2015-02-19 16:01:15 +01:00
|
|
|
/*
|
|
|
|
* nghttp2 - HTTP/2 C Library
|
|
|
|
*
|
|
|
|
* Copyright (c) 2015 Tatsuhiro Tsujikawa
|
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining
|
|
|
|
* a copy of this software and associated documentation files (the
|
|
|
|
* "Software"), to deal in the Software without restriction, including
|
|
|
|
* without limitation the rights to use, copy, modify, merge, publish,
|
|
|
|
* distribute, sublicense, and/or sell copies of the Software, and to
|
|
|
|
* permit persons to whom the Software is furnished to do so, subject to
|
|
|
|
* the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be
|
|
|
|
* included in all copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
|
|
|
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
|
|
|
* LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
|
|
|
* OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
|
|
|
* WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
#include "nghttp2_http.h"
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
|
2015-04-15 15:32:11 +02:00
|
|
|
#include "nghttp2_hd.h"
|
|
|
|
#include "nghttp2_helper.h"
|
2015-02-19 16:01:15 +01:00
|
|
|
|
2015-09-23 07:41:53 +02:00
|
|
|
static uint8_t downcase(uint8_t c) {
|
2015-09-23 11:07:38 +02:00
|
|
|
return 'A' <= c && c <= 'Z' ? (uint8_t)(c - 'A' + 'a') : c;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static int memieq(const void *a, const void *b, size_t n) {
|
|
|
|
size_t i;
|
|
|
|
const uint8_t *aa = a, *bb = b;
|
|
|
|
|
|
|
|
for (i = 0; i < n; ++i) {
|
|
|
|
if (downcase(aa[i]) != downcase(bb[i])) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-04-15 15:32:11 +02:00
|
|
|
#define lstrieq(A, B, N) ((sizeof((A)) - 1) == (N) && memieq((A), (B), (N)))
|
2015-02-19 16:01:15 +01:00
|
|
|
|
|
|
|
static int64_t parse_uint(const uint8_t *s, size_t len) {
|
|
|
|
int64_t n = 0;
|
|
|
|
size_t i;
|
|
|
|
if (len == 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
for (i = 0; i < len; ++i) {
|
|
|
|
if ('0' <= s[i] && s[i] <= '9') {
|
|
|
|
if (n > INT64_MAX / 10) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
n *= 10;
|
|
|
|
if (n > INT64_MAX - (s[i] - '0')) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
n += s[i] - '0';
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int lws(const uint8_t *s, size_t n) {
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < n; ++i) {
|
|
|
|
if (s[i] != ' ' && s[i] != '\t') {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
static int check_pseudo_header(nghttp2_stream *stream, const nghttp2_hd_nv *nv,
|
2015-02-19 16:01:15 +01:00
|
|
|
int flag) {
|
|
|
|
if (stream->http_flags & flag) {
|
|
|
|
return 0;
|
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
if (lws(nv->value->base, nv->value->len)) {
|
2015-02-19 16:01:15 +01:00
|
|
|
return 0;
|
|
|
|
}
|
2015-09-23 11:07:38 +02:00
|
|
|
stream->http_flags = (uint16_t)(stream->http_flags | flag);
|
