept(connection->htp, connection) < 0) { |
| evutil_closesocket(connection->sock); |
| return -1; |
| } |
| |
| #ifndef EVHTP_DISABLE_SSL |
| if (connection->htp->ssl_ctx != NULL) { |
| connection->ssl = SSL_new(connection->htp->ssl_ctx); |
| connection->bev = bufferevent_openssl_socket_new(evbase, |
| connection->sock, |
| connection->ssl, |
| BUFFEREVENT_SSL_ACCEPTING, |
| connection->htp->bev_flags); |
| SSL_set_app_data(connection->ssl, connection); |
| goto end; |
| } |
| #endif |
| |
| connection->bev = bufferevent_socket_new(evbase, |
| connection->sock, |
| connection->htp->bev_flags); |
| #ifndef EVHTP_DISABLE_SSL |
| end: |
| #endif |
| |
| if (connection->recv_timeo.tv_sec || connection->recv_timeo.tv_usec) { |
| c_recv_timeo = &connection->recv_timeo; |
| } else if (connection->htp->recv_timeo.tv_sec || |
| connection->htp->recv_timeo.tv_usec) { |
| c_recv_timeo = &connection->htp->recv_timeo; |
| } else { |
| c_recv_timeo = NULL; |
| } |
| |
| if (connection->send_timeo.tv_sec || connection->send_timeo.tv_usec) { |
| c_send_timeo = &connection->send_timeo; |
| } else if (connection->htp->send_timeo.tv_sec || |
| connection->htp->send_timeo.tv_usec) { |
| c_send_timeo = &connection->htp->send_timeo; |
| } else { |
| c_send_timeo = NULL; |
| } |
| |
| evhtp_connection_set_timeouts(connection, c_recv_timeo, c_send_timeo); |
| |
| connection->resume_ev = event_new(evbase, -1, EV_READ | EV_PERSIST, |
| _evhtp_connection_resumecb, connection); |
| event_add(connection->resume_ev, NULL); |
| |
| bufferevent_enable(connection->bev, EV_READ); |
| bufferevent_setcb(connection->bev, |
| _evhtp_connection_readcb, |
| _evhtp_connection_writecb, |
| _evhtp_connection_eventcb, connection); |
| |
| return 0; |
| } /* _evhtp_connection_accept */ |
| |
| static void |
| _evhtp_default_request_cb(evhtp_request_t * request, void * arg) { |
| return evhtp_send_reply(request, EVHTP_RES_NOTFOUND); |
| } |
| |
| static evhtp_connection_t * |
| _evhtp_connection_new(evhtp_t * htp, int sock) { |
| evhtp_connection_t * connection; |
| |
| if (!(connection = calloc(sizeof(evhtp_connection_t), 1))) { |
| return NULL; |
| } |
| |
| connection->error = 0; |
| connection->owner = 1; |
| connection->sock = sock; |
| connection->htp = htp; |
| connection->parser = htparser_new(); |
| |
| htparser_init(connection->parser, htp_type_request); |
| htparser_set_userdata(connection->parser, connection); |
| |
| return connection; |
| } |
| |
| #ifdef LIBEVENT_HAS_SHUTDOWN |
| #ifndef EVHTP_DISABLE_SSL |
| static void |
| _evhtp_shutdown_eventcb(evbev_t * bev, short events, void * arg) { |
| } |
| |
| #endif |
| #endif |
| |
| static int |
| _evhtp_run_post_accept(evhtp_t * htp, evhtp_connection_t * connection) { |
| void * args; |
| evhtp_res res; |
| |
| if (htp->defaults.post_accept == NULL) { |
| return 0; |
| } |
| |
| args = htp->defaults.post_accept_cbarg; |
| res = htp->defaults.post_accept(connection, args); |
| |
| if (res != EVHTP_RES_OK) { |
| return -1; |
| } |
| |
| return 0; |
| } |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| static void |
| _evhtp_run_in_thread(evthr_t * thr, void * arg, void * shared) { |
| evhtp_t * htp = shared; |
| evhtp_connection_t * connection = arg; |
| |
| connection->evbase = evthr_get_base(thr); |
| connection->thread = thr; |
| |
| evthr_inc_backlog(connection->thread); |
| |
| if (_evhtp_connection_accept(connection->evbase, connection) < 0) { |
| return evhtp_connection_free(connection); |
| } |
| |
| if (_evhtp_run_post_accept(htp, connection) < 0) { |
| return evhtp_connection_free(connection); |
| } |
| } |
| |
| #endif |
| |
| static void |
| _evhtp_accept_cb(evserv_t * serv, int fd, struct sockaddr * s, int sl, void * arg) { |
| evhtp_t * htp = arg; |
| evhtp_connection_t * connection; |
| |
| if (!(connection = _evhtp_connection_new(htp, fd))) { |
| return; |
| } |
| |
| connection->saddr = malloc(sl); |
| memcpy(connection->saddr, s, sl); |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| if (htp->thr_pool != NULL) { |
| if (evthr_pool_defer(htp->thr_pool, _evhtp_run_in_thread, connection) != EVTHR_RES_OK) { |
| evutil_closesocket(connection->sock); |
| return evhtp_connection_free(connection); |
| } |
| return; |
| } |
| #endif |
| connection->evbase = htp->evbase; |
| |
| if (_evhtp_connection_accept(htp->evbase, connection) < 0) { |
| return evhtp_connection_free(connection); |
| } |
| |
| if (_evhtp_run_post_accept(htp, connection) < 0) { |
| return evhtp_connection_free(connection); |
| } |
| } |
| |
| #ifndef EVHTP_DISABLE_SSL |
| #ifndef EVHTP_DISABLE_EVTHR |
| static unsigned long |
| _evhtp_ssl_get_thread_id(void) { |
| return (unsigned long)pthread_self(); |
| } |
| |
| static void |
| _evhtp_ssl_thread_lock(int mode, int type, const char * file, int line) { |
| if (type < ssl_num_locks) { |
| if (mode & CRYPTO_LOCK) { |
| pthread_mutex_lock(&(ssl_locks[type])); |
| } else { |
| pthread_mutex_unlock(&(ssl_locks[type])); |
| } |
| } |
| } |
| |
| #endif |
| static void |
| _evhtp_ssl_delete_scache_ent(evhtp_ssl_ctx_t * ctx, evhtp_ssl_sess_t * sess) { |
| evhtp_t * htp; |
| evhtp_ssl_cfg_t * cfg; |
| unsigned char * sid; |
| unsigned int slen; |
| |
| htp = (evhtp_t *)SSL_CTX_get_app_data(ctx); |
| cfg = htp->ssl_cfg; |
| |
| sid = sess->session_id; |
| slen = sess->session_id_length; |
| |
| if (cfg->scache_del) { |
| (cfg->scache_del)(htp, sid, slen); |
| } |
| } |
| |
| static int |
| _evhtp_ssl_add_scache_ent(evhtp_ssl_t * ssl, evhtp_ssl_sess_t * sess) { |
| evhtp_connection_t * connection; |
| evhtp_ssl_cfg_t * cfg; |
| unsigned char * sid; |
| int slen; |
| |
| connection = (evhtp_connection_t *)SSL_get_app_data(ssl); |
