Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1403 lines
37 KiB

/*++
Copyright (c) 1995-1996 Microsoft Corporation
Module Name :
hgetinfo.cxx
Abstract:
This file contains the code for getting information from HTTP_REQUEST
object. This is useful for ISAPI apps and filters.
Author:
Murali R. Krishnan ( MuraliK ) 20-Nov-1996
Environment:
Project:
W3Svc DLL
Functions Exported:
Revision History:
--*/
/************************************************************
* Include Headers
************************************************************/
#include "w3p.hxx"
extern "C"
{
#include "md5.h"
}
//
// IsStringMatch()
// Matches the given string variable to the constant string supplied.
// The two variables involved are strings :( which are null-terminated
// So, we cannot apply Memory Comparisons
//
// Returns:
// TRUE on a match
// FALSE if there is a failure to match up
//
# define IsStringMatch( pszConstant, pszVar, cchVar) \
((cchVar == (sizeof( pszConstant) - 1)) && \
!strcmp( pszConstant, pszVar) \
)
//
// IsStringPrefixMatch()
// Matches the given string variable for a prefix constant string.
//
// Returns:
// TRUE on a match
// FALSE if there is a failure to match up
//
# define IsStringPrefixMatch( pszConstantPrefix, pszVar, cchVar) \
((cchVar >= (sizeof( pszConstantPrefix) - 1)) && \
!memcmp( pszConstantPrefix, pszVar, (sizeof(pszConstantPrefix) - 1))\
)
static const CHAR g_szHexDigits[] = "0123456789abcdef";
/************************************************************
* Function Prototypes and inlines
************************************************************/
BOOL
BuildCGIHeaderList(
HTTP_HEADERS * pHeaderList,
CHAR * pchBuffer,
DWORD * lpcchBuffer
);
BOOL
GetInfoFromCertificate(
IN TCP_AUTHENT & tcpauth,
IN LPCSTR pszValName,
DWORD cchValName,
OUT CHAR * pchBuffer,
IN OUT DWORD * lpcchBuffer
);
BOOL
HseBuildRawHeaders(
IN HTTP_HEADERS * pHeaderList,
OUT LPSTR lpvBuffer,
IN OUT LPDWORD lpdwSize
);
BOOL
CopyStringToBuffer(
IN LPCSTR psz,
IN DWORD cch,
OUT CHAR * pchBuffer,
IN OUT DWORD * lpcchBuffer
)
{
if ( *lpcchBuffer >= cch ) {
if ( pchBuffer != NULL ) {
CopyMemory( pchBuffer, psz, cch);
*lpcchBuffer = cch;
return (TRUE);
}
}
*lpcchBuffer = cch;
SetLastError( ERROR_INSUFFICIENT_BUFFER);
return ( FALSE);
} // CopyStringToBuffer()
BOOL
VariableNotAvailable(
OUT CHAR* pchBuffer,
IN OUT DWORD* lpcchBuffer
)
/*++
Description:
handles server request for which content is not available,
i.e. variables which depends on instance or metadata
when such info is not available.
In this case we return an empty string.
