mirror of
https://github.com/apache/httpd.git
synced 2025-08-08 15:02:10 +03:00
yacc. Also change the make file magic so that the real source file name is embedded in the debug info. The generated files have been created with flex 2.5.35/bison 2.4.1. The two 'no previous prototype' warnings are supposed to be fixed with the next flex version. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1002824 13f79535-47bb-0310-9956-ffa450edef68
291 lines
9.7 KiB
C
291 lines
9.7 KiB
C
/* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership.
|
|
* The ASF licenses this file to You under the Apache License, Version 2.0
|
|
* (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
/* _ _
|
|
* _ __ ___ ___ __| | ___ ___| | mod_ssl
|
|
* | '_ ` _ \ / _ \ / _` | / __/ __| | Apache Interface to OpenSSL
|
|
* | | | | | | (_) | (_| | \__ \__ \ |
|
|
* |_| |_| |_|\___/ \__,_|___|___/___/_|
|
|
* |_____|
|
|
* ssl_expr_eval.c
|
|
* Expression Evaluation
|
|
*/
|
|
/* ``Make love,
|
|
not software!''
|
|
-- Unknown */
|
|
#include "ssl_private.h"
|
|
|
|
/* _________________________________________________________________
|
|
**
|
|
** Expression Evaluation
|
|
** _________________________________________________________________
|
|
*/
|
|
|
|
static BOOL ssl_expr_eval_comp(request_rec *, ssl_expr *, const char **err);
|
|
static char *ssl_expr_eval_word(request_rec *, ssl_expr *, const char **err);
|
|
static BOOL ssl_expr_eval_oid(request_rec *r, const char *word,
|
|
const char *oidstr, const char **err);
|
|
static char *ssl_expr_eval_func_file(request_rec *, char *, const char **err);
|
|
static int ssl_expr_eval_strcmplex(char *, char *, const char **err);
|
|
|
|
BOOL ssl_expr_eval(request_rec *r, ssl_expr *node, const char **err)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_True: {
|
|
return TRUE;
|
|
}
|
|
case op_False: {
|
|
return FALSE;
|
|
}
|
|
case op_Not: {
|
|
ssl_expr *e = (ssl_expr *)node->node_arg1;
|
|
return (!ssl_expr_eval(r, e, err));
|
|
}
|
|
case op_Or: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval(r, e1, err) || ssl_expr_eval(r, e2, err));
|
|
}
|
|
case op_And: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval(r, e1, err) && ssl_expr_eval(r, e2, err));
|
|
}
|
|
case op_Comp: {
|
|
ssl_expr *e = (ssl_expr *)node->node_arg1;
|
|
return ssl_expr_eval_comp(r, e, err);
|
|
}
|
|
default: {
|
|
*err = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static BOOL ssl_expr_eval_comp(request_rec *r, ssl_expr *node, const char **err)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_EQ: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (strcmp(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err)) == 0);
|
|
}
|
|
case op_NE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (strcmp(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err)) != 0);
|
|
}
|
|
case op_LT: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err), err) < 0);
|
|
}
|
|
case op_LE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err), err) <= 0);
|
|
}
|
|
case op_GT: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err), err) > 0);
|
|
}
|
|
case op_GE: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
return (ssl_expr_eval_strcmplex(ssl_expr_eval_word(r, e1, err), ssl_expr_eval_word(r, e2, err), err) >= 0);
|
|
}
|
|
case op_IN: {
|
|
ssl_expr *e1 = (ssl_expr *)node->node_arg1;
|
|
ssl_expr *e2 = (ssl_expr *)node->node_arg2;
|
|
ssl_expr *e3;
|
|
char *w1 = ssl_expr_eval_word(r, e1, err);
|
|
BOOL found = FALSE;
|
|
do {
|
|
ssl_expr_node_op op = e2->node_op;
|
|
e3 = (ssl_expr *)e2->node_arg1;
|
|
e2 = (ssl_expr *)e2->node_arg2;
|
|
|
|
if (op == op_PeerExtElement) {
|
|
char *w3 = ssl_expr_eval_word(r, e3, err);
|
|
|
|
found = ssl_expr_eval_oid(r, w1, w3, err);
|
|
|
|
/* There will be no more nodes on the list, so the result is authoritative */
|
|
break;
|
|
}
|
|
|
|
if (strcmp(w1, ssl_expr_eval_word(r, e3, err)) == 0) {
|
|
found = TRUE;