2015-02-19 16:01:15 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int expect_response_body(nghttp2_stream *stream) {
|
|
|
|
return (stream->http_flags & NGHTTP2_HTTP_FLAG_METH_HEAD) == 0 &&
|
|
|
|
stream->status_code / 100 != 1 && stream->status_code != 304 &&
|
|
|
|
stream->status_code != 204;
|
|
|
|
}
|
|
|
|
|
2015-03-21 13:52:57 +01:00
|
|
|
/* For "http" or "https" URIs, OPTIONS request may have "*" in :path
|
|
|
|
header field to represent system-wide OPTIONS request. Otherwise,
|
|
|
|
:path header field value must start with "/". This function must
|
|
|
|
be called after ":method" header field was received. This function
|
|
|
|
returns nonzero if path is valid.*/
|
|
|
|
static int check_path(nghttp2_stream *stream) {
|
|
|
|
return (stream->http_flags & NGHTTP2_HTTP_FLAG_SCHEME_HTTP) == 0 ||
|
|
|
|
((stream->http_flags & NGHTTP2_HTTP_FLAG_PATH_REGULAR) ||
|
|
|
|
((stream->http_flags & NGHTTP2_HTTP_FLAG_METH_OPTIONS) &&
|
|
|
|
(stream->http_flags & NGHTTP2_HTTP_FLAG_PATH_ASTERISK)));
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
static int http_request_on_header(nghttp2_stream *stream, nghttp2_hd_nv *nv,
|
|
|
|
int trailer) {
|
|
|
|
if (nv->name->base[0] == ':') {
|
2015-02-19 16:01:15 +01:00
|
|
|
if (trailer ||
|
|
|
|
(stream->http_flags & NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
switch (nv->token) {
|
2015-02-19 16:01:15 +01:00
|
|
|
case NGHTTP2_TOKEN__AUTHORITY:
|
2015-02-20 11:30:34 +01:00
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG__AUTHORITY)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case NGHTTP2_TOKEN__METHOD:
|
2015-02-20 11:30:34 +01:00
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG__METHOD)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
switch (nv->value->len) {
|
2015-03-21 13:52:57 +01:00
|
|
|
case 4:
|
2016-03-12 05:23:12 +01:00
|
|
|
if (lstreq("HEAD", nv->value->base, nv->value->len)) {
|
2015-03-21 13:52:57 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_METH_HEAD;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2015-03-21 13:52:57 +01:00
|
|
|
break;
|
|
|
|
case 7:
|
2016-03-12 05:23:12 +01:00
|
|
|
switch (nv->value->base[6]) {
|
2015-03-21 13:52:57 +01:00
|
|
|
case 'T':
|
2016-03-12 05:23:12 +01:00
|
|
|
if (lstreq("CONNECT", nv->value->base, nv->value->len)) {
|
2015-03-21 13:52:57 +01:00
|
|
|
if (stream->stream_id % 2 == 0) {
|
|
|
|
/* we won't allow CONNECT for push */
|
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
|
|
|
}
|
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_METH_CONNECT;
|
|
|
|
if (stream->http_flags &
|
|
|
|
(NGHTTP2_HTTP_FLAG__PATH | NGHTTP2_HTTP_FLAG__SCHEME)) {
|
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'S':
|
2016-03-12 05:23:12 +01:00
|
|
|
if (lstreq("OPTIONS", nv->value->base, nv->value->len)) {
|
2015-03-21 13:52:57 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_METH_OPTIONS;
|
|
|
|
}
|
|
|
|
break;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2015-03-21 13:52:57 +01:00