Arguments:
pchBuffer - pointer to character buffer which will contain
the value if found
lpcchBuffer - pointer to DWORD containing
IN: the count of characters pchBuffer can store
OUT: the count of characters actually stored (on success)
the count of characters required (on failure)
Returns:
TRUE if success, otherwise FALSE
Win32 Error Code :
NO_ERROR for success
ERROR_INSUFFICIENT_BUFFER - if space is not enough
ERROR_INVALID_INDEX - if item is not found
--*/
{
if ( *lpcchBuffer >= 1 ) {
if ( pchBuffer != NULL ) {
*pchBuffer = '\0';
*lpcchBuffer = 1;
return TRUE;
} else {
SetLastError( ERROR_INVALID_PARAMETER );
return FALSE;
}
}
*lpcchBuffer = 1;
SetLastError( ERROR_INSUFFICIENT_BUFFER);
return ( FALSE);
}
inline BOOL
CopyStringToBuffer(
IN LPCSTR psz,
OUT CHAR * pchBuffer,
IN OUT DWORD * lpcchBuffer
)
{
DBG_ASSERT( psz != NULL );
return (CopyStringToBuffer( psz, strlen(psz) + 1, pchBuffer, lpcchBuffer));
} // CopyStringToBuffer()
inline BOOL
ReturnNullString(
OUT CHAR * pchBuffer,
IN OUT DWORD * lpcchBuffer
)
{
return (CopyStringToBuffer( "", 1, pchBuffer, lpcchBuffer));
}
/************************************************************
* Functions
************************************************************/
PW3_METADATA
HTTP_REQUEST::GetWAMMetaData(
)
/*++
Description:
This function gets the metadata pointer taking into account
running child ISAPI scenario. For some ISAPI related gets
this should be used intstead of QueryMetaData()
Arguments:
Returns:
PW3_METADATA pointer or NULL
--*/
{
if ( _pWamRequest && _pWamRequest->IsChild() ) {
return _pWamRequest->QueryExecMetaData();
}
else {
return QueryMetaData();
}
}
BOOL
HTTP_REQUEST::GetInfoForName(
const CHAR * pszValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
/*++
Description:
This function acts as the switch board for getting values
for requested ValueName. It is used by Filters/ISAPI applications
to obtain the required server and request values.
Arguments:
pszValName - pointer to string containing the name of the value
pchBuffer - pointer to character buffer which will contain
the value if found
lpcchBuffer - pointer to DWORD containing
IN: the count of characters pchBuffer can store
OUT: the count of characters actually stored (on success)
the count of characters required (on failure)
Returns:
Win32 Error Code
NO_ERROR for success
ERROR_INSUFFICIENT_BUFFER - if space is not enough
ERROR_INVALID_INDEX - if item is not found
--*/
{
if ( !pszValName)
{
SetLastError( ERROR_INVALID_PARAMETER );
return FALSE;
}
if ( !( *pszValName ) || !isalpha( (UCHAR)(*pszValName) ) )
{
SetLastError( ERROR_INVALID_INDEX);
return (FALSE);
}
BOOL fRet;
PFN_GET_INFO pfnGI;
DWORD cchValName = strlen( pszValName);
pfnGI = HTTP_REQUEST::sm_GetInfoFuncs[IndexOfChar(*pszValName)];
DBG_ASSERT( NULL != pfnGI);
fRet = (this->*pfnGI)( pszValName, cchValName, pchBuffer, lpcchBuffer );
#if OLD_MODE_COMPATIBILITY
//
// Once upon a time, this function was not there. Then all the queries
// if they did not get resolved were passed onto GetEnvironmentString()
// to extract and environment parameter.
//
// These days the GetEnvironmentString() which is part of the GetInfoMisc()
// is not a fast function => it consumes more time
// So we will avoid this. Thanks for listening to the story.
//
if ( !fRet && ( GetLastError() == ERROR_INVALID_INDEX ) )
{
//
// Try again with the Misc() function if we do not find
// the item in the general location.
// This has performance costs :(
//
fRet = GetInfoMisc( pszValName, cchValName,
pchBuffer, lpcchBuffer );
}
# endif // OLD_MODE_COMPATIBILITY
return fRet;
} // HTTP_REQUEST::GetInfoForName()
BOOL
HTTP_REQUEST::GetInfoA(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'A');
//
// ALL_HTTP is a special server specific value used by the CGI code
// to retrieve all of the HTTP headers the client sent
//
if ( IsStringMatch( "ALL_RAW", pszValName, cchValName)) {
//
// Probably the proxy is making the request
