windows-nt/Source/XPSP1/NT/net/upnp/host/upnphost/udhhttp/response.cpp
2020-09-26 16:20:57 +08:00

464 lines
15 KiB
C++

/*--
Copyright (c) 1995-1998 Microsoft Corporation
Module Name: CONNECT.CPP
Author: Arul Menezes
Abstract: All the constant data used by the HTTP daemon
--*/
#include "pch.h"
#pragma hdrstop
#include "httpd.h"
const char* rgWkday[] = { "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat", 0};
const char* rgMonth[] = { "", "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct", "Nov", "Dec", 0};
const char cszServerID[] = "UPnP/1.0";
const char cszProductID[] = "UPnP Device Host/1.0";
// const char cszRespStatus[] = "HTTP/1.0 %d %s\r\n";
const char cszRespStatus[] = "HTTP/1.0 ";
// const char cszRespServer[] = "Server: %s\r\n";
const char cszRespServer2[] = "Server: ";
// const char cszRespType[] = "Content-Type: %s\r\n";
const char cszRespType2[] = "Content-Type: ";
// const char cszRespLength[] = "Content-Length: %d\r\n";
const char cszRespLength2[] = "Content-Length: ";
// const char cszRespWWWAuthBasic[] = "WWW-Authenticate: Basic\r\n";
const char cszRespWWWAuthBasic2[] = "WWW-Authenticate: Basic";
const char cszRespWWWAuthNTLM[] = "WWW-Authenticate: NTLM";
// const char cszDateFmt[] = "%3s, %02d %3s %04d %02d:%02d:%02d GMT\r\n";
const char cszRespDate[] = "Date: ";
// const char cszRespLocation[]="Location: %s\r\n";
const char cszRespLocation2[]="Location: ";
// const char cszConnection[] = "Connection: %s\r\n";
const char cszConnection2[] = "Connection: ";
const char cszKeepAlive[] = "keep-alive";
const char cszClose[] = "close";
const char cszCRLF[] = "\r\n";
const char cszRespLastMod[] = "Last-Modified: ";
#define APPENDCRLF(psz) { *psz++ = '\r'; *psz++ = '\n'; }
// The order of items in this table must match that in enum RESPONSESTATUS
// This is not international safe! In new version, we fill the table on
// httpd initialization with string from the rc file.
/*
STATUSINFO rgStatus[STATUS_MAX] = {
{ 200, "OK", NULL },
{ 302, "Object Moved", "<head><title>Object Moved</title></head><body><h1>Object Moved</h1>This object has moved to "},
{ 304, "Not Modified", NULL }, // body not allowed for 304
{ 400, "Bad Request", "The request was not understood" },
{ 401, "Unauthorized", "Access denied" },
{ 403, "Forbidden", "Access denied" },
{ 404, "Object Not Found", "The requested URL was not found" },
{ 500, "Internal Server Error", "The server encountered an error" },
{ 501, "Not Implemented", "This method is not implemented" },
};
*/
STATUSINFO rgStatus[STATUS_MAX] = {
{ 200, "OK", NULL}, // no body!
{ 301, "Object Moved", NULL},
{ 304, "Not Modified", NULL}, // body not allowed for 304
{ 400, "Bad Request", NULL},
{ 401, "Unauthorized", NULL},
{ 403, "Forbidden", NULL},
{ 404, "Object Not Found", NULL},
{ 500, "Internal Server Error", NULL},
{ 501, "Not Implemented", NULL},
{ 505, "HTTP Version Not Supported", NULL},
};
#define LCID_USA MAKELANGID(LAND_ENGLISH, SUBLANG_ENGLISH_US);
int SendData(SOCKET sock, const char FAR *pszBuffData, int cbBuffLen, int flags)
{
// assumption - sock is a blocking one
char FAR *pszTempBuff ;
int nBytesSent = 0;
int retVal = cbBuffLen ;
pszTempBuff = (char FAR*)pszBuffData ;
while ( cbBuffLen > 0 )
{
if((nBytesSent = send(sock, pszTempBuff, cbBuffLen, flags)) == SOCKET_ERROR)
{
retVal = SOCKET_ERROR;
TraceTag(ttidWebServer, "Send RESPONSE Data failed! - %d",WSAGetLastError());
break;
}
if( nBytesSent <= 0 )
{ // XXX it may be that nBytesSent is zero. There is no simple solution other than
// doing a select until the socket becomes writeable. For now, we want to make
// sure that we make progress in the loop and ensure termination, so we will
// just break out if this happens.