| cfg = connection->htp->ssl_cfg; |
| |
| sid = sess->session_id; |
| slen = sess->session_id_length; |
| |
| SSL_set_timeout(sess, cfg->scache_timeout); |
| |
| if (cfg->scache_add) { |
| return (cfg->scache_add)(connection, sid, slen, sess); |
| } |
| |
| return 0; |
| } |
| |
| static evhtp_ssl_sess_t * |
| _evhtp_ssl_get_scache_ent(evhtp_ssl_t * ssl, unsigned char * sid, int sid_len, int * copy) { |
| evhtp_connection_t * connection; |
| evhtp_ssl_cfg_t * cfg; |
| evhtp_ssl_sess_t * sess; |
| |
| connection = (evhtp_connection_t * )SSL_get_app_data(ssl); |
| cfg = connection->htp->ssl_cfg; |
| sess = NULL; |
| |
| if (cfg->scache_get) { |
| sess = (cfg->scache_get)(connection, sid, sid_len); |
| } |
| |
| *copy = 0; |
| |
| return sess; |
| } |
| |
| static int |
| _evhtp_ssl_servername(evhtp_ssl_t * ssl, int * unused, void * arg) { |
| const char * sname; |
| evhtp_connection_t * connection; |
| evhtp_t * evhtp; |
| evhtp_t * evhtp_vhost; |
| |
| if (!(sname = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name))) { |
| return SSL_TLSEXT_ERR_NOACK; |
| } |
| |
| if (!(connection = SSL_get_app_data(ssl))) { |
| return SSL_TLSEXT_ERR_NOACK; |
| } |
| |
| if (!(evhtp = connection->htp)) { |
| return SSL_TLSEXT_ERR_NOACK; |
| } |
| |
| if ((evhtp_vhost = _evhtp_request_find_vhost(evhtp, sname))) { |
| connection->htp = evhtp_vhost; |
| connection->vhost_via_sni = 1; |
| |
| SSL_set_SSL_CTX(ssl, evhtp_vhost->ssl_ctx); |
| SSL_set_options(ssl, SSL_CTX_get_options(ssl->ctx)); |
| |
| if ((SSL_get_verify_mode(ssl) == SSL_VERIFY_NONE) || |
| (SSL_num_renegotiations(ssl) == 0)) { |
| SSL_set_verify(ssl, SSL_CTX_get_verify_mode(ssl->ctx), |
| SSL_CTX_get_verify_callback(ssl->ctx)); |
| } |
| |
| return SSL_TLSEXT_ERR_OK; |
| } |
| |
| return SSL_TLSEXT_ERR_NOACK; |
| } /* _evhtp_ssl_servername */ |
| |
| #endif |
| |
| /* |
| * PUBLIC FUNCTIONS |
| */ |
| |
| htp_method |
| evhtp_request_get_method(evhtp_request_t * r) { |
| return htparser_get_method(r->conn->parser); |
| } |
| |
| /** |
| * @brief pauses a connection (disables reading) |
| * |
| * @param c a evhtp_connection_t * structure |
| */ |
| void |
| evhtp_connection_pause(evhtp_connection_t * c) { |
| if ((bufferevent_get_enabled(c->bev) & EV_READ)) { |
| bufferevent_disable(c->bev, EV_READ); |
| } |
| } |
| |
| /** |
| * @brief resumes a connection (enables reading) and activates resume event. |
| * |
| * @param c |
| */ |
| void |
| evhtp_connection_resume(evhtp_connection_t * c) { |
| if (!(bufferevent_get_enabled(c->bev) & EV_READ)) { |
| bufferevent_enable(c->bev, EV_READ); |
| event_active(c->resume_ev, EV_WRITE, 1); |
| } |
| } |
| |
| /** |
| * @brief Wrapper around evhtp_connection_pause |
| * |
| * @see evhtp_connection_pause |
| * |
| * @param request |
| */ |
| void |
| evhtp_request_pause(evhtp_request_t * request) { |
| request->status = EVHTP_RES_PAUSE; |
| return evhtp_connection_pause(request->conn); |
| } |
| |
| /** |
| * @brief Wrapper around evhtp_connection_resume |
| * |
| * @see evhtp_connection_resume |
| * |
| * @param request |
| */ |
| void |
| evhtp_request_resume(evhtp_request_t * request) { |
| return evhtp_connection_resume(request->conn); |
| } |
| |
| evhtp_header_t * |
| evhtp_header_key_add(evhtp_headers_t * headers, const char * key, char kalloc) { |
| evhtp_header_t * header; |
| |
| if (!(header = evhtp_header_new(key, NULL, kalloc, 0))) { |
| return NULL; |
| } |
| |
| evhtp_headers_add_header(headers, header); |
| |
| return header; |
| } |
| |
| evhtp_header_t * |
| evhtp_header_val_add(evhtp_headers_t * headers, const char * val, char valloc) { |
| evhtp_header_t * header = TAILQ_LAST(headers, evhtp_headers_s); |
| |
| if (header == NULL) { |
| return NULL; |
| } |
| |
| header->vlen = strlen(val); |
| |
| if (valloc == 1) { |
| header->val = malloc(header->vlen + 1); |
| header->val[header->vlen] = '\0'; |
| memcpy(header->val, val, header->vlen); |
| } else { |
| header->val = (char *)val; |
| } |
| |
| header->v_heaped = valloc; |
| |
| return header; |
| } |
| |
| evhtp_kvs_t * |
| evhtp_kvs_new(void) { |
| evhtp_kvs_t * kvs = malloc(sizeof(evhtp_kvs_t)); |
| |
| TAILQ_INIT(kvs); |
| return kvs; |
| } |
| |
| evhtp_kv_t * |
| evhtp_kv_new(const char * key, const char * val, char kalloc, char valloc) { |
| evhtp_kv_t * kv; |
| |
| if (!(kv = malloc(sizeof(evhtp_kv_t)))) { |
| return NULL; |
| } |
| |
| kv->k_heaped = kalloc; |
| kv->v_heaped = valloc; |
| kv->klen = 0; |
| kv->vlen = 0; |
| |
| if (key != NULL) { |
| kv->klen = strlen(key); |
| |
| if (kalloc == 1) { |
| char * s = malloc(kv->klen + 1); |
| |
| s[kv->klen] = '\0'; |
| memcpy(s, key, kv->klen); |
| kv->key = s; |
| } else { |
| kv->key = (char *)key; |
| } |
| } |
| |
| if (val != NULL) { |
| kv->vlen = strlen(val); |
| |
| if (valloc == 1) { |
| char * s = malloc(kv->vlen + 1); |
| |
| s[kv->vlen] = '\0'; |
| memcpy(s, val, kv->vlen); |
| kv->val = s; |
| } else { |
| kv->val = (char *)val; |
| } |
| } |
| |
| return kv; |
| } /* evhtp_kv_new */ |
| |
| void |
| evhtp_kv_free(evhtp_kv_t * kv) { |
| if (kv == NULL) { |
| return; |
| } |
| |
| if (kv->k_heaped) { |
| free(kv->key); |
| } |
| |
| if (kv->v_heaped) { |
| free(kv->val); |
| } |
| |
| free(kv); |
| } |
| |
| void |
| evhtp_kv_rm_and_free(evhtp_kvs_t * kvs, evhtp_kv_t * kv) { |
| if (kvs == NULL || kv == NULL) { |
| return; |
| } |
| |
| TAILQ_REMOVE(kvs, kv, next); |
| |
| evhtp_kv_free(kv); |
| } |
| |
| void |
| evhtp_kvs_free(evhtp_kvs_t * kvs) { |
| evhtp_kv_t * kv; |
| evhtp_kv_t * save; |
| |
| if (kvs == NULL) { |
| return; |
| } |
| |
| for (kv = TAILQ_FIRST(kvs); kv != NULL; kv = save) { |