// Get the raw list of headers
//
return ( HseBuildRawHeaders( QueryHeaderList(),
pchBuffer, lpcchBuffer)
);
} else if ( IsStringMatch( "APPL_MD_PATH", pszValName, cchValName )) {
PW3_METADATA pMetaData = GetWAMMetaData();
if ( pMetaData == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
DBG_ASSERT( pMetaData->QueryAppPath() != NULL);
return ( pMetaData->QueryAppPath()->
CopyToBuffer( pchBuffer, lpcchBuffer)
);
} else if ( IsStringMatch( "APPL_PHYSICAL_PATH", pszValName, cchValName )) {
PW3_METADATA pMetaData = GetWAMMetaData();
MB mb( (IMDCOM*) g_pInetSvc->QueryMDObject());
if ( pMetaData == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
STACK_STR( strAppPhysicalPath, MAX_PATH);
//
// Create the Applicaiton Physical Path in a separate buffer
// and then copy it over to the incoming buffer
//
return ( ( pMetaData->BuildApplPhysicalPath(
&mb,
&strAppPhysicalPath))
&& strAppPhysicalPath.CopyToBuffer( pchBuffer, lpcchBuffer)
);
} else if ( IsStringMatch( "ALL_HTTP", pszValName, cchValName )) {
return BuildCGIHeaderList( QueryHeaderList(), pchBuffer, lpcchBuffer );
} else if ( IsStringMatch( "AUTH_TYPE", pszValName, cchValName )) {
return ( _strAuthType.CopyToBuffer( pchBuffer, lpcchBuffer));
} else if ( IsStringMatch( "AUTH_PASSWORD", pszValName, cchValName )) {
return ( _strUnmappedPassword.CopyToBuffer( pchBuffer, lpcchBuffer));
} else if ( IsStringMatch( "AUTH_USER", pszValName, cchValName )) {
return ( _strUnmappedUserName.CopyToBuffer( pchBuffer, lpcchBuffer));
} else {
SetLastError( ERROR_INVALID_INDEX);
}
return ( FALSE);
} // HTTP_REQUEST::GetInfoA()
BOOL
HTTP_REQUEST::GetInfoC(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'C');
if ( IsStringMatch( "CONTENT_LENGTH", pszValName, cchValName )) {
CHAR rgchCL[40];
_ultoa( _cbContentLength, rgchCL, 10);
fReturn = CopyStringToBuffer( rgchCL,
pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "CONTENT_TYPE", pszValName, cchValName )) {
fReturn = _strContentType.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringPrefixMatch( "CERT_", pszValName, cchValName)) {
//
// All the certificates related stuff has to go in here.
//
fReturn = GetInfoFromCertificate( _tcpauth, (pszValName + 5),
cchValName - 5,
pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoC()
BOOL
HTTP_REQUEST::GetInfoH(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn = TRUE;
LPCSTR pszSuffix;
DWORD cchSuffix;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'H');
if ( IsStringPrefixMatch( "HTTP_", pszValName, cchValName)) {
pszSuffix = pszValName + (sizeof("HTTP_") - 1);
cchSuffix = cchValName - (sizeof("HTTP_") - 1);
if ( IsStringMatch( "REQ_REALM", pszSuffix, cchSuffix)) {
LPCSTR psz;
//
// generate the real information
//
if ( QueryMetaData() == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
psz = ( QueryMetaData()->QueryRealm()
? QueryMetaData()->QueryRealm()
: QueryHostAddr() );
fReturn = CopyStringToBuffer( psz, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "REQ_PWD_EXPIRE", pszSuffix, cchSuffix )) {
CHAR rgExp[40];
_ultoa( _dwExpireInDay, rgExp, 10);
fReturn = CopyStringToBuffer( rgExp, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "CFG_ENC_CAPS", pszSuffix, cchSuffix )) {
if ( QueryW3Instance() == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
CHAR rgNum[40];
_ultoa( (UINT) QueryW3Instance()->QueryEncCaps(),
rgNum, 10);
fReturn = CopyStringToBuffer( rgNum, pchBuffer, lpcchBuffer);
} else {
//
// Since the value begins with "HTTP_"
// then it's probably in our headers list
//
CHAR achHeader[MAX_HEADER_LENGTH];
CHAR * pch;
LPCSTR pszValue;
DWORD cchValue;
HTTP_FAST_MAP_HEADERS iField;
// adjust "1" for the terminating ":" if needed
if ( cchSuffix >= sizeof( achHeader ) - 1 ) {
SetLastError( ERROR_INVALID_PARAMETER );
return FALSE;
}
//
// Copy the client specified header name to a temp buffer
// so we can replace all "_" with "-"s so it will match the
// header names in our list.
