Annotation of embedaddon/curl/src/tool_doswin.c, revision 1.1

1.1     ! misho       1: /***************************************************************************
        !             2:  *                                  _   _ ____  _
        !             3:  *  Project                     ___| | | |  _ \| |
        !             4:  *                             / __| | | | |_) | |
        !             5:  *                            | (__| |_| |  _ <| |___
        !             6:  *                             \___|\___/|_| \_\_____|
        !             7:  *
        !             8:  * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
        !             9:  *
        !            10:  * This software is licensed as described in the file COPYING, which
        !            11:  * you should have received as part of this distribution. The terms
        !            12:  * are also available at https://curl.haxx.se/docs/copyright.html.
        !            13:  *
        !            14:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
        !            15:  * copies of the Software, and permit persons to whom the Software is
        !            16:  * furnished to do so, under the terms of the COPYING file.
        !            17:  *
        !            18:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
        !            19:  * KIND, either express or implied.
        !            20:  *
        !            21:  ***************************************************************************/
        !            22: #include "tool_setup.h"
        !            23: 
        !            24: #if defined(MSDOS) || defined(WIN32)
        !            25: 
        !            26: #if defined(HAVE_LIBGEN_H) && defined(HAVE_BASENAME)
        !            27: #  include <libgen.h>
        !            28: #endif
        !            29: 
        !            30: #ifdef WIN32
        !            31: #  include <tlhelp32.h>
        !            32: #  include "tool_cfgable.h"
        !            33: #  include "tool_libinfo.h"
        !            34: #endif
        !            35: 
        !            36: #include "tool_bname.h"
        !            37: #include "tool_doswin.h"
        !            38: 
        !            39: #include "memdebug.h" /* keep this as LAST include */
        !            40: 
        !            41: #ifdef WIN32
        !            42: #  undef  PATH_MAX
        !            43: #  define PATH_MAX MAX_PATH
        !            44: #endif
        !            45: 
        !            46: #ifndef S_ISCHR
        !            47: #  ifdef S_IFCHR
        !            48: #    define S_ISCHR(m) (((m) & S_IFMT) == S_IFCHR)
        !            49: #  else
        !            50: #    define S_ISCHR(m) (0) /* cannot tell if file is a device */
        !            51: #  endif
        !            52: #endif
        !            53: 
        !            54: #ifdef WIN32
        !            55: #  define _use_lfn(f) (1)   /* long file names always available */
        !            56: #elif !defined(__DJGPP__) || (__DJGPP__ < 2)  /* DJGPP 2.0 has _use_lfn() */
        !            57: #  define _use_lfn(f) (0)  /* long file names never available */
        !            58: #elif defined(__DJGPP__)
        !            59: #  include <fcntl.h>                /* _use_lfn(f) prototype */
        !            60: #endif
        !            61: 
        !            62: #ifndef UNITTESTS
        !            63: static SANITIZEcode truncate_dryrun(const char *path,
        !            64:                                     const size_t truncate_pos);
        !            65: #ifdef MSDOS
        !            66: static SANITIZEcode msdosify(char **const sanitized, const char *file_name,
        !            67:                              int flags);
        !            68: #endif
        !            69: static SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
        !            70:                                                        const char *file_name,
        !            71:                                                        int flags);
        !            72: #endif /* !UNITTESTS (static declarations used if no unit tests) */
        !            73: 
        !            74: 
        !            75: /*
        !            76: Sanitize a file or path name.
        !            77: 
        !            78: All banned characters are replaced by underscores, for example:
        !            79: f?*foo => f__foo
        !            80: f:foo::$DATA => f_foo__$DATA
        !            81: f:\foo:bar => f__foo_bar
        !            82: f:\foo:bar => f:\foo:bar   (flag SANITIZE_ALLOW_PATH)
        !            83: 
        !            84: This function was implemented according to the guidelines in 'Naming Files,
        !            85: Paths, and Namespaces' section 'Naming Conventions'.
        !            86: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
        !            87: 
        !            88: Flags
        !            89: -----
        !            90: SANITIZE_ALLOW_COLONS:     Allow colons.
