mirror of
https://github.com/apache/httpd.git
synced 2025-06-04 21:42:15 +03:00
to be included even when mod_ssl is not enabled. * Makefile.in (install-include): Only install mod_ssl.h. * modules/ssl/ssl_private.h: New file. * modules/ssl/mod_ssl.h: Move everything apart from than the optional hook definitions into ssl_private.h. * modules/ssl/*.c: Include ssl_private.h not mod_ssl.h * modules/ssl/config.m4: Always add the mod_ssl directory to the include path so other modules can find mod_ssl.h. * modules/proxy/mod_proxy.c: Include mod_ssl.h to pick up the optional hook definitions rather than copy'n'pasting them. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@102803 13f79535-47bb-0310-9956-ffa450edef68
254 lines
8.3 KiB
C
254 lines
8.3 KiB
C
/* Copyright 2001-2004 The Apache Software Foundation
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
/* _ _
|
|
* _ __ ___ ___ __| | ___ ___| | mod_ssl
|
|
* | '_ ` _ \ / _ \ / _` | / __/ __| | Apache Interface to OpenSSL
|
|
* | | | | | | (_) | (_| | \__ \__ \ |
|
|
* |_| |_| |_|\___/ \__,_|___|___/___/_|
|
|
* |_____|
|
|
* ssl_expr_eval.c
|
|
* Expression Evaluation
|
|
*/
|
|
/* ``Make love,
|
|
not software!''
|
|
-- Unknown */
|
|
#include "ssl_private.h"
|
|
|
|
/* _________________________________________________________________
|
|
**
|
|
** Expression Evaluation
|
|
** _________________________________________________________________
|
|
*/
|
|
|
|
static BOOL ssl_expr_eval_comp(request_rec *, ssl_expr *);
|
|
static char *ssl_expr_eval_word(request_rec *, ssl_expr *);
|
|
static char *ssl_expr_eval_func_file(request_rec *, char *);
|
|
static int ssl_expr_eval_strcmplex(char *, char *);
|
|
|
|
BOOL ssl_expr_eval(request_rec *r, ssl_expr *node)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_True: {
|
|
return TRUE;
|
|
}
|
|
case op_False: {
|
|
return FALSE;
|
|
}
|
|
case op_Not: {
|
|
ssl_expr *e = (ssl_expr *)node->node_arg1;
|
|
return (!ssl_expr_eval(r, e));
|
|
}
|
|
case op_Or: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval(r, e1) || ssl_expr_eval(r, e2));
|
|
}
|
|
case op_And: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval(r, e1) && ssl_expr_eval(r, e2));
|
|
}
|
|
case op_Comp: {
|
|
ssl_expr *e = (ssl_expr *)node->node_arg1;
|
|
return ssl_expr_eval_comp(r, e);
|
|
}
|
|
default: {
|
|
ssl_expr_error = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static BOOL ssl_expr_eval_comp(request_rec *r, ssl_expr *node)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_EQ: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (strcmp(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) == 0);
|
|
}
|
|
case op_NE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (strcmp(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) != 0);
|
|
}
|
|
case op_LT: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) < 0);
|
|
}
|
|
case op_LE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) <= 0);
|
|
}
|
|
case op_GT: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) > 0);
|
|
}
|
|
case op_GE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1), ssl_expr_eval_word(r, e2)) >= 0);
|
|
}
|
|
case op_IN: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
ssl_expr *e3;
|
|
char *w1 = ssl_expr_eval_word(r, e1);
|
|
BOOL found = FALSE;
|
|
do {
|
|
e3 = (ssl_expr *)e2->node_arg1;
|
|
e2 = (ssl_expr *)e2->node_arg2;
|
|