retVal = SOCKET_ERROR;
TraceTag(ttidWebServer, "Send RESPONSE Data failed! zero bytes sent - %d",WSAGetLastError());
break;
}
cbBuffLen -= nBytesSent;
pszTempBuff += nBytesSent;
}
return retVal;
}
void CHttpResponse::SendHeaders(PCSTR pszExtraHeaders, PCSTR pszNewRespStatus)
{
DEBUG_CODE_INIT;
CHAR szBuf[HEADERBUFSIZE];
PSTR pszBuf = szBuf;
PSTR pszTrav;
int iLen;
DWORD cbNeeded ;
PSTR pszFilterHeaders = NULL;
if ( g_pVars->m_fFilters &&
! m_pRequest->CallFilter(SF_NOTIFY_SEND_RESPONSE))
myleave(97);
// For HTTP 0.9, we don't send headers back.
if (m_pRequest->m_dwVersion <= MAKELONG(9, 0))
myleave(0);
// We do calculation up front to see if we need a allocate a buffer or not.
// Certain may be set by an ISAPI Extension, Filter, or ASP
// and we must do the check to make sure their sum plus http headers server
// uses will be less than buffer we created.
cbNeeded = m_pRequest->m_bufRespHeaders.Count() +
MyStrlenA(pszExtraHeaders) +
MyStrlenA(pszNewRespStatus) +
MyStrlenA(m_pszRedirect) +
MyStrlenA(m_pRequest->m_pszNTLMOutBuf) +
((m_pRequest->m_pFInfo && m_rs == STATUS_UNAUTHORIZED) ?
MyStrlenA(m_pRequest->m_pFInfo->m_pszDenyHeader) : 0);
// If what we need for extra + 1000 bytes (for the regular Http headers) is
// > our buf, allocate a new one
if (cbNeeded + 1000 > HEADERBUFSIZE)
{
if (!(pszBuf = MyRgAllocNZ(CHAR,cbNeeded+1000)))
myleave(98);
}
pszTrav = pszBuf;
// if (pszNewRespStatus)
// iLen = sprintf(szBuf,"HTTP/1.0 %s\r\n",pszNewRespStatus);
// else
// iLen = sprintf(szBuf, cszRespStatus, rgStatus[m_rs].dwStatusNumber, rgStatus[m_rs].pszStatusText);
// the status line
// ServerSupportFunction on SEND_RESPONSE_HEADER can override the server value
pszTrav = strcpyEx(pszTrav,cszRespStatus);
if (pszNewRespStatus)
{
pszTrav = strcpyEx(pszTrav,pszNewRespStatus);
}
else // copy the number and value over
{
_itoa(rgStatus[m_rs].dwStatusNumber,pszTrav,10);
pszTrav = strchr(pszTrav,'\0');
*pszTrav++ = ' ';
pszTrav = strcpyEx(pszTrav,rgStatus[m_rs].pszStatusText);
}
APPENDCRLF(pszTrav);
// GENERAL HEADERS
// the Date line
SYSTEMTIME st;
GetSystemTime(&st); // NOTE: Must be GMT!
// iLen += sprintf(szBuf+iLen, cszDateFmt, rgWkday[st.wDayOfWeek], st.wDay, rgMonth[st.wMonth], st.wYear, st.wHour, st.wMinute, st.wSecond);
pszTrav = strcpyEx(pszTrav, cszRespDate);
pszTrav = WriteHTTPDate(pszTrav,&st,TRUE);
// APPENDCRLF(pszTrav);
// Connection: header
if (m_connhdr != CONN_NONE)
{
// iLen += sprintf(szBuf+iLen, cszConnection, (m_connhdr==CONN_KEEP ? cszKeepAlive : cszClose));
pszTrav = strcpyEx(pszTrav,cszConnection2);
pszTrav = strcpyEx(pszTrav,(m_connhdr==CONN_KEEP ? cszKeepAlive : cszClose));
APPENDCRLF(pszTrav);
}
// RESPONSE HEADERS
// the server line
// iLen += sprintf(szBuf+iLen, cszRespServer, cszServerID);
pszTrav = strcpyEx(pszTrav,cszRespServer2);
pszTrav = strcpyEx(pszTrav,g_pVars->m_pszServerID);
APPENDCRLF(pszTrav);
// the Location header (for redirects)