|
|
|
break;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case NGHTTP2_TOKEN__PATH:
|
|
|
|
if (stream->http_flags & NGHTTP2_HTTP_FLAG_METH_CONNECT) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2015-02-20 11:30:34 +01:00
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG__PATH)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->value->base[0] == '/') {
|
2015-03-21 13:52:57 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PATH_REGULAR;
|
2016-03-12 05:23:12 +01:00
|
|
|
} else if (nv->value->len == 1 && nv->value->base[0] == '*') {
|
2015-03-21 13:52:57 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PATH_ASTERISK;
|
|
|
|
}
|
2015-02-19 16:01:15 +01:00
|
|
|
break;
|
|
|
|
case NGHTTP2_TOKEN__SCHEME:
|
|
|
|
if (stream->http_flags & NGHTTP2_HTTP_FLAG_METH_CONNECT) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2015-02-20 11:30:34 +01:00
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG__SCHEME)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
if ((nv->value->len == 4 && memieq("http", nv->value->base, 4)) ||
|
|
|
|
(nv->value->len == 5 && memieq("https", nv->value->base, 5))) {
|
2015-03-21 13:52:57 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_SCHEME_HTTP;
|
|
|
|
}
|
2015-02-19 16:01:15 +01:00
|
|
|
break;
|
|
|
|
case NGHTTP2_TOKEN_HOST:
|
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG_HOST)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case NGHTTP2_TOKEN_CONTENT_LENGTH: {
|
|
|
|
if (stream->content_length != -1) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
stream->content_length = parse_uint(nv->value->base, nv->value->len);
|
2015-02-19 16:01:15 +01:00
|
|
|
if (stream->content_length == -1) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* disallowed header fields */
|
|
|
|
case NGHTTP2_TOKEN_CONNECTION:
|
|
|
|
case NGHTTP2_TOKEN_KEEP_ALIVE:
|
|
|
|
case NGHTTP2_TOKEN_PROXY_CONNECTION:
|
|
|
|
case NGHTTP2_TOKEN_TRANSFER_ENCODING:
|
|
|
|
case NGHTTP2_TOKEN_UPGRADE:
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
case NGHTTP2_TOKEN_TE:
|
2016-03-12 05:23:12 +01:00
|
|
|
if (!lstrieq("trailers", nv->value->base, nv->value->len)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->name->base[0] == ':') {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->name->base[0] != ':') {
|
2015-02-19 16:01:15 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
static int http_response_on_header(nghttp2_stream *stream, nghttp2_hd_nv *nv,
|
|
|
|
int trailer) {
|
|
|
|
if (nv->name->base[0] == ':') {
|
2015-02-19 16:01:15 +01:00
|
|
|
if (trailer ||
|
|
|
|
(stream->http_flags & NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
switch (nv->token) {
|
2015-02-19 16:01:15 +01:00
|
|
|
case NGHTTP2_TOKEN__STATUS: {
|
2015-02-20 11:30:34 +01:00
|
|
|
if (!check_pseudo_header(stream, nv, NGHTTP2_HTTP_FLAG__STATUS)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->value->len != 3) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
