[0001]
[0002]
[0003]
[0004]
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
[0098]
[0099]
[0100]
[0101]
[0102]
[0103]
[0104]
[0105]
[0106]
[0107]
[0108]
[0109]
[0110]
[0111]
[0112]
[0113]
[0114]
[0115]
[0116]
[0117]
[0118]
[0119]
[0120]
[0121]
[0122]
[0123]
[0124]
[0125]
[0126]
[0127]
[0128]
[0129]
[0130]
[0131]
[0132]
[0133]
[0134]
[0135]
[0136]
[0137]
[0138]
[0139]
[0140]
[0141]
[0142]
[0143]
[0144]
[0145]
[0146]
[0147]
[0148]
[0149]
[0150]
[0151]
[0152]
[0153]
[0154]
[0155]
[0156]
[0157]
[0158]
[0159]
[0160]
[0161]
[0162]
[0163]
[0164]
[0165]
[0166]
[0167]
[0168]
[0169]
[0170]
[0171]
[0172]
[0173]
[0174]
[0175]
[0176]
[0177]
[0178]
[0179]
[0180]
[0181]
[0182]
[0183]
[0184]
[0185]
[0186]
[0187]
[0188]
[0189]
[0190]
[0191]
[0192]
[0193]
[0194]
[0195]
[0196]
[0197]
[0198]
[0199]
[0200]
[0201]
[0202]
[0203]
[0204]
[0205]
[0206]
[0207]
[0208]
[0209]
[0210]
[0211]
[0212]
[0213]
[0214]
[0215]
[0216]
[0217]
[0218]
[0219]
[0220]
[0221]
[0222]
[0223]
[0224]
[0225]
[0226]
[0227]
[0228]
[0229]
[0230]
[0231]
[0232]
[0233]
[0234]
[0235]
[0236]
[0237]
[0238]
[0239]
[0240]
[0241]
[0242]
[0243]
[0244]
[0245]
[0246]
[0247]
[0248]
[0249]
[0250]
[0251]
[0252]
[0253]
[0254]
[0255]
[0256]
[0257]
[0258]
[0259]
[0260]
[0261]
[0262]
[0263]
[0264]
[0265]
[0266]
[0267]
[0268]
[0269]
[0270]
[0271]
[0272]
[0273]
[0274]
[0275]
[0276]
[0277]
[0278]
[0279]
[0280]
[0281]
[0282]
[0283]
[0284]
[0285]
[0286]
[0287]
[0288]
[0289]
[0290]
[0291]
[0292]
[0293]
[0294]
[0295]
[0296]
[0297]
[0298]
[0299]
[0300]
[0301]
[0302]
[0303]
[0304]
[0305]
[0306]
[0307]
[0308]
[0309]
[0310]
[0311]
[0312]
[0313]
[0314]
[0315]
[0316]
[0317]
[0318]
[0319]
[0320]
[0321]
[0322]
[0323]
[0324]
[0325]
[0326]
[0327]
[0328]
[0329]
[0330]
[0331]
[0332]
[0333]
[0334]
[0335]
[0336]
[0337]
[0338]
[0339]
[0340]
[0341]
[0342]
[0343]
[0344]
[0345]
[0346]
[0347]
[0348]
[0349]
[0350]
[0351]
[0352]
[0353]
[0354]
[0355]
[0356]
[0357]
[0358]
[0359]
[0360]
[0361]
[0362]
[0363]
[0364]
[0365]
[0366]
[0367]
[0368]
[0369]
[0370]
[0371]
[0372]
[0373]
[0374]
[0375]
[0376]
[0377]
[0378]
[0379]
[0380]
[0381]
[0382]
[0383]
[0384]
[0385]
[0386]
[0387]
[0388]
[0389]
[0390]
[0391]
[0392]
[0393]
[0394]
[0395]
[0396]
[0397]
[0398]
[0399]
[0400]
[0401]
[0402]
[0403]
[0404]
[0405]
[0406]
[0407]
[0408]
[0409]
[0410]
[0411]
[0412]
[0413]
[0414]
[0415]
[0416]
[0417]
[0418]
[0419]
[0420]
[0421]
[0422]
[0423]
[0424]
[0425]
[0426]
[0427]
[0428]
[0429]
[0430]
[0431]
[0432]
[0433]
[0434]
[0435]
[0436]
[0437]
[0438]
[0439]
[0440]
[0441]
[0442]
[0443]
[0444]
[0445]
[0446]
[0447]
[0448]
[0449]
[0450]
[0451]
[0452]
[0453]
[0454]
[0455]
[0456]
[0457]
[0458]
[0459]
[0460]
[0461]
[0462]
[0463]
[0464]
[0465]
[0466]
[0467]
[0468]
[0469]
[0470]
[0471]
[0472]
[0473]
[0474]
[0475]
[0476]
[0477]
[0478]
[0479]
[0480]
[0481]
[0482]
[0483]
[0484]
[0485]
[0486]
[0487]
[0488]
[0489]
[0490]
[0491]
[0492]
[0493]
[0494]
[0495]
[0496]
[0497]
[0498]
[0499]
[0500]
[0501]
[0502]
[0503]
[0504]
[0505]
[0506]
[0507]
[0508]
[0509]
[0510]
[0511]
[0512]
[0513]
[0514]
[0515]
[0516]
[0517]
[0518]
[0519]
[0520]
[0521]
[0522]
[0523]
[0524]
[0525]
[0526]
[0527]
[0528]
[0529]
[0530]
[0531]
[0532]
[0533]
[0534]
[0535]
[0536]
[0537]
[0538]
[0539]
[0540]
[0541]
[0542]
[0543]
[0544]
[0545]
[0546]
[0547]
[0548]
[0549]
[0550]
[0551]
[0552]
[0553]
[0554]
[0555]
[0556]
[0557]
[0558]
[0559]
[0560]
[0561]
[0562]
[0563]
[0564]
[0565]
[0566]
[0567]
[0568]
[0569]
[0570]
[0571]
[0572]
[0573]
[0574]
[0575]
[0576]
[0577]
[0578]
[0579]
[0580]
[0581]
[0582]
[0583]
[0584]
[0585]
[0586]
[0587]
[0588]
[0589]
[0590]
[0591]
[0592]
[0593]
[0594]
[0595]
[0596]
[0597]
[0598]
[0599]
[0600]
[0601]
[0602]
[0603]
[0604]
[0605]
[0606]
[0607]
[0608]
[0609]
[0610]
[0611]
[0612]
[0613]
[0614]
[0615]
[0616]
[0617]
[0618]
[0619]
[0620]
[0621]
[0622]
[0623]
[0624]
[0625]
[0626]
[0627]
[0628]
[0629]
[0630]
[0631]
[0632]
[0633]
[0634]
[0635]
[0636]
[0637]
[0638]
[0639]
[0640]
[0641]
[0642]
[0643]
[0644]
[0645]
[0646]
[0647]
[0648]
[0649]
[0650]
[0651]
[0652]
[0653]
[0654]
[0655]
[0656]
[0657]
[0658]
[0659]
[0660]
[0661]
[0662]
[0663]
[0664]
[0665]
[0666]
[0667]
[0668]
[0669]
[0670]
[0671]
[0672]
[0673]
[0674]
[0675]
[0676]
[0677]
[0678]
[0679]
[0680]
[0681]
[0682]
[0683]
[0684]
[0685]
[0686]
[0687]
[0688]
[0689]
[0690]
[0691]
[0692]
[0693]
[0694]
[0695]
[0696]
[0697]
[0698]
[0699]
[0700]
[0701]
[0702]
[0703]
[0704]
[0705]
[0706]
[0707]
[0708]
[0709]
[0710]
[0711]
[0712]
[0713]
[0714]
[0715]
[0716]
[0717]
[0718]
[0719]
[0720]
[0721]
[0722]
[0723]
[0724]
[0725]
[0726]
[0727]
[0728]
[0729]
[0730]
[0731]
[0732]
[0733]
[0734]
[0735]
[0736]
[0737]
[0738]
[0739]
[0740]
[0741]
[0742]
[0743]
[0744]
[0745]
[0746]
[0747]
[0748]
[0749]
[0750]
[0751]
[0752]
[0753]
[0754]
[0755]
[0756]
[0757]
[0758]
[0759]
[0760]
[0761]
[0762]
[0763]
[0764]
[0765]
[0766]
[0767]
[0768]
[0769]
[0770]
[0771]
[0772]
[0773]
[0774]
[0775]
[0776]
[0777]
[0778]
[0779]
[0780]
[0781]
[0782]
[0783]
[0784]
[0785]
[0786]
[0787]
[0788]
[0789]
[0790]
[0791]
[0792]
[0793]
[0794]
[0795]
[0796]
[0797]
[0798]
[0799]
[0800]
[0801]
[0802]
[0803]
[0804]
[0805]
[0806]
[0807]
[0808]
[0809]
[0810]
[0811]
[0812]
[0813]
[0814]
[0815]
[0816]
[0817]
[0818]
[0819]
[0820]
[0821]
[0822]
[0823]
[0824]
[0825]
[0826]
[0827]
[0828]
[0829]
[0830]
[0831]
[0832]
[0833]
[0834]
[0835]
[0836]
[0837]
[0838]
[0839]
[0840]
[0841]
[0842]
[0843]
[0844]
[0845]
[0846]
[0847]
[0848]
[0849]
[0850]
[0851]
[0852]
[0853]
[0854]
[0855]
[0856]
[0857]
[0858]
[0859]
[0860]
[0861]
[0862]
[0863]
[0864]
[0865]
[0866]
[0867]
[0868]
[0869]
[0870]
[0871]
[0872]
[0873]
[0874]
[0875]
[0876]
[0877]
[0878]
[0879]
[0880]
[0881]
[0882]
[0883]
[0884]
[0885]
[0886]
[0887]
[0888]
[0889]
[0890]
[0891]
[0892]
[0893]
[0894]
[0895]
[0896]
[0897]
[0898]
[0899]
[0900]
[0901]
[0902]
[0903]
[0904]
[0905]
[0906]
[0907]
[0908]
[0909]
[0910]
[0911]
[0912]
[0913]
[0914]
[0915]
[0916]
[0917]
[0918]
[0919]
[0920]
[0921]
[0922]
[0923]
[0924]
[0925]
[0926]
[0927]
[0928]
[0929]
[0930]
[0931]
[0932]
[0933]
[0934]
[0935]
[0936]
[0937]
[0938]
[0939]
[0940]
[0941]
[0942]
[0943]
[0944]
[0945]
[0946]
[0947]
[0948]
[0949]
[0950]
[0951]
[0952]
[0953]
[0954]
[0955]
[0956]
[0957]
[0958]
[0959]
[0960]
[0961]
[0962]
[0963]
[0964]
[0965]
[0966]
[0967]
[0968]
[0969]
[0970]
[0971]
[0972]
[0973]
[0974]
[0975]
[0976]
[0977]
[0978]
[0979]
[0980]
[0981]
[0982]
[0983]
[0984]
[0985]
[0986]
[0987]
[0988]
[0989]
[0990]
[0991]
[0992]
[0993]
[0994]
[0995]
[0996]
[0997]
[0998]
[0999]
[1000]
[1001]
[1002]
[1003]
[1004]
[1005]
[1006]
[1007]
[1008]
[1009]
[1010]
[1011]
[1012]
[1013]
[1014]
[1015]
[1016]
[1017]
[1018]
[1019]
[1020]
[1021]
[1022]
[1023]
[1024]
[1025]
[1026]
[1027]
[1028]
[1029]
[1030]
[1031]
[1032]
[1033]
[1034]
[1035]
[1036]
[1037]
[1038]
[1039]
[1040]
[1041]
[1042]
[1043]
[1044]
[1045]
[1046]
[1047]
[1048]
[1049]
[1050]
[1051]
[1052]
[1053]
[1054]
[1055]
[1056]
[1057]
[1058]
[1059]
[1060]
[1061]
[1062]
[1063]
[1064]
[1065]
[1066]
[1067]
[1068]
[1069]
[1070]
[1071]
[1072]
[1073]
[1074]
[1075]
[1076]
[1077]
[1078]
[1079]
[1080]
[1081]
[1082]
[1083]
[1084]
[1085]
[1086]
[1087]
[1088]
[1089]
[1090]
[1091]
[1092]
[1093]
[1094]
[1095]
[1096]
[1097]
[1098]
[1099]
[1100]
[1101]
[1102]
[1103]
[1104]
[1105]
[1106]
[1107]
[1108]
[1109]
[1110]
[1111]
[1112]
[1113]
[1114]
[1115]
[1116]
[1117]
[1118]
[1119]
[1120]
[1121]
[1122]
[1123]
[1124]
[1125]
[1126]
[1127]
[1128]
[1129]
[1130]
[1131]
[1132]
[1133]
[1134]
[1135]
[1136]
[1137]
[1138]
[1139]
[1140]
[1141]
[1142]
[1143]
[1144]
[1145]
[1146]
[1147]
[1148]
[1149]
[1150]
[1151]
[1152]
[1153]
[1154]
[1155]
[1156]
[1157]
[1158]
[1159]
[1160]
[1161]
[1162]
[1163]
[1164]
[1165]
[1166]
[1167]
[1168]
[1169]
[1170]
[1171]
[1172]
[1173]
[1174]
[1175]
[1176]
[1177]
[1178]
[1179]
[1180]
[1181]
[1182]
[1183]
[1184]
[1185]
[1186]
[1187]
[1188]
[1189]
[1190]
[1191]
[1192]
[1193]
[1194]
[1195]
[1196]
[1197]
[1198]
[1199]
[1200]
[1201]
[1202]
[1203]
[1204]
[1205]
[1206]
[1207]
[1208]
[1209]
[1210]
[1211]
[1212]
[1213]
[1214]
[1215]
[1216]
[1217]
[1218]
[1219]
[1220]
[1221]
[1222]
[1223]
[1224]
[1225]
[1226]
[1227]
[1228]
[1229]
[1230]
[1231]
[1232]
[1233]
[1234]
[1235]
[1236]
[1237]
[1238]
[1239]
[1240]
[1241]
[1242]
[1243]
[1244]
[1245]
[1246]
[1247]
[1248]
[1249]
[1250]
[1251]
[1252]
[1253]
[1254]
[1255]
[1256]
[1257]
[1258]
[1259]
[1260]
[1261]
[1262]
[1263]
[1264]
[1265]
[1266]
[1267]
[1268]
[1269]
[1270]
[1271]
[1272]
[1273]
[1274]
[1275]
[1276]
[1277]
[1278]
[1279]
[1280]
[1281]
[1282]
[1283]
[1284]
[1285]
[1286]
[1287]
[1288]
[1289]
[1290]
[1291]
[1292]
[1293]
[1294]
[1295]
[1296]
[1297]
[1298]
[1299]
[1300]
[1301]
[1302]
[1303]
[1304]
[1305]
[1306]
[1307]
[1308]
[1309]
[1310]
[1311]
[1312]
[1313]
[1314]
[1315]
[1316]
[1317]
[1318]
[1319]
[1320]
[1321]
[1322]
[1323]
[1324]
[1325]
[1326]
[1327]
[1328]
[1329]
[1330]
[1331]
[1332]
[1333]
[1334]
[1335]
[1336]
[1337]
[1338]
[1339]
[1340]
[1341]
[1342]
[1343]
[1344]
[1345]
[1346]
[1347]
[1348]
[1349]
[1350]
[1351]
[1352]
[1353]
[1354]
[1355]
[1356]
[1357]
[1358]
[1359]
[1360]
[1361]
[1362]
[1363]
[1364]
[1365]
[1366]
[1367]
[1368]
[1369]
[1370]
[1371]
[1372]
[1373]
[1374]
[1375]
[1376]
[1377]
[1378]
[1379]
[1380]
[1381]
[1382]
[1383]
[1384]
[1385]
[1386]
[1387]
[1388]
[1389]
[1390]
[1391]
[1392]
[1393]
[1394]
[1395]
[1396]
[1397]
[1398]
[1399]
[1400]
[1401]
[1402]
[1403]
[1404]
[1405]
[1406]
[1407]
[1408]
[1409]
[1410]
[1411]
[1412]
[1413]
[1414]
[1415]
[1416]
[1417]
[1418]
[1419]
[1420]
[1421]
[1422]
[1423]
[1424]
[1425]
[1426]
[1427]
[1428]
[1429]
[1430]
[1431]
[1432]
[1433]
[1434]
[1435]
[1436]
[1437]
[1438]
[1439]
[1440]
[1441]
[1442]
[1443]
[1444]
[1445]
[1446]
[1447]
[1448]
[1449]
[1450]
[1451]
[1452]
[1453]
[1454]
[1455]
[1456]
[1457]
[1458]
[1459]
[1460]
[1461]
[1462]
[1463]
[1464]
[1465]
[1466]
[1467]
[1468]
[1469]
[1470]
[1471]
[1472]
[1473]
[1474]
[1475]
[1476]
[1477]
[1478]
[1479]
[1480]
[1481]
[1482]
[1483]
[1484]
[1485]
[1486]
[1487]
[1488]
[1489]
[1490]
[1491]
[1492]
[1493]
[1494]
[1495]
[1496]
[1497]
[1498]
[1499]
[1500]
[1501]
[1502]
[1503]
[1504]
[1505]
[1506]
[1507]
[1508]
[1509]
[1510]
[1511]
[1512]
[1513]
[1514]
[1515]
[1516]
[1517]
[1518]
[1519]
[1520]
[1521]
[1522]
[1523]
[1524]
[1525]
[1526]
[1527]
[1528]
[1529]
[1530]
[1531]
[1532]
[1533]
[1534]
[1535]
[1536]
[1537]
[1538]
[1539]
[1540]
[1541]
[1542]
[1543]
[1544]
[1545]
[1546]
[1547]
[1548]
[1549]
[1550]
[1551]
[1552]
[1553]
[1554]
[1555]
[1556]
[1557]
[1558]
[1559]
[1560]
[1561]
[1562]
[1563]
[1564]
[1565]
[1566]
[1567]
[1568]
[1569]
[1570]
[1571]
[1572]
[1573]
[1574]
[1575]
[1576]
[1577]
[1578]
[1579]
[1580]
[1581]
[1582]
[1583]
[1584]
[1585]
[1586]
[1587]
[1588]
[1589]
[1590]
[1591]
[1592]
[1593]
[1594]
[1595]
[1596]
[1597]
[1598]
[1599]
[1600]
[1601]
[1602]
[1603]
[1604]
[1605]
[1606]
[1607]
[1608]
[1609]
[1610]
[1611]
[1612]
[1613]
[1614]
[1615]
[1616]
[1617]
[1618]
[1619]
[1620]
[1621]
[1622]
[1623]
[1624]
[1625]
[1626]
[1627]
[1628]
[1629]
[1630]
[1631]
[1632]
[1633]
[1634]
[1635]
[1636]
[1637]