if (m_pszRedirect)
{
DEBUGCHK(m_rs == STATUS_MOVED);
// iLen += sprintf(szBuf+iLen, cszRespLocation, m_pszRedirect);
pszTrav = strcpyEx(pszTrav,cszRespLocation2);
pszTrav = strcpyEx(pszTrav,m_pszRedirect);
APPENDCRLF(pszTrav);
}
// the WWW-Authenticate line
if (m_rs == STATUS_UNAUTHORIZED)
{
// In the middle of an NTLM authentication session
if (g_pVars->m_fNTLMAuth && m_pRequest->m_pszNTLMOutBuf)
{
// iLen += sprintf(szBuf+iLen,"%s %s\r\n",cszRespWWWAuthNTLM,m_pRequest->m_pszNTLMOutBuf);
pszTrav = strcpyEx(pszTrav,cszRespWWWAuthNTLM);
*pszTrav++ = ' ';
pszTrav = strcpyEx(pszTrav,m_pRequest->m_pszNTLMOutBuf);
APPENDCRLF(pszTrav);
}
// If both schemes are enabled, send both back to client and let the browser decide which to use
else if (g_pVars->m_fBasicAuth && g_pVars->m_fNTLMAuth)
{
// iLen += sprintf(szBuf+iLen,"%s\r\n%s",cszRespWWWAuthNTLM,cszRespWWWAuthBasic);
pszTrav = strcpyEx(pszTrav,cszRespWWWAuthNTLM);
APPENDCRLF(pszTrav);
pszTrav = strcpyEx(pszTrav,cszRespWWWAuthBasic2);
APPENDCRLF(pszTrav);
}
else if (g_pVars->m_fBasicAuth)
{
// iLen += sprintf(szBuf+iLen, cszRespWWWAuthBasic);
pszTrav = strcpyEx(pszTrav,cszRespWWWAuthBasic2);
APPENDCRLF(pszTrav);
}
else if (g_pVars->m_fNTLMAuth)
{
// iLen += sprintf(szBuf+iLen,"%s\r\n",cszRespWWWAuthNTLM);
pszTrav = strcpyEx(pszTrav,cszRespWWWAuthNTLM);
APPENDCRLF(pszTrav);
}
}
// ENTITY HEADERS
// the Last-Modified line
if (m_hFile)
{
FILETIME ft;
SYSTEMTIME st;
if ( GetFileTime(m_hFile, NULL, NULL, &ft) && // gets filetime in GMT
FileTimeToSystemTime(&ft, &st) ) // converts GMT filetime to GMT systemtime
{
// iLen += sprintf(szBuf+iLen, cszDateFmt, rgWkday[st.wDayOfWeek], st.wDay, rgMonth[st.wMonth], st.wYear, st.wHour, st.wMinute, st.wSecond);
pszTrav = strcpyEx(pszTrav, cszRespLastMod);
pszTrav = WriteHTTPDate(pszTrav,&st,TRUE);
}
}
// the Content-Type line
if (m_pszType)
{
// iLen += sprintf(szBuf+iLen, cszRespType, m_pszType);
pszTrav = strcpyEx(pszTrav,cszRespType2);
pszTrav = strcpyEx(pszTrav,m_pszType);
APPENDCRLF(pszTrav);
}
// the Content-Length line
if (m_dwLength)
{
// If we have a file that is 0 length, it is set to -1.
if (m_dwLength == -1)
m_dwLength = 0;
// iLen += sprintf(szBuf+iLen, cszRespLength, m_dwLength);
pszTrav = strcpyEx(pszTrav,cszRespLength2);
_itoa(m_dwLength,pszTrav,10);
pszTrav = strchr(pszTrav,'\0');
APPENDCRLF(pszTrav);
}
if ((m_rs == STATUS_UNAUTHORIZED) && m_pRequest->m_pFInfo && m_pRequest->m_pFInfo->m_pszDenyHeader)
{
pszTrav = strcpyEx(pszTrav,m_pRequest->m_pFInfo->m_pszDenyHeader);
// It's the script's responsibility to add any \r\n to the headers.
}
if (m_pRequest->m_bufRespHeaders.Data())
{
memcpy(pszTrav,m_pRequest->m_bufRespHeaders.Data(),m_pRequest->m_bufRespHeaders.Count());
pszTrav += m_pRequest->m_bufRespHeaders.Count();
}
// APPENDCRLF(pszTrav);
if (pszExtraHeaders)
{
pszTrav = strcpyEx(pszTrav,pszExtraHeaders);
// It's the script's responsibility to add any \r\n to the headers.
