static int func_http_repl_send_start(clientHttpRequest *http) { assert(http); if (0 == http->request->flags.redirected) return -1; HttpHeader *hdr = &http->reply->header; HttpHeaderEntry e; stringInit(&e.name,"Content-Disposition"); stringInit(&e.value,"attachment; filename=\""); char *filename = strrchr(http->uri, '/'); if (NULL == filename) return -1; filename++; stringAppend(&e.value, filename, strlen(filename)); stringAppend(&e.value, "\"", 1); e.id = HDR_CONTENT_DISPOSITION; httpHeaderDelById(hdr, e.id); httpHeaderAddEntry(hdr, httpHeaderEntryClone(&e)); stringClean(&e.name); stringClean(&e.value); return 0; }
/* use fresh entries to replace old ones */ void httpHeaderUpdate(HttpHeader * old, const HttpHeader * fresh, const HttpHeaderMask * denied_mask) { const HttpHeaderEntry *e; HttpHeaderPos pos = HttpHeaderInitPos; assert(old && fresh); assert(old != fresh); debug(55, 7) ("updating hdr: %p <- %p\n", old, fresh); while ((e = httpHeaderGetEntry(fresh, &pos))) { /* deny bad guys (ok to check for HDR_OTHER) here */ if (denied_mask && CBIT_TEST(*denied_mask, e->id)) continue; if (e->id != HDR_OTHER) httpHeaderDelById(old, e->id); else httpHeaderDelByName(old, strBuf(e->name)); } pos = HttpHeaderInitPos; while ((e = httpHeaderGetEntry(fresh, &pos))) { /* deny bad guys (ok to check for HDR_OTHER) here */ if (denied_mask && CBIT_TEST(*denied_mask, e->id)) continue; httpHeaderAddClone(old, e); } /* And now, repack the array to "fill in the holes" */ httpHeaderRepack(old); }
void httpHeaderPutRange(HttpHeader * hdr, const HttpHdrRange * range) { MemBuf mb; Packer p; assert(hdr && range); /* remove old directives if any */ httpHeaderDelById(hdr, HDR_RANGE); /* pack into mb */ memBufDefInit(&mb); packerToMemInit(&p, &mb); httpHdrRangePackInto(range, &p); /* put */ httpHeaderAddEntry(hdr, httpHeaderEntryCreate(HDR_RANGE, NULL, mb.buf)); /* cleanup */ packerClean(&p); memBufClean(&mb); }
void httpHeaderPutCc(HttpHeader * hdr, const HttpHdrCc * cc) { MemBuf mb; Packer p; assert(hdr && cc); /* remove old directives if any */ httpHeaderDelById(hdr, HDR_CACHE_CONTROL); /* pack into mb */ memBufDefInit(&mb); packerToMemInit(&p, &mb); httpHdrCcPackInto(cc, &p); /* put */ httpHeaderAddEntry(hdr, httpHeaderEntryCreate(HDR_CACHE_CONTROL, NULL, mb.buf)); /* cleanup */ packerClean(&p); memBufClean(&mb); }
int httpHeaderParse(HttpHeader * hdr, const char *header_start, const char *header_end) { const char *field_ptr = header_start; HttpHeaderEntry *e; assert(hdr); assert(header_start && header_end); debug(55, 7) ("parsing hdr: (%p)\n%s\n", hdr, getStringPrefix(header_start, header_end)); HttpHeaderStats[hdr->owner].parsedCount++; if (memchr(header_start, '\0', header_end - header_start)) { debug(55, 1) ("WARNING: HTTP header contains NULL characters {%s}\n", getStringPrefix(header_start, header_end)); return httpHeaderReset(hdr); } /* common format headers are "<name>:[ws]<value>" lines delimited by <CRLF>. * continuation lines start with a (single) space or tab */ while (field_ptr < header_end) { const char *field_start = field_ptr; const char *field_end; do { const char *this_line = field_ptr; field_ptr = memchr(field_ptr, '\n', header_end - field_ptr); if (!field_ptr) return httpHeaderReset(hdr); /* missing <LF> */ field_end = field_ptr; field_ptr++; /* Move to next line */ if (field_end > this_line && field_end[-1] == '\r') { field_end--; /* Ignore CR LF */ /* Ignore CR CR LF in relaxed mode */ if (Config.onoff.relaxed_header_parser && field_end > this_line + 1 && field_end[-1] == '\r') { debug(55, Config.onoff.relaxed_header_parser <= 0 ? 