        !            91: Without this flag colons are sanitized.
        !            92: 
        !            93: SANITIZE_ALLOW_PATH:       Allow path separators and colons.
        !            94: Without this flag path separators and colons are sanitized.
        !            95: 
        !            96: SANITIZE_ALLOW_RESERVED:   Allow reserved device names.
        !            97: Without this flag a reserved device name is renamed (COM1 => _COM1) unless it's
        !            98: in a UNC prefixed path.
        !            99: 
        !           100: SANITIZE_ALLOW_TRUNCATE:   Allow truncating a long filename.
        !           101: Without this flag if the sanitized filename or path will be too long an error
        !           102: occurs. With this flag the filename --and not any other parts of the path-- may
        !           103: be truncated to at least a single character. A filename followed by an
        !           104: alternate data stream (ADS) cannot be truncated in any case.
        !           105: 
        !           106: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
        !           107: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
        !           108: */
        !           109: SANITIZEcode sanitize_file_name(char **const sanitized, const char *file_name,
        !           110:                                 int flags)
        !           111: {
        !           112:   char *p, *target;
        !           113:   size_t len;
        !           114:   SANITIZEcode sc;
        !           115:   size_t max_sanitized_len;
        !           116: 
        !           117:   if(!sanitized)
        !           118:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           119: 
        !           120:   *sanitized = NULL;
        !           121: 
        !           122:   if(!file_name)
        !           123:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           124: 
        !           125:   if((flags & SANITIZE_ALLOW_PATH)) {
        !           126: #ifndef MSDOS
        !           127:     if(file_name[0] == '\\' && file_name[1] == '\\')
        !           128:       /* UNC prefixed path \\ (eg \\?\C:\foo) */
        !           129:       max_sanitized_len = 32767-1;
        !           130:     else
        !           131: #endif
        !           132:       max_sanitized_len = PATH_MAX-1;
        !           133:   }
        !           134:   else
        !           135:     /* The maximum length of a filename.
        !           136:        FILENAME_MAX is often the same as PATH_MAX, in other words it is 260 and
        !           137:        does not discount the path information therefore we shouldn't use it. */
        !           138:     max_sanitized_len = (PATH_MAX-1 > 255) ? 255 : PATH_MAX-1;
        !           139: 
        !           140:   len = strlen(file_name);
        !           141:   if(len > max_sanitized_len) {
        !           142:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) ||
        !           143:        truncate_dryrun(file_name, max_sanitized_len))
        !           144:       return SANITIZE_ERR_INVALID_PATH;
        !           145: 
        !           146:     len = max_sanitized_len;
        !           147:   }
        !           148: 
        !           149:   target = malloc(len + 1);
        !           150:   if(!target)
        !           151:     return SANITIZE_ERR_OUT_OF_MEMORY;
        !           152: 
        !           153:   strncpy(target, file_name, len);
        !           154:   target[len] = '\0';
        !           155: 
        !           156: #ifndef MSDOS
        !           157:   if((flags & SANITIZE_ALLOW_PATH) && !strncmp(target, "\\\\?\\", 4))
        !           158:     /* Skip the literal path prefix \\?\ */
        !           159:     p = target + 4;
        !           160:   else
        !           161: #endif
        !           162:     p = target;
        !           163: 
        !           164:   /* replace control characters and other banned characters */
        !           165:   for(; *p; ++p) {
        !           166:     const char *banned;
        !           167: 
        !           168:     if((1 <= *p && *p <= 31) ||
        !           169:        (!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *p == ':') ||
        !           170:        (!(flags & SANITIZE_ALLOW_PATH) && (*p == '/' || *p == '\\'))) {
        !           171:       *p = '_';
        !           172:       continue;
        !           173:     }
        !           174: 
        !           175:     for(banned = "|<>\"?*"; *banned; ++banned) {
        !           176:       if(*p == *banned) {
        !           177:         *p = '_';
        !           178:         break;
        !           179:       }
        !           180:     }
        !           181:   }
        !           182: 
        !           183:   /* remove trailing spaces and periods if not allowing paths */
        !           184:   if(!(flags & SANITIZE_ALLOW_PATH) && len) {
        !           185:     char *clip = NULL;
        !           186: 
        !           187:     p = &target[len];
        !           188:     do {
        !           189:       --p;
        !           190:       if(*p != ' ' && *p != '.')