}
else
{
APPENDCRLF(pszTrav); // the double CRLF signifies that header data is at an end
}
*pszTrav = 0;
pszFilterHeaders = pszBuf; // pointer may be modified, don't loose original pszBuf ptr
iLen = (int)((INT_PTR)(pszTrav - pszBuf));
if (g_pVars->m_fFilters &&
! m_pRequest->CallFilter(SF_NOTIFY_SEND_RAW_DATA, &pszFilterHeaders, &iLen))
myleave(99);
iLen = SendData(m_socket,pszFilterHeaders,iLen,0);
done:
TraceTag(ttidWebServer, "Sending RESPONSE HEADER<<%s>>", pszFilterHeaders);
if (pszBuf != szBuf)
MyFree(pszBuf);
}
void CHttpResponse::SendBody(void)
{
if (TOK_HEAD == m_pRequest->m_idMethod)
return;
if (m_hFile)
SendFile(m_socket, m_hFile, m_pRequest);
else if (m_pszBody)
{
PSTR pszSendBuf = (PSTR) m_pszBody;
int cbSendBuf = m_dwLength;
if (g_pVars->m_fFilters &&
! m_pRequest->CallFilter(SF_NOTIFY_SEND_RAW_DATA, &pszSendBuf, &cbSendBuf))
{
;
}
else
{ // send if there's no filters or if filter call succeeded
SendData(m_socket, pszSendBuf, cbSendBuf, 0);
}
TraceTag(ttidWebServer, "Sending RESPONSE BODY<<%s>> len=%d", pszSendBuf, cbSendBuf);
}
}
void SendFile(SOCKET sock, HANDLE hFile, CHttpRequest *pRequest)
{
BYTE bBuf[4096];
DWORD dwRead;
PBYTE pszSendBuf;
int cbSendBuf;
int nBytesSent = 0;
while (ReadFile(hFile, bBuf, sizeof(bBuf), &dwRead, 0) && dwRead)
{
pszSendBuf = bBuf;
cbSendBuf = dwRead;
if (g_pVars->m_fFilters &&
! pRequest->CallFilter(SF_NOTIFY_SEND_RAW_DATA, (PSTR*) &pszSendBuf, &cbSendBuf))
{
;
}
else
{ // send if there's no filters or if filter call succeeded
if((nBytesSent = SendData(sock, (PSTR) pszSendBuf, cbSendBuf, 0)) == SOCKET_ERROR)
{
TraceTag(ttidWebServer, "Send RESPONSE Data failed! - %d",WSAGetLastError());
break;
}
else
{
TraceTag(ttidWebServer, "Sending RESPONSE Data - Bytes to be sent = %d bytes sent = %d", dwRead, nBytesSent );
}
}
}
return;
}
// This function used to display the message "Object moved
void CHttpResponse::SendRedirect(PCSTR pszRedirect, BOOL fFromFilter)
{
if (!fFromFilter && m_pRequest->FilterNoResponse())
return;
DEBUGCHK(!m_hFile);
DEBUGCHK(m_rs==STATUS_MOVED);
// create a body
PSTR pszBody = MySzAllocA(strlen(rgStatus[m_rs].pszStatusBody)+2*strlen(pszRedirect)+30);
DWORD dwLen = 0;
if (pszBody)
{
// originally used this string set -- "Moved Permanently", "<head><title>Object Moved</title></head><body><h1>Object Moved</h1>This object has moved to <a HREF=\"%s\">%s</a></body>" },
// sprintf(pszBody, rgStatus[m_rs].pszStatusBody, pszRedirect, pszRedirect);
PSTR pszTrav = strcpyEx(pszBody,rgStatus[m_rs].pszStatusBody);
pszTrav = strcpyEx(pszTrav,"<a href=\"");
pszTrav = strcpyEx(pszTrav,pszRedirect);
pszTrav = strcpyEx(pszTrav,"\">");
pszTrav = strcpyEx(pszTrav,pszRedirect);
pszTrav = strcpyEx(pszTrav,"</a></body>");
SetBody(pszBody, cszTextHtml);
}
// set redirect header & send all headers, then the synthetic body
m_pszRedirect = pszRedirect;
SendHeaders(NULL,NULL);
SendBody();
MyFree(pszBody);
}
// Read strings of the bodies to send on web server errors ("Object not found",
// "Server Error",...) using load string. These strings are in wide character
// format, so we first convert them to regular strings, marching along
// pszBodyCodes (which is a buffer size BODYSTRINGSIZE). After the conversion,
// we set each rgStatus[i].pszStatusBody to the pointer in the buffer.
void InitializeResponseCodes(PSTR pszStatusBodyBuf)
{
PSTR pszTrav = pszStatusBodyBuf;
UINT i;
int iLen;
WCHAR wszBuf[256];
for (i = 0; i < ARRAYSIZEOF(rgStatus); i++)
{
// no bodies for these
if (i == STATUS_OK || i == STATUS_NOTMODIFIED)
continue;
LoadString(g_hInst,RESBASE_body + i,wszBuf,celems(wszBuf));
iLen = MyW2A(wszBuf, pszTrav, BODYSTRINGSIZE - (int)((INT_PTR)((pszTrav - pszStatusBodyBuf))));
if (!iLen)
return;
rgStatus[i].pszStatusBody = pszTrav;
pszTrav += iLen;
}
}