[1638]
[1639]
[1640]
[1641]
[1642]
[1643]
[1644]
[1645]
[1646]
[1647]
[1648]
[1649]
[1650]
[1651]
[1652]
[1653]
[1654]
[1655]
[1656]
[1657]
[1658]
[1659]
[1660]
[1661]
[1662]
[1663]
[1664]
[1665]
[1666]
[1667]
[1668]
[1669]
[1670]
[1671]
[1672]
[1673]
[1674]
[1675]
[1676]
[1677]
[1678]
[1679]
[1680]
[1681]
[1682]
[1683]
[1684]
[1685]
[1686]
[1687]
[1688]
[1689]
[1690]
[1691]
[1692]
[1693]
[1694]
[1695]
[1696]
[1697]
[1698]
[1699]
[1700]
[1701]
[1702]
[1703]
[1704]
[1705]
[1706]
[1707]
[1708]
[1709]
[1710]
[1711]
[1712]
[1713]
[1714]
[1715]
[1716]
[1717]
[1718]
[1719]
[1720]
[1721]
[1722]
[1723]
[1724]
[1725]
[1726]
[1727]
[1728]
[1729]
[1730]
[1731]
[1732]
[1733]
[1734]
[1735]
[1736]
[1737]
[1738]
[1739]
[1740]
[1741]
[1742]
[1743]
[1744]
[1745]
[1746]
[1747]
[1748]
[1749]
[1750]
[1751]
[1752]
[1753]
[1754]
[1755]
[1756]
[1757]
[1758]
[1759]
[1760]
[1761]
[1762]
[1763]
[1764]
[1765]
[1766]
[1767]
[1768]
[1769]
[1770]
[1771]
[1772]
[1773]
[1774]
[1775]
[1776]
[1777]
[1778]
[1779]
[1780]
[1781]
[1782]
[1783]
[1784]
[1785]
[1786]
[1787]
[1788]
[1789]
[1790]
[1791]
[1792]
[1793]
[1794]
[1795]
[1796]
[1797]
[1798]
[1799]
[1800]
[1801]
[1802]
[1803]
[1804]
[1805]
[1806]
[1807]
[1808]
[1809]
[1810]
[1811]
[1812]
[1813]
[1814]
[1815]
[1816]
[1817]
[1818]
[1819]
[1820]
[1821]
[1822]
[1823]
[1824]
[1825]
[1826]
[1827]
[1828]
[1829]
[1830]
[1831]
[1832]
[1833]
[1834]
[1835]
[1836]
[1837]
[1838]
[1839]
[1840]
[1841]
[1842]
[1843]
[1844]
[1845]
[1846]
[1847]
[1848]
[1849]
[1850]
[1851]
[1852]
[1853]
[1854]
[1855]
[1856]
[1857]
[1858]
[1859]
[1860]
[1861]
[1862]
[1863]
[1864]
[1865]
[1866]
[1867]
[1868]
[1869]
[1870]
[1871]
[1872]
[1873]
[1874]
[1875]
[1876]
[1877]
[1878]
[1879]
[1880]
[1881]
[1882]
[1883]
[1884]
[1885]
[1886]
[1887]
[1888]
[1889]
[1890]
[1891]
[1892]
[1893]
[1894]
[1895]
[1896]
[1897]
[1898]
[1899]
[1900]
[1901]
[1902]
[1903]
[1904]
[1905]
[1906]
[1907]
[1908]
[1909]
[1910]
[1911]
[1912]
[1913]
[1914]
[1915]
[1916]
[1917]
[1918]
[1919]
[1920]
[1921]
[1922]
[1923]
[1924]
[1925]
[1926]
[1927]
[1928]
[1929]
[1930]
[1931]
[1932]
[1933]
[1934]
[1935]
[1936]
[1937]
[1938]
[1939]
[1940]
[1941]
[1942]
[1943]
[1944]
[1945]
[1946]
[1947]
[1948]
[1949]
[1950]
[1951]
[1952]
[1953]
[1954]
[1955]
[1956]
[1957]
[1958]
[1959]
[1960]
[1961]
[1962]
[1963]
[1964]
[1965]
[1966]
[1967]
[1968]
[1969]
[1970]
[1971]
[1972]
[1973]
[1974]
[1975]
[1976]
[1977]
[1978]
[1979]
[1980]
[1981]
[1982]
[1983]
[1984]
[1985]
[1986]
[1987]
[1988]
[1989]
[1990]
[1991]
[1992]
[1993]
[1994]
[1995]
[1996]
[1997]
[1998]
[1999]
[2000]
[2001]
[2002]
[2003]
[2004]
[2005]
[2006]
[2007]
[2008]
[2009]
[2010]
[2011]
[2012]
[2013]
[2014]
[2015]
[2016]
[2017]
[2018]
[2019]
[2020]
[2021]
[2022]
[2023]
[2024]
[2025]
[2026]
[2027]
[2028]
[2029]
[2030]
[2031]
[2032]
[2033]
[2034]
[2035]
[2036]
[2037]
[2038]
[2039]
[2040]
[2041]
[2042]
[2043]
[2044]
[2045]
[2046]
[2047]
[2048]
[2049]
[2050]
[2051]
[2052]
[2053]
[2054]
[2055]
[2056]
[2057]
[2058]
[2059]
[2060]
[2061]
[2062]
[2063]
[2064]
[2065]
[2066]
[2067]
[2068]
[2069]
[2070]
[2071]
[2072]
[2073]
[2074]
[2075]
[2076]
[2077]
[2078]
[2079]
[2080]
[2081]
[2082]
[2083]
[2084]
[2085]
[2086]
[2087]
[2088]
[2089]
[2090]
[2091]
[2092]
[2093]
[2094]
[2095]
[2096]
[2097]
[2098]
[2099]
[2100]
[2101]
[2102]
[2103]
[2104]
[2105]
[2106]
[2107]
[2108]
[2109]
[2110]
[2111]
[2112]
[2113]
[2114]
[2115]
[2116]
[2117]
[2118]
[2119]
[2120]
[2121]
[2122]
[2123]
[2124]
[2125]
[2126]
[2127]
[2128]
[2129]
[2130]
[2131]
[2132]
[2133]
[2134]
[2135]
[2136]
[2137]
[2138]
[2139]
[2140]
[2141]
[2142]
[2143]
[2144]
[2145]
[2146]
[2147]
[2148]
[2149]
[2150]
[2151]
[2152]
[2153]
[2154]
[2155]
[2156]
[2157]
[2158]
[2159]
[2160]
[2161]
[2162]
[2163]
[2164]
[2165]
[2166]
[2167]
[2168]
[2169]
[2170]
[2171]
[2172]
[2173]
[2174]
[2175]
[2176]
[2177]
[2178]
[2179]
[2180]
[2181]
[2182]
[2183]
[2184]
[2185]
[2186]
[2187]
[2188]
[2189]
[2190]
[2191]
[2192]
[2193]
[2194]
[2195]
[2196]
[2197]
[2198]
[2199]
[2200]
[2201]
[2202]
[2203]
[2204]
[2205]
[2206]
[2207]
[2208]
[2209]
[2210]
[2211]
[2212]
[2213]
[2214]
[2215]
[2216]
[2217]
[2218]
[2219]
[2220]
[2221]
[2222]
[2223]
[2224]
[2225]
[2226]
[2227]
[2228]
[2229]
[2230]
[2231]
[2232]
[2233]
[2234]
[2235]
[2236]
[2237]
[2238]
[2239]
[2240]
[2241]
[2242]
[2243]
[2244]
[2245]
[2246]
[2247]
[2248]
[2249]
[2250]
[2251]
[2252]
[2253]
[2254]
[2255]
[2256]
[2257]
[2258]
[2259]
[2260]
[2261]
[2262]
[2263]
[2264]
[2265]
[2266]
[2267]
[2268]
[2269]
[2270]
[2271]
[2272]
[2273]
[2274]
[2275]
[2276]
[2277]
[2278]
[2279]
[2280]
[2281]
[2282]
[2283]
[2284]
[2285]
[2286]
[2287]
[2288]
[2289]
[2290]
[2291]
[2292]
[2293]
[2294]
[2295]
[2296]
[2297]
[2298]
[2299]
[2300]
[2301]
[2302]
[2303]
[2304]
[2305]
[2306]
[2307]
[2308]
[2309]
[2310]
[2311]
[2312]
[2313]
[2314]
[2315]
[2316]
[2317]
[2318]
[2319]
[2320]
[2321]
[2322]
[2323]
[2324]
[2325]
[2326]
[2327]
[2328]
[2329]
[2330]
[2331]
[2332]
[2333]
[2334]
[2335]
[2336]
[2337]
[2338]
[2339]
[2340]
[2341]
[2342]
[2343]
[2344]
[2345]
[2346]
[2347]
[2348]
[2349]
[2350]
[2351]
[2352]
[2353]
[2354]
[2355]
[2356]
[2357]
[2358]
[2359]
[2360]
[2361]
[2362]
[2363]
[2364]
[2365]
[2366]
[2367]
[2368]
[2369]
[2370]
[2371]
[2372]
[2373]
[2374]
[2375]
[2376]
[2377]
[2378]
[2379]
[2380]
[2381]
[2382]
[2383]
[2384]
[2385]
[2386]
[2387]
[2388]
[2389]
[2390]
[2391]
[2392]
[2393]
[2394]
[2395]
[2396]
[2397]
[2398]
[2399]
[2400]
[2401]
[2402]
[2403]
[2404]
[2405]
[2406]
[2407]
[2408]
[2409]
[2410]
[2411]
[2412]
[2413]
[2414]
[2415]
[2416]
[2417]
[2418]
[2419]
[2420]
[2421]
[2422]
[2423]
[2424]
[2425]
[2426]
[2427]
[2428]
[2429]
[2430]
[2431]
[2432]
[2433]
[2434]
[2435]
[2436]
[2437]
[2438]
[2439]
[2440]
[2441]
[2442]
[2443]
[2444]
[2445]
[2446]
[2447]
[2448]
[2449]
[2450]
[2451]
[2452]
[2453]
[2454]
[2455]
[2456]
[2457]
[2458]
[2459]
[2460]
[2461]
[2462]
[2463]
[2464]
[2465]
[2466]
[2467]
[2468]
[2469]
[2470]
[2471]
[2472]
[2473]
[2474]
[2475]
[2476]
[2477]
[2478]
[2479]
[2480]
[2481]
[2482]
[2483]
[2484]
[2485]
[2486]
[2487]
[2488]
[2489]
[2490]
[2491]
[2492]
[2493]
[2494]
[2495]
[2496]
[2497]
[2498]
[2499]
[2500]
[2501]
[2502]
[2503]
[2504]
[2505]
[2506]
[2507]
[2508]
[2509]
[2510]
[2511]
[2512]
[2513]
[2514]
[2515]
[2516]
[2517]
[2518]
[2519]
[2520]
[2521]
[2522]
[2523]
[2524]
[2525]
[2526]
[2527]
[2528]
[2529]
[2530]
[2531]
[2532]
[2533]
[2534]
[2535]
[2536]
[2537]
[2538]
[2539]
[2540]
[2541]
[2542]
[2543]
[2544]
[2545]
[2546]
[2547]
[2548]
[2549]
[2550]
[2551]
[2552]
[2553]
[2554]
[2555]
[2556]
[2557]
[2558]
[2559]
[2560]
[2561]
[2562]
[2563]
[2564]
[2565]
[2566]
[2567]
[2568]
[2569]
[2570]
[2571]
[2572]
[2573]
[2574]
[2575]
[2576]
[2577]
[2578]
[2579]
[2580]
[2581]
[2582]
[2583]
[2584]
[2585]
[2586]
[2587]
[2588]
[2589]
[2590]
[2591]
[2592]
[2593]
[2594]
[2595]
[2596]
[2597]
[2598]
[2599]
[2600]
[2601]
[2602]
[2603]
[2604]
[2605]
[2606]
[2607]
[2608]
[2609]
[2610]
[2611]
[2612]
[2613]
[2614]
[2615]
[2616]
[2617]
[2618]
[2619]
[2620]
[2621]
[2622]
[2623]
[2624]
[2625]
[2626]
[2627]
[2628]
[2629]
[2630]
[2631]
[2632]
[2633]
[2634]
[2635]
[2636]
[2637]
[2638]
[2639]
[2640]
[2641]
[2642]
[2643]
[2644]
[2645]
[2646]
[2647]
[2648]
[2649]
[2650]
[2651]
[2652]
[2653]
[2654]
[2655]
[2656]
[2657]
[2658]
[2659]
[2660]
[2661]
[2662]
[2663]
[2664]
[2665]
[2666]
[2667]
[2668]
[2669]
[2670]
[2671]
[2672]
[2673]
[2674]
[2675]
[2676]
[2677]
[2678]
[2679]
[2680]
[2681]
[2682]
[2683]
[2684]
[2685]
[2686]
[2687]
[2688]
[2689]
[2690]
[2691]
[2692]
[2693]
[2694]
[2695]
[2696]
[2697]
[2698]
[2699]
[2700]
[2701]
[2702]
[2703]
[2704]
[2705]
[2706]
[2707]
[2708]
[2709]
[2710]
[2711]
[2712]
[2713]
[2714]
[2715]
[2716]
[2717]
[2718]
[2719]
[2720]
[2721]
[2722]
[2723]
[2724]
[2725]
[2726]
[2727]
[2728]
[2729]
[2730]
[2731]
[2732]
[2733]
[2734]
[2735]
[2736]
[2737]
[2738]
[2739]
[2740]
[2741]
[2742]
[2743]
[2744]
[2745]
[2746]
[2747]
[2748]
[2749]
[2750]
[2751]
[2752]
[2753]
[2754]
[2755]
[2756]
[2757]
[2758]
[2759]
[2760]
[2761]
[2762]
[2763]
[2764]
[2765]
[2766]
[2767]
[2768]
[2769]
[2770]
[2771]
[2772]
[2773]
[2774]
[2775]
[2776]
[2777]
[2778]
[2779]
[2780]
[2781]
[2782]
[2783]
[2784]
[2785]
[2786]
[2787]
[2788]
[2789]
[2790]
[2791]
[2792]
[2793]
[2794]
[2795]
[2796]
[2797]
[2798]
[2799]
[2800]
[2801]
[2802]
[2803]
[2804]
[2805]
[2806]
[2807]
[2808]
[2809]
[2810]
[2811]
[2812]
[2813]
[2814]
[2815]
[2816]
[2817]
[2818]
[2819]
[2820]
[2821]
[2822]
[2823]
[2824]
[2825]
[2826]
[2827]
[2828]
[2829]
[2830]
[2831]
[2832]
[2833]
[2834]
[2835]
[2836]
[2837]
[2838]
[2839]
[2840]
[2841]
[2842]
[2843]
[2844]
[2845]
[2846]
[2847]
[2848]
[2849]
[2850]
[2851]
[2852]
[2853]
[2854]
[2855]
[2856]
[2857]
[2858]
[2859]
[2860]
[2861]
[2862]
[2863]
[2864]
[2865]
[2866]
[2867]
[2868]
[2869]
[2870]
[2871]
[2872]
[2873]
[2874]
[2875]
[2876]
[2877]
[2878]
[2879]
[2880]
[2881]
[2882]
[2883]
[2884]
[2885]
[2886]
[2887]
[2888]
[2889]
[2890]
[2891]
[2892]
[2893]
[2894]
[2895]
[2896]
[2897]
[2898]
[2899]
[2900]
[2901]
[2902]
[2903]
[2904]
[2905]
[2906]
[2907]
[2908]
[2909]
[2910]
[2911]
[2912]
[2913]
[2914]
[2915]
[2916]
[2917]
[2918]
[2919]
[2920]
[2921]
[2922]
[2923]
[2924]
[2925]
[2926]
[2927]
[2928]
[2929]
[2930]
[2931]
[2932]
[2933]
[2934]
[2935]
[2936]
[2937]
[2938]
[2939]
[2940]
[2941]
[2942]
[2943]
[2944]
[2945]
[2946]
[2947]
[2948]
[2949]
[2950]
[2951]
[2952]
[2953]
[2954]
[2955]
[2956]
[2957]
[2958]
[2959]
[2960]
[2961]
[2962]
[2963]
[2964]
[2965]
[2966]
[2967]
[2968]
[2969]
[2970]
[2971]
[2972]
[2973]
[2974]
[2975]
[2976]
[2977]
[2978]
[2979]
[2980]
[2981]
[2982]
[2983]
[2984]
[2985]
[2986]
[2987]
[2988]
[2989]
[2990]
[2991]
[2992]
[2993]
[2994]
[2995]
[2996]
[2997]
[2998]
[2999]
[3000]
[3001]
[3002]
[3003]
[3004]
[3005]
[3006]
[3007]
[3008]
[3009]
[3010]
[3011]
[3012]
[3013]
[3014]
[3015]
[3016]
[3017]
[3018]
[3019]
[3020]
[3021]
[3022]
[3023]
[3024]
[3025]
[3026]
[3027]
[3028]
[3029]
[3030]
[3031]
[3032]
[3033]
[3034]
[3035]
[3036]
[3037]
[3038]
[3039]
[3040]
[3041]
[3042]
[3043]
[3044]
[3045]
[3046]
[3047]
[3048]
[3049]
[3050]
[3051]
[3052]
[3053]
[3054]
[3055]
[3056]
[3057]
[3058]
[3059]
[3060]
[3061]
[3062]
[3063]
[3064]
[3065]
[3066]
[3067]
[3068]
[3069]
[3070]
[3071]
[3072]
[3073]
[3074]
[3075]
[3076]
[3077]
[3078]
[3079]
[3080]
[3081]
[3082]
[3083]
[3084]
[3085]
[3086]
[3087]
[3088]
[3089]
[3090]
[3091]
[3092]
[3093]
[3094]
[3095]
[3096]
[3097]
[3098]
[3099]
[3100]
[3101]
[3102]
[3103]
[3104]
[3105]
[3106]
[3107]
[3108]
[3109]
[3110]
[3111]
[3112]
[3113]
[3114]
[3115]
[3116]
[3117]
[3118]
[3119]
[3120]
[3121]
[3122]
[3123]
[3124]
[3125]
[3126]
[3127]
[3128]
[3129]
[3130]
[3131]
[3132]
[3133]
[3134]
[3135]
[3136]
[3137]
[3138]
[3139]
[3140]
[3141]
[3142]
[3143]
[3144]
[3145]
[3146]
[3147]
[3148]
[3149]
[3150]
[3151]
[3152]
[3153]
[3154]
[3155]
[3156]
[3157]
[3158]
[3159]
[3160]
[3161]
[3162]
[3163]
[3164]
[3165]
[3166]
[3167]
[3168]
[3169]
[3170]
/*****************************************************************************/
/*
                                Service.c