| save = TAILQ_NEXT(kv, next); |
| |
| TAILQ_REMOVE(kvs, kv, next); |
| |
| evhtp_kv_free(kv); |
| } |
| |
| free(kvs); |
| } |
| |
| int |
| evhtp_kvs_for_each(evhtp_kvs_t * kvs, evhtp_kvs_iterator cb, void * arg) { |
| evhtp_kv_t * kv; |
| |
| TAILQ_FOREACH(kv, kvs, next) { |
| int res; |
| |
| if ((res = cb(kv, arg))) { |
| return res; |
| } |
| } |
| |
| return 0; |
| } |
| |
| const char * |
| evhtp_kv_find(evhtp_kvs_t * kvs, const char * key) { |
| evhtp_kv_t * kv; |
| |
| if (kvs == NULL || key == NULL) { |
| return NULL; |
| } |
| |
| TAILQ_FOREACH(kv, kvs, next) { |
| if (strcasecmp(kv->key, key) == 0) { |
| return kv->val; |
| } |
| } |
| |
| return NULL; |
| } |
| |
| evhtp_kv_t * |
| evhtp_kvs_find_kv(evhtp_kvs_t * kvs, const char * key) { |
| evhtp_kv_t * kv; |
| |
| if (kvs == NULL || key == NULL) { |
| return NULL; |
| } |
| |
| TAILQ_FOREACH(kv, kvs, next) { |
| if (strcasecmp(kv->key, key) == 0) { |
| return kv; |
| } |
| } |
| |
| return NULL; |
| } |
| |
| void |
| evhtp_kvs_add_kv(evhtp_kvs_t * kvs, evhtp_kv_t * kv) { |
| if (kvs == NULL || kv == NULL) { |
| return; |
| } |
| |
| TAILQ_INSERT_TAIL(kvs, kv, next); |
| } |
| |
| typedef enum { |
| s_query_start = 0, |
| s_query_question_mark, |
| s_query_separator, |
| s_query_key, |
| s_query_val, |
| s_query_key_hex_1, |
| s_query_key_hex_2, |
| s_query_val_hex_1, |
| s_query_val_hex_2, |
| s_query_done |
| } query_parser_state; |
| |
| static inline int |
| evhtp_is_hex_query_char(unsigned char ch) { |
| switch (ch) { |
| case 'a': case 'A': |
| case 'b': case 'B': |
| case 'c': case 'C': |
| case 'd': case 'D': |
| case 'e': case 'E': |
| case 'f': case 'F': |
| case '0': |
| case '1': |
| case '2': |
| case '3': |
| case '4': |
| case '5': |
| case '6': |
| case '7': |
| case '8': |
| case '9': |
| return 1; |
| default: |
| return 0; |
| } /* switch */ |
| } |
| |
| enum unscape_state { |
| unscape_state_start = 0, |
| unscape_state_hex1, |
| unscape_state_hex2 |
| }; |
| |
| int |
| evhtp_unescape_string(unsigned char ** out, unsigned char * str, size_t str_len) { |
| unsigned char * optr; |
| unsigned char * sptr; |
| unsigned char d; |
| unsigned char ch; |
| unsigned char c; |
| size_t i; |
| enum unscape_state state; |
| |
| if (out == NULL || *out == NULL) { |
| return -1; |
| } |
| |
| state = unscape_state_start; |
| optr = *out; |
| sptr = str; |
| d = 0; |
| |
| for (i = 0; i < str_len; i++) { |
| ch = *sptr++; |
| |
| switch (state) { |
| case unscape_state_start: |
| if (ch == '%') { |
| state = unscape_state_hex1; |
| break; |
| } |
| |
| *optr++ = ch; |
| |
| break; |
| case unscape_state_hex1: |
| if (ch >= '0' && ch <= '9') { |
| d = (unsigned char)(ch - '0'); |
| state = unscape_state_hex2; |
| break; |
| } |
| |
| c = (unsigned char)(ch | 0x20); |
| |
| if (c >= 'a' && c <= 'f') { |
| d = (unsigned char)(c - 'a' + 10); |
| state = unscape_state_hex2; |
| break; |
| } |
| |
| state = unscape_state_start; |
| *optr++ = ch; |
| break; |
| case unscape_state_hex2: |
| state = unscape_state_start; |
| |
| if (ch >= '0' && ch <= '9') { |
| ch = (unsigned char)((d << 4) + ch - '0'); |
| |
| *optr++ = ch; |
| break; |
| } |
| |
| c = (unsigned char)(ch | 0x20); |
| |
| if (c >= 'a' && c <= 'f') { |
| ch = (unsigned char)((d << 4) + c - 'a' + 10); |
| *optr++ = ch; |
| break; |
| } |
| |
| break; |
| } /* switch */ |
| } |
| |
| return 0; |
| } /* evhtp_unescape_string */ |
| |
| evhtp_query_t * |
| evhtp_parse_query(const char * query, size_t len) { |
| evhtp_query_t * query_args; |
| query_parser_state state = s_query_start; |
| char * key_buf = NULL; |
| char * val_buf = NULL; |
| int key_idx; |
| int val_idx; |
| int res; |
| unsigned char ch; |
| size_t i; |
| |
| query_args = evhtp_query_new(); |
| |
| if (!(key_buf = malloc(len+1))) { |
| return NULL; |
| } |
| |
| if (!(val_buf = malloc(len+1))) { |
| free(key_buf); |
| return NULL; |
| } |
| |
| key_idx = 0; |
| val_idx = 0; |
| |
| for (i = 0; i < len; i++) { |
| res = 0; |
| ch = query[i]; |
| |
| if (key_idx >= len || val_idx >= len) { |
| res = -1; |
| goto error; |
| } |
| |
| switch (state) { |
| case s_query_start: |
| memset(key_buf, 0, len); |
| memset(val_buf, 0, len); |
| |
| key_idx = 0; |
| val_idx = 0; |
| |
| switch (ch) { |
| case '?': |
| state = s_query_key; |
| break; |
| case '/': |
| state = s_query_question_mark; |
| break; |
| default: |
| state = s_query_key; |
| goto query_key; |
| } |
| |
| break; |
| case s_query_question_mark: |
| switch (ch) { |
| case '?': |
| state = s_query_key; |
| break; |
| case '/': |
| state = s_query_question_mark; |
| break; |
| default: |
| res = -1; |
| goto error; |
| } |
| break; |
| query_key: |
| case s_query_key: |
| switch (ch) { |
| case '=': |
| state = s_query_val; |
| break; |
| case '%': |
| key_buf[key_idx++] = ch; |
| key_buf[key_idx] = '\0'; |
| state = s_query_key_hex_1; |
| break; |
| default: |
| key_buf[key_idx++] = ch; |
| key_buf[key_idx] = '\0'; |
| break; |
| } |
| break; |
| case s_query_key_hex_1: |
| if (!evhtp_is_hex_query_char(ch)) { |
| /* not hex, so we treat as a normal key */ |
| if ((key_idx + 2) >= len) { |
| /* we need to insert \%<ch>, but not enough space */ |
| res = -1; |
| goto error; |
| } |
| |
| key_buf[key_idx - 1] = '%'; |
| key_buf[key_idx++] = ch; |
| key_buf[key_idx] = '\0'; |
| state = s_query_key; |
| break; |
| } |
| |
| key_buf[key_idx++] = ch; |
| key_buf[key_idx] = '\0'; |
| |
| state = s_query_key_hex_2; |
| break; |
| case s_query_key_hex_2: |
| if (!evhtp_is_hex_query_char(ch)) { |
| res = -1; |
| goto error; |
| } |
| |
| key_buf[key_idx++] = ch; |
| key_buf[key_idx] = '\0'; |