1 : 2) ("WARNING: Double CR characters in HTTP header {%s}\n", getStringPrefix(field_start, field_end)); field_end--; } } /* Barf on stray CR characters */ if (memchr(this_line, '\r', field_end - this_line)) { debug(55, 1) ("WARNING: suspicious CR characters in HTTP header {%s}\n", getStringPrefix(field_start, field_end)); if (Config.onoff.relaxed_header_parser) { char *p = (char *) this_line; /* XXX Warning! This destroys original header content and violates specifications somewhat */ while ((p = memchr(p, '\r', field_end - p)) != NULL) *p++ = ' '; } else return httpHeaderReset(hdr); } if (this_line + 1 == field_end && this_line > field_start) { debug(55, 1) ("WARNING: Blank continuation line in HTTP header {%s}\n", getStringPrefix(header_start, header_end)); return httpHeaderReset(hdr); } } while (field_ptr < header_end && (*field_ptr == ' ' || *field_ptr == '\t')); if (field_start == field_end) { if (field_ptr < header_end) { debug(55, 1) ("WARNING: unparseable HTTP header field near {%s}\n", getStringPrefix(field_start, header_end)); return httpHeaderReset(hdr); } break; /* terminating blank line */ } e = httpHeaderEntryParseCreate(field_start, field_end); if (NULL == e) { debug(55, 1) ("WARNING: unparseable HTTP header field {%s}\n", getStringPrefix(field_start, field_end)); debug(55, Config.onoff.relaxed_header_parser <= 0 ? 1 : 2) (" in {%s}\n", getStringPrefix(header_start, header_end)); if (Config.onoff.relaxed_header_parser) continue; else return httpHeaderReset(hdr); } if (e->id == HDR_CONTENT_LENGTH) { squid_off_t l1; HttpHeaderEntry *e2; if (!httpHeaderParseSize(strBuf(e->value), &l1)) { debug(55, 1) ("WARNING: Unparseable content-length '%s'\n", strBuf(e->value)); httpHeaderEntryDestroy(e); return httpHeaderReset(hdr); } e2 = httpHeaderFindEntry(hdr, e->id); if (e2 && strCmp(e->value, strBuf(e2->value)) != 0) { squid_off_t l2; debug(55, Config.onoff.relaxed_header_parser <= 0 ? 1 : 2) ("WARNING: found two conflicting content-length headers in {%s}\n", getStringPrefix(header_start, header_end)); if (!Config.onoff.relaxed_header_parser) { httpHeaderEntryDestroy(e); return httpHeaderReset(hdr); } if (!httpHeaderParseSize(strBuf(e2->value), &l2)) { debug(55, 1) ("WARNING: Unparseable content-length '%s'\n", strBuf(e->value)); httpHeaderEntryDestroy(e); return httpHeaderReset(hdr); } if (l1 > l2) { httpHeaderDelById(hdr, e2->id); } else { httpHeaderEntryDestroy(e); continue; } } else if (e2) { debug(55, Config.onoff.relaxed_header_parser <= 0 ? 1 : 2) ("NOTICE: found double content-length header\n"); if (Config.onoff.relaxed_header_parser) { httpHeaderEntryDestroy(e); continue; } else { httpHeaderEntryDestroy(e); return httpHeaderReset(hdr); } } } if (e->id == HDR_OTHER && stringHasWhitespace(strBuf(e->name))) { debug(55, Config.onoff.relaxed_header_parser <= 0 ? 1 : 2) ("WARNING: found whitespace in HTTP header name {%s}\n", getStringPrefix(field_start, field_end)); if (!Config.onoff.relaxed_header_parser) { httpHeaderEntryDestroy(e); return httpHeaderReset(hdr); } } httpHeaderAddEntry(hdr, e); } return 1; /* even if no fields where found, it is a valid header */ }