This module provides a complementary function to CONFIG.C, which basically
configures per-HTTPD process runtime characterstics, whereas SERVICE.C allows
per-service (essentially virtual services) characteristics to be specified. 
While there is some overlap between the two they do perform different tasks.

Prior to WASD v7.1 service configuration was performed by CONFIG.C as part of
general configuration.  This had it's limitations and this module goes some way
in providing a more flexible and understandable configuration environment. 
This module configuration file, HTTP$SERVICE, does not have to be used and if
is not present the HTTP$CONFIG configuration file [Service] directive will
continue to provide backward-compatible service configuration.  However, new
features will only be incorporated via this module, and HTTP$SERVICE is
available it's service configuration overrides anything still present in
WASD_CONFIG.

All service directives must be delimitted with '[' and ']'.  The (virtual)
service they apply to are specified with the usual '[[' and ']]' directive.

  [[http://the.host.name:80]]
  [ServiceIPaddress] 130.185.250.1 
  [ServiceProxy]  disabled
  [ServiceNoLog]  disabled
  [ServiceBodyTag]  
  [ServiceErrorReportPath]  
    
Both IPv4 and IPv6 addresses may be used to specify a service name and or
service address.  This can be in normal or compressed form.  If part of a
service name hyphens should be substituted for colons so that the port can be
differentiated from the service address.

  [[http://130.185.250.1:80]]
  [[http://--FFFF-130.185.250.1:80]]
  [[http://--FFFF-1FA-B983:80]]

In the case of a service specification a 'generic' host name can be specified
using "*".  This generic host name is replaced with the IP host name of
whichever system starts the server.  This is a simple way for providing a basic
or common service on all members of a cluster for instance.

  [[http://*:80]]
  [ServiceProxy]  disabled
  [ServiceNoLog]  disabled

This configuration file only really needs to be used for more complex service
configurations.  Basic HTTP and HTTPS services need only be specified using the
the WASD_CONFIG_GLOBAL [Service] directive.

The [IncludeFile] directive takes a VMS file name as a parameter.  It then
attempts to read and insert any directives contained in that file into the
current point in the server configuration.  Files may be nested one deep (i.e.
a main configuration file allowed to include other files, but the other file
not allowed in include yet more).


PRECEDENCE OF SERVICE SPECIFICATIONS
------------------------------------
1. /SERVICE= command line qualifier
2. WASD_CONFIG_SERVER configuration file (if logical defined and file exists)
3. WASD_CONFIG_GLOBAL [Service] directive


WASD_CONFIG_SERVICE DIRECTIVES
------------------------
  o  IncludeFile                    <filename>
  o  ServiceAdmin                   DISABLED | ENABLED
  o  ServiceBind                    <string>
  o  ServiceBodyTag                 <string>
  o  ServiceConnect                 DISABLED | ENABLED
  o  ServiceClientSSL               DISABLED | ENABLED
  o  ServiceClientSSLCaFile         <string>
  o  ServiceClientSSLcert           <string>
  o  ServiceClientSSLcipherList     <string>
  o  ServiceClientSSLkey            <string>
  o  ServiceClientSSLverifyCA       DISABLED | ENABLED
  o  ServiceClientSSLversion        <string>
  o  ServiceErrorReportPath         <string>
  o  ServiceHttp2Protocol           DISABLED | ENABLED (default)
  o  ServiceLogFormat               <string>
  o  ServiceNoLog                   DISABLED | ENABLED
  o  ServiceNonSSLRedirect          <host-name>|<IP-address>[:<port>]
  o  ServiceProxy                   DISABLED | ENABLED
  o  ServiceProxyAffinity           DISABLED | ENABLED
  o  ServiceProxyAuth               NONE | PROXY | CHAIN | LOCAL
  o  ServiceProxyCache              obsolete as of v12.0.0
  o  ServiceProxyChain              <string>
  o  ServiceProxyChainCred          <username>:<password>
  o  ServiceProxyBind               <string>
  o  ServiceProxyTunnel             CONNECT | FIREWALL | RAW
  o  ServiceProxyReworkMax          <integer>
  o  ServiceRawSocket               DISABLED | ENABLED
  o  ServiceShareSSH                <integer> 
  o  ServiceSSLcert                 <string>
  o  ServiceSSLcipherList           <string>
  o  ServiceSSLoptions              <string>
  o  ServiceSSLverifyPeer           DISABLED | ENABLED | OPTIONAL
  o  ServiceSSLverifyPeerCAfile     <string>
  o  ServiceSSLverifyDataMax        <integer>
  o  ServiceSSLverifyPeerDepth      <integer>
  o  ServiceSSLversion              <string>
  o  ServiceSSLkey                  <string>
  o  ServiceSSLstrictTransSec       <integer> [<string>]


COMMAND-LINE PARAMETERS
-----------------------
The following syntax and values are also available for both the WASD_CONFIG
[service] configuration parameter and /SERVICE= qualifier.  Also see SESOLA.C
for SSL parameter processing.

  http:                      system host name, HTTP service
  https:                     system host name, SSL service
  http:port                  system host name, supplied port, HTTP service
  https:port                 system host name, supplied SSL service
  http://host.domain         specified host name, pot 80, HTTP service
  https://host.domain        specified host name port 443, SSL service
  http://host.domain:port    specified host name and port, HTTP service
  https://host.domain:port   specified host name and port, SSL service
  ;admin                     service is for per-instance administration
  ;bind=                     supplied IP address for service
  ;ip=                       supplied IP address for service
  ;cafile=                   CA file for verifying X.509 certificates
  ;cert=                     SSL service's non-default server certificate
  ;chain=                    service chains to up-stream proxy service
  ;cipher=                   SSL service's specific, non-default cipher list
  ;connect                   service provides SSL connect proxy access
  ;key=                      SSL service's non-default server RSA private key
  ;lauth                     local authorization required
  ;backlog=                  listen queue length
  ;pauth                     proxy authorization required
  ;pbind                     supplied IP address for proxy socket
  ;pclientssl                client SSL supported
  ;proxy                     service provide proxy access
  ;verify                    always verify SSL connection using X.509 cert

For example:

  [service]
  http://host.name:8080;proxy;connect
  https://host.name:443;cert=HT_ROOT:[LOCAL]SITE.PEM


VERSION HISTORY
---------------
14-MAR-2021  MGD  proxy caching obsolete
26-FEB-2021  MGD  [ServiceConnect] respond at connection on a port
                  [ServiceProxyReworkMax] to allow proxy reworking
15-AUG-2020  MGD  if no service configured create http: and https: ex nihilo
30-NOV-2016  MGD  [ServiceRawSocket] service is raw [web]socket
                  ensure HTTP/2 is disabled on "tunnel" services
06-JUN-2016  MGD  [ServiceSSLsessionTimeout] lifetime of session ticket or ID
                  [ServiceSSLverifyPeerDataMax] <integer>
                  bugfix; ServiceReviseNow() next new service (other items)
21-FEB-2015  MGD  [ServiceSSLstrictTransSec] <string>
17-JAN-2015  MGD  ServiceConfigLoadCallback() StringBuffer[4096];
15-NOV-2014  MGD  [ServiceSSLoptions] <string>
04-OCT-2013  MGD  [ServiceNonSSLRedirect] <host-name>|<IP-address>[:<port>]
06-MAR_2011  MGD  ServiceEntityMatch() processes in-match and if-not-match
30-OCT-2010  MGD  ServiceFindVirtual() make "Host:" beginning "www." find
                    services with the same remaining domain (eliminates the
                    need to have parallel "www.name.dom" and "name.dom")
12-SEP-2010  MGD  ServiceReportNow() add synopsis to service report
10-JUN-2010  MGD  bugfix; allow METACON_TOKEN_INCLUDE for [IncludeFile]
27-FEB-2010  MGD  [ServiceProxyChainCred] down-stream proxy credentials
21-JAN-2010  MGD  ServiceChange()
15-NOV-2009  MGD  [ServiceShareSSH] share with (allow proxy to) SSH (timeout)
13-OCT-2009  MGD  allow for []-delimited IPv6 address (as service names)
                  ServiceFindVirtual() allow for IPv6 interface in "Host:"
22-AUG-2009  MGD  bugfix; ServiceConfigFromString() create and use
                    temporary service structure if generating report
31-JUL-2009  MGD  ServiceConfigAdd() use INADDR_ANY if host name lookup fails
26-MAY-2009  MGD  [ServiceLogFormat] user defined format
23-OCT-2007  MGD  [ServiceProxyAuth] CHAIN
22-APR-2006  MGD  [ServiceProxyAffinity]
11-JUN-2005  MGD  allow [ServiceErrorReportPath] to specify a negative
                  code to exclude that from error reporting (e.g. -401)
20-APR-2005  MGD  add 'SSL Shared With:' report line
20-JAN-2005  MGD  bugfix; ServiceConfigAdd(), NetHostNameLookup() status check
14-NOV-2004  MGD  bugfix; reporting configuration errors (confusing
                  mention of next service, rather than current service)
15-AUG-2004  MGD  [ServiceClientSSLcert], [ServiceClientSSLkey]
10-AUG-2004  MGD  'tunnelling' concept generalises CONNECT method
06-AUG-2004  MGD  bugfix; ServiceFindVirtual() port string comparison
10-APR-2004  MGD  significant modifications to support IPv6
28-JAN-2004  MGD  service access log report (via LoggingReport())
15-AUG-2003  MGD  where CDATA constraints make using &#10; entity impossible
                  use a field name of hidden$lf and &#94; substituted for it,
                  bugfix; ServiceConfigReviseNow() form element names must be
                  unique (technically correct and enforced by modern browsers)
08-JUN-2003  MGD  bugfix; ServiceConfigFromString() (jpp@esme.fr)
28-JAN-2003  MGD  relax ServiceParse() so that [[the.host.name]] is accepted
                  (i.e. without both scheme and port)
30-SEP-2002  MGD  bugfix; ServiceConfigFromString()
21-SEP-2002  MGD  bugfix; make WASD_CONFIG_SERVICE not found non-fatal
15-MAY-2002  MGD  change [ServiceProxyHttpSSL] to [ServiceClientSSL]
23-FEB-2002  MGD  change [ServiceSSLclientVerify..] to [ServiceSSLverifyPeer..]
                  to avoid confusion with unrelated [ServiceClientSSL..]
06-JAN-2002  MGD  [ServiceProxyHttpSSL..] HTTP to SSL (HTTPS) gateway
14-OCT-2001  MGD  [ServiceProxyBind], [ServiceIPaddress] to [ServiceBind]
29-SEP-2001  MGD  instance support (including admin service)
15-SEP-2001  MGD  meta-config
04-AUG-2001  MGD  support module WATCHing
04-JUL-2001  MGD  additional information in service report
27-JUN-2001  MGD  bugfix; parsing of [ServiceProxyChain]
28-FEB-2001  MGD  OdsLoadTextFile(), OdsParseTextFile(), [IncludeFile]
16-FEB-2001  MGD  add service-based error report status code handling
10-DEC-2000  MGD  SSL client certificate verification
21-NOV-2000  MGD  allow for generic service (no host name specified)
17-JUN-2000  MGD  initial
*/
/*****************************************************************************/

#ifdef WASD_VMS_V7
#undef _VMS__V6__SOURCE
#define _VMS__V6__SOURCE
#undef __VMS_VER
#define __VMS_VER 70000000
#undef __CRTL_VER
#define __CRTL_VER 70000000
#endif

/* standard C header files */
#include <ctype.h>
#include <errno.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

/* VMS related header files */
#include <lnmdef.h>
#include <ssdef.h>
#include <stsdef.h>

/* application related header */
#include "wasd.h"

#define WASD_MODULE "SERVICE"

/******************/
/* global storage */
/******************/

BOOL  ServiceAdminSpecified,
      ServiceConfigFileDefined;
      ServiceLoadFromConfigFile,
      ServiceWwwImplied;
 
SERVICE_META  ServiceMeta;
SERVICE_META  *ServiceMetaPtr;

LIST_HEAD  ServiceList;

char  ErrorServiceList [] = "service list confusing";

/********************/
/* external storage */
/********************/

#ifdef DBUG
extern BOOL Debug;
#else
#define Debug 0 
#endif

extern BOOL  HttpdServerStartup,
             LoggingPerService,
             ProtocolHttpsAvailable,
             ProtocolHttpsConfigured;

extern int  OpcomMessages,
            ServerPort;

extern int  ToLowerCase[],
            ToUpperCase[];

extern char  CliServices[],
             ErrorSanityCheck[],
             ServerHostName[],
             ServerHostPort[],
             SoftwareID[];

extern CONFIG_STRUCT  Config;
extern META_CONFIG  *MetaGlobalServicePtr;
extern MSG_STRUCT  Msgs;
extern WATCH_STRUCT  Watch;

/*****************************************************************************/
/*
*/ 
 
int ServiceConfigLoad (META_CONFIG **MetaConPtrPtr)

{
   int  status;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE, "ServiceConfigLoad()");

   ServiceWwwImplied = Config.cfMisc.WwwImplied;

   if (!ServiceConfigFileDefined && v10orPrev10(CONFIG_SERVICE_FILE_NAME,0))
      ServiceConfigFileDefined = ServiceLoadFromConfigFile = true;

   if (CliServices[0] || !ServiceLoadFromConfigFile)
   {
      /* set services using /SERVICE=, or no service configuration file */
      ServiceLoadFromConfigFile = false;
      status = ServiceConfigFromString (MetaConPtrPtr);
   }
   else
   {
      ServiceLoadFromConfigFile = true;
      status = MetaConLoad (MetaConPtrPtr,
                            v10orPrev10(CONFIG_SERVICE_FILE_NAME,0),
                            &ServiceConfigLoadCallback, true, false);
   }

   if (*MetaConPtrPtr == MetaGlobalServicePtr)
   {
      /* server startup */
      MetaConStartupReport (MetaGlobalServicePtr, "SERVICE");
      if (VMSnok (status))
      {
         /* the WASD_CONFIG_SERVICE file does not *have* to exist! */
         if (status != RMS$_FNF) exit (status);
         status = SS$_NORMAL;
      }

      if (!ServiceList.EntryCount)
      {
         ErrorNoticed (NULL, 0, "no service configured - ex nihilo...", FI_LI);
         ServiceLoadFromConfigFile = false;
         status = ServiceConfigFromString (MetaConPtrPtr);
      }
   }

   return (status);
}

/*****************************************************************************/
/*
Called by MetaConUnload() to free resources allocated during service
configuration.
*/ 
 
ServiceConfigUnload (META_CONFIG *mcptr)

{
   int  status;
   SERVICE_META  *smptr;
   SERVICE_STRUCT *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE, "ServiceConfigUnload()");

   smptr = mcptr->ServiceMetaPtr;
   if (smptr && smptr != ServiceMetaPtr)
   {
      LIST_ITERATE (svptr, smptr->ServiceListPtr)
      {
         if (svptr->SSLserverPtr) VmFree (svptr->SSLserverPtr, FI_LI);
         if (svptr->SSLclientPtr) VmFree (svptr->SSLclientPtr, FI_LI);
         VmFree (svptr, FI_LI);
      }
      VmFree (smptr, FI_LI);
      mcptr->ServiceMetaPtr = NULL;
   }
}

/*****************************************************************************/
/*
Called after each service has been fully configured.
*/ 
 
ServiceConfigPostProcess (META_CONFIG *mcptr)

{
   static char  ProblemCannotConfig [] = "Cannot configure service";

   int  status;
   SERVICE_META  *smptr;
   SERVICE_STRUCT *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE, "ServiceConfigPostProcess()");

   smptr = mcptr->ServiceMetaPtr;

   if (smptr->ServiceLooksValid)
   {
      svptr = &smptr->ConfigService;