| |
| state = s_query_key; |
| break; |
| case s_query_val: |
| switch (ch) { |
| case ';': |
| case '&': |
| evhtp_kvs_add_kv(query_args, evhtp_kv_new(key_buf, val_buf, 1, 1)); |
| |
| memset(key_buf, 0, len); |
| memset(val_buf, 0, len); |
| |
| key_idx = 0; |
| val_idx = 0; |
| |
| state = s_query_key; |
| |
| break; |
| case '%': |
| val_buf[val_idx++] = ch; |
| val_buf[val_idx] = '\0'; |
| |
| state = s_query_val_hex_1; |
| break; |
| default: |
| val_buf[val_idx++] = ch; |
| val_buf[val_idx] = '\0'; |
| |
| break; |
| } /* switch */ |
| break; |
| case s_query_val_hex_1: |
| if (!evhtp_is_hex_query_char(ch)) { |
| /* not really a hex val */ |
| if ((val_idx + 2) >= len) { |
| /* we need to insert \%<ch>, but not enough space */ |
| res = -1; |
| goto error; |
| } |
| |
| |
| val_buf[val_idx - 1] = '%'; |
| val_buf[val_idx++] = ch; |
| val_buf[val_idx] = '\0'; |
| |
| state = s_query_val; |
| break; |
| } |
| |
| val_buf[val_idx++] = ch; |
| val_buf[val_idx] = '\0'; |
| |
| state = s_query_val_hex_2; |
| break; |
| case s_query_val_hex_2: |
| if (!evhtp_is_hex_query_char(ch)) { |
| res = -1; |
| goto error; |
| } |
| |
| val_buf[val_idx++] = ch; |
| val_buf[val_idx] = '\0'; |
| |
| state = s_query_val; |
| break; |
| default: |
| /* bad state */ |
| res = -1; |
| goto error; |
| } /* switch */ |
| } |
| |
| if (key_idx && val_idx) { |
| evhtp_kvs_add_kv(query_args, evhtp_kv_new(key_buf, val_buf, 1, 1)); |
| } |
| |
| free(key_buf); |
| free(val_buf); |
| |
| return query_args; |
| error: |
| free(key_buf); |
| free(val_buf); |
| |
| return NULL; |
| } /* evhtp_parse_query */ |
| |
| void |
| evhtp_send_reply_start(evhtp_request_t * request, evhtp_res code) { |
| evhtp_connection_t * c; |
| evbuf_t * reply_buf; |
| |
| c = evhtp_request_get_connection(request); |
| |
| if (!(reply_buf = _evhtp_create_reply(request, code))) { |
| return evhtp_connection_free(c); |
| } |
| |
| bufferevent_write_buffer(c->bev, reply_buf); |
| evbuffer_free(reply_buf); |
| } |
| |
| void |
| evhtp_send_reply_body(evhtp_request_t * request, evbuf_t * buf) { |
| evhtp_connection_t * c; |
| |
| c = request->conn; |
| |
| bufferevent_write_buffer(c->bev, buf); |
| } |
| |
| void |
| evhtp_send_reply_end(evhtp_request_t * request) { |
| request->finished = 1; |
| |
| return _evhtp_connection_writecb(evhtp_request_get_bev(request), |
| evhtp_request_get_connection(request)); |
| } |
| |
| void |
| evhtp_send_reply(evhtp_request_t * request, evhtp_res code) { |
| evhtp_connection_t * c; |
| evbuf_t * reply_buf; |
| |
| c = evhtp_request_get_connection(request); |
| request->finished = 1; |
| |
| if (!(reply_buf = _evhtp_create_reply(request, code))) { |
| return evhtp_connection_free(request->conn); |
| } |
| |
| bufferevent_write_buffer(evhtp_connection_get_bev(c), reply_buf); |
| evbuffer_free(reply_buf); |
| } |
| |
| int |
| evhtp_response_needs_body(const evhtp_res code, const htp_method method) { |
| return code != EVHTP_RES_NOCONTENT && |
| code != EVHTP_RES_NOTMOD && |
| (code < 100 || code >= 200) && |
| method != htp_method_HEAD; |
| } |
| |
| void |
| evhtp_send_reply_chunk_start(evhtp_request_t * request, evhtp_res code) { |
| evhtp_header_t * content_len; |
| |
| if (evhtp_response_needs_body(code, request->method)) { |
| content_len = evhtp_headers_find_header(request->headers_out, "Content-Length"); |
| |
| switch (request->proto) { |
| case EVHTP_PROTO_11: |
| |
| /* |
| * prefer HTTP/1.1 chunked encoding to closing the connection; |
| * note RFC 2616 section 4.4 forbids it with Content-Length: |
| * and it's not necessary then anyway. |
| */ |
| |
| evhtp_kv_rm_and_free(request->headers_out, content_len); |
| request->chunked = 1; |
| break; |
| case EVHTP_PROTO_10: |
| /* |
| * HTTP/1.0 can be chunked as long as the Content-Length header |
| * is set to 0 |
| */ |
| evhtp_kv_rm_and_free(request->headers_out, content_len); |
| |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Content-Length", "0", 0, 0)); |
| |
| request->chunked = 1; |
| break; |
| default: |
| request->chunked = 0; |
| break; |
| } /* switch */ |
| } else { |
| request->chunked = 0; |
| } |
| |
| if (request->chunked == 1) { |
| evhtp_headers_add_header(request->headers_out, |
| evhtp_header_new("Transfer-Encoding", "chunked", 0, 0)); |
| |
| /* |
| * if data already exists on the output buffer, we automagically convert |
| * it to the first chunk. |
| */ |
| if (evbuffer_get_length(request->buffer_out) > 0) { |
| char lstr[128]; |
| int sres; |
| |
| sres = snprintf(lstr, sizeof(lstr), "%x\r\n", |
| (unsigned)evbuffer_get_length(request->buffer_out)); |
| |
| if (sres >= sizeof(lstr) || sres < 0) { |
| /* overflow condition, shouldn't ever get here, but lets |
| * terminate the connection asap */ |
| goto end; |
| } |
| |
| evbuffer_prepend(request->buffer_out, lstr, strlen(lstr)); |
| evbuffer_add(request->buffer_out, "\r\n", 2); |
| } |
| } |
| |
| end: |
| evhtp_send_reply_start(request, code); |
| } /* evhtp_send_reply_chunk_start */ |
| |
| void |
| evhtp_send_reply_chunk(evhtp_request_t * request, evbuf_t * buf) { |
| evbuf_t * output; |
| |
| output = bufferevent_get_output(request->conn->bev); |
| |
| if (evbuffer_get_length(buf) == 0) { |
| return; |
| } |
| if (request->chunked) { |
| evbuffer_add_printf(output, "%x\r\n", |
| (unsigned)evbuffer_get_length(buf)); |
| } |
| evhtp_send_reply_body(request, buf); |
| if (request->chunked) { |
| evbuffer_add(output, "\r\n", 2); |
| } |
| bufferevent_flush(request->conn->bev, EV_WRITE, BEV_FLUSH); |
| } |
| |
| void |
| evhtp_send_reply_chunk_end(evhtp_request_t * request) { |
| if (request->chunked) { |