stream->status_code = (int16_t)parse_uint(nv->value->base, nv->value->len);
|
2015-02-19 16:01:15 +01:00
|
|
|
if (stream->status_code == -1) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case NGHTTP2_TOKEN_CONTENT_LENGTH: {
|
2016-12-03 06:57:16 +01:00
|
|
|
if (stream->status_code == 204) {
|
|
|
|
/* content-length header field in 204 response is prohibited by
|
|
|
|
RFC 7230. But some widely used servers send content-length:
|
|
|
|
0. Until they get fixed, we ignore it. */
|
|
|
|
if (stream->content_length != -1) {
|
|
|
|
/* Found multiple content-length field */
|
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
|
|
|
}
|
|
|
|
if (!lstrieq("0", nv->value->base, nv->value->len)) {
|
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
|
|
|
}
|
|
|
|
stream->content_length = 0;
|
|
|
|
return NGHTTP2_ERR_REMOVE_HTTP_HEADER;
|
|
|
|
}
|
|
|
|
if (stream->status_code / 100 == 1 ||
|
2016-11-03 09:26:32 +01:00
|
|
|
(stream->status_code == 200 &&
|
|
|
|
(stream->http_flags & NGHTTP2_HTTP_FLAG_METH_CONNECT))) {
|
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
|
|
|
}
|
2015-02-19 16:01:15 +01:00
|
|
|
if (stream->content_length != -1) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2016-03-12 05:23:12 +01:00
|
|
|
stream->content_length = parse_uint(nv->value->base, nv->value->len);
|
2015-02-19 16:01:15 +01:00
|
|
|
if (stream->content_length == -1) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* disallowed header fields */
|
|
|
|
case NGHTTP2_TOKEN_CONNECTION:
|
|
|
|
case NGHTTP2_TOKEN_KEEP_ALIVE:
|
|
|
|
case NGHTTP2_TOKEN_PROXY_CONNECTION:
|
|
|
|
case NGHTTP2_TOKEN_TRANSFER_ENCODING:
|
|
|
|
case NGHTTP2_TOKEN_UPGRADE:
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
case NGHTTP2_TOKEN_TE:
|
2016-03-12 05:23:12 +01:00
|
|
|
if (!lstrieq("trailers", nv->value->base, nv->value->len)) {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->name->base[0] == ':') {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->name->base[0] != ':') {
|
2015-02-19 16:01:15 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-01-16 07:11:48 +01:00
|
|
|
/* Generated by genauthroitychartbl.py */
|
|
|
|
static char VALID_AUTHORITY_CHARS[] = {
|
2016-10-15 11:36:04 +02:00
|
|
|
0 /* NUL */, 0 /* SOH */, 0 /* STX */, 0 /* ETX */,
|
|
|
|
0 /* EOT */, 0 /* ENQ */, 0 /* ACK */, 0 /* BEL */,
|
|
|
|
0 /* BS */, 0 /* HT */, 0 /* LF */, 0 /* VT */,
|
|
|
|
0 /* FF */, 0 /* CR */, 0 /* SO */, 0 /* SI */,
|
|
|
|
0 /* DLE */, 0 /* DC1 */, 0 /* DC2 */, 0 /* DC3 */,
|
|
|
|
0 /* DC4 */, 0 /* NAK */, 0 /* SYN */, 0 /* ETB */,
|
|
|
|
0 /* CAN */, 0 /* EM */, 0 /* SUB */, 0 /* ESC */,
|
|
|
|
0 /* FS */, 0 /* GS */, 0 /* RS */, 0 /* US */,
|
|
|
|
0 /* SPC */, 1 /* ! */, 0 /* " */, 0 /* # */,
|
|
|
|
1 /* $ */, 1 /* % */, 1 /* & */, 1 /* ' */,
|
|
|
|
1 /* ( */, 1 /* ) */, 1 /* * */, 1 /* + */,
|
|
|
|
1 /* , */, 1 /* - */, 1 /* . */, 0 /* / */,
|
|
|
|
1 /* 0 */, 1 /* 1 */, 1 /* 2 */, 1 /* 3 */,