      /* disable irrelevant attributes */
      if (svptr->RawSocket)
      {
         svptr->AdminService = svptr->Http2Enabled =
            svptr->ProxyService = svptr->ConnectService = false;
         svptr->ShareSSH = 0;
      }
      else
      if (svptr->ConnectService)
      {
         svptr->AdminService = svptr->Http2Enabled =
            svptr->ProxyService = svptr->RawSocket = false;
         svptr->ShareSSH = 0;
      }
      else
      if (svptr->ProxyTunnel == PROXY_TUNNEL_CONNECT ||
          svptr->ProxyTunnel == PROXY_TUNNEL_FIREWALL ||
          svptr->ProxyTunnel == PROXY_TUNNEL_RAW)
         svptr->Http2Enabled = false;

      mcptr->ReportLinePtr = smptr->ServiceLine;
      mcptr->ReportLineNumber = smptr->ServiceLineNumber;
      status = ServiceConfigAdd (mcptr, &smptr->ConfigService);
      if (VMSnok (status))
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemCannotConfig);
      mcptr->ReportLinePtr = NULL;
      mcptr->ReportLineNumber = 0;
   }
}

/*****************************************************************************/
/*
For each non-meta-config directive line read by MetaConLoad() this function is
called to parse the line text's contents and to configure the private data
structure associated with each rule.
*/

BOOL ServiceConfigLoadCallback (META_CONFIG *mcptr)

{
   static char  ProblemUnknownKeyword [] = "Unknown keyword",
                ProblemObsolete [] = "Directive is obsolete",
                ProblemDirective [] = "Unknown directive",
                ProblemInvalidService [] = "Invalid service specification",
                ProblemOverflow [] = "Storage overflow",
                ProblemNoSSL [] = "SSL not available",
                ProblemUsage [] = "Cannot use during service configuration";

   int  status,
        retval,
        LineLength;
   char  *cptr, *sptr, *zptr;
   char  StringBuffer [4096],
         StringScratch [4096];
   SERVICE_META  *smptr;
   METACON_LINE  *mclptr;
   SERVICE_STRUCT  *svptr;
   SESOLA_CONTEXT  *scptr, *ssptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
   {
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceConfigLoadCallback() !&F !&X",
                 &ServiceConfigLoadCallback, mcptr);
      if (WATCH_MODULE(WATCH_MOD__DETAIL))
      {
         mclptr = mcptr->ParsePtr;
         WatchDataFormatted ("!&X !UL !UL !UL !UL !&X !&Z !&Z\n",
            mclptr, mclptr->Size, mclptr->Token, mclptr->Number,
            mclptr->Length, mclptr->LineDataPtr, mclptr->TextPtr,
            mclptr->InlineTextPtr);
      }
   }

   /* get a pointer to the current "line" */
   mclptr = mcptr->ParsePtr;

   if (mcptr == MetaGlobalServicePtr)
   {
      /* at server startup set the global service pointer */
      smptr = mcptr->ServiceMetaPtr = ServiceMetaPtr = &ServiceMeta;
      /* use the global service list */
      smptr->ServiceListPtr = &ServiceList;
   }
   else
   if (!mcptr->ServiceMetaPtr)
   {
      /* with a report conjure one up ex nihlo */
      smptr = mcptr->ServiceMetaPtr = VmGet (sizeof(SERVICE_META));
      /* use the internal service list */
      smptr->ServiceListPtr = &smptr->ServiceList;
   }
   else
      /* not the first time through */
      smptr = mcptr->ServiceMetaPtr;

   if (mclptr->Token == METACON_TOKEN_PRE)
   {
      /******************/
      /* pre-initialize */
      /******************/

      return (true);
   }

   if (mclptr->Token == METACON_TOKEN_POST)
   {
      /****************/
      /* post-process */
      /****************/

      /* if last loaded service add this to the list */
      ServiceConfigPostProcess (mcptr);

      return (true);
   }

   if (mclptr->Token == METACON_TOKEN_INCLUDE) return (true);

   if (mclptr->Token == METACON_TOKEN_VERSION) return (true);

   if (mclptr->Token != METACON_TOKEN_SERVICE &&
       mclptr->Token != METACON_TOKEN_TEXT)
   {
      /* only interested in services and directive text */
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemUsage);
      return (true);
   }

   /***********/
   /* process */
   /***********/

   /* this service config structure will be used as working storage */
   svptr = &smptr->ConfigService;

   /* buffer the text associated with the current "line" */
   zptr = (sptr = StringBuffer) + sizeof(StringBuffer);
   cptr = mclptr->TextPtr;
   while (*cptr && sptr < zptr) *sptr++ = *cptr++;
   if (sptr >= zptr)
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemOverflow);
      return (false);
   }
   *sptr = '\0';
   cptr = StringBuffer;

   if (mclptr->Token == METACON_TOKEN_SERVICE)
   {
      /***************************/
      /* next (or first) service */
      /***************************/

      /* if previous valid service add this to the list */
      ServiceConfigPostProcess (mcptr);

      /* initialize service structure */
      memset (svptr, 0, sizeof(SERVICE_STRUCT));
      smptr->ServiceLooksValid = false;

      /* for MetaconReport() note line details for when ServiceConfigAdd() */
      strzcpy (smptr->ServiceLine,
               mcptr->CurrentOdsPtr->DataLinePtr,
               sizeof(smptr->ServiceLine));
      smptr->ServiceLineNumber = mcptr->CurrentOdsPtr->DataLineNumber;

      /* enable unless explicitly disabled */
      svptr->Http2Enabled = true;

      /* avoid loading the "next new service" entry ;^) */
      if (strchr (cptr, '?')) return (true);

      /*******************/
      /* process service */
      /*******************/

      smptr->ServiceLooksValid = true;

      retval = ServiceParse (cptr,
                             &svptr->RequestScheme,
                             &svptr->ServerHostName,
                             sizeof(svptr->ServerHostName),
                             &svptr->ServerPort,
                             &svptr->GenericService);

      if (retval == -1)
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemInvalidService);
         smptr->ServiceLooksValid = false;
      }

      if (svptr->RequestScheme == SCHEME_HTTPS)
      {
         if (ProtocolHttpsAvailable)
            svptr->SSLserverPtr = VmGet (sizeof(SESOLA_CONTEXT));
         else
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemNoSSL);
            smptr->ServiceLooksValid = false;
         }
      }

      return (true);
   }

   /**********************/
   /* service directives */
   /**********************/

   if (*cptr == '[')
   {
      cptr++;
      for (sptr = cptr; *sptr && *sptr != ']'; sptr++);
      if (*sptr != ']')
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, "missing \']\'?");
         return (true);
      }
      *sptr++ = '\0';
      while (*sptr && ISLWS(*sptr)) sptr++;
   }

   /****************************************************/
   /* ignore directives unless server specification ok */
   /****************************************************/

   if (!smptr->ServiceLooksValid) return (true);

   ssptr = svptr->SSLserverPtr;
   scptr = svptr->SSLclientPtr;

   if (strsame (cptr, "ServiceAdmin", -1))
      svptr->AdminService = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceBind", -1) ||
       /* and for backward compatibility */
       strsame (cptr, "ServiceIPaddress", -1))
   {
      MetaConSetString (mcptr, sptr, svptr->BindIpAddressString,
                        sizeof(svptr->BindIpAddressString));
      /* the convention for IPv6 literal hexadecimal is  upper-case */
      for (cptr = svptr->BindIpAddressString; *cptr; cptr++)
         *cptr = TOUP(*cptr);
   }
   else
   if (strsame (cptr, "ServiceBodyTag", -1))
      MetaConSetString (mcptr, sptr, svptr->BodyTag, sizeof(svptr->BodyTag));
   else
   if (strsame (cptr, "ServiceClientSSL", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      svptr->SSLclientEnabled = MetaConSetBoolean (mcptr, sptr);
   }
   else
   if (strsame (cptr, "ServiceClientSSLCaFile", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, scptr->CaFile, sizeof(scptr->CaFile));
   }
   else
   if (strsame (cptr, "ServiceClientSSLcert", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, scptr->CertFile, sizeof(scptr->CertFile));
   }
   else
   if (strsame (cptr, "ServiceClientSSLcipherList", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, scptr->CipherList,
                        sizeof(scptr->CipherList));
   }
   else
   if (strsame (cptr, "ServiceClientSSLkey", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, scptr->KeyFile, sizeof(scptr->KeyFile));
   }
   else
   if (strsame (cptr, "ServiceClientSSLverifyCA", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      scptr->VerifyCA = MetaConSetBoolean (mcptr, sptr);
   }
   else
   if (strsame (cptr, "ServiceClientSSLversion", -1))
   {
      if (!scptr) svptr->SSLclientPtr = scptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, scptr->VersionString,
                        sizeof(scptr->VersionString));
   }
   else
   if (strsame (cptr, "ServiceErrorReportPath", -1))
      MetaConSetString (mcptr, sptr, svptr->ErrorReportPath,
                        sizeof(svptr->ErrorReportPath));
   else
   if (strsame (cptr, "ServiceHttp2Protocol", -1))
      svptr->Http2Enabled = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceLogFormat", -1))
      MetaConSetString (mcptr, sptr, svptr->LogFormat,
                        sizeof(svptr->LogFormat));
   else
   if (strsame (cptr, "ServiceNoLog", -1))
      svptr->NoLog = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceNoTrack", -1))
      MetaConReport (mcptr, METACON_REPORT_INFORM, ProblemObsolete);
   else
   if (strsame (cptr, "ServiceNonSslRedirect", -1))
      MetaConSetString (mcptr, sptr, svptr->NonSslRedirect,
                        sizeof(svptr->NonSslRedirect));
   else
   if (strsame (cptr, "ServiceProxy", -1))
      svptr->ProxyService = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceProxyAffinity", -1))
      svptr->ProxyAffinity = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceProxyAuth", -1))
   {
      MetaConSetString (mcptr, sptr, StringScratch, sizeof(StringScratch));
      if (!StringScratch[0] || strsame (StringScratch, "NONE", -1))
         svptr->ProxyAuthRequired = svptr->LocalAuthRequired =
            svptr->ProxyChainAuthRequired = false;
      else
      if (strsame (StringScratch, "PROXY", -1))
         svptr->ProxyAuthRequired = true;
      else
      if (strsame (StringScratch, "CHAIN", -1))
         svptr->ProxyChainAuthRequired = true;
      else
      if (strsame (StringScratch, "LOCAL", -1))
         svptr->LocalAuthRequired = true;
      else
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemUnknownKeyword);
         smptr->ServiceLooksValid = false;
         return (true);
      }
   }
   else
   if (strsame (cptr, "ServiceProxyBind", -1))
   {
      MetaConSetString (mcptr, sptr, svptr->ProxyBindIpAddressString,
                        sizeof(svptr->ProxyBindIpAddressString));
      /* the convention for IPv6 literal hexadecimal is  upper-case */
      for (cptr = svptr->ProxyBindIpAddressString; *cptr; cptr++)
         *cptr = TOUP(*cptr);
   }
   else
   if (strsame (cptr, "ServiceProxyCache", -1))
      MetaConReport (mcptr, METACON_REPORT_INFORM, ProblemObsolete);
   else
   if (strsame (cptr, "ServiceProxyChain", -1))
      MetaConSetString (mcptr, sptr, svptr->ProxyChainHostPort,
                        sizeof(svptr->ProxyChainHostPort));
   else
   if (strsame (cptr, "ServiceProxyChainCred", -1))
      MetaConSetString (mcptr, sptr, svptr->ProxyChainCred,
                        sizeof(svptr->ProxyChainCred));
   else
   if (strsame (cptr, "ServiceProxyReworkMax", -1))
      svptr->ProxyReworkMax = MetaConSetInteger (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceProxySSL", -1))
   {
      /* backward compatibility (allows CONNECT) */
      if (MetaConSetBoolean (mcptr, sptr))
         svptr->ProxyTunnel = PROXY_TUNNEL_CONNECT;
      else
         svptr->ProxyTunnel = 0;
   }
   else
   if (strsame (cptr, "ServiceProxyTrack", -1))
      MetaConReport (mcptr, METACON_REPORT_INFORM, ProblemObsolete);
   else
   if (strsame (cptr, "ServiceProxyTunnel", -1))
   {
      MetaConSetString (mcptr, sptr, StringScratch, sizeof(StringScratch));
      if (!StringScratch[0] || strsame (StringScratch, "NONE", -1))
         svptr->ProxyTunnel = 0;
      else
      if (strsame (StringScratch, "CONNECT", -1))
         svptr->ProxyTunnel = PROXY_TUNNEL_CONNECT;
      else
      if (strsame (StringScratch, "FIREWALL", -1))
         svptr->ProxyTunnel = PROXY_TUNNEL_FIREWALL;
      else
      if (strsame (StringScratch, "RAW", -1))
         svptr->ProxyTunnel = PROXY_TUNNEL_RAW;
      else
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemUnknownKeyword);
         smptr->ServiceLooksValid = false;
         return (true);
      }
   }
   else
   if (strsame (cptr, "ServiceRawSocket", -1))
      svptr->RawSocket = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceConnect", -1))
      svptr->ConnectService = MetaConSetBoolean (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceShareSSH", -1))
      svptr->ShareSSH = MetaConSetInteger (mcptr, sptr);
   else
   if (strsame (cptr, "ServiceSSLcert", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->CertFile, sizeof(ssptr->CertFile));
   }
   else
   if (strsame (cptr, "ServiceSSLcipherList", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->CipherList,
                        sizeof(ssptr->CipherList));
   }
   else
   if (strsame (cptr, "ServiceSSLkey", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->KeyFile, sizeof(ssptr->KeyFile));
   }
   else
   if (strsame (cptr, "ServiceSSLsessionLifetime", -1))
      svptr->ShareSSH = MetaConSetSeconds (mcptr, sptr, 1);
   else
   if (strsame (cptr, "ServiceSSLoptions", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->OptionsString,
                        sizeof(ssptr->OptionsString));
   }
   else
   if (strsame (cptr, "ServiceSSLverifyPeer", -1) ||
       /* backward compatibility */
       strsame (cptr, "ServiceSSLclientVerify", -1) ||
       strsame (cptr, "ServiceSSLclientVerifyRequired", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, StringScratch, sizeof(StringScratch));
      if (!StringScratch[0] ||
          strsame (StringScratch, "DISABLED", -1) ||
          strsame (StringScratch, "NO", -1) ||
          strsame (StringScratch, "OFF", -1))
         ssptr->VerifyPeer = 0;
      else
      if (strsame (StringScratch, "ENABLED", -1) ||
          strsame (StringScratch, "YES", -1) ||
          strsame (StringScratch, "ON", -1))
         ssptr->VerifyPeer = SESOLA_VERIFY_PEER_REQUIRED;
      else
      if (strsame (StringScratch, "OPTIONAL", -1))
         ssptr->VerifyPeer = SESOLA_VERIFY_PEER_OPTIONAL;
      else
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemUnknownKeyword);
         smptr->ServiceLooksValid = false;
         return (true);
      }
   }
   else
   if (strsame (cptr, "ServiceSSLverifyPeerCAfile", -1) ||
       /* backward compatibility */
       strsame (cptr, "ServiceSSLclientVerifyCaFile", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->CaFile, sizeof(ssptr->CaFile));
   }
   else
   if (strsame (cptr, "ServiceSSLverifyPeerDataMax", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      ssptr->VerifyDataMax = MetaConSetInteger (mcptr, sptr);
   }
   else
   if (strsame (cptr, "ServiceSSLverifyPeerDepth", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      ssptr->VerifyDepth = MetaConSetInteger (mcptr, sptr);
   }
   else
   if (strsame (cptr, "ServiceSSLversion", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->VersionString,
                        sizeof(ssptr->VersionString));
   }
   else
   if (strsame (cptr, "ServiceSSLstrictTransSec", -1))
   {
      if (!ssptr) svptr->SSLserverPtr = ssptr = VmGet (sizeof(SESOLA_CONTEXT));
      MetaConSetString (mcptr, sptr, ssptr->StrictTransSec,
                        sizeof(ssptr->StrictTransSec));
   }
   else
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemDirective);

   return (true);
}

/*****************************************************************************/
/*
Add the service to the loaded list.
*/

int ServiceConfigAdd
(
META_CONFIG *mcptr,
SERVICE_STRUCT *svptr
)
{
   static BOOL  SetOfficialServer;

   int  status;
   char  *cptr, *sptr, *zptr;
   SERVICE_META  *smptr;
   SERVICE_STRUCT *nsvptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceConfigAdd() !AZ:!UL",
                 svptr->ServerHostName, svptr->ServerPort);

   /* get a pointer to the meta-config data */
   smptr = mcptr->ServiceMetaPtr;

   status = NetHostNameLookup (svptr->ServerHostName,
                               svptr->ServerPort,
                               &svptr->ServerHostName,
                               &svptr->ServerHostPort,
                               &svptr->ServerIpAddressString,
                               &svptr->ServerIpAddress, NULL);
   if (VMSnok (status))
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR,
                     "Problem resolving host name !AZ",
                     svptr->ServerHostName);
      /* set this to zero so that NetCreateService() uses primary address */
      IPADDRESS_ZERO (&svptr->ServerIpAddress);
   }

   if (svptr->BindIpAddressString[0])
   {
      status = TcpIpStringToAddress (svptr->BindIpAddressString,
                                     &svptr->BindIpAddress);
      if (VMSnok (status))
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR,
                        "Problem with !AZ bind address !AZ",
                        svptr->ServerHostName, svptr->BindIpAddressString);
         return (status);
      }
   }