// We also need to append a colon if needed
//
strcpy( achHeader, pszValName + 5 );
for ( pch = achHeader; pch = strchr( pch, '_' ); *pch++ = '-')
;
pszValue = NULL;
// Lookup the name in the fast map first.
if ( HTTP_HEADERS::FindOrdinalForHeader( achHeader, cchSuffix,
(LPDWORD ) &iField)
) {
// get the header value from fast map
pszValue = _HeaderList.FastMapQueryValue( iField);
cchValue = ((pszValue != NULL) ? strlen( pszValue) : 0);
}
// if the header is absent in the fast map, lookup the slow map
if ( NULL == pszValue ) {
// append a ':' if not already present
if ( (cchSuffix >= 1) && (achHeader[cchSuffix-1] != ':') &&
(cchSuffix < sizeof(achHeader))) {
achHeader[cchSuffix] = ':';
achHeader[cchSuffix+1] = '\0';
cchSuffix++;
}
pszValue = _HeaderList.FindValue( achHeader, &cchValue );
}
if ( pszValue != NULL) {
// Copy including the "null" character for the string.
fReturn = CopyStringToBuffer( pszValue, cchValue + 1,
pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
}
} else if ( IsStringPrefixMatch( "HTTPS", pszValName, cchValName)) {
pszSuffix = pszValName + (sizeof("HTTPS") - 1);
cchSuffix = cchValName - (sizeof("HTTPS") - 1);
if ( *pszSuffix == '\0') {
// pszValName == "HTTPS"
fReturn = CopyStringToBuffer( IsSecurePort() ? "on" : "off",
pchBuffer, lpcchBuffer);
} else if ( *pszSuffix == '_' ) {
fReturn = GetInfoFromCertificate( _tcpauth, pszSuffix+1,
cchSuffix - 1,
pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoH()
BOOL
HTTP_REQUEST::GetInfoI(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn = FALSE;
LPCSTR pszSuffix;
DWORD cchSuffix;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'I');
if ( IsStringPrefixMatch( "INSTANCE_", pszValName, cchValName))
{
pszSuffix = pszValName + (sizeof("INSTANCE_")-1);
cchSuffix = cchValName - (sizeof("INSTANCE_") - 1);
if ( IsStringMatch( "ID", pszSuffix, cchSuffix))
{
if ( QueryW3Instance() == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
CHAR rgch[40];
_ultoa( QueryW3Instance()->QueryInstanceId(),
rgch,
10);
fReturn = CopyStringToBuffer( rgch, pchBuffer, lpcchBuffer);
}
else if ( IsStringMatch( "META_PATH", pszSuffix, cchSuffix ))
{
if ( QueryW3Instance() == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
fReturn = CopyStringToBuffer( QueryW3Instance()->QueryMDPath(),
pchBuffer,
lpcchBuffer);
}
else
{
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
}
else
{
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return fReturn;
} // HTTP_REQUEST::GetInfoI()
BOOL
HTTP_REQUEST::GetInfoL(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'L');
if ( IsStringMatch( "LOCAL_ADDR", pszValName, cchValName)) {
//
// Note this returns the server IP address since we don't necessarily
// know the DNS name of this server
//
fReturn = CopyStringToBuffer( QueryClientConn()->QueryLocalAddr(),
pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "LOGON_USER", pszValName, cchValName )) {
fReturn = _strUserName.CopyToBuffer( pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoL()
BOOL
HTTP_REQUEST::GetInfoP(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'P');
if ( IsStringMatch( "PATH_INFO", pszValName, cchValName )) {
fReturn = _strPathInfo.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "PATH_TRANSLATED", pszValName, cchValName )) {
//
// Note that _strPathInfo has already been escaped
//
// If the path can't be found (no home root for example) then
// treat it as success and return the empty string.
//
// Easiest is to use a string object to obtain the xlation.
PW3_METADATA pMetaData = GetWAMMetaData();
if ( pMetaData == NULL )
{
return VariableNotAvailable( pchBuffer, lpcchBuffer);
}
STACK_STR( str, MAX_PATH);
if ( !LookupVirtualRoot( &str,
_strPathInfo.QueryStr() ,
_strPathInfo.QueryCCH() ) &&
GetLastError() != ERROR_PATH_NOT_FOUND ) {
fReturn = FALSE;
} else {
fReturn = str.CopyToBuffer( pchBuffer, lpcchBuffer);
}
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoP()
BOOL
HTTP_REQUEST::GetInfoR(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
char chBuff[8]; // plenty of room for _itoa(USHORT_MAX, ...)