|
|
|
|
1 /* 4 */, 1 /* 5 */, 1 /* 6 */, 1 /* 7 */,
|
|
|
|
1 /* 8 */, 1 /* 9 */, 1 /* : */, 1 /* ; */,
|
|
|
|
0 /* < */, 1 /* = */, 0 /* > */, 0 /* ? */,
|
|
|
|
1 /* @ */, 1 /* A */, 1 /* B */, 1 /* C */,
|
|
|
|
1 /* D */, 1 /* E */, 1 /* F */, 1 /* G */,
|
|
|
|
1 /* H */, 1 /* I */, 1 /* J */, 1 /* K */,
|
|
|
|
1 /* L */, 1 /* M */, 1 /* N */, 1 /* O */,
|
|
|
|
1 /* P */, 1 /* Q */, 1 /* R */, 1 /* S */,
|
|
|
|
1 /* T */, 1 /* U */, 1 /* V */, 1 /* W */,
|
|
|
|
1 /* X */, 1 /* Y */, 1 /* Z */, 1 /* [ */,
|
|
|
|
0 /* \ */, 1 /* ] */, 0 /* ^ */, 1 /* _ */,
|
|
|
|
0 /* ` */, 1 /* a */, 1 /* b */, 1 /* c */,
|
|
|
|
1 /* d */, 1 /* e */, 1 /* f */, 1 /* g */,
|
|
|
|
1 /* h */, 1 /* i */, 1 /* j */, 1 /* k */,
|
|
|
|
1 /* l */, 1 /* m */, 1 /* n */, 1 /* o */,
|
|
|
|
1 /* p */, 1 /* q */, 1 /* r */, 1 /* s */,
|
|
|
|
1 /* t */, 1 /* u */, 1 /* v */, 1 /* w */,
|
|
|
|
1 /* x */, 1 /* y */, 1 /* z */, 0 /* { */,
|
|
|
|
0 /* | */, 0 /* } */, 1 /* ~ */, 0 /* DEL */,
|
|
|
|
0 /* 0x80 */, 0 /* 0x81 */, 0 /* 0x82 */, 0 /* 0x83 */,
|
|
|
|
0 /* 0x84 */, 0 /* 0x85 */, 0 /* 0x86 */, 0 /* 0x87 */,
|
|
|
|
0 /* 0x88 */, 0 /* 0x89 */, 0 /* 0x8a */, 0 /* 0x8b */,
|
|
|
|
0 /* 0x8c */, 0 /* 0x8d */, 0 /* 0x8e */, 0 /* 0x8f */,
|
|
|
|
0 /* 0x90 */, 0 /* 0x91 */, 0 /* 0x92 */, 0 /* 0x93 */,
|
|
|
|
0 /* 0x94 */, 0 /* 0x95 */, 0 /* 0x96 */, 0 /* 0x97 */,
|
|
|
|
0 /* 0x98 */, 0 /* 0x99 */, 0 /* 0x9a */, 0 /* 0x9b */,
|
|
|
|
0 /* 0x9c */, 0 /* 0x9d */, 0 /* 0x9e */, 0 /* 0x9f */,
|
|
|
|
0 /* 0xa0 */, 0 /* 0xa1 */, 0 /* 0xa2 */, 0 /* 0xa3 */,
|
|
|
|
0 /* 0xa4 */, 0 /* 0xa5 */, 0 /* 0xa6 */, 0 /* 0xa7 */,
|
|
|
|
0 /* 0xa8 */, 0 /* 0xa9 */, 0 /* 0xaa */, 0 /* 0xab */,
|
|
|
|
0 /* 0xac */, 0 /* 0xad */, 0 /* 0xae */, 0 /* 0xaf */,
|
|
|
|
0 /* 0xb0 */, 0 /* 0xb1 */, 0 /* 0xb2 */, 0 /* 0xb3 */,
|
|
|
|
0 /* 0xb4 */, 0 /* 0xb5 */, 0 /* 0xb6 */, 0 /* 0xb7 */,
|
|
|
|
0 /* 0xb8 */, 0 /* 0xb9 */, 0 /* 0xba */, 0 /* 0xbb */,
|
|
|
|
0 /* 0xbc */, 0 /* 0xbd */, 0 /* 0xbe */, 0 /* 0xbf */,
|
|
|
|
0 /* 0xc0 */, 0 /* 0xc1 */, 0 /* 0xc2 */, 0 /* 0xc3 */,
|
|
|
|
0 /* 0xc4 */, 0 /* 0xc5 */, 0 /* 0xc6 */, 0 /* 0xc7 */,
|
|
|
|
0 /* 0xc8 */, 0 /* 0xc9 */, 0 /* 0xca */, 0 /* 0xcb */,
|
|
|
|
0 /* 0xcc */, 0 /* 0xcd */, 0 /* 0xce */, 0 /* 0xcf */,
|
|
|
|
0 /* 0xd0 */, 0 /* 0xd1 */, 0 /* 0xd2 */, 0 /* 0xd3 */,
|
|
|
|
0 /* 0xd4 */, 0 /* 0xd5 */, 0 /* 0xd6 */, 0 /* 0xd7 */,
|
|
|
|
0 /* 0xd8 */, 0 /* 0xd9 */, 0 /* 0xda */, 0 /* 0xdb */,
|
|
|
|
0 /* 0xdc */, 0 /* 0xdd */, 0 /* 0xde */, 0 /* 0xdf */,
|
|
|
|
0 /* 0xe0 */, 0 /* 0xe1 */, 0 /* 0xe2 */, 0 /* 0xe3 */,
|
|
|
|
0 /* 0xe4 */, 0 /* 0xe5 */, 0 /* 0xe6 */, 0 /* 0xe7 */,
|
|
|
|
0 /* 0xe8 */, 0 /* 0xe9 */, 0 /* 0xea */, 0 /* 0xeb */,
|
|
|
|
0 /* 0xec */, 0 /* 0xed */, 0 /* 0xee */, 0 /* 0xef */,
|
|
|
|
0 /* 0xf0 */, 0 /* 0xf1 */, 0 /* 0xf2 */, 0 /* 0xf3 */,
|
|
|
|
0 /* 0xf4 */, 0 /* 0xf5 */, 0 /* 0xf6 */, 0 /* 0xf7 */,
|
|
|
|
0 /* 0xf8 */, 0 /* 0xf9 */, 0 /* 0xfa */, 0 /* 0xfb */,