   /************************/
   /* check/set parameters */
   /************************/

   if (svptr->AdminService)
   {
      if (ServiceAdminSpecified)
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR,
                        "Redundant administration service");
         return (STS$K_ERROR);
      }
      ServiceAdminSpecified = true;
   }

   svptr->ServerHostPortLength = strlen(svptr->ServerHostPort);
   svptr->ServerHostNameLength = strlen(svptr->ServerHostName);
   sprintf (svptr->ServerPortString, "%d", svptr->ServerPort); 

   if (svptr->RequestScheme == SCHEME_HTTPS)
      svptr->RequestSchemeNamePtr = "https:";
   else
      svptr->RequestSchemeNamePtr = "http:";

   if (!svptr->ListenBacklog)
      svptr->ListenBacklog = Config.cfServer.ListenBacklog;
   if (!svptr->ListenBacklog)
      svptr->ListenBacklog = DEFAULT_LISTEN_BACKLOG;

   if (svptr->ErrorReportPath[0])
      svptr->ServiceErrorReportPath = true;
   else
      strzcpy (svptr->ErrorReportPath,
               Config.cfReport.ErrorReportPath,
               sizeof(svptr->ErrorReportPath));

   /*****************************/
   /* proxy service information */
   /*****************************/

   if (svptr->ProxyService ||
       svptr->ProxyTunnel)
   {
      if (svptr->ProxyChainHostPort[0])
      {
         status = NetHostNameLookup (svptr->ProxyChainHostPort, 0,
                                     &svptr->ProxyChainHostName,
                                     &svptr->ProxyChainHostPort,
                                     &svptr->ProxyChainIpAddressString,
                                     &svptr->ProxyChainIpAddress, NULL);
         if (VMSnok (status))
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           "Problem resolving host name !AZ",
                           svptr->ProxyChainHostPort);
            return (status);
         }

         svptr->ProxyChainHostNameLength = strlen(svptr->ProxyChainHostName);
         if (!svptr->ProxyChainPort)
            svptr->ProxyChainPort = DEFAULT_HTTP_PROXY_PORT;
         sprintf (svptr->ProxyChainPortString, "%d", svptr->ProxyChainPort);
      }
   }

   if (svptr->ProxyBindIpAddressString[0])
   {
      status = TcpIpStringToAddress (svptr->ProxyBindIpAddressString,
                                     &svptr->ProxyBindIpAddress);
      if (VMSnok (status))
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR,
                        "Problem with !AZ proxy bind address !AZ",
                        svptr->ServerHostName, svptr->ProxyBindIpAddressString);
         return (status);
      }
   }

   /***************************************/
   /* allocate memory add and new service */
   /***************************************/

   /* copy the filled-out service structure into an in-list structure */
   nsvptr = VmGet (sizeof (SERVICE_STRUCT));
   memcpy (nsvptr, svptr, sizeof(SERVICE_STRUCT));

   if (svptr->SSLserverPtr)
   {
      /* SESOLA server structure */
      nsvptr->SSLserverPtr = VmGet (sizeof(SESOLA_CONTEXT));
      memcpy (nsvptr->SSLserverPtr,
              svptr->SSLserverPtr,
              sizeof(SESOLA_CONTEXT));
   }

   if (svptr->SSLclientPtr)
   {
      /* SESOLA client structure */
      nsvptr->SSLclientPtr = VmGet (sizeof(SESOLA_CONTEXT));
      memcpy (nsvptr->SSLclientPtr,
              svptr->SSLclientPtr,
              sizeof(SESOLA_CONTEXT));
   }

   ListAddTail (smptr->ServiceListPtr, nsvptr, LIST_ENTRY_TYPE_SERVICE);

   /*********/
   /* other */
   /*********/

   /* process the error report path and any associated status codes */
   for (cptr = nsvptr->ErrorReportPath; *cptr && !ISLWS(*cptr); cptr++);
   nsvptr->ErrorReportPathLength = cptr - nsvptr->ErrorReportPath;
   if (*cptr) *cptr++ = '\0';
   while (*cptr && ISLWS(*cptr)) cptr++;
   nsvptr->ErrorReportPathCodesPtr = cptr;
   nsvptr->ErrorReportPathCodesCount = 0;
   while (*cptr &&
          nsvptr->ErrorReportPathCodesCount <
          SERVICE_ERROR_REPORT_PATH_CODES_MAX)
   {
      while (*cptr && ISLWS(*cptr)) cptr++;
      if (isdigit(*cptr) || *cptr == '-') 
         nsvptr->ErrorReportPathCodes[nsvptr->ErrorReportPathCodesCount++] =
            atoi(cptr);
      while (*cptr && !ISLWS(*cptr)) cptr++;
   }
   if (nsvptr->ErrorReportPathCodesCount >=
       SERVICE_ERROR_REPORT_PATH_CODES_MAX)
      MetaConReport (mcptr, METACON_REPORT_ERROR,
                     "Error report path codes problem");

   /* process name, etc., generated from the primary port */
   if (!SetOfficialServer)
   {
      /* the host and port for the "official" server */
      SetOfficialServer = ServerPort = nsvptr->ServerPort;
      sprintf (ServerHostPort, "%s:%d", ServerHostName, ServerPort);
   }

   if (nsvptr->RequestScheme == SCHEME_HTTPS)
      if (ProtocolHttpsAvailable)
         ProtocolHttpsConfigured = true;

   return (SS$_NORMAL);
}

/*****************************************************************************/
/*
Parse a HTTP scheme, host name, and integer port number from a string. 
Defaults apply to missing components.  Some basic checking is performed on the
components.  Return the number of characters scanned from the string, or -1 to
indicate a fatal error.
*/ 

int ServiceParse
(
char *SourceString,
int *SchemeValuePtr,
char *HostNamePtr,
int SizeOfHostName,
int *PortNumberPtr,
BOOL *GenericServicePtr
)
{
   BOOL  IsHost;
   char  *cptr, *sptr, *tptr, *zptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceParse() !&Z", SourceString);

   *SchemeValuePtr = *PortNumberPtr = 0;
   *HostNamePtr = '\0';
   *GenericServicePtr = false;

   cptr = SourceString;

   if (strsame (cptr, "http:", 5))
   {
      *SchemeValuePtr = SCHEME_HTTP;
      cptr += 5;
   }
   else
   if (strsame (cptr, "https:", 6))
   {
      *SchemeValuePtr = SCHEME_HTTPS;
      cptr += 6;
   }
   else
   {
      /* if it looks like an incorrect scheme specification */
      for (tptr = cptr;
           *tptr && *tptr != '.' && *tptr != ':' && *tptr != '[';
           tptr++);
      if (tptr[0] == ':' && !isdigit(tptr[1]) && tptr[1] != '*') return (-1);
      /* otherwise it defaults to */
      *SchemeValuePtr = SCHEME_HTTP;
   }

   if (*cptr == '/') cptr++;
   if (*cptr == '/') cptr++;

   if (*cptr == '[')
   {
      /* IPv6 address */
      zptr = (sptr = HostNamePtr) + SizeOfHostName;
      while (*cptr && *cptr != ']' && sptr < zptr) *sptr++ = *cptr++;
      if (*cptr == ']' && sptr < zptr) *sptr++ = *cptr++;
      if (sptr >= zptr) return (-1);
      *sptr = '\0'; 
   }
   else
   if (isdigit(*cptr))
   {
      /* check if it's a dotted-decimal address */
      for (tptr = cptr; *tptr && isdigit(*tptr); tptr++);
      if (*tptr == '.')
      {
         /* dotted decimal address */
         zptr = (sptr = HostNamePtr) + SizeOfHostName;
         while (*cptr && (*cptr == '.' || isdigit(*cptr)) && sptr < zptr)
            *sptr++ = *cptr++;
         if (sptr >= zptr) return (-1);
         *sptr = '\0';
      }
   }
   else
   if (*cptr == '*')
   {
      /* generic service */
      while (*cptr && *cptr == '*') cptr++;
   }
   else
   {
      /* alphanumeric host name, or numeric address */
      zptr = (sptr = HostNamePtr) + SizeOfHostName;
      while (*cptr && (*cptr == '*' || *cptr == '.' || isalnum(*cptr) ||
                       *cptr == '-' || *cptr == '_') && sptr < zptr)
         *sptr++ = *cptr++;
      if (sptr >= zptr) return (-1);
      *sptr = '\0';
   }

   if (!HostNamePtr[0])
   {
      /* none or generic specified, default to primary server name */
      *GenericServicePtr = true;
      zptr = (sptr = HostNamePtr) + SizeOfHostName;
      for (tptr = ServerHostName; *tptr && sptr < zptr; *sptr++ = *tptr++);
      if (sptr >= zptr) return (-1);
      *sptr = '\0';
   }

   if (isdigit(*cptr) || (cptr[0] == ':' && isdigit(cptr[1])))
   {
      /* IP port */
      if (*cptr == ':') cptr++;
      *PortNumberPtr = atol(cptr);
      while (*cptr && isdigit(*cptr)) cptr++;
      if (*PortNumberPtr <= 0 || *PortNumberPtr > 65535) return (-1);
   }
   else
   if (*SchemeValuePtr == SCHEME_HTTPS)
      *PortNumberPtr = DEFAULT_HTTPS_PORT;
   else
      *PortNumberPtr = DEFAULT_HTTP_PORT;

   return (cptr - SourceString);
}

/*****************************************************************************/
/*
Parse the 'Service's parameter to determine which host(s)/port(s) services need
to be provided for.  This is a comma or newline separated list with no
white-space.  The service information may comprise of optional components:
"[scheme://][host][:port][;bind=address][;proxy][;chain=server][;cert=file]".
*/ 

int ServiceConfigFromString (META_CONFIG **MetaConPtrPtr)

{
   BOOL  ProxyService,
         SesolaServiceUsed;
   int  status,
        DummyRequestScheme,
        Length,
        ListenBacklog;
   char  *cptr, *sptr, *zptr;
   META_CONFIG  *mcptr;
   SERVICE_META  *smptr;
   SERVICE_STRUCT  *svptr;
   SESOLA_CONTEXT  SesolaServerService;
   SERVICE_STRUCT  ConfigService;
   char  StringScratch [256];

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceConfigFromString() !&Z !&Z !AZ:!UL",
                 CliServices, Config.cfServer.ServicePtr,
                 ServerHostName, ServerPort);

   status = MetaConLoad (MetaConPtrPtr, NULL, NULL, false, false);
   if (VMSnok (status)) return (status);

   mcptr = *MetaConPtrPtr;

   if (mcptr == MetaGlobalServicePtr)
   {
      /* during server startup set the global service pointer */
      smptr = mcptr->ServiceMetaPtr = ServiceMetaPtr = &ServiceMeta;
      /* use the global service list */
      smptr->ServiceListPtr = &ServiceList;
   }
   else
   {
      /* a report then conjure one up ex nihlo */
      smptr = mcptr->ServiceMetaPtr = VmGet (sizeof(SERVICE_META));
      /* use the internal service list */
      smptr->ServiceListPtr = &smptr->ServiceList;
   }

   if (CliServices[0])
      cptr = CliServices;
   else
   if (!Config.cfServer.ServicePtr)
   {
      if (ProtocolHttpsAvailable)
         sprintf (cptr = CliServices, "http://%s:80,https://%s:443",
                  ServerHostName, ServerHostName);
      else
         sprintf (cptr = CliServices, "http://%s:80", ServerHostName);
   }
   else
      cptr = Config.cfServer.ServicePtr;

   /******************************/
   /* parse comma-separated list */
   /******************************/

   while (*cptr)
   {
      while (*cptr && (isspace(*cptr) || *cptr == ',')) cptr++;
      if (!*cptr) break;

      memset (&ConfigService, 0, sizeof(ConfigService));
      memset (&SesolaServerService, 0, sizeof(SesolaServerService));
      SesolaServiceUsed = false;

      /*************************/
      /* service specification */
      /*************************/

      Length = ServiceParse (cptr,
                             &ConfigService.RequestScheme,
                             &ConfigService.ServerHostName,
                             sizeof(ConfigService.ServerHostName),
                             &ConfigService.ServerPort,
                             &ConfigService.GenericService);
      if (Length < 0) ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
      cptr += Length;

      if (!ProtocolHttpsAvailable &&
          ConfigService.RequestScheme == SCHEME_HTTPS)
      {
         FaoToStdout ("%HTTPD-W-SERVICE, \
SSL not available, service ignored\n \\!AZ//!AZ:!UL\\\n",
            ConfigService.RequestSchemeNamePtr,
            ConfigService.ServerHostPort);
         continue;
      }

      if (ConfigService.RequestScheme == SCHEME_HTTPS)
      {
         ConfigService.RequestSchemeNamePtr = "https:";
         SesolaServiceUsed = true;
      }
      else
         ConfigService.RequestSchemeNamePtr = "http:";

      /****************************/
      /* other service parameters */
      /****************************/

      while (*cptr == ';')
      {
         if (strsame (cptr, ";admin", 6))
            ConfigService.AdminService = true;
         else
         if (strsame (cptr, ";backlog=", 9))
         {
            cptr += 9;
            ConfigService.ListenBacklog = atoi(cptr);
         }
         else
         if (strsame (cptr, ";bind=", 6) ||
             /* for backward compatibility */
             strsame (cptr, ";ip=", 4))
         {
            while (*cptr && *cptr != '=') cptr++;
            if (*cptr) cptr++;
            zptr = (sptr = ConfigService.BindIpAddressString) +
                    sizeof(ConfigService.BindIpAddressString);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = *cptr++;
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
         }
         else
         if (strsame (cptr, ";cafile=", 8))
         {
            cptr += 8;
            zptr = (sptr = SesolaServerService.CaFile) +
                   sizeof(SesolaServerService.CaFile);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = TOUP(*cptr++);
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
            SesolaServiceUsed = true;
         }
         else
         if (strsame (cptr, ";cert=", 6))
         {
            cptr += 6;
            zptr = (sptr = SesolaServerService.CertFile) +
                   sizeof(SesolaServerService.CertFile);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = TOUP(*cptr++);
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
            SesolaServiceUsed = true;
         }
         else
         if (strsame (cptr, ";chain=", 7))
         {
            cptr += 7;
            zptr = (sptr = ConfigService.ProxyChainHostPort) +
                   sizeof(ConfigService.ProxyChainHostPort);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = *cptr++;
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
         }
         else
         if (strsame (cptr, ";connect", 8))
            ConfigService.ProxyTunnel == PROXY_TUNNEL_CONNECT;
         else
         if (strsame (cptr, ";cipher=", 8))
         {
            cptr += 8;
            zptr = (sptr = SesolaServerService.CipherList) +
                   sizeof(SesolaServerService.CipherList);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = *cptr++;
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
            SesolaServiceUsed = true;
         }
         else
         if (strsame (cptr, ";key=", 5))
         {
            cptr += 5;
            zptr = (sptr = SesolaServerService.KeyFile) +
                   sizeof(SesolaServerService.KeyFile);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = TOUP(*cptr++);
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
            SesolaServiceUsed = true;
         }
         else
         if (strsame (cptr, ";lauth", 6))
            ConfigService.LocalAuthRequired = true;
         else
         if (strsame (cptr, ";paff", 6))
            ConfigService.ProxyAffinity = true;
         else
         if (strsame (cptr, ";pauth", 6))
            ConfigService.ProxyAuthRequired = true;
         else
         if (strsame (cptr, ";cauth", 6))
            ConfigService.ProxyChainAuthRequired = true;
         else
         if (strsame (cptr, ";proxy", 6))
            ConfigService.ProxyService = true;
         else
         if (strsame (cptr, ";pbind=", 7))
         {
            cptr += 7;
            zptr = (sptr = ConfigService.ProxyBindIpAddressString) +
                    sizeof(ConfigService.ProxyBindIpAddressString);
            while (*cptr && !isspace(*cptr) && *cptr != ',' &&
                   *cptr != ';' && sptr < zptr) *sptr++ = *cptr++;
            if (sptr >= zptr)
               ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
            *sptr = '\0';
         }
         else
         if (strsame (cptr, ";pclientssl", 11))
         {
            if (!ConfigService.SSLclientPtr)
               ConfigService.SSLclientPtr = VmGet (sizeof(SESOLA_CONTEXT));
            ConfigService.SSLclientEnabled = true;
         }
         else
         if (strsame (cptr, ";verify", 7))
            SesolaServiceUsed =  SesolaServerService.VerifyPeer = true;
         else
         {
            if (*cptr == ';') cptr++;
            sptr = cptr;
            while (*sptr && *sptr != ';' && *sptr != ',') sptr++;
            FaoToStdout ("%HTTPD-W-SERVICE, \
unknown parameter, ignored\n \\!#AZ\\\n",
               sptr-cptr, cptr);
            cptr = sptr;
         }

         if (*cptr == ';') cptr++;
         while (*cptr && !isspace(*cptr) && *cptr != ',' && *cptr != ';')
            cptr++;
      }

      /***************/
      /* add service */
      /***************/

      if (SesolaServiceUsed) ConfigService.SSLserverPtr = &SesolaServerService;

      status = ServiceConfigAdd (mcptr, &ConfigService);
      if (VMSnok (status))
      {
         FaoToStdout ("%HTTPD-W-SERVICE, \
cannot configure service\n \\!AZ//!AZ\\\n",
            ConfigService.RequestSchemeNamePtr,
            ConfigService.ServerHostPort);
         continue;
      }

      if (*cptr && *cptr != ',' && !isspace(*cptr))
         ErrorExitVmsStatus (0, ErrorServiceList, FI_LI);
   }

   return (SS$_NORMAL);
}

/*****************************************************************************/
/*
Search the list of virtual services for one matching.  If either host or port
component is omitted or specified as a wildcard then match any.
*/ 