| evbuffer_add(bufferevent_get_output(evhtp_request_get_bev(request)), |
| "0\r\n\r\n", 5); |
| } |
| |
| evhtp_send_reply_end(request); |
| } |
| |
| void |
| evhtp_unbind_socket(evhtp_t * htp) { |
| evconnlistener_free(htp->server); |
| htp->server = NULL; |
| } |
| |
| int |
| evhtp_bind_sockaddr(evhtp_t * htp, struct sockaddr * sa, size_t sin_len, int backlog) { |
| signal(SIGPIPE, SIG_IGN); |
| |
| htp->server = evconnlistener_new_bind(htp->evbase, _evhtp_accept_cb, (void *)htp, |
| LEV_OPT_THREADSAFE | LEV_OPT_CLOSE_ON_FREE | LEV_OPT_REUSEABLE, |
| backlog, sa, sin_len); |
| |
| #ifdef USE_DEFER_ACCEPT |
| { |
| evutil_socket_t sock; |
| int one = 1; |
| |
| sock = evconnlistener_get_fd(htp->server); |
| |
| setsockopt(sock, IPPROTO_TCP, TCP_DEFER_ACCEPT, &one, (ev_socklen_t)sizeof(one)); |
| setsockopt(sock, IPPROTO_TCP, TCP_NODELAY, &one, (ev_socklen_t)sizeof(one)); |
| } |
| #endif |
| |
| #ifndef EVHTP_DISABLE_SSL |
| if (htp->ssl_ctx != NULL) { |
| /* if ssl is enabled and we have virtual hosts, set our servername |
| * callback. We do this here because we want to make sure that this gets |
| * set after all potential virtualhosts have been set, not just after |
| * ssl_init. |
| */ |
| if (TAILQ_FIRST(&htp->vhosts) != NULL) { |
| SSL_CTX_set_tlsext_servername_callback(htp->ssl_ctx, |
| _evhtp_ssl_servername); |
| } |
| } |
| #endif |
| |
| return htp->server ? 0 : -1; |
| } |
| |
| int |
| evhtp_bind_socket(evhtp_t * htp, const char * baddr, uint16_t port, int backlog) { |
| struct sockaddr_in sin; |
| struct sockaddr_in6 sin6; |
| |
| #ifndef NO_SYS_UN |
| struct sockaddr_un sun; |
| #endif |
| struct sockaddr * sa; |
| size_t sin_len; |
| |
| memset(&sin, 0, sizeof(sin)); |
| |
| if (!strncmp(baddr, "ipv6:", 5)) { |
| memset(&sin6, 0, sizeof(sin6)); |
| |
| baddr += 5; |
| sin_len = sizeof(struct sockaddr_in6); |
| sin6.sin6_port = htons(port); |
| sin6.sin6_family = AF_INET6; |
| |
| evutil_inet_pton(AF_INET6, baddr, &sin6.sin6_addr); |
| sa = (struct sockaddr *)&sin6; |
| } else if (!strncmp(baddr, "unix:", 5)) { |
| #ifndef NO_SYS_UN |
| baddr += 5; |
| |
| if (strlen(baddr) >= sizeof(sun.sun_path)) { |
| return -1; |
| } |
| |
| memset(&sun, 0, sizeof(sun)); |
| |
| sin_len = sizeof(struct sockaddr_un); |
| sun.sun_family = AF_UNIX; |
| |
| strncpy(sun.sun_path, baddr, strlen(baddr)); |
| |
| sa = (struct sockaddr *)&sun; |
| #else |
| fprintf(stderr, "System does not support AF_UNIX sockets\n"); |
| return -1; |
| #endif |
| } else { |
| if (!strncmp(baddr, "ipv4:", 5)) { |
| baddr += 5; |
| } |
| |
| sin_len = sizeof(struct sockaddr_in); |
| |
| sin.sin_family = AF_INET; |
| sin.sin_port = htons(port); |
| sin.sin_addr.s_addr = inet_addr(baddr); |
| |
| sa = (struct sockaddr *)&sin; |
| } |
| |
| return evhtp_bind_sockaddr(htp, sa, sin_len, backlog); |
| } /* evhtp_bind_socket */ |
| |
| void |
| evhtp_callbacks_free(evhtp_callbacks_t * callbacks) { |
| /* XXX TODO */ |
| } |
| |
| evhtp_callback_t * |
| evhtp_callback_new(const char * path, evhtp_callback_type type, evhtp_callback_cb cb, void * arg) { |
| evhtp_callback_t * hcb; |
| |
| if (!(hcb = calloc(sizeof(evhtp_callback_t), 1))) { |
| return NULL; |
| } |
| |
| hcb->type = type; |
| hcb->cb = cb; |
| hcb->cbarg = arg; |
| |
| switch (type) { |
| case evhtp_callback_type_hash: |
| hcb->hash = _evhtp_quick_hash(path); |
| hcb->val.path = strdup(path); |
| break; |
| #ifndef EVHTP_DISABLE_REGEX |
| case evhtp_callback_type_regex: |
| hcb->val.regex = malloc(sizeof(regex_t)); |
| |
| if (regcomp(hcb->val.regex, (char *)path, REG_EXTENDED) != 0) { |
| free(hcb->val.regex); |
| free(hcb); |
| return NULL; |
| } |
| break; |
| #endif |
| case evhtp_callback_type_glob: |
| hcb->val.glob = strdup(path); |
| break; |
| default: |
| free(hcb); |
| return NULL; |
| } /* switch */ |
| |
| return hcb; |
| } |
| |
| void |
| evhtp_callback_free(evhtp_callback_t * callback) { |
| if (callback == NULL) { |
| return; |
| } |
| |
| switch (callback->type) { |
| case evhtp_callback_type_hash: |
| free(callback->val.path); |
| break; |
| case evhtp_callback_type_glob: |
| free(callback->val.glob); |
| break; |
| #ifndef EVHTP_DISABLE_REGEX |
| case evhtp_callback_type_regex: |
| regfree(callback->val.regex); |
| free(callback->val.regex); |
| break; |
| #endif |
| } |
| |
| if (callback->hooks) { |
| free(callback->hooks); |
| } |
| |
| free(callback); |
| |
| return; |
| } |
| |
| int |
| evhtp_callbacks_add_callback(evhtp_callbacks_t * cbs, evhtp_callback_t * cb) { |
| TAILQ_INSERT_TAIL(cbs, cb, next); |
| |
| return 0; |
| } |
| |
| int |
| evhtp_set_hook(evhtp_hooks_t ** hooks, evhtp_hook_type type, void * cb, void * arg) { |
| if (*hooks == NULL) { |
| if (!(*hooks = calloc(sizeof(evhtp_hooks_t), 1))) { |
| return -1; |
| } |
| } |
| |
| switch (type) { |
| case evhtp_hook_on_headers_start: |
| (*hooks)->on_headers_start = (evhtp_hook_headers_start_cb)cb; |
| (*hooks)->on_headers_start_arg = arg; |
| break; |
| case evhtp_hook_on_header: |
| (*hooks)->on_header = (evhtp_hook_header_cb)cb; |
| (*hooks)->on_header_arg = arg; |
| break; |
| case evhtp_hook_on_headers: |
| (*hooks)->on_headers = (evhtp_hook_headers_cb)cb; |
| (*hooks)->on_headers_arg = arg; |
| break; |
| case evhtp_hook_on_path: |
| (*hooks)->on_path = (evhtp_hook_path_cb)cb; |
| (*hooks)->on_path_arg = arg; |
| break; |
| case evhtp_hook_on_read: |
| (*hooks)->on_read = (evhtp_hook_read_cb)cb; |
| (*hooks)->on_read_arg = arg; |
| break; |
| case evhtp_hook_on_request_fini: |
| (*hooks)->on_request_fini = (evhtp_hook_request_fini_cb)cb; |
| (*hooks)->on_request_fini_arg = arg; |
| break; |
| case evhtp_hook_on_connection_fini: |