|
|
|
|
0 /* 0xfc */, 0 /* 0xfd */, 0 /* 0xfe */, 0 /* 0xff */
|
2016-01-16 07:11:48 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static int check_authority(const uint8_t *value, size_t len) {
|
|
|
|
const uint8_t *last;
|
|
|
|
for (last = value + len; value != last; ++value) {
|
|
|
|
if (!VALID_AUTHORITY_CHARS[*value]) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int check_scheme(const uint8_t *value, size_t len) {
|
|
|
|
const uint8_t *last;
|
|
|
|
if (len == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!(('A' <= *value && *value <= 'Z') || ('a' <= *value && *value <= 'z'))) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
last = value + len;
|
|
|
|
++value;
|
|
|
|
|
|
|
|
for (; value != last; ++value) {
|
|
|
|
if (!(('A' <= *value && *value <= 'Z') ||
|
|
|
|
('a' <= *value && *value <= 'z') ||
|
|
|
|
('0' <= *value && *value <= '9') || *value == '+' || *value == '-' ||
|
|
|
|
*value == '.')) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2015-02-19 16:01:15 +01:00
|
|
|
int nghttp2_http_on_header(nghttp2_session *session, nghttp2_stream *stream,
|
2016-03-12 05:23:12 +01:00
|
|
|
nghttp2_frame *frame, nghttp2_hd_nv *nv,
|
2015-04-15 15:32:11 +02:00
|
|
|
int trailer) {
|
2016-01-16 07:11:48 +01:00
|
|
|
int rv;
|
|
|
|
|
2015-02-24 10:45:59 +01:00
|
|
|
/* We are strict for pseudo header field. One bad character should
|
|
|
|
lead to fail. OTOH, we should be a bit forgiving for regular
|
|
|
|
headers, since existing public internet has so much illegal
|
|
|
|
headers floating around and if we kill the stream because of
|
|
|
|
this, we may disrupt many web sites and/or libraries. So we
|
|
|
|
become conservative here, and just ignore those illegal regular
|
|
|
|
headers. */
|
2016-03-12 05:23:12 +01:00
|
|
|
if (!nghttp2_check_header_name(nv->name->base, nv->name->len)) {
|
2015-02-24 10:45:59 +01:00
|
|
|
size_t i;
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->name->len > 0 && nv->name->base[0] == ':') {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-24 10:45:59 +01:00
|
|
|
}
|
|
|
|
/* header field name must be lower-cased without exception */
|
2016-03-12 05:23:12 +01:00
|
|
|
for (i = 0; i < nv->name->len; ++i) {
|
|
|
|
uint8_t c = nv->name->base[i];
|
2015-02-24 10:45:59 +01:00
|
|
|
if ('A' <= c && c <= 'Z') {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-24 10:45:59 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/* When ignoring regular headers, we set this flag so that we
|
|
|
|
still enforce header field ordering rule for pseudo header
|
|
|
|
fields. */
|
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED;
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_IGN_HTTP_HEADER;
|
2015-02-24 10:45:59 +01:00
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
if (nv->token == NGHTTP2_TOKEN__AUTHORITY ||
|
|
|
|
nv->token == NGHTTP2_TOKEN_HOST) {
|
|
|
|
rv = check_authority(nv->value->base, nv->value->len);
|
|
|
|