BOOL ServiceIsConfigured (char *HostPort)

{
   char  *cptr, *sptr;
   SERVICE_STRUCT  *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceIsConfigured() !&Z", HostPort);

   LIST_ITERATE (svptr, &ServiceList)
   {
      if (WATCH_MODULE(WATCH_MOD_SERVICE))
         WatchDataFormatted ("!&Z\n", svptr->ServerHostPort);

      cptr = HostPort;
      sptr = svptr->ServerHostPort;
      /* compare the host name portion */
      if (*cptr == ':')
      {
         if (*sptr == '[')
         {
            /* IPv6 address */
            while (*sptr && *sptr != ']') sptr++;
            if (*sptr == ']') sptr++;
         }
         else
            while (*sptr && *sptr != ':') sptr++;
      }
      while (*cptr && *cptr != ':' && *sptr && *sptr != ':')
      {
         if (*cptr == '*')
         {
            while (*cptr == '*') cptr++;
            while (*sptr && TOLO(*sptr) != TOLO(*cptr)) sptr++;
            if (!*cptr || *cptr == ':' || !*sptr || *sptr == ':') break;
         }
         if (TOLO(*cptr) != TOLO(*sptr)) break;
         cptr++;
         sptr++;
      }
      /* continue if the host name portion did not match */
      if ((*cptr && *cptr != ':') || *sptr != ':') continue;
      /* return true if the parameter did not contain a specific port */
      if (!*cptr)
      {
         if (WATCH_MODULE(WATCH_MOD_SERVICE))
            WatchThis (WATCHALL, WATCH_MOD_SERVICE, "YES");
         return (true);
      }
      cptr++;
      sptr++;
      /* compare the port portion */
      while (*cptr && *sptr)
      {
         if (*cptr == '*')
         {
            while (*cptr == '*') cptr++;
            while (*sptr && *sptr != *cptr) sptr++;
            if (!*cptr || !*sptr) break;
         }
         if (*cptr != *sptr) break;
         cptr++;
         sptr++;
      }
      /* return true if the ports matched */
      if (!*cptr && !*sptr)
      {
         if (WATCH_MODULE(WATCH_MOD_SERVICE))
            WatchThis (WATCHALL, WATCH_MOD_SERVICE, "YES");
         return (true);
      }
   }

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE, "NO");
   return (false);
}

/*****************************************************************************/
/*
Find a service' host name and port that matches the request's "Host:" request
header line.  Point the request's service pointer at the virtual service's
structure is found.  Return true if a matching service was found, false if not.
*/ 

BOOL ServiceFindVirtual (REQUEST_STRUCT *rqptr)

{
   BOOL  wwwName;
   int  HostNameLength,
        HostPortLength;
   char  *cptr, *sptr, *sptr1, *sptr2, *zptr;
   char  Ipv6HostSansIf [256];
   SERVICE_STRUCT  *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE,
                 "ServiceFindVirtual() !&Z", rqptr->rqHeader.HostPtr);

   if (rqptr->NetIoPtr->SesolaPtr)
      if (SesolaSNIserviceSet (rqptr->NetIoPtr->SesolaPtr))
         return (true);
 
   if (!rqptr->rqHeader.HostPtr || !rqptr->rqHeader.HostPtr[0])
   {
      /* just use whatever service the request connected to */
      if (WATCHING (rqptr, WATCH_CONNECT))
         WatchThis (WATCHITM(rqptr), WATCH_CONNECT,
                    "ACTUAL !AZ", rqptr->ServicePtr->ServerHostPort); 
      return (true);
   }

   cptr = rqptr->rqHeader.HostPtr;
   if (*cptr == '[')
   {
      /* IPv6 (one form of anyway) */
      for (sptr1 = cptr; *sptr1 && *sptr1 != ']' && *sptr1 != '%'; sptr1++);
      if (*sptr1 == '%')
      {
         /* copy, excising the interface */
         zptr = (sptr = Ipv6HostSansIf) + sizeof(Ipv6HostSansIf)-1;
         while (*cptr && *cptr != '%' && sptr < zptr) *sptr++ = *cptr++;
         while (*cptr && *cptr != ']') cptr++;
         sptr1 = sptr;
         while (*cptr && sptr < zptr) *sptr++ = *cptr++;
         *sptr = '\0';
         cptr = Ipv6HostSansIf;
      }
      if (*sptr1 == ']') sptr1++;
   }
   else
   {
      /* IPv4 */
      for (sptr1 = cptr; *sptr1 && *sptr1 != ':'; sptr1++);
   }
   HostNameLength = sptr1 - cptr;
   while (*sptr1) sptr1++;
   HostPortLength = sptr1 - cptr;

   if (ServiceWwwImplied)
      wwwName = SAME4(cptr,'www.');
   else
      wwwName = false;

   LIST_ITERATE (svptr, &ServiceList)
   {
      if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
         WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE,
                    "!UL !UL !&Z !&B !UL !UL !&Z",
                    HostNameLength, HostPortLength, cptr, wwwName,
                    svptr->ServerHostNameLength, svptr->ServerHostPortLength,
                    svptr->ServerHostPort); 

      if (!wwwName || HostNameLength != svptr->ServerHostNameLength + 4)
         if (HostNameLength != svptr->ServerHostNameLength)
            continue;

      if (HostNameLength == HostPortLength)
      {
         /* no port specified, use default for request scheme */
         switch (rqptr->ServicePtr->RequestScheme)
         {
            case SCHEME_HTTP :
               if (svptr->ServerPort != DEFAULT_HTTP_PORT) continue;
               break;
            case SCHEME_HTTPS :
               if (svptr->ServerPort != DEFAULT_HTTPS_PORT) continue;
               break;
            default :
               continue;
         }
      }
      else
      if (HostPortLength != svptr->ServerHostPortLength)
         continue;

      sptr1 = cptr;
      /* only if a port was included in the "Host:" compare that */
      if (HostNameLength == HostPortLength)
         sptr2 = svptr->ServerHostName;
      else
         sptr2 = svptr->ServerHostPort;
      /* if "Host:" name begins "www." and this one does not */
      if (wwwName && !MATCH4 (sptr2, "www.")) sptr1 += 4;
      while (*sptr1 && *sptr2)
      {
         if (TOLO(*sptr1) == TOLO(*sptr2))
         {
            sptr1++;
            sptr2++;
         }
         else
            break;
      }
      if (*sptr1 || *sptr2) continue;

      if (WATCHING (rqptr, WATCH_CONNECT))
         WatchThis (WATCHITM(rqptr), WATCH_CONNECT,
                    "VIRTUAL !AZ", svptr->ServerHostPort); 

      /* change the request's service pointer to it's virtual equivalent */
      rqptr->ServicePtr = rqptr->NetIoPtr->ServicePtr = svptr;

      return (true);
   }

   if (WATCHING (rqptr, WATCH_CONNECT))
      WatchThis (WATCHITM(rqptr), WATCH_CONNECT, "UNKNOWN service"); 

   return (false);
}

/*****************************************************************************/
/*
Look for a matching service and change the request to point to that service. 
If none matching found then a 500 (internal - server configuration) error.  Of
course just changing the request pointer to another service can have profound
implications - consider changing an HTTP request to an SSL service or vice
versa!
*/ 

BOOL ServiceChange
(
REQUEST_STRUCT *rqptr,
char *ServiceSpec
)
{
   SERVICE_STRUCT  *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE,
                 "ServiceChange() !&Z", ServiceSpec);

   if (strsame (ServiceSpec, "RAW", -1))
   {
      /* find the (first) service offering raw tunneling */
      LIST_ITERATE (svptr, &ServiceList)
         if (svptr->ProxyService && svptr->ProxyTunnel == PROXY_TUNNEL_RAW)
            break;
   }
   else
   if (strsame (ServiceSpec, "http://", 7))
   {
      /* find the matching HTTP service */
      LIST_ITERATE (svptr, &ServiceList)
      {
         if (svptr->RequestScheme != SCHEME_HTTP) continue;
         if (StringMatch (rqptr, svptr->ServerHostPort, ServiceSpec+7)) break;
      }
   }
   else
   if (strsame (ServiceSpec, "https://", 8))
   {
      /* find the matching SSL service */
      LIST_ITERATE (svptr, &ServiceList)
      {
         if (svptr->RequestScheme != SCHEME_HTTPS) continue;
         if (StringMatch (rqptr, svptr->ServerHostPort, ServiceSpec+8)) break;
      }
   }
   else
   {
      /* find the matching service */
      LIST_ITERATE (svptr, &ServiceList)
         if (StringMatch (rqptr, svptr->ServerHostPort, ServiceSpec)) break;
   }

   if (svptr)
   {
      if (WATCHING (rqptr, WATCH_REQUEST))
         WatchThis (WATCHITM(rqptr), WATCH_REQUEST,
                    "SERVICE change !AZ MATCHED !AZ!AZ -> !AZ!AZ",
                    ServiceSpec,
                    rqptr->ServicePtr->RequestSchemeNamePtr,
                    rqptr->ServicePtr->ServerHostPort,
                    svptr->RequestSchemeNamePtr,
                    svptr->ServerHostPort);

      /* move the request to that service */
      rqptr->ServiceBeforeChangePtr = rqptr->ServicePtr;
      rqptr->ServicePtr = rqptr->NetIoPtr->ServicePtr = svptr;

      return (true);
   }

   if (WATCHING (rqptr, WATCH_REQUEST))
      WatchThis (WATCHITM(rqptr), WATCH_REQUEST,
                 "SERVICE change !AZ NOMATCH", ServiceSpec);
   rqptr->rqResponse.HttpStatus = 500;

   return (false);
}

/*****************************************************************************/
/*
Output string configured services (called from ConfigReportNow()).
*/ 

int ServiceReportConfigFromString
(
REQUEST_STRUCT *rqptr,
CONFIG_STRUCT *cfptr
)
{
   static char  ServicesFao [] = 
"<p><table class=\"ctgry\">\n\
<tr><th class=\"ctttl\">Service</th></tr>\n\
<tr><td>\n\
<table class=\"rghtlft\">\n";

   static char  ServiceLoadFao [] =
"<tr><th class=\"tacnt\">(see &quot;Services&quot; report)</th></tr>\n";

   static char  ServiceNoneFao [] =
"<tr><td><i>(none)</i></td></tr>\n";

   static char  OneServiceFao [] =
"<tr><th>!UL.</th>\
<td><tt>!AZ//!AZ!AZ!&@!AZ!&@!&@!AZ!AZ!AZ!AZ!AZ</tt></td>\
<td><tt>!AZ</tt></td></tr>\n";

   static char  ServiceListFao [] =
"<tr><th>!UL.</th><td><tt>!AZ<tt></td></tr>\n";

   static char  EndServicesFao [] =
"<tr><td colspan=\"2\"><b>Service Not Found URL:&nbsp;</b>!AZ</td></tr>\n\
</table>\n\
</td></tr>\n\
</table>\n";

   static char  NotNoneFao [] = "<i>(none)</i>\n";

   int  count, status;
   unsigned long  FaoVector [32];
   char  *cptr, *sptr;
   unsigned long  *vecptr;
   SERVICE_STRUCT  *svptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_SERVICE))
      WatchThis (WATCHALL, WATCH_MOD_SERVICE,
                 "ServiceReportConfigFromString()");

   status = FaolToNet (rqptr, ServicesFao, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   if (ServiceLoadFromConfigFile)
   {
      status = FaolToNet (rqptr, ServiceLoadFao, NULL);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }
   else
   if (!cfptr->cfServer.ServicePtr)
   {
      status = FaolToNet (rqptr, ServiceNoneFao, NULL);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }
   else
   if (cfptr != &Config)
   {
      count = 1;
      for (cptr = cfptr->cfServer.ServicePtr; *cptr; cptr++)
      {
         sptr = cptr;
         vecptr = FaoVector;
         *vecptr++ = count++;
         *vecptr++ = sptr;
         while (*cptr && *cptr != ',') cptr++;
         if (*cptr)
         {
            *cptr = '\0';
            status = FaolToNet (rqptr, ServiceListFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
            *cptr = ',';
         }
         else
         {
            status = FaolToNet (rqptr, ServiceListFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
         }
      }
   }
   else
   {
      count = 1;
      LIST_ITERATE (svptr, &ServiceList)
      {
         vecptr = FaoVector;

         *vecptr++ = count++;
         *vecptr++ = svptr->RequestSchemeNamePtr;
         *vecptr++ = svptr->ServerHostPort;

         if (svptr->ProxyChainHostPort[0])
         {
            *vecptr++ = ";chain=!AZ";
            *vecptr++ = svptr->ProxyChainHostPort;
         }
         else
            *vecptr++ = "";
         if (svptr->ProxyTunnel == PROXY_TUNNEL_CONNECT)
            *vecptr++ = ";connect";
         else
            *vecptr++ = "";
         if (svptr->BindIpAddressString[0])
         {
            *vecptr++ = ";ip=!AZ";
            *vecptr++ = svptr->BindIpAddressString;
         }
         else
            *vecptr++ = "";
         if (svptr->ListenBacklog != DEFAULT_LISTEN_BACKLOG)
         {
            *vecptr++ = ";backlog=!UL";
            *vecptr++ = svptr->ListenBacklog;
         }
         else
            *vecptr++ = "";
         if (svptr->LocalAuthRequired)
            *vecptr++ = ";lauth";
         else
            *vecptr++ = "";
         if (svptr->ProxyAffinity)
            *vecptr++ = ";paff";
         else
            *vecptr++ = "";
         if (svptr->ProxyAuthRequired)
            *vecptr++ = ";pauth";
         else
            *vecptr++ = "";
         if (svptr->ProxyChainAuthRequired)
            *vecptr++ = ";cauth";
         else
            *vecptr++ = "";
         if (svptr->ProxyService)
            *vecptr++ = ";proxy";
         else
            *vecptr++ = "";

         *vecptr++ = svptr->ServerIpAddressString;

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, OneServiceFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
      }
   }

   vecptr = FaoVector;
   if (cfptr->cfServer.ServiceNotFoundUrl[0])
      *vecptr++ = cfptr->cfServer.ServiceNotFoundUrl;
   else
      *vecptr++ = NotNoneFao;

   status = FaolToNet (rqptr, EndServicesFao, &FaoVector);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   return (SS$_NORMAL);
}

/*****************************************************************************/
/*
A server administration report on the server's configuration. This function
just wraps the reporting function, loading a temporary database if necessary
for reporting from the configuration file.
*/ 

ServiceReport
(
REQUEST_STRUCT *rqptr,
BOOL UseServerDatabase
)
{
   int  status;
   META_CONFIG  *mcptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE,
                 "ServiceReport() !&F !UL",
                 &ServiceReport, UseServerDatabase);

   if (UseServerDatabase)
      ServiceReportNow (rqptr, MetaGlobalServicePtr);
   else
   {
      status = ServiceConfigLoad (&mcptr);
      if (VMSnok (status))
      {
         /* severe error reported */
         rqptr->rqResponse.HttpStatus = 403;
         ErrorGeneral (rqptr, mcptr->LoadReport.TextPtr, FI_LI);
      }
      else
         ServiceReportNow (rqptr, mcptr);
      MetaConUnload (&mcptr, NULL);
   }

   AdminEnd (rqptr);
}

/*****************************************************************************/
/*
Return a report on the HTTPd service configuration ... now!  This function
blocks while executing.
*/ 

ServiceReportNow
(
REQUEST_STRUCT *rqptr,
META_CONFIG *mcptr
)
{
#define REPORT_ENDIS(b) \
{ if (b) *vecptr++ = "[enabled]"; else *vecptr++ = "[disabled]"; }

#define REPORT_STRING_DEFAULT(b) \
{ if (b && b[0]) *vecptr++ = b; else *vecptr++ = ReportDefault; }