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'R');
if ( IsStringMatch( "REQUEST_METHOD", pszValName, cchValName )) {
fReturn = _strMethod.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "REMOTE_HOST", pszValName, cchValName)) {
//
// Note that REMOTE_HOST returns DNS name if available
//
fReturn =
CopyStringToBuffer( (( QueryClientConn()->IsDnsResolved() )?
( QueryClientConn()->QueryResolvedDnsName()) :
( QueryClientConn()->QueryRemoteAddr() )
),
pchBuffer,
lpcchBuffer);
} else if ( IsStringMatch( "REMOTE_ADDR", pszValName, cchValName ) ) {
fReturn = CopyStringToBuffer( QueryClientConn()->QueryRemoteAddr(),
pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "REMOTE_USER", pszValName, cchValName)) {
fReturn = _strUnmappedUserName.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "REMOTE_PORT", pszValName, cchValName ) ) {
_itoa( QueryClientConn()->QueryRemotePort(), chBuff, 10);
fReturn = CopyStringToBuffer( chBuff, pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoR()
BOOL
HTTP_REQUEST::GetInfoS(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'S');
if ( IsStringMatch( "SCRIPT_NAME", pszValName, cchValName ) ) {
fReturn = _strURL.CopyToBuffer( pchBuffer, lpcchBuffer );
} else if ( IsStringPrefixMatch( "SERVER_", pszValName, cchValName)) {
LPCSTR pszSuffix = pszValName + (sizeof("SERVER_") - 1);
DWORD cchSuffix = cchValName - (sizeof("SERVER_") - 1);
if ( IsStringMatch( "NAME", pszSuffix, cchSuffix ) ) {
fReturn = CopyStringToBuffer( QueryHostAddr(),
pchBuffer, lpcchBuffer );
} else if ( IsStringMatch( "PROTOCOL", pszSuffix, cchSuffix)) {
CHAR rgch[40];
wsprintf( rgch,
"HTTP/%d.%d",
_VersionMajor,
_VersionMinor );
fReturn = CopyStringToBuffer( rgch, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "PORT", pszSuffix, cchSuffix )) {
CHAR rgch[40];
_ultoa( QueryClientConn()->QueryPort(),
rgch, 10);
fReturn = CopyStringToBuffer( rgch, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "PORT_SECURE", pszSuffix, cchSuffix)) {
fReturn = CopyStringToBuffer( ( IsSecurePort() ? "1" : "0"), 2,
pchBuffer, lpcchBuffer );
} else if ( IsStringMatch( "SOFTWARE", pszSuffix, cchSuffix)) {
DBG_ASSERT( g_szServerType[g_cbServerType] == '\0');
fReturn = CopyStringToBuffer( g_szServerType, g_cbServerType + 1,
pchBuffer, lpcchBuffer);
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
} else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoS()
BOOL
HTTP_REQUEST::GetInfoU(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( toupper(*pszValName) == 'U');
if ( IsStringMatch( "UNMAPPED_REMOTE_USER", pszValName, cchValName )) {
fReturn = _strUnmappedUserName.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "URL", pszValName, cchValName ) ) {
fReturn = _strURL.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "URL_PATH_INFO", pszValName, cchValName ) ) {
fReturn = _strURLPathInfo.CopyToBuffer( pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "UNENCODED_URL", pszValName, cchValName ) ) {
fReturn = _strRawURL.CopyToBuffer( pchBuffer, lpcchBuffer);
}
else {
SetLastError( ERROR_INVALID_INDEX);
fReturn = FALSE;
}
return ( fReturn);
} // HTTP_REQUEST::GetInfoU()
BOOL
HTTP_REQUEST::GetInfoMisc(
const CHAR * pszValName,
DWORD cchValName,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
{
BOOL fReturn;
DBG_ASSERT( pszValName != NULL);
if ( IsStringMatch( "GATEWAY_INTERFACE", pszValName, cchValName )) {
fReturn = CopyStringToBuffer( "CGI/1.1", sizeof("CGI/1.1"),
pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "QUERY_STRING", pszValName, cchValName )) {
fReturn = _strURLParams.CopyToBuffer( pchBuffer, lpcchBuffer);
} else {
//
// Any other value we assume to be a real environment variable
//
DWORD cch;
//
// GetEnvironmentVariable()
// If the function succeeds, the return value is the number of
// characters stored into the buffer pointed to by lpcchBuffer,
// not including the terminating null character.