} else if (nv->token == NGHTTP2_TOKEN__SCHEME) {
|
|
|
|
rv = check_scheme(nv->value->base, nv->value->len);
|
2016-01-16 07:11:48 +01:00
|
|
|
} else {
|
2016-03-12 05:23:12 +01:00
|
|
|
rv = nghttp2_check_header_value(nv->value->base, nv->value->len);
|
2016-01-16 07:11:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (rv == 0) {
|
2016-03-12 05:23:12 +01:00
|
|
|
assert(nv->name->len > 0);
|
|
|
|
if (nv->name->base[0] == ':') {
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_HTTP_HEADER;
|
2015-02-22 15:13:27 +01:00
|
|
|
}
|
|
|
|
/* When ignoring regular headers, we set this flag so that we
|
|
|
|
still enforce header field ordering rule for pseudo header
|
|
|
|
fields. */
|
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_PSEUDO_HEADER_DISALLOWED;
|
2015-02-26 14:59:07 +01:00
|
|
|
return NGHTTP2_ERR_IGN_HTTP_HEADER;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (session->server || frame->hd.type == NGHTTP2_PUSH_PROMISE) {
|
2016-03-12 05:23:12 +01:00
|
|
|
return http_request_on_header(stream, nv, trailer);
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
|
2016-03-12 05:23:12 +01:00
|
|
|
return http_response_on_header(stream, nv, trailer);
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
int nghttp2_http_on_request_headers(nghttp2_stream *stream,
|
|
|
|
nghttp2_frame *frame) {
|
|
|
|
if (stream->http_flags & NGHTTP2_HTTP_FLAG_METH_CONNECT) {
|
2015-02-20 11:30:34 +01:00
|
|
|
if ((stream->http_flags & NGHTTP2_HTTP_FLAG__AUTHORITY) == 0) {
|
2015-02-19 16:01:15 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
stream->content_length = -1;
|
2015-03-21 13:52:57 +01:00
|
|
|
} else {
|
|
|
|
if ((stream->http_flags & NGHTTP2_HTTP_FLAG_REQ_HEADERS) !=
|
|
|
|
NGHTTP2_HTTP_FLAG_REQ_HEADERS ||
|
|
|
|
(stream->http_flags &
|
|
|
|
(NGHTTP2_HTTP_FLAG__AUTHORITY | NGHTTP2_HTTP_FLAG_HOST)) == 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (!check_path(stream)) {
|
|
|
|
return -1;
|
|
|
|
}
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (frame->hd.type == NGHTTP2_PUSH_PROMISE) {
|
|
|
|
/* we are going to reuse data fields for upcoming response. Clear
|
|
|
|
them now, except for method flags. */
|
|
|
|
stream->http_flags &= NGHTTP2_HTTP_FLAG_METH_ALL;
|
|
|
|
stream->content_length = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nghttp2_http_on_response_headers(nghttp2_stream *stream) {
|
2015-02-20 11:30:34 +01:00
|
|
|
if ((stream->http_flags & NGHTTP2_HTTP_FLAG__STATUS) == 0) {
|
2015-02-19 16:01:15 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stream->status_code / 100 == 1) {
|
|
|
|
/* non-final response */
|
2015-09-23 11:07:38 +02:00
|
|
|
stream->http_flags =
|
|
|
|
(uint16_t)((stream->http_flags & NGHTTP2_HTTP_FLAG_METH_ALL) |
|
|
|
|
NGHTTP2_HTTP_FLAG_EXPECT_FINAL_RESPONSE);
|
2015-02-19 16:01:15 +01:00
|
|
|
stream->content_length = -1;
|
|
|
|
stream->status_code = -1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-09-23 11:07:38 +02:00
|
|
|