#define REPORT_STRING_NONE(b) \
{ if (b && b[0]) *vecptr++ = b; else *vecptr++ = ReportNotNone; }

   static char  ReportSynopsisFao [] =
"<p><table class=\"ctgry\">\n\
<tr><th class=\"ctttl\">Synopsis</th></tr>\n\
<tr><td>\n\
<table class=\"lftlft\">\n\
<tr><td></td>\
<th class=\"sbttl pdrght1\">Service</th>\
<th class=\"sbttl pdrght1\">Address</th>\
<th class=\"sbttl pdrght1\">IP</th>\
<th class=\"sbttl pdrght1\">HTTP</th>\
<th class=\"sbttl pdrght1\">SSL</th>\
<th class=\"sbttl pdrght1\">Proxy</th>\
<th class=\"sbttl pdrght1\">Tunnel</th>\
<th class=\"sbttl\">Chain</th></tr>\n";

   static char  ReportOneSynopsisFao [] =
"<tr><th class=\"targht\">!UL.</th>\
<td class=\"pdrght1\">!AZ//!AZ</td>\
<td class=\"pdrght1\">!AZ</td>\
<td class=\"pdrght1 targht\">!&?v4\rv6\r</td>\
<td class=\"pdrght1 targht\">!AZ</td>\
<td class=\"pdrght1\">!AZ</td>\
<td class=\"pdrght1\">!AZ</td>\
<td class=\"pdrght1\">!AZ!AZ!&@</td>\
<td>!AZ</td>\
</tr>\n";

   static char  ReportEndSynopsisFao [] =
"</table>\n\
</td></tr>\n\
</table>\n";

   static char  ReportServiceFao [] =
"<p><table class=\"ctgry\">\n\
<tr><th class=\"ctttl\">&nbsp;&nbsp;!UL&nbsp;&nbsp;-&nbsp;&nbsp;\
<a href=\"!AZ//!AZ\">!AZ//!AZ</a></th></tr>\n\
<tr><td>\n\
<table class=\"rghtlft\">\n\
<tr><td>\n\
<table cellpadding=\"0\" cellspacing=\"5\" border=\"0\">\n\
<tr><th>Service IP Address:</th><td>!AZ</td></tr>\n\
<tr><th>Bind IP Address:</th><td>!AZ</td></tr>\n\
<tr><th>MultiHome IP Address:</th><td>!&I</td></tr>\n\
<tr><th>Socket IP Address:</th><td>!&@</td></tr>\n\
!&@\
<tr><th>Device:</th><td>!&@</td></tr>\n";

   static char  ReportHttp2Fao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>HTTP/2:</th><td>!&@</td></tr>\n";

   static char  ReportSslServiceFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>SSL Version:</th><td>!AZ</td></tr>\n\
<tr><th>SSL Options:</th>\
<td style=\"white-space:normal;\">!AZ</td></tr>\n\
<tr><th>SSL Cipher List:</th>\
<td style=\"white-space:normal;\">!AZ</td></tr>\n\
<tr><th>SSL Certificate:</th><td>!AZ</td></tr>\n\
<tr><th>SSL Private Key:</th><td>!AZ</td></tr>\n\
<tr><th>SSL Session Lifetime:</th><td>!AZ!AZ</td></tr>\n\
<tr><th>SSL Verify Peer:</th><td>!AZ</td></tr>\n\
<tr><th>SSL Verify Peer Data Max:</th><td>!UL!AZ</td></tr>\n\
<tr><th>SSL Verify Peer CA File:</th><td>!AZ</td></tr>\n\
<tr><th>Strict Transport Security:</th>\
<td>!AZ</td></tr>\n\
<tr><th>SSL Shared With:</th><td>";

   static char  ReportSslClientFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>SSL/Client</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Version:</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Certificate:</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Private Key:</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Verify CA:</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Verify CA File:</th><td>!AZ</td></tr>\n\
<tr><th>SSL/Client Cipher List:</th>\
<td style=\"white-space:normal;\">!AZ</td></tr>\n";

   static char  ReportProxyFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>Proxy:</th><td>!AZ</td></tr>\n";

   static char  ReportProxyDetailsFao [] =
"<tr><th>Proxy Tunnel:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Bind IP Address:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Affinity:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Authorization:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Chain:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Chain Cred:</th><td>!AZ</td></tr>\n\
<tr><th>Proxy Rework Max:</th><td>!UL</td></tr>\n";

   static char  ReportOtherFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>RawSocket:</th><td>!AZ</td></tr>\n\
<tr><th>(On) Connect:</th><td>!AZ</td></tr>\n\
<tr><th>Share SSH:</th><td>!UL\
&nbsp;<i>(!&?enabled\rdisabled\r)</i></td></tr>\n\
<tr><th>Admin:</th><td>!&@</td></tr>\n\
<tr><th>NoLog:</th><td>!AZ</td></tr>\n\
<tr><th>Log Format:</th><td><tt>!AZ</tt>!AZ</td></tr>\n\
<tr><th>Body Tag:</th><td colspan=\"2\">!AZ</td></tr>\n\
<tr><th>Report Path:</th><td colspan=\"2\">!&@</td></tr>\n\
<tr><td style=\"height:0.5em;\"></td></tr>\n\
<tr><th>Access Log:</th><td>!&@</td></tr>\n\
</table>\n\
</td></tr>\n\
</table>\n\
</td></tr>\n\
</table>\n";

   static char  EndPageFao [] =
"</table>\n\
</body>\n\
</html>\n";

   static char  ReportDefault [] = "<i>(default)</i>",
                ReportNotAppl [] = "<i>(n/a)</i>",
                ReportNotNone [] = "<i>(none)</i>",
                ReportServiceNoneFao [] = "<i>(no services defined)</i>";

   int  count, idx, status,
        SslShareCount;
   unsigned long  *vecptr;
   unsigned long  FaoVector [64];
   char  *cptr, *sptr, *zptr;
   LIST_HEAD  *slptr;
   SERVICE_META  *smptr;
   SERVICE_STRUCT  *svptr, *tsvptr;
   SESOLA_CONTEXT  *scptr, *ssptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE, "ServiceReportNow()");

   /* get a pointer to the meta-config data */
   smptr = mcptr->ServiceMetaPtr;

   AdminPageTitle (rqptr, "Service Configuration");
   AdminMetaConReport (rqptr, mcptr, MetaGlobalServicePtr);
   if (ServiceConfigFileDefined)
      AdminMetaConSource (rqptr, mcptr, MetaGlobalServicePtr);

   /************/
   /* synopsis */
   /************/

   status = FaolToNet (rqptr, ReportSynopsisFao, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   count = 0;
   LIST_ITERATE (svptr, smptr->ServiceListPtr)
   {
      count++;

      vecptr = FaoVector;

      *vecptr++ = count;
      *vecptr++ = svptr->RequestSchemeNamePtr;
      *vecptr++ = svptr->ServerHostPort;
      if (svptr->BindIpAddressString[0])
         *vecptr++ = svptr->BindIpAddressString;
      else
         *vecptr++ = svptr->ServerIpAddressString;
      *vecptr++ = IPADDRESS_IS_V4(&svptr->ServerIpAddress);
      *vecptr++ = svptr->Http2Enabled ? "2+1" : "1";
      if (svptr->SSLserverPtr)
         *vecptr++ = ((SESOLA_CONTEXT*)svptr->SSLserverPtr)->VersionStringPtr;
      else
         *vecptr++ = "";
      if (svptr->ProxyService)
         *vecptr++ = "enabled";
      else
         *vecptr++ = "";
      if (svptr->ShareSSH)
         *vecptr++ = "ShareSSH ";
      else
         *vecptr++ = "";
      if (!svptr->ProxyService)
         *vecptr++ = "";
      else
      if (svptr->ProxyTunnel == PROXY_TUNNEL_CONNECT)
         *vecptr++ = "CONNECT";
      else
      if (svptr->ProxyTunnel == PROXY_TUNNEL_FIREWALL)
         *vecptr++ = "FIREWALL";
      else
      if (svptr->ProxyTunnel == PROXY_TUNNEL_RAW)
         *vecptr++ = "RAW";
      else
         *vecptr++ = "";
      if (!svptr->ProxyService)
         *vecptr++ = "";
      else
      if (svptr->SSLclientPtr &&
          ((SESOLA_CONTEXT*)svptr->SSLclientPtr)->VersionStringPtr)
      {
         *vecptr++ = "+!AZ";
         *vecptr++ = ((SESOLA_CONTEXT*)svptr->SSLclientPtr)->VersionStringPtr;
      }
      else
         *vecptr++ = "";
      if (svptr->ProxyChainHostPort[0])
         *vecptr++ = svptr->ProxyChainHostPort;
      else
         *vecptr++ = "";

      FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
      status = FaolToNet (rqptr, ReportOneSynopsisFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }

   status = FaolToNet (rqptr, ReportEndSynopsisFao, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   /************/
   /* services */
   /************/

   count = 0;
   LIST_ITERATE (svptr, smptr->ServiceListPtr)
   {
      count++;

      vecptr = FaoVector;

      *vecptr++ = count;
      *vecptr++ = svptr->RequestSchemeNamePtr;
      *vecptr++ = svptr->ServerHostPort;
      *vecptr++ = svptr->RequestSchemeNamePtr;
      *vecptr++ = svptr->ServerHostPort;

      *vecptr++ = svptr->ServerIpAddressString;
      REPORT_STRING_NONE (svptr->BindIpAddressString)
      *vecptr++ = &svptr->MultiHomeIpAddress;

      if (svptr->ServerChannel)
      {
         *vecptr++ = "!&I!&? (INADDR_ANY)\r\r";
         *vecptr++ = &svptr->ServerIpAddress;
         *vecptr++ = IPADDRESS_IS_ANY (&svptr->ServerIpAddress);
      }
      else
      if (mcptr == MetaGlobalServicePtr)
      {
         if (svptr->BgDevName[0])
         {
            *vecptr++ = "<i>(!AZ)</i>";
            *vecptr++ = svptr->BgDevName;
         }
         else
            *vecptr++ = ReportNotNone;
      }
      else
         *vecptr++ = ReportNotAppl;

      if (mcptr == MetaGlobalServicePtr)
      {
         if (VMSnok (svptr->ServerBindStatus))
         {
            if (svptr->ServerBindStatus)
            {
               *vecptr++ = 
"<tr><th>Bind:</th><td>\
<font color=\"#ff0000\">!&m<font></td></tr>\n";
               *vecptr++ = svptr->ServerBindStatus;
            }
            else
               *vecptr++ = 
"<tr><th>Bind:</th><td>reused existing socket</td></tr>\n";
         }
         else
            *vecptr++ = "";
      }
      else
         *vecptr++ = "";

      if (svptr->ServerChannel)
      {
         *vecptr++ = "!AZ (!UL channel!%s)";
         *vecptr++ = svptr->BgDevName;
         *vecptr++ = NetGetRefCnt (svptr->ServerChannel);
      }
      else
      if (svptr->BgDevName[0])
      {
         *vecptr++ = "<i>(!AZ)</i>";
         *vecptr++ = svptr->BgDevName;
      }
      else
         *vecptr++ = ReportNotNone;

      FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
      status = FaolToNet (rqptr, ReportServiceFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

      vecptr = FaoVector;
      REPORT_ENDIS (svptr->Http2Enabled)
      status = FaolToNet (rqptr, ReportHttp2Fao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

      if (ssptr = svptr->SSLserverPtr)
      {
         vecptr = FaoVector;

         REPORT_STRING_DEFAULT (ssptr->VersionString)
         REPORT_STRING_DEFAULT (ssptr->OptionsString)
         REPORT_STRING_DEFAULT (ssptr->CipherList)
         REPORT_STRING_DEFAULT (ssptr->CertFile)
         REPORT_STRING_DEFAULT (ssptr->KeyFile)
         *vecptr++ = MetaConShowSeconds (rqptr, ssptr->SessionLifetime);
         *vecptr++ = ssptr->SessionLifetime ? "" : " <i>(default)</i>";
         switch (ssptr->VerifyPeer)
         {
             case SESOLA_VERIFY_PEER_OPTIONAL : *vecptr++ = "[optional]"; break;
             case SESOLA_VERIFY_PEER_REQUIRED : *vecptr++ = "[enabled]"; break;
             default : *vecptr++ = "[disabled]";
         }
         *vecptr++ = ssptr->VerifyDataMax;
         *vecptr++ = ssptr->VerifyDataMax ? "" : " <i>(default)</i>";
         REPORT_STRING_DEFAULT (ssptr->CaFile)
         REPORT_STRING_DEFAULT (ssptr->StrictTransSec)

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, ReportSslServiceFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

         SslShareCount = 0;
         LIST_ITERATE (tsvptr, smptr->ServiceListPtr)
         {
            if (tsvptr == svptr) continue;
            if (tsvptr->RequestScheme != SCHEME_HTTPS) continue;
            if (!IPADDRESS_IS_SAME (&tsvptr->MultiHomeIpAddress,
                                    &svptr->MultiHomeIpAddress)) continue;
            if (tsvptr->ServerPort != svptr->ServerPort) continue;
            SslShareCount++;
            FaoToNet (rqptr, "!AZ<br>", tsvptr->ServerHostPort);
         }
         if (SslShareCount)
            FaoToNet (rqptr, "</td></tr>\n");
         else
            FaoToNet (rqptr, "!AZ</td></tr>\n", ReportNotNone);
      }

      if (ssptr && svptr->NonSslRedirect[0])
         FaoToNet (rqptr,
"<tr><th>Non-SSL Redirect:</th>\
<td>!&;AZ</td></tr><td>\n",
                   svptr->NonSslRedirect);

      if (scptr = svptr->SSLclientPtr)
      {
         vecptr = FaoVector;

         REPORT_ENDIS (svptr->SSLclientEnabled)
         REPORT_STRING_DEFAULT (scptr->VersionStringPtr)
         REPORT_STRING_DEFAULT (scptr->CertFilePtr)
         REPORT_STRING_DEFAULT (scptr->KeyFilePtr)
         REPORT_ENDIS (scptr->VerifyCA)
         REPORT_STRING_DEFAULT (scptr->CaFilePtr)
         REPORT_STRING_DEFAULT (scptr->CipherListPtr)

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, ReportSslClientFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
      }

      vecptr = FaoVector;

      REPORT_ENDIS (svptr->ProxyService)

      status = FaolToNet (rqptr, ReportProxyFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

      if (svptr->ProxyService)
      {
         vecptr = FaoVector;

         if (svptr->ProxyTunnel == PROXY_TUNNEL_CONNECT)
            *vecptr++ = "CONNECT";
         else
         if (svptr->ProxyTunnel == PROXY_TUNNEL_FIREWALL)
            *vecptr++ = "FIREWALL";
         else
         if (svptr->ProxyTunnel == PROXY_TUNNEL_RAW)
            *vecptr++ = "RAW";
         else
            *vecptr++ = ReportNotNone;
         REPORT_STRING_NONE (svptr->ProxyBindIpAddressString)
         REPORT_ENDIS (svptr->ProxyAffinity)
         if (svptr->ProxyAuthRequired)
            *vecptr++ = "PROXY";
         else
         if (svptr->ProxyChainAuthRequired)
            *vecptr++ = "CHAIN";
         else
         if (svptr->LocalAuthRequired)
            *vecptr++ = "LOCAL";
         else
            *vecptr++ = ReportNotNone;
         REPORT_STRING_NONE (svptr->ProxyChainHostPort)
         REPORT_STRING_NONE (svptr->ProxyChainCred)
         *vecptr++ = svptr->ProxyReworkMax;

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, ReportProxyDetailsFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
      }

      vecptr = FaoVector;

      REPORT_ENDIS (svptr->RawSocket)
      REPORT_ENDIS (svptr->ConnectService)
      *vecptr++ = svptr->ShareSSH;
      *vecptr++ = svptr->ShareSSH;
      if (svptr->AdminService)
         *vecptr++ = "<font color=\"#ff0000\"><b>!AZ</b></font>";
      REPORT_ENDIS (svptr->AdminService)
      REPORT_ENDIS (svptr->NoLog)
      REPORT_STRING_DEFAULT (svptr->LogFormat)
      if (svptr->LogFormatProblem)
         *vecptr++ = "&nbsp;&nbsp;<font color=\"#ff0000\"><b>(PROBLEM)</b></font>";
      else
         *vecptr++ = "";
      REPORT_STRING_DEFAULT (svptr->BodyTag)
      if (svptr->ServiceErrorReportPath)
      {
         *vecptr++ = "!AZ !AZ";
         *vecptr++ = svptr->ErrorReportPath;
         *vecptr++ = svptr->ErrorReportPathCodesPtr;
      }
      else
         *vecptr++ = ReportDefault;

      if (svptr->LogFileNameLength)
      {
         *vecptr++ =
"<a href=\"!AZ?service=!AZ\">!AZ</a> <i>(!&?open\rclosed\r)</i>";
         *vecptr++ = ADMIN_REPORT_SERVICE_LOG;
         *vecptr++ = svptr->ServerHostPort;
         if (LoggingPerService)
         {
            *vecptr++ = svptr->LogFileName;
            *vecptr++ = svptr->LogFileOpen;
         }
         else
         {
            slptr = smptr->ServiceListPtr;
            *vecptr++ = ((SERVICE_STRUCT*)LIST_GET_HEAD(slptr))->LogFileName;
            *vecptr++ = ((SERVICE_STRUCT*)LIST_GET_HEAD(slptr))->LogFileOpen;
         }
      }
      else
         *vecptr++ = "<i>(none)</i>";

      FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
      status = FaolToNet (rqptr, ReportOtherFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }

   /**************/
   /* end report */
   /**************/

   status = FaoToNet (rqptr, EndPageFao);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   rqptr->rqResponse.PreExpired = PRE_EXPIRE_ADMIN;
   ResponseHeader200 (rqptr, "text/html", &rqptr->NetWriteBufferDsc);

#undef REPORT_ENDIS
#undef REPORT_STRING_DEFAULT
#undef REPORT_STRING_NONE
}

/*****************************************************************************/
/*
A server administration menu for service configuration. This function just
wraps the revision function, loading a temporary database if necessary for
reporting from the configuration file.
*/ 

ServiceConfigRevise
(
REQUEST_STRUCT *rqptr,
BOOL UseServerDatabase
)
{
   int  status;
   META_CONFIG  *mcptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE,
                 "ServiceConfigRevise() !&F !UL",
                 &ServiceConfigRevise, UseServerDatabase);

   if (UseServerDatabase)
      ServiceConfigReviseNow (rqptr, MetaGlobalServicePtr);
   else
   {
      status = ServiceConfigLoad (&mcptr);
      if (VMSnok (status))
      {
         /* severe error reported */
         rqptr->rqResponse.HttpStatus = 403;
         ErrorGeneral (rqptr, mcptr->LoadReport.TextPtr, FI_LI);
      }
      else
         ServiceConfigReviseNow (rqptr, mcptr);
      MetaConUnload (&mcptr, NULL);
   }

   AdminEnd (rqptr);
}

/*****************************************************************************/
/*
Return a report on the HTTPd service configuration ... now!
*/ 