// If the specified environment variable name was not found
// in the environment block for the current process,
// the return value is zero.
// If the buffer pointed to by lpcchBuffer is not large enough,
// the return value is the buffer size, in characters,
// required to hold the value string and its terminating
// null character.
//
cch = GetEnvironmentVariable( pszValName,
pchBuffer,
*lpcchBuffer);
if ( cch == 0) {
SetLastError( ERROR_INVALID_INDEX );
fReturn = FALSE;
} else if ( cch < *lpcchBuffer ) {
// data is already copied. No problems. Return the length.
*lpcchBuffer = (cch + 1);
fReturn = TRUE;
} else {
*lpcchBuffer = cch;
SetLastError( ERROR_INSUFFICIENT_BUFFER);
fReturn = FALSE;
}
}
return (fReturn);
} // HTTP_REQUEST::GetInfoMisc()
/************************************************************
* Support Functions for GetInfoXXX
************************************************************/
BOOL
GetInfoFromCertificate(
IN TCP_AUTHENT & tcpauth,
IN LPCSTR pszValName,
DWORD cchValName,
OUT CHAR * pchBuffer,
IN OUT DWORD * lpcchBuffer
)
{
IISMD5_CTX md5;
BOOL fReturn = FALSE;
BOOL fNoCert;
DWORD i;
CHAR achCertName[MAX_CERT_FIELD_SIZE];
DWORD dwCertInfo;
DBG_ASSERT( pszValName != NULL);
DBG_ASSERT( !memcmp( pszValName - 5, "CERT_", 5) ||
!memcmp( pszValName - 6, "HTTPS_", 6)
);
//
// Find the value for the field in a certificate that is requested
//
if ( IsStringMatch( "SUBJECT", pszValName, cchValName )) {
LPSTR pV = NULL;
if ( !tcpauth.QueryCertificateSubject( achCertName, sizeof(achCertName), &fNoCert ) ) {
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
fReturn = CopyStringToBuffer( achCertName, pchBuffer, lpcchBuffer);
}
} else if ( IsStringMatch( "ISSUER", pszValName, cchValName )) {
LPSTR pV = NULL;
if ( !tcpauth.QueryCertificateIssuer( achCertName, sizeof(achCertName), &fNoCert ) ) {
// no certificate available
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
fReturn = CopyStringToBuffer( achCertName, pchBuffer, lpcchBuffer);
}
} else if ( IsStringMatch( "FLAGS", pszValName, cchValName )) {
DWORD dwF;
CHAR rgF[40];
if ( !tcpauth.QueryCertificateFlags( &dwF, &fNoCert ) ) {
rgF[0] = '\0';
} else {
_ultoa( dwF, rgF, 10);
}
fReturn = CopyStringToBuffer( rgF, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "SERIALNUMBER", pszValName, cchValName )) {
LPBYTE pV;
DWORD cch; // Buffer bytes
if ( !tcpauth.QueryCertificateSerialNumber( &pV, &dwCertInfo, &fNoCert ) ) {
// no certificate available
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
// Buffer size (cert bytes * 2 + # of '-' + NULL)
cch = dwCertInfo * 3;
if ( (pchBuffer == NULL) || (*lpcchBuffer < cch) )
{
SetLastError( ERROR_INSUFFICIENT_BUFFER);
fReturn = FALSE;
}
else
{
// Serial number is in reverse byte order
i = 0;
for( INT iSerialByte = dwCertInfo - 1; iSerialByte >= 0; --iSerialByte )
{