| (*hooks)->on_connection_fini = (evhtp_hook_connection_fini_cb)cb; |
| (*hooks)->on_connection_fini_arg = arg; |
| break; |
| case evhtp_hook_on_error: |
| (*hooks)->on_error = (evhtp_hook_err_cb)cb; |
| (*hooks)->on_error_arg = arg; |
| break; |
| case evhtp_hook_on_new_chunk: |
| (*hooks)->on_new_chunk = (evhtp_hook_chunk_new_cb)cb; |
| (*hooks)->on_new_chunk_arg = arg; |
| break; |
| case evhtp_hook_on_chunk_complete: |
| (*hooks)->on_chunk_fini = (evhtp_hook_chunk_fini_cb)cb; |
| (*hooks)->on_chunk_fini_arg = arg; |
| break; |
| case evhtp_hook_on_chunks_complete: |
| (*hooks)->on_chunks_fini = (evhtp_hook_chunks_fini_cb)cb; |
| (*hooks)->on_chunks_fini_arg = arg; |
| break; |
| case evhtp_hook_on_hostname: |
| (*hooks)->on_hostname = (evhtp_hook_hostname_cb)cb; |
| (*hooks)->on_hostname_arg = arg; |
| break; |
| default: |
| return -1; |
| } /* switch */ |
| |
| return 0; |
| } /* evhtp_set_hook */ |
| |
| int |
| evhtp_unset_hook(evhtp_hooks_t ** hooks, evhtp_hook_type type) { |
| return evhtp_set_hook(hooks, type, NULL, NULL); |
| } |
| |
| int |
| evhtp_unset_all_hooks(evhtp_hooks_t ** hooks) { |
| int res = 0; |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_headers_start)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_header)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_headers)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_path)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_read)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_request_fini)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_connection_fini)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_error)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_new_chunk)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_chunk_complete)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_chunks_complete)) { |
| res -= 1; |
| } |
| |
| if (evhtp_unset_hook(hooks, evhtp_hook_on_hostname)) { |
| res -= 1; |
| } |
| |
| return res; |
| } /* evhtp_unset_all_hooks */ |
| |
| evhtp_callback_t * |
| evhtp_set_cb(evhtp_t * htp, const char * path, evhtp_callback_cb cb, void * arg) { |
| evhtp_callback_t * hcb; |
| |
| _evhtp_lock(htp); |
| |
| if (htp->callbacks == NULL) { |
| if (!(htp->callbacks = calloc(sizeof(evhtp_callbacks_t), sizeof(char)))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| TAILQ_INIT(htp->callbacks); |
| } |
| |
| if (!(hcb = evhtp_callback_new(path, evhtp_callback_type_hash, cb, arg))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| if (evhtp_callbacks_add_callback(htp->callbacks, hcb)) { |
| evhtp_callback_free(hcb); |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| _evhtp_unlock(htp); |
| return hcb; |
| } |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| static void |
| _evhtp_thread_init(evthr_t * thr, void * arg) { |
| evhtp_t * htp = (evhtp_t *)arg; |
| |
| if (htp->thread_init_cb) { |
| htp->thread_init_cb(htp, thr, htp->thread_init_cbarg); |
| } |
| } |
| |
| int |
| evhtp_use_threads(evhtp_t * htp, evhtp_thread_init_cb init_cb, int nthreads, void * arg) { |
| htp->thread_init_cb = init_cb; |
| htp->thread_init_cbarg = arg; |
| |
| #ifndef EVHTP_DISABLE_SSL |
| evhtp_ssl_use_threads(); |
| #endif |
| |
| if (!(htp->thr_pool = evthr_pool_new(nthreads, _evhtp_thread_init, htp))) { |
| return -1; |
| } |
| |
| evthr_pool_start(htp->thr_pool); |
| return 0; |
| } |
| |
| #endif |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| int |
| evhtp_use_callback_locks(evhtp_t * htp) { |
| if (htp == NULL) { |
| return -1; |
| } |
| |
| if (!(htp->lock = malloc(sizeof(pthread_mutex_t)))) { |
| return -1; |
| } |
| |
| return pthread_mutex_init(htp->lock, NULL); |
| } |
| |
| #endif |
| |
| #ifndef EVHTP_DISABLE_REGEX |
| evhtp_callback_t * |
| evhtp_set_regex_cb(evhtp_t * htp, const char * pattern, evhtp_callback_cb cb, void * arg) { |
| evhtp_callback_t * hcb; |
| |
| _evhtp_lock(htp); |
| |
| if (htp->callbacks == NULL) { |
| if (!(htp->callbacks = calloc(sizeof(evhtp_callbacks_t), sizeof(char)))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| TAILQ_INIT(htp->callbacks); |
| } |
| |
| if (!(hcb = evhtp_callback_new(pattern, evhtp_callback_type_regex, cb, arg))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| if (evhtp_callbacks_add_callback(htp->callbacks, hcb)) { |
| evhtp_callback_free(hcb); |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| _evhtp_unlock(htp); |
| return hcb; |
| } |
| |
| #endif |
| |
| evhtp_callback_t * |
| evhtp_set_glob_cb(evhtp_t * htp, const char * pattern, evhtp_callback_cb cb, void * arg) { |
| evhtp_callback_t * hcb; |
| |
| _evhtp_lock(htp); |
| |
| if (htp->callbacks == NULL) { |
| if (!(htp->callbacks = calloc(sizeof(evhtp_callbacks_t), sizeof(char)))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| TAILQ_INIT(htp->callbacks); |
| } |
| |
| if (!(hcb = evhtp_callback_new(pattern, evhtp_callback_type_glob, cb, arg))) { |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| if (evhtp_callbacks_add_callback(htp->callbacks, hcb)) { |
| evhtp_callback_free(hcb); |
| _evhtp_unlock(htp); |
| return NULL; |
| } |
| |
| _evhtp_unlock(htp); |
| return hcb; |
| } |
| |
| void |
| evhtp_set_gencb(evhtp_t * htp, evhtp_callback_cb cb, void * arg) { |
| htp->defaults.cb = cb; |
| htp->defaults.cbarg = arg; |
| } |
| |
| void |
| evhtp_set_pre_accept_cb(evhtp_t * htp, evhtp_pre_accept_cb cb, void * arg) { |
| htp->defaults.pre_accept = cb; |
| htp->defaults.pre_accept_cbarg = arg; |
| } |
| |
| void |
| evhtp_set_post_accept_cb(evhtp_t * htp, evhtp_post_accept_cb cb, void * arg) { |
| htp->defaults.post_accept = cb; |
| htp->defaults.post_accept_cbarg = arg; |
| } |