if (strcmp(w1, ssl_expr_eval_word(r, e3)) == 0) {
|
|
found = TRUE;
|
|
break;
|
|
}
|
|
} while (e2 != NULL);
|
|
return found;
|
|
}
|
|
case op_REG: {
|
|
ssl_expr *e1;
|
|
ssl_expr *e2;
|
|
char *word;
|
|
regex_t *regex;
|
|
|
|
e1 = (ssl_expr *)node->node_arg1;
|
|
e2 = (ssl_expr *)node->node_arg2;
|
|
word = ssl_expr_eval_word(r, e1);
|
|
regex = (regex_t *)(e2->node_arg1);
|
|
return (ap_regexec(regex, word, 0, NULL, 0) == 0);
|
|
}
|
|
case op_NRE: {
|
|
ssl_expr *e1;
|
|
ssl_expr *e2;
|
|
char *word;
|
|
regex_t *regex;
|
|
|
|
e1 = (ssl_expr *)node->node_arg1;
|
|
e2 = (ssl_expr *)node->node_arg2;
|
|
word = ssl_expr_eval_word(r, e1);
|
|
regex = (regex_t *)(e2->node_arg1);
|
|
return !(ap_regexec(regex, word, 0, NULL, 0) == 0);
|
|
}
|
|
default: {
|
|
ssl_expr_error = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static char *ssl_expr_eval_word(request_rec *r, ssl_expr *node)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_Digit: {
|
|
char *string = (char *)node->node_arg1;
|
|
return string;
|
|
}
|
|
case op_String: {
|
|
char *string = (char *)node->node_arg1;
|
|
return string;
|
|
}
|
|
case op_Var: {
|
|
char *var = (char *)node->node_arg1;
|
|
char *val = ssl_var_lookup(r->pool, r->server, r->connection, r, var);
|
|
return (val == NULL ? "" : val);
|
|
}
|
|
case op_Func: {
|
|
char *name = (char *)node->node_arg1;
|
|
ssl_expr *args = (ssl_expr *)node->node_arg2;
|
|
if (strEQ(name, "file"))
|
|
return ssl_expr_eval_func_file(r, (char *)(args->node_arg1));
|
|
else {
|
|
ssl_expr_error = "Internal evaluation error: Unknown function name";
|
|
return "";
|
|
}
|
|
}
|
|
default: {
|
|
ssl_expr_error = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static char *ssl_expr_eval_func_file(request_rec *r, char *filename)
|
|
{
|
|
apr_file_t *fp;
|
|
char *buf;
|
|
apr_off_t offset;
|
|
apr_size_t len;
|
|
apr_finfo_t finfo;
|
|
|
|
if (apr_file_open(&fp, filename, APR_READ|APR_BUFFERED,
|
|
APR_OS_DEFAULT, r->pool) != APR_SUCCESS) {
|
|
ssl_expr_error = "Cannot open file";
|
|
return "";
|
|
}
|
|
apr_file_info_get(&finfo, APR_FINFO_SIZE, fp);
|
|
if ((finfo.size + 1) != ((apr_size_t)finfo.size + 1)) {
|
|
ssl_expr_error = "Huge file cannot be read";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
len = (apr_size_t)finfo.size;
|
|
if (len == 0) {
|
|
buf = (char *)apr_palloc(r->pool, sizeof(char) * 1);
|
|
*buf = NUL;
|
|
}
|
|
else {
|
|
if ((buf = (char *)apr_palloc(r->pool, sizeof(char)*(len+1))) == NULL) {
|
|
ssl_expr_error = "Cannot allocate memory";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
offset = 0;
|
|
apr_file_seek(fp, APR_SET, &offset);
|
|
if (apr_file_read(fp, buf, &len) != APR_SUCCESS) {
|
|
ssl_expr_error = "Cannot read from file";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
buf[len] = NUL;
|
|
}
|
|
apr_file_close(fp);
|
|
return buf;
|
|
}
|
|
|
|
/* a variant of strcmp(3) which works correctly also for number strings */
|
|
static int ssl_expr_eval_strcmplex(char *cpNum1, char *cpNum2)
|
|
{
|
|
int i, n1, n2;
|
|
|
|
if (cpNum1 == NULL)
|
|
return -1;
|
|
if (cpNum2 == NULL)
|
|
return +1;
|
|
n1 = strlen(cpNum1);
|
|
n2 = strlen(cpNum2);
|
|
if (n1 > n2)
|
|
return 1;
|
|
if (n1 < n2)
|
|
return -1;
|
|
for (i = 0; i < n1; i++) {
|
|
if (cpNum1[i] > cpNum2[i])
|
|
return 1;
|
|
if (cpNum1[i] < cpNum2[i])
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|