pchBuffer[i++] = g_szHexDigits[ *(pV + iSerialByte) >> 4 ];
pchBuffer[i++] = g_szHexDigits[ *(pV + iSerialByte) & 0xf ];
pchBuffer[i++] = '-';
}
DBG_ASSERT(i == cch);
pchBuffer[ cch - 1 ] = 0;
fReturn = TRUE;
}
*lpcchBuffer = cch;
}
} else if ( IsStringMatch( "COOKIE", pszValName, cchValName )) {
LPSTR pV;
DWORD cch; // Buffer bytes
if ( !tcpauth.QueryCertificateIssuer( achCertName, sizeof(achCertName), &fNoCert ) ) {
// no certificate available
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
IISMD5Init( &md5 );
IISMD5Update( &md5, (LPBYTE)achCertName, strlen(achCertName) );
if ( !tcpauth.QueryCertificateSerialNumber( (LPBYTE*)&pV, &dwCertInfo, &fNoCert )) {
// assumes that the above call set the error code
DBG_ASSERT( fReturn == FALSE);
} else {
// Buffer size
cch = (sizeof(md5.digest) * 2) + 1;
if ((pchBuffer == NULL) || (*lpcchBuffer < cch) )
{
SetLastError( ERROR_INSUFFICIENT_BUFFER);
fReturn = FALSE;
}
else
{
IISMD5Update( &md5, (LPBYTE)pV, dwCertInfo );
IISMD5Final( &md5 );
for ( i = 0 ; i < sizeof(md5.digest) ; ++i ) {
wsprintf( pchBuffer + i * 2, "%02x", md5.digest[i] );
}
fReturn = TRUE;
}
*lpcchBuffer = cch;
}
}
} else if ( IsStringMatch( "KEYSIZE", pszValName, cchValName)) {
DWORD dwVal;
CHAR rgVal[40];
if ( !tcpauth.QueryEncryptionKeySize( &dwVal, &fNoCert ) ) {
rgVal[0] = '\0';
} else {
_ultoa( dwVal, rgVal, 10);
}
fReturn = CopyStringToBuffer( rgVal, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "SECRETKEYSIZE", pszValName, cchValName )) {
DWORD dwVal;
CHAR rgVal[40];
if ( !tcpauth.QueryEncryptionServerPrivateKeySize( &dwVal, &fNoCert ) ) {
rgVal[0] = '\0';
} else {
_ultoa( dwVal, rgVal, 10);
}
fReturn = CopyStringToBuffer( rgVal, pchBuffer, lpcchBuffer);
} else if ( IsStringMatch( "SERVER_SUBJECT", pszValName, cchValName )) {
LPSTR pV;
if ( !tcpauth.QueryServerCertificateSubject( &pV, &fNoCert ) ) {
// no certificate available
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
fReturn = CopyStringToBuffer( pV, pchBuffer, lpcchBuffer);
}
} else if ( IsStringMatch( "SERVER_ISSUER", pszValName, cchValName )) {
LPSTR pV;
if ( !tcpauth.QueryServerCertificateIssuer( &pV, &fNoCert ) ) {
// no certificate available
fReturn = fNoCert ? ReturnNullString( pchBuffer, lpcchBuffer ) : FALSE;
} else {
fReturn = CopyStringToBuffer( pV, pchBuffer, lpcchBuffer);
}
} else {
SetLastError( ERROR_INVALID_INDEX);
DBG_ASSERT( fReturn == FALSE);
}
return ( fReturn);
} // GetInfoFromCertificate()
# define PSZ_HTTP_PREFIX "HTTP_"
# define LEN_PSZ_HTTP_PREFIX (sizeof(PSZ_HTTP_PREFIX) - 1)
BOOL
BuildCGIHeaderList(
HTTP_HEADERS * pHeaderList,
CHAR * pchBuffer,
DWORD * lpcchBuffer
)
/*++
Routine Description:
Builds a list of all client passed headers in the form of
//
// Builds a list of all client HTTP headers in the form of:
//
// HTTP_<up-case header>: <field>\n
// HTTP_<up-case header>: <field>\n
// ...