| |
| #ifndef EVHTP_DISABLE_SSL |
| #ifndef EVHTP_DISABLE_EVTHR |
| int |
| evhtp_ssl_use_threads(void) { |
| int i; |
| |
| if (ssl_locks_initialized == 1) { |
| return 0; |
| } |
| |
| ssl_locks_initialized = 1; |
| |
| ssl_num_locks = CRYPTO_num_locks(); |
| ssl_locks = malloc(ssl_num_locks * sizeof(evhtp_mutex_t)); |
| |
| for (i = 0; i < ssl_num_locks; i++) { |
| pthread_mutex_init(&(ssl_locks[i]), NULL); |
| } |
| |
| CRYPTO_set_id_callback(_evhtp_ssl_get_thread_id); |
| CRYPTO_set_locking_callback(_evhtp_ssl_thread_lock); |
| |
| return 0; |
| } |
| |
| #endif |
| |
| int |
| evhtp_ssl_init(evhtp_t * htp, evhtp_ssl_cfg_t * cfg) { |
| long cache_mode; |
| evhtp_ssl_scache_init init_cb = NULL; |
| evhtp_ssl_scache_add add_cb = NULL; |
| evhtp_ssl_scache_get get_cb = NULL; |
| evhtp_ssl_scache_del del_cb = NULL; |
| |
| if (cfg == NULL || htp == NULL || cfg->pemfile == NULL) { |
| return -1; |
| } |
| |
| SSL_library_init(); |
| SSL_load_error_strings(); |
| RAND_poll(); |
| |
| STACK_OF(SSL_COMP) * comp_methods = SSL_COMP_get_compression_methods(); |
| sk_SSL_COMP_zero(comp_methods); |
| |
| htp->ssl_cfg = cfg; |
| htp->ssl_ctx = SSL_CTX_new(SSLv23_server_method()); |
| |
| #if OPENSSL_VERSION_NUMBER >= 0x10000000L |
| SSL_CTX_set_options(htp->ssl_ctx, SSL_MODE_RELEASE_BUFFERS); |
| /* SSL_CTX_set_options(htp->ssl_ctx, SSL_MODE_AUTO_RETRY); */ |
| SSL_CTX_set_timeout(htp->ssl_ctx, cfg->ssl_ctx_timeout); |
| #endif |
| |
| SSL_CTX_set_options(htp->ssl_ctx, cfg->ssl_opts); |
| |
| #ifndef OPENSSL_NO_EC |
| if (cfg->named_curve != NULL) { |
| EC_KEY * ecdh = NULL; |
| int nid = 0; |
| |
| nid = OBJ_sn2nid(cfg->named_curve); |
| if (nid == 0) { |
| fprintf(stderr, "ECDH initialization failed: unknown curve %s\n", cfg->named_curve); |
| } |
| ecdh = EC_KEY_new_by_curve_name(nid); |
| if (ecdh == NULL) { |
| fprintf(stderr, "ECDH initialization failed for curve %s\n", cfg->named_curve); |
| } |
| SSL_CTX_set_tmp_ecdh(htp->ssl_ctx, ecdh); |
| EC_KEY_free(ecdh); |
| } |
| #endif /* OPENSSL_NO_EC */ |
| |
| if (cfg->ciphers != NULL) { |
| SSL_CTX_set_cipher_list(htp->ssl_ctx, cfg->ciphers); |
| } |
| |
| SSL_CTX_load_verify_locations(htp->ssl_ctx, cfg->cafile, cfg->capath); |
| X509_STORE_set_flags(SSL_CTX_get_cert_store(htp->ssl_ctx), cfg->store_flags); |
| SSL_CTX_set_verify(htp->ssl_ctx, cfg->verify_peer, cfg->x509_verify_cb); |
| |
| if (cfg->x509_chk_issued_cb != NULL) { |
| htp->ssl_ctx->cert_store->check_issued = cfg->x509_chk_issued_cb; |
| } |
| |
| if (cfg->verify_depth) { |
| SSL_CTX_set_verify_depth(htp->ssl_ctx, cfg->verify_depth); |
| } |
| |
| switch (cfg->scache_type) { |
| case evhtp_ssl_scache_type_disabled: |
| cache_mode = SSL_SESS_CACHE_OFF; |
| break; |
| case evhtp_ssl_scache_type_user: |
| cache_mode = SSL_SESS_CACHE_SERVER | |
| SSL_SESS_CACHE_NO_INTERNAL | |
| SSL_SESS_CACHE_NO_INTERNAL_LOOKUP; |
| |
| init_cb = cfg->scache_init; |
| add_cb = cfg->scache_add; |
| get_cb = cfg->scache_get; |
| del_cb = cfg->scache_del; |
| break; |
| case evhtp_ssl_scache_type_builtin: |
| cache_mode = SSL_SESS_CACHE_SERVER | |
| SSL_SESS_CACHE_NO_INTERNAL | |
| SSL_SESS_CACHE_NO_INTERNAL_LOOKUP; |
| |
| #if 0 |
| init_cb = _evhtp_ssl_builtin_init; |
| add_cb = _evhtp_ssl_builtin_add; |
| get_cb = _evhtp_ssl_builtin_get; |
| del_cb = _evhtp_ssl_builtin_del; |
| #endif |
| break; |
| case evhtp_ssl_scache_type_internal: |
| default: |
| cache_mode = SSL_SESS_CACHE_SERVER; |
| break; |
| } /* switch */ |
| |
| SSL_CTX_use_certificate_file(htp->ssl_ctx, cfg->pemfile, SSL_FILETYPE_PEM); |
| SSL_CTX_use_PrivateKey_file(htp->ssl_ctx, cfg->privfile ? : cfg->pemfile, SSL_FILETYPE_PEM); |
| |
| SSL_CTX_set_session_id_context(htp->ssl_ctx, |
| (void *)&session_id_context, |
| sizeof(session_id_context)); |
| |
| SSL_CTX_set_app_data(htp->ssl_ctx, htp); |
| SSL_CTX_set_session_cache_mode(htp->ssl_ctx, cache_mode); |
| |
| if (cache_mode != SSL_SESS_CACHE_OFF) { |
| SSL_CTX_sess_set_cache_size(htp->ssl_ctx, |
| cfg->scache_size ? cfg->scache_size : 1024); |
| |
| if (cfg->scache_type == evhtp_ssl_scache_type_builtin || |
| cfg->scache_type == evhtp_ssl_scache_type_user) { |
| SSL_CTX_sess_set_new_cb(htp->ssl_ctx, _evhtp_ssl_add_scache_ent); |
| SSL_CTX_sess_set_get_cb(htp->ssl_ctx, _evhtp_ssl_get_scache_ent); |
| SSL_CTX_sess_set_remove_cb(htp->ssl_ctx, _evhtp_ssl_delete_scache_ent); |
| |
| if (cfg->scache_init) { |
| cfg->args = (cfg->scache_init)(htp); |
| } |
| } |
| } |
| |
| return 0; |
| } /* evhtp_use_ssl */ |
| |
| #endif |
| |
| evbev_t * |
| evhtp_connection_get_bev(evhtp_connection_t * connection) { |
| return connection->bev; |
| } |
| |
| evbev_t * |
| evhtp_connection_take_ownership(evhtp_connection_t * connection) { |
| evbev_t * bev = evhtp_connection_get_bev(connection); |
| |
| if (connection->hooks) { |
| evhtp_unset_all_hooks(&connection->hooks); |
| } |
| |
| if (connection->request && connection->request->hooks) { |
| evhtp_unset_all_hooks(&connection->request->hooks); |
| } |
| |
| evhtp_connection_set_bev(connection, NULL); |
| |
| connection->owner = 0; |
| |
| bufferevent_disable(bev, EV_READ); |
| bufferevent_setcb(bev, NULL, NULL, NULL, NULL); |
| |
| return bev; |
| } |
| |
| evbev_t * |
| evhtp_request_get_bev(evhtp_request_t * request) { |
| return evhtp_connection_get_bev(request->conn); |
| } |
| |
| evbev_t * |
| evhtp_request_take_ownership(evhtp_request_t * request) { |
| return evhtp_connection_take_ownership(evhtp_request_get_connection(request)); |
| } |
| |
| void |
| evhtp_connection_set_bev(evhtp_connection_t * conn, evbev_t * bev) { |
| conn->bev = bev; |
| } |
| |
| void |
| evhtp_request_set_bev(evhtp_request_t * request, evbev_t * bev) { |