|
|
break;
|
|
}
|
|
} while (e2 != NULL);
|
|
return found;
|
|
}
|
|
case op_REG: {
|
|
ssl_expr *e1;
|
|
ssl_expr *e2;
|
|
char *word;
|
|
ap_regex_t *regex;
|
|
|
|
e1 = (ssl_expr *)node->node_arg1;
|
|
e2 = (ssl_expr *)node->node_arg2;
|
|
word = ssl_expr_eval_word(r, e1, err);
|
|
regex = (ap_regex_t *)(e2->node_arg1);
|
|
return (ap_regexec(regex, word, 0, NULL, 0) == 0);
|
|
}
|
|
case op_NRE: {
|
|
ssl_expr *e1;
|
|
ssl_expr *e2;
|
|
char *word;
|
|
ap_regex_t *regex;
|
|
|
|
e1 = (ssl_expr *)node->node_arg1;
|
|
e2 = (ssl_expr *)node->node_arg2;
|
|
word = ssl_expr_eval_word(r, e1, err);
|
|
regex = (ap_regex_t *)(e2->node_arg1);
|
|
return !(ap_regexec(regex, word, 0, NULL, 0) == 0);
|
|
}
|
|
default: {
|
|
*err = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static char *ssl_expr_eval_word(request_rec *r, ssl_expr *node, const char **err)
|
|
{
|
|
switch (node->node_op) {
|
|
case op_Digit: {
|
|
char *string = (char *)node->node_arg1;
|
|
return string;
|
|
}
|
|
case op_String: {
|
|
char *string = (char *)node->node_arg1;
|
|
return string;
|
|
}
|
|
case op_Var: {
|
|
char *var = (char *)node->node_arg1;
|
|
char *val = ssl_var_lookup(r->pool, r->server, r->connection, r, var);
|
|
return (val == NULL ? "" : val);
|
|
}
|
|
case op_Func: {
|
|
char *name = (char *)node->node_arg1;
|
|
ssl_expr *args = (ssl_expr *)node->node_arg2;
|
|
if (strEQ(name, "file"))
|
|
return ssl_expr_eval_func_file(r, (char *)(args->node_arg1), err);
|
|
else {
|
|
*err = "Internal evaluation error: Unknown function name";
|
|
return "";
|
|
}
|
|
}
|
|
default: {
|
|
*err = "Internal evaluation error: Unknown expression node";
|
|
return FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
static BOOL ssl_expr_eval_oid(request_rec *r, const char *word,
|
|
const char *oidstr, const char **err)
|
|
{
|
|
int j;
|
|
BOOL result = FALSE;
|
|
apr_array_header_t *oid_array;
|
|
char **oid_value;
|
|
|
|
if (NULL == (oid_array = ssl_ext_list(r->pool, r->connection, 1, oidstr))) {
|
|
return FALSE;
|
|
}
|
|
|
|
oid_value = (char **) oid_array->elts;
|
|
for (j = 0; j < oid_array->nelts; j++) {
|
|
if (strcmp(word, oid_value[j]) == 0) {
|
|
result = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
return result;
|
|
}
|
|
|
|
|
|
static char *ssl_expr_eval_func_file(request_rec *r, char *filename, const char **err)
|
|
{
|
|
apr_file_t *fp;
|
|
char *buf;
|
|
apr_off_t offset;
|
|
apr_size_t len;
|
|
apr_finfo_t finfo;
|
|
|
|
if (apr_file_open(&fp, filename, APR_READ|APR_BUFFERED,
|
|
APR_OS_DEFAULT, r->pool) != APR_SUCCESS) {
|
|
*err = "Cannot open file";
|
|
return "";
|
|
}
|
|
apr_file_info_get(&finfo, APR_FINFO_SIZE, fp);
|
|
if ((finfo.size + 1) != ((apr_size_t)finfo.size + 1)) {
|
|
*err = "Huge file cannot be read";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
len = (apr_size_t)finfo.size;
|
|
if (len == 0) {
|
|
buf = (char *)apr_palloc(r->pool, sizeof(char) * 1);
|
|
*buf = NUL;
|
|
}
|
|
else {
|
|
if ((buf = (char *)apr_palloc(r->pool, sizeof(char)*(len+1))) == NULL) {
|
|
*err = "Cannot allocate memory";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
offset = 0;
|
|
apr_file_seek(fp, APR_SET, &offset);
|
|
if (apr_file_read(fp, buf, &len) != APR_SUCCESS) {
|
|
*err = "Cannot read from file";
|
|
apr_file_close(fp);
|
|
return "";
|
|
}
|
|
buf[len] = NUL;
|
|
}
|
|
apr_file_close(fp);
|
|
return buf;
|
|
}
|
|
|
|
/* a variant of strcmp(3) which works correctly also for number strings */
|
|
static int ssl_expr_eval_strcmplex(char *cpNum1, char *cpNum2, const char **err)
|
|
{
|
|
int i, n1, n2;
|
|
|
|
if (cpNum1 == NULL)
|
|
return -1;
|
|
if (cpNum2 == NULL)
|
|
return +1;
|
|
n1 = strlen(cpNum1);
|
|
n2 = strlen(cpNum2);
|
|
if (n1 > n2)
|
|
return 1;
|
|
if (n1 < n2)
|
|
return -1;
|
|
for (i = 0; i < n1; i++) {
|
|
if (cpNum1[i] > cpNum2[i])
|
|
return 1;
|
|
if (cpNum1[i] < cpNum2[i])
|
|
return -1;
|
|
}
|
|
return 0;
|
|
}
|