ServiceConfigReviseNow
(
REQUEST_STRUCT *rqptr,
META_CONFIG *mcptr
)
{
   static char  ReviseServiceNoneFao [] = "<i>(no services defined)</i>";

   static char  ReviseServiceFao [] =
"!AZ\
<p><table class=\"ctgry\">\n\
<tr><th class=\"ctttl\">!&@!AZ!AZ!AZ</th></tr>\n\
<tr><td>\n\
<table class=\"rghtlft\">\n\
\
<tr><th>Scheme:</th><td>\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[[\">\n\
<input type=\"radio\" name=\"ServiceScheme!UL\" value=\"http:\"!&? CHECKED\r\r>http\n\
<input type=\"radio\" name=\"ServiceScheme!UL\" value=\"https:\"!&? CHECKED\r\r>https\n\
</td></tr>\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"//\">\n\
<tr><th>Name:</th><td>\
<input type=\"text\" size=\"40\" name=\"ServiceName!UL\" value=\"!AZ\">\
</td></tr>\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\":\">\n\
<tr><th>Port:</th><td>\
<input type=\"text\" size=\"5\" name=\"ServicePort!UL\" value=\"!AZ\">\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"]]\">\n\
</td></tr>\n\
\
<tr><th>Bind IP Address:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceBind]&#32;&#32;\">\n\
<input type=\"text\" size=\"20\" name=\"ServiceBind!UL\" value=\"!AZ\">\n\
&nbsp;<i>(only if NI multi-homed)</i></td></tr>\n";

   static char  ReviseHttp2Fao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
\
<tr><th>HTTP2:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceHttp2Protocol]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceHttp2Protocol!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceHttp2Protocol!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n";

   static char  ReviseSslServiceFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
\
<tr><th>SSL Version:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLversion]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLversion!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Options:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLoptions]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLoptions!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Cipher List:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLcipherList]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLcipherList!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Certificate:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLcert]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLcert!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Private Key:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLkey]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLkey!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Session Lifetime:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLsessionLifetime]&#32;&#32;\">\n\
<input type=\"text\" size=\"7\" name=\"ServiceSSLsessionLifetime!UL\" value=\"!AZ\">\n\
 <i>(hh:mm:ss)</i></td></tr>\n\
<tr><th>SSL Verify Peer:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLVerifyPeer]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceSSLVerifyPeer!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceSSLVerifyPeer!UL\" value=\"optional\"!&? CHECKED\r\r>optional\n\
<input type=\"radio\" name=\"ServiceSSLVerifyPeer!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
<tr><th>SSL Verify Peer Data Max:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLVerifyPeerDataMax]&#32;&#32;\">\n\
<input type=\"text\" size=\"5\" name=\"ServiceSSLVerifyPeerDataMax!UL\" value=\"!UL\">\n\
 <i>(kBytes)</i></td></tr>\n\
<tr><th>SSL Verify Peer CA File:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLVerifyPeerCaFile]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLVerifyPeerCaFile!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Verify Peer Depth:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceVerifyPeerDepth]&#32;&#32;\">\n\
<input type=\"text\" size=\"5\" name=\"ServiceVerifyPeerDepth!UL\" value=\"!UL\">\n\
</td></tr>\n\
<tr><th>Strict Transport Security:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLstrictTransSec]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLstrictTransSec!UL\" value=\"!UL\">\n\
</td></tr>\n\
<tr><th>Non-SSL Redirect:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceNonSSLRedirect]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceNonSSLRedirect!UL\" value=\"!AZ\">\n\
</td></tr>\n";

   static char  ReviseProxyFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
\
<tr><th>Proxy:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxy]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceProxy!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceProxy!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n";

   static char  ReviseProxyDetailsFao [] =
"<tr><th>Proxy Tunnel:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyTunnel]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceProxyTunnel!UL\" value=\"none\"!&? CHECKED\r\r>none\n\
<input type=\"radio\" name=\"ServiceProxyTunnel!UL\" value=\"CONNECT\"!&? CHECKED\r\r>CONNECT\n\
<input type=\"radio\" name=\"ServiceProxyTunnel!UL\" value=\"FIREWALL\"!&? CHECKED\r\r>FIREWALL\n\
<input type=\"radio\" name=\"ServiceProxyTunnel!UL\" value=\"RAW\"!&? CHECKED\r\r>RAW\n\
</td></tr>\n\
\
<tr><th>Proxy Bind IP Address:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyBind]&#32;&#32;\">\n\
<input type=\"text\" size=\"20\" name=\"ServiceProxyBind!UL\" value=\"!AZ\">\n\
&nbsp;<i>(only if NI multi-homed)</i></td></tr>\n\
\
<tr><th>Proxy Affinity:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyAffinity]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceProxyAffinity!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceProxyAffinity!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
\
<tr><th>Proxy Authorization:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyAuth]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceProxyAuth!UL\" value=\"none\"!&? CHECKED\r\r>none\n\
<input type=\"radio\" name=\"ServiceProxyAuth!UL\" value=\"PROXY\"!&? CHECKED\r\r>PROXY\n\
<input type=\"radio\" name=\"ServiceProxyAuth!UL\" value=\"CHAIN\"!&? CHECKED\r\r>CHAIN\n\
<input type=\"radio\" name=\"ServiceProxyAuth!UL\" value=\"LOCAL\"!&? CHECKED\r\r>LOCAL\n\
</td></tr>\n\
\
<tr><th>Proxy Chain:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyChain]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceProxyChain!UL\" value=\"!AZ\">\n\
</td></tr>\n\
\
<tr><th>Proxy Chain Cred:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyChainCred]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceProxyChainCred!UL\" value=\"!AZ\">\
</td></tr>\n\
\
<tr><th>Proxy Rework Max:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceProxyReworkMax]&#32;&#32;\">\n\
<input type=\"text\" size=\"5\" name=\"ServiceProxyReworMax!UL\" value=\"!UL\">\n\
 <i>(kBytes)</i></td></tr>\n";

   static char  ReviseSslClientFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
\
<tr><th>SSL/Client:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceClientSSL]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceClientSSL!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceClientSSL!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n";

   static char  ReviseSslClientDetailsFao [] =
"<tr><th>SSL/Client Version:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceClientSSLversion]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLversion!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Certificate:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLcert]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLcert!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL Private Key:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceSSLkey]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceSSLkey!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL/Client Verify CA:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceClientSSLverifyCA]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceClientSSLverifyCA!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceClientSSLverifyCA!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
<tr><th>SSL/Client Verify CA File:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceClientSSLCaFile]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceClientSSLCaFile!UL\" value=\"!AZ\">\n\
</td></tr>\n\
<tr><th>SSL/Client Cipher List:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceClientSSLcipherList]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceClientSSLcipherList!UL\" value=\"!AZ\">\n\
</td></tr>\n";

   static char  ReviseOtherFao [] =
"<tr><td style=\"height:0.5em;\"></td></tr>\n\
\
<tr><th>RawSocket:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceRawSocket]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceRawSocket!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceRawSocket!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
\
<tr><th>(On) Connect:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceConnect]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceConnect!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceConnect!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
\
<tr><th>Share SSH:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceShareSSH]&#32;&#32;\">\n\
<input type=\"text\" size=\"5\" name=\"ServiceShareSSH!UL\" value=\"!UL\">\n\
</td></tr>\n\
\
<tr><th>Admin:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceAdmin]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceAdmin!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceAdmin!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
\
<tr><th>NoLog:</th><td>\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceNoLog]&#32;&#32;\">\n\
<input type=\"radio\" name=\"ServiceNoLog!UL\" value=\"enabled\"!&? CHECKED\r\r>enabled\n\
<input type=\"radio\" name=\"ServiceNoLog!UL\" value=\"disabled\"!&? CHECKED\r\r>disabled\n\
</td></tr>\n\
\
<tr><th>Log Format:</th><td colspan=\"2\">\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceLogFormat]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceLogFormat!UL\" value=\"!AZ\">\n\
</td></tr>\n\
\
<tr><th>Body Tag:</th><td colspan=\"2\">\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceBodyTag]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceBodyTag!UL\" value=\"!AZ\">\n\
</td></tr>\n\
\
<tr><th>Error Report Path:</th><td colspan=\"2\">\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;[ServiceErrorReportPath]&#32;&#32;\">\n\
<input type=\"text\" size=\"40\" name=\"ServiceErrorReportPath!UL\" value=\"!&@\">\n\
</td></tr>\n\
\
</table>\n\
</td></tr>\n\
</table>\n\
<input type=\"hidden\" name=\"hidden$lf\" value=\"&#94;\">\n";

   static char  NotNone [] = "<i>(none)</i>\n";

   int  count, idx, status;
   unsigned long  *vecptr;
   unsigned long  FaoVector [128];
   char  *cptr, *sptr, *zptr;
   SERVICE_META  *smptr;
   SERVICE_STRUCT  *svptr;
   SESOLA_CONTEXT  *scptr, *ssptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_SERVICE))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_SERVICE, "ServiceConfigReviseNow()");

   /* get a pointer to the meta-config data */
   smptr = mcptr->ServiceMetaPtr;

   AdminPageTitle (rqptr, "Service Configuration");
   AdminMetaConReport (rqptr, mcptr, MetaGlobalServicePtr);

   if (ServiceConfigFileDefined)
   {
      AdminMetaConSource (rqptr, mcptr, MetaGlobalServicePtr);
      AdminMetaConBeginUpdateForm (rqptr);
   }
   else
   {
      status = FaoToNet (rqptr, "<form method=\"POST\" action=\"\">");
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }

   /************/
   /* services */
   /************/

   if (!LIST_GET_HEAD(smptr->ServiceListPtr))
   {
      status = FaolToNet (rqptr, ReviseServiceNoneFao, NULL);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }
   else
   {
      count = 0;
      LIST_ITERATE (svptr, smptr->ServiceListPtr)
      {
         count++;

         vecptr = FaoVector;

         /* place holder for the "next new service" comment (see below) */
         *vecptr++ = "";

         *vecptr++ = "!UL&nbsp;&nbsp;-&nbsp;&nbsp;";
         *vecptr++ = count;

         *vecptr++ = svptr->RequestSchemeNamePtr;
         *vecptr++ = "//";
         *vecptr++ = svptr->ServerHostPort;

         *vecptr++ = count;
         *vecptr++ = svptr->RequestScheme == SCHEME_HTTP;
         *vecptr++ = count;
         *vecptr++ = svptr->RequestScheme == SCHEME_HTTPS;
         *vecptr++ = count;
         if (svptr->GenericService)
            *vecptr++ = "*";
         else
            *vecptr++ = svptr->ServerHostName;
         *vecptr++ = count;
         *vecptr++ = svptr->ServerPortString;
         *vecptr++ = count;
         *vecptr++ = svptr->BindIpAddressString;

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, ReviseServiceFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

         vecptr = FaoVector;
         *vecptr++ = count;
         *vecptr++ = svptr->Http2Enabled;
         *vecptr++ = count;
         *vecptr++ = !svptr->Http2Enabled;
         status = FaolToNet (rqptr, ReviseHttp2Fao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

         if (ssptr = svptr->SSLserverPtr)
         {
            vecptr = FaoVector;

            *vecptr++ = count;
            *vecptr++ = ssptr->VersionString;
            *vecptr++ = count;
            *vecptr++ = ssptr->OptionsString;
            *vecptr++ = count;
            *vecptr++ = ssptr->CipherList;
            *vecptr++ = count;
            *vecptr++ = ssptr->CertFile;
            *vecptr++ = count;
            *vecptr++ = ssptr->KeyFile;
            *vecptr++ = count;
            *vecptr++ = MetaConShowSeconds (rqptr, ssptr->SessionLifetime);
            *vecptr++ = count;
            *vecptr++ = ssptr->VerifyPeer == SESOLA_VERIFY_PEER_REQUIRED;
            *vecptr++ = count;
            *vecptr++ = ssptr->VerifyPeer == SESOLA_VERIFY_PEER_OPTIONAL;
            *vecptr++ = count;
            *vecptr++ = !ssptr->VerifyPeer;
            *vecptr++ = count;
            *vecptr++ = ssptr->VerifyDataMax;
            *vecptr++ = count;
            *vecptr++ = ssptr->CaFile;
            *vecptr++ = count;
            *vecptr++ = ssptr->VerifyDepth;
            *vecptr++ = count;
            *vecptr++ = ssptr->StrictTransSec;
            *vecptr++ = count;
            *vecptr++ = svptr->NonSslRedirect;

            FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
            status = FaolToNet (rqptr, ReviseSslServiceFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
         }

         vecptr = FaoVector;
         *vecptr++ = count;
         *vecptr++ = svptr->ProxyService;
         *vecptr++ = count;
         *vecptr++ = !svptr->ProxyService;
         status = FaolToNet (rqptr, ReviseProxyFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

         if (svptr->ProxyService)
         {
            vecptr = FaoVector;
            *vecptr++ = count;
            *vecptr++ = !svptr->ProxyTunnel;
            *vecptr++ = count;
            *vecptr++ = (svptr->ProxyTunnel == PROXY_TUNNEL_CONNECT);
            *vecptr++ = count;
            *vecptr++ = (svptr->ProxyTunnel == PROXY_TUNNEL_FIREWALL);
            *vecptr++ = count;
            *vecptr++ = (svptr->ProxyTunnel == PROXY_TUNNEL_RAW);
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyBindIpAddressString;
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyAffinity;
            *vecptr++ = count;
            *vecptr++ = !svptr->ProxyAffinity;
            *vecptr++ = count;
            *vecptr++ = !(svptr->ProxyAuthRequired ||
                          svptr->ProxyChainAuthRequired ||
                          svptr->LocalAuthRequired);
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyAuthRequired;
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyChainAuthRequired;
            *vecptr++ = count;
            *vecptr++ = svptr->LocalAuthRequired;
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyChainHostPort;
            *vecptr++ = count;
            *vecptr++ = svptr->ProxyChainCred;
            *vecptr++ = svptr->ProxyReworkMax;

            FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
            status = FaolToNet (rqptr, ReviseProxyDetailsFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

            vecptr = FaoVector;
            *vecptr++ = count;
            *vecptr++ = svptr->SSLclientEnabled;
            *vecptr++ = count;
            *vecptr++ = !svptr->SSLclientEnabled;
            status = FaolToNet (rqptr, ReviseSslClientFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

            if (scptr = svptr->SSLclientPtr)
            {
               vecptr = FaoVector;

               *vecptr++ = count;
               *vecptr++ = scptr->VersionString;
               *vecptr++ = count;
               *vecptr++ = scptr->CertFile;
               *vecptr++ = count;
               *vecptr++ = scptr->KeyFile;
               *vecptr++ = count;
               *vecptr++ = scptr->VerifyCA;
               *vecptr++ = count;
               *vecptr++ = !scptr->VerifyCA;
               *vecptr++ = count;
               *vecptr++ = scptr->CaFile;
               *vecptr++ = count;
               *vecptr++ = scptr->CipherList;

               FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
               status = FaolToNet (rqptr, ReviseSslClientDetailsFao,
                                   &FaoVector);
               if (VMSnok (status))
                  ErrorNoticed (rqptr, status, NULL, FI_LI);
            }
         }

         vecptr = FaoVector;

         *vecptr++ = count;
         *vecptr++ = svptr->RawSocket;
         *vecptr++ = count;
         *vecptr++ = !svptr->RawSocket;
         *vecptr++ = count;
         *vecptr++ = svptr->ConnectService;
         *vecptr++ = count;
         *vecptr++ = !svptr->ConnectService;
         *vecptr++ = count;
         *vecptr++ = svptr->ShareSSH;
         *vecptr++ = count;
         *vecptr++ = svptr->AdminService;
         *vecptr++ = count;
         *vecptr++ = !svptr->AdminService;
         *vecptr++ = count;
         *vecptr++ = svptr->NoLog;
         *vecptr++ = count;
         *vecptr++ = !svptr->NoLog;
         *vecptr++ = count;
         *vecptr++ = svptr->LogFormat;
         *vecptr++ = count;
         *vecptr++ = svptr->BodyTag;
         *vecptr++ = count;
         if (svptr->ServiceErrorReportPath)
         {
            *vecptr++ = "!AZ !AZ";
            *vecptr++ = svptr->ErrorReportPath;
            *vecptr++ = svptr->ErrorReportPathCodesPtr;
         }
         else
            *vecptr++ = "";

         FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
         status = FaolToNet (rqptr, ReviseOtherFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
      }
   }

   /***********************/
   /* "blank" new service */
   /***********************/

   count++;

   vecptr = FaoVector;
   *vecptr++ =
"<input type=\"hidden\" name=\"hidden$lf\" value=\"\
&#32;&#94;# place-holder for the next new service\">\n";
   *vecptr++ = "";
   *vecptr++ = "- Next New Service -";
   *vecptr++ = "";
   *vecptr++ = "";
   *vecptr++ = count;
   *vecptr++ = true;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = "?.?.?.?";
   *vecptr++ = count;
   *vecptr++ = "80";
   *vecptr++ = count;
   *vecptr++ = "";

   FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
   status = FaolToNet (rqptr, ReviseServiceFao, &FaoVector);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   vecptr = FaoVector;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = true;
   status = FaolToNet (rqptr, ReviseProxyFao, &FaoVector);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   vecptr = FaoVector;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = true;
   *vecptr++ = count;
   *vecptr++ = 0;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = true;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = true;
   *vecptr++ = count;
   *vecptr++ = false;
   *vecptr++ = count;
   *vecptr++ = "";
   *vecptr++ = count;
   *vecptr++ = "";

   FaoCheck (sizeof(FaoVector), &FaoVector, vecptr, FI_LI);
   status = FaolToNet (rqptr, ReviseOtherFao, &FaoVector);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   /**************/
   /* end report */
   /**************/

   if (ServiceConfigFileDefined)
      AdminMetaConEndUpdateForm (rqptr);
   else
      status = FaolToNet (rqptr, "</form>\n", NULL);
   status = FaolToNet (rqptr, "</body>\n</html>\n", NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   rqptr->rqResponse.PreExpired = PRE_EXPIRE_ADMIN;
   ResponseHeader200 (rqptr, "text/html", &rqptr->NetWriteBufferDsc);
}

/*****************************************************************************/