| return evhtp_connection_set_bev(request->conn, bev); |
| } |
| |
| evhtp_connection_t * |
| evhtp_request_get_connection(evhtp_request_t * request) { |
| return request->conn; |
| } |
| |
| void |
| evhtp_connection_set_timeouts(evhtp_connection_t * c, |
| const struct timeval * rtimeo, |
| const struct timeval * wtimeo) { |
| if (!c) { |
| return; |
| } |
| |
| bufferevent_set_timeouts(c->bev, rtimeo, wtimeo); |
| } |
| |
| void |
| evhtp_connection_set_max_body_size(evhtp_connection_t * c, uint64_t len) { |
| if (len == 0) { |
| c->max_body_size = c->htp->max_body_size; |
| } else { |
| c->max_body_size = len; |
| } |
| } |
| |
| void |
| evhtp_request_set_max_body_size(evhtp_request_t * req, uint64_t len) { |
| return evhtp_connection_set_max_body_size(req->conn, len); |
| } |
| |
| void |
| evhtp_connection_free(evhtp_connection_t * connection) { |
| if (connection == NULL) { |
| return; |
| } |
| |
| _evhtp_request_free(connection->request); |
| _evhtp_connection_fini_hook(connection); |
| |
| free(connection->parser); |
| free(connection->hooks); |
| free(connection->saddr); |
| |
| if (connection->resume_ev) { |
| event_free(connection->resume_ev); |
| } |
| |
| if (connection->bev) { |
| #ifdef LIBEVENT_HAS_SHUTDOWN |
| bufferevent_shutdown(connection->bev, _evhtp_shutdown_eventcb); |
| #else |
| #ifndef EVHTP_DISABLE_SSL |
| if (connection->ssl != NULL) { |
| SSL_set_shutdown(connection->ssl, SSL_RECEIVED_SHUTDOWN); |
| SSL_shutdown(connection->ssl); |
| } |
| #endif |
| bufferevent_free(connection->bev); |
| #endif |
| } |
| |
| #ifndef EVHTP_DISABLE_EVTHR |
| if (connection->thread) { |
| evthr_dec_backlog(connection->thread); |
| } |
| #endif |
| |
| free(connection); |
| } /* evhtp_connection_free */ |
| |
| void |
| evhtp_request_free(evhtp_request_t * request) { |
| return _evhtp_request_free(request); |
| } |
| |
| void |
| evhtp_set_timeouts(evhtp_t * htp, const struct timeval * r_timeo, const struct timeval * w_timeo) { |
| if (r_timeo != NULL) { |
| htp->recv_timeo = *r_timeo; |
| } |
| |
| if (w_timeo != NULL) { |
| htp->send_timeo = *w_timeo; |
| } |
| } |
| |
| void |
| evhtp_set_max_keepalive_requests(evhtp_t * htp, uint64_t num) { |
| htp->max_keepalive_requests = num; |
| } |
| |
| /** |
| * @brief set bufferevent flags, defaults to BEV_OPT_CLOSE_ON_FREE |
| * |
| * @param htp |
| * @param flags |
| */ |
| void |
| evhtp_set_bev_flags(evhtp_t * htp, int flags) { |
| htp->bev_flags = flags; |
| } |
| |
| void |
| evhtp_set_max_body_size(evhtp_t * htp, uint64_t len) { |
| htp->max_body_size = len; |
| } |
| |
| int |
| evhtp_add_alias(evhtp_t * evhtp, const char * name) { |
| evhtp_alias_t * alias; |
| |
| if (evhtp == NULL || name == NULL) { |
| return -1; |
| } |
| |
| if (!(alias = calloc(sizeof(evhtp_alias_t), 1))) { |
| return -1; |
| } |
| |
| alias->alias = strdup(name); |
| |
| TAILQ_INSERT_TAIL(&evhtp->aliases, alias, next); |
| |
| return 0; |
| } |
| |
| /** |
| * @brief add a virtual host. |
| * |
| * NOTE: If SSL is being used and the vhost was found via SNI, the Host: header |
| * will *NOT* be used to find a matching vhost. |
| * |
| * Also, any hooks which are set prior to finding a vhost that are hooks |
| * which are after the host hook, they are overwritten by the callbacks |
| * and hooks set for the vhost specific evhtp_t structure. |
| * |
| * @param evhtp |
| * @param name |
| * @param vhost |
| * |
| * @return |
| */ |
| int |
| evhtp_add_vhost(evhtp_t * evhtp, const char * name, evhtp_t * vhost) { |
| if (evhtp == NULL || name == NULL || vhost == NULL) { |
| return -1; |
| } |
| |
| if (TAILQ_FIRST(&vhost->vhosts) != NULL) { |
| /* vhosts cannot have secondary vhosts defined */ |
| return -1; |
| } |
| |
| if (!(vhost->server_name = strdup(name))) { |
| return -1; |
| } |
| |
| /* set the parent of this vhost so when the request has been completely |
| * serviced, the vhost can be reset to the original evhtp structure. |
| * |
| * This allows for a keep-alive connection to make multiple requests with |
| * different Host: values. |
| */ |
| vhost->parent = evhtp; |
| |
| /* inherit various flags from the parent evhtp structure */ |
| vhost->bev_flags = evhtp->bev_flags; |
| vhost->max_body_size = evhtp->max_body_size; |
| vhost->max_keepalive_requests = evhtp->max_keepalive_requests; |
| vhost->recv_timeo = evhtp->recv_timeo; |
| vhost->send_timeo = evhtp->send_timeo; |
| |
| TAILQ_INSERT_TAIL(&evhtp->vhosts, vhost, next_vhost); |
| |
| return 0; |
| } |
| |
| evhtp_t * |
| evhtp_new(evbase_t * evbase, void * arg) { |
| evhtp_t * htp; |
| |
| if (evbase == NULL) { |
| return NULL; |
| } |
| |
| if (!(htp = calloc(sizeof(evhtp_t), 1))) { |
| return NULL; |
| } |
| |
| status_code_init(); |
| |
| htp->arg = arg; |
| htp->evbase = evbase; |
| htp->bev_flags = BEV_OPT_CLOSE_ON_FREE; |
| |
| TAILQ_INIT(&htp->vhosts); |
| TAILQ_INIT(&htp->aliases); |
| |
| evhtp_set_gencb(htp, _evhtp_default_request_cb, (void *)htp); |
| |
| return htp; |
| } |
| |
| void |
| evhtp_free(evhtp_t * evhtp) { |
| evhtp_alias_t * evhtp_alias, * tmp; |
| |
| if (evhtp == NULL) { |
| return; |
| } |
| |
| if (evhtp->thr_pool) { |
| evthr_pool_stop(evhtp->thr_pool); |
| evthr_pool_free(evhtp->thr_pool); |
| } |
| |
| if (evhtp->callbacks) { |
| free(evhtp->callbacks); |
| } |
| |
| if (evhtp->server_name) { |
| free(evhtp->server_name); |
| } |
| |
| TAILQ_FOREACH_SAFE(evhtp_alias, &evhtp->aliases, next, tmp) { |
| if (evhtp_alias->alias != NULL) { |
| free(evhtp_alias->alias); |
| } |
| TAILQ_REMOVE(&evhtp->aliases, evhtp_alias, next); |
| free(evhtp_alias); |
| } |
| |
| free(evhtp); |
| } |