//
Arguments:
pstr - Receives full list
pHeaderList - List of headers
--*/
{
CHAR * pchStart = pchBuffer;
DWORD cchReq = 0;
BOOL fReturn = TRUE;
HH_ITERATOR hhi;
NAME_VALUE_PAIR * pnp = NULL;
pHeaderList->InitIterator( &hhi);
while ( pHeaderList->NextPair( &hhi, &pnp)) {
//
// Ignore "method", "url" and "version"
//
if ( pnp->pchName[pnp->cchName - 1] != ':' ) {
continue;
}
//
// add HTTP_ as prefix to the headers
// convert all "-" to "_"
// convert header names to UpperCase
//
//+1 for terminating '\n'
cchReq += (pnp->cchName + pnp->cchValue + 1 + LEN_PSZ_HTTP_PREFIX);
if ( pchStart != NULL && cchReq < *lpcchBuffer) {
DWORD i;
CopyMemory( pchBuffer, PSZ_HTTP_PREFIX, LEN_PSZ_HTTP_PREFIX);
pchBuffer += LEN_PSZ_HTTP_PREFIX;
//
// Convert the destination to upper and replace all '-' with '_'
// Also convert lower-case header names to upper-case
//
for ( i = 0; i < pnp->cchName; i++) {
pchBuffer[i] = (( pnp->pchName[i] == '-') ? '_' :
toupper( pnp->pchName[i])
);
} // for
pchBuffer += i;
CopyMemory( (LPVOID) pchBuffer, pnp->pchValue, pnp->cchValue);
pchBuffer += pnp->cchValue;
*pchBuffer++ = '\n'; // store a \n
} else {
fReturn = FALSE;
}
} // while
// Store the size depending upon if buffer was sufficient or not
if ( fReturn && (pchStart != NULL)) {
DBG_ASSERT( pchBuffer >= pchStart);
*pchBuffer++ = '\0'; // +1 for '\0'
*lpcchBuffer = DIFF(pchBuffer - pchStart);
} else {
fReturn = FALSE;
*lpcchBuffer = cchReq + sizeof(CHAR);
SetLastError( ERROR_INSUFFICIENT_BUFFER);
}
return ( fReturn);
} // BuildCGIHeaderList()
BOOL
HseBuildRawHeaders( IN HTTP_HEADERS * pHeaderList,
OUT LPSTR pchBuffer,
IN OUT LPDWORD lpcchBuffer
)
/*++
Routine Description:
Builds a list of all raw client passed headers in the form of
<header>:<blank><field>\n
<header>:<blank><field>\n
Arguments:
pHeaderList - List of headers
pchBuffer - pointer to buffer which will contain generated headers
lpcchBuffer - pointer to DWORD containing size of buffer
It will contain the size of written data on return.
Returns:
TRUE on success and FALSE if failure.
Error code is set to ERROR_INSUFFICIENT_BUFFER
if there is not enough buffer.
--*/
{
CHAR * pchStart = pchBuffer;
DWORD cchReq = 0;
BOOL fReturn = TRUE;
HH_ITERATOR hhi;
NAME_VALUE_PAIR * pnp = NULL;
pHeaderList->InitIterator( &hhi);
while ( pHeaderList->NextPair( &hhi, &pnp)) {
//
// Ignore "method", "url" and "version"
//
if ( pnp->pchName[pnp->cchName - 1] != ':' ) {
continue;
}
//
// leave the headers in native form i.e. no conversion of '-' to '_'
//
cchReq += (pnp->cchName + pnp->cchValue + 3); //+3 for blank & \r\n
if ( pchStart != NULL && cchReq < *lpcchBuffer) {
CopyMemory( (LPVOID) pchBuffer, pnp->pchName,
pnp->cchName * sizeof(CHAR));
pchBuffer += pnp->cchName;
*pchBuffer++ = ' '; // store a blank
memmove( (LPVOID) pchBuffer, pnp->pchValue, pnp->cchValue);
pchBuffer += pnp->cchValue;
*pchBuffer++ = '\r'; // store a \r
*pchBuffer++ = '\n'; // store a \n
} else {
fReturn = FALSE;
}
} // while
// Store the size depending upon if buffer was sufficient or not
if ( fReturn && (pchStart != NULL)) {
DBG_ASSERT( pchBuffer >= pchStart);
*pchBuffer++ = '\0'; // +1 for '\0'
*lpcchBuffer = DIFF(pchBuffer - pchStart);
} else {
fReturn = FALSE;
*lpcchBuffer = cchReq + sizeof(CHAR);
SetLastError( ERROR_INSUFFICIENT_BUFFER);
}
return (fReturn);
} // HseBuildRawHeaders()
/************************ End of File ***********************/