stream->http_flags =
|
|
|
|
(uint16_t)(stream->http_flags & ~NGHTTP2_HTTP_FLAG_EXPECT_FINAL_RESPONSE);
|
2015-02-19 16:01:15 +01:00
|
|
|
|
|
|
|
if (!expect_response_body(stream)) {
|
|
|
|
stream->content_length = 0;
|
2015-11-07 02:56:40 +01:00
|
|
|
} else if (stream->http_flags & (NGHTTP2_HTTP_FLAG_METH_CONNECT |
|
|
|
|
NGHTTP2_HTTP_FLAG_METH_UPGRADE_WORKAROUND)) {
|
2015-02-19 16:01:15 +01:00
|
|
|
stream->content_length = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-03-11 09:46:39 +01:00
|
|
|
int nghttp2_http_on_trailer_headers(nghttp2_stream *stream,
|
2015-02-19 16:01:15 +01:00
|
|
|
nghttp2_frame *frame) {
|
2017-03-11 09:46:39 +01:00
|
|
|
(void)stream;
|
|
|
|
|
2015-02-19 16:01:15 +01:00
|
|
|
if ((frame->hd.flags & NGHTTP2_FLAG_END_STREAM) == 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nghttp2_http_on_remote_end_stream(nghttp2_stream *stream) {
|
|
|
|
if (stream->http_flags & NGHTTP2_HTTP_FLAG_EXPECT_FINAL_RESPONSE) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (stream->content_length != -1 &&
|
|
|
|
stream->content_length != stream->recv_content_length) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int nghttp2_http_on_data_chunk(nghttp2_stream *stream, size_t n) {
|
2015-09-23 11:07:38 +02:00
|
|
|
stream->recv_content_length += (int64_t)n;
|
2015-02-19 16:01:15 +01:00
|
|
|
|
|
|
|
if ((stream->http_flags & NGHTTP2_HTTP_FLAG_EXPECT_FINAL_RESPONSE) ||
|
|
|
|
(stream->content_length != -1 &&
|
|
|
|
stream->recv_content_length > stream->content_length)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void nghttp2_http_record_request_method(nghttp2_stream *stream,
|
|
|
|
nghttp2_frame *frame) {
|
|
|
|
const nghttp2_nv *nva;
|
|
|
|
size_t nvlen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
switch (frame->hd.type) {
|
|
|
|
case NGHTTP2_HEADERS:
|
|
|
|
nva = frame->headers.nva;
|
|
|
|
nvlen = frame->headers.nvlen;
|
|
|
|
break;
|
|
|
|
case NGHTTP2_PUSH_PROMISE:
|
|
|
|
nva = frame->push_promise.nva;
|
|
|
|
nvlen = frame->push_promise.nvlen;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-20 11:26:34 +01:00
|
|
|
/* TODO we should do this strictly. */
|
2015-02-19 16:01:15 +01:00
|
|
|
for (i = 0; i < nvlen; ++i) {
|
|
|
|
const nghttp2_nv *nv = &nva[i];
|
2015-04-15 15:32:11 +02:00
|
|
|
if (!(nv->namelen == 7 && nv->name[6] == 'd' &&
|
|
|
|
memcmp(":metho", nv->name, nv->namelen - 1) == 0)) {
|
2015-02-20 11:26:34 +01:00
|
|
|
continue;
|
|
|
|
}
|
2015-04-15 15:32:11 +02:00
|
|
|
if (lstreq("CONNECT", nv->value, nv->valuelen)) {
|
2015-02-20 11:26:34 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_METH_CONNECT;
|
|
|
|
return;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
2015-04-15 15:32:11 +02:00
|
|
|
if (lstreq("HEAD", nv->value, nv->valuelen)) {
|
2015-02-20 11:26:34 +01:00
|
|
|
stream->http_flags |= NGHTTP2_HTTP_FLAG_METH_HEAD;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return;
|
2015-02-19 16:01:15 +01:00
|
|
|
}
|
|
|
|
}
|