        !           191:         break;
        !           192:       clip = p;
        !           193:     } while(p != target);
        !           194: 
        !           195:     if(clip) {
        !           196:       *clip = '\0';
        !           197:       len = clip - target;
        !           198:     }
        !           199:   }
        !           200: 
        !           201: #ifdef MSDOS
        !           202:   sc = msdosify(&p, target, flags);
        !           203:   free(target);
        !           204:   if(sc)
        !           205:     return sc;
        !           206:   target = p;
        !           207:   len = strlen(target);
        !           208: 
        !           209:   if(len > max_sanitized_len) {
        !           210:     free(target);
        !           211:     return SANITIZE_ERR_INVALID_PATH;
        !           212:   }
        !           213: #endif
        !           214: 
        !           215:   if(!(flags & SANITIZE_ALLOW_RESERVED)) {
        !           216:     sc = rename_if_reserved_dos_device_name(&p, target, flags);
        !           217:     free(target);
        !           218:     if(sc)
        !           219:       return sc;
        !           220:     target = p;
        !           221:     len = strlen(target);
        !           222: 
        !           223:     if(len > max_sanitized_len) {
        !           224:       free(target);
        !           225:       return SANITIZE_ERR_INVALID_PATH;
        !           226:     }
        !           227:   }
        !           228: 
        !           229:   *sanitized = target;
        !           230:   return SANITIZE_ERR_OK;
        !           231: }
        !           232: 
        !           233: 
        !           234: /*
        !           235: Test if truncating a path to a file will leave at least a single character in
        !           236: the filename. Filenames suffixed by an alternate data stream can't be
        !           237: truncated. This performs a dry run, nothing is modified.
        !           238: 
        !           239: Good truncate_pos 9:    C:\foo\bar  =>  C:\foo\ba
        !           240: Good truncate_pos 6:    C:\foo      =>  C:\foo
        !           241: Good truncate_pos 5:    C:\foo      =>  C:\fo
        !           242: Bad* truncate_pos 5:    C:foo       =>  C:foo
        !           243: Bad truncate_pos 5:     C:\foo:ads  =>  C:\fo
        !           244: Bad truncate_pos 9:     C:\foo:ads  =>  C:\foo:ad
        !           245: Bad truncate_pos 5:     C:\foo\bar  =>  C:\fo
        !           246: Bad truncate_pos 5:     C:\foo\     =>  C:\fo
        !           247: Bad truncate_pos 7:     C:\foo\     =>  C:\foo\
        !           248: Error truncate_pos 7:   C:\foo      =>  (pos out of range)
        !           249: Bad truncate_pos 1:     C:\foo\     =>  C
        !           250: 
        !           251: * C:foo is ambiguous, C could end up being a drive or file therefore something
        !           252:   like C:superlongfilename can't be truncated.
        !           253: 
        !           254: Returns
        !           255: SANITIZE_ERR_OK: Good -- 'path' can be truncated
        !           256: SANITIZE_ERR_INVALID_PATH: Bad -- 'path' cannot be truncated
        !           257: != SANITIZE_ERR_OK && != SANITIZE_ERR_INVALID_PATH: Error
        !           258: */
        !           259: SANITIZEcode truncate_dryrun(const char *path, const size_t truncate_pos)
        !           260: {
        !           261:   size_t len;
        !           262: 
        !           263:   if(!path)
        !           264:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           265: 
        !           266:   len = strlen(path);
        !           267: 
        !           268:   if(truncate_pos > len)
        !           269:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           270: 
        !           271:   if(!len || !truncate_pos)
        !           272:     return SANITIZE_ERR_INVALID_PATH;
        !           273: 
        !           274:   if(strpbrk(&path[truncate_pos - 1], "\\/:"))
        !           275:     return SANITIZE_ERR_INVALID_PATH;
        !           276: 
        !           277:   /* C:\foo can be truncated but C:\foo:ads can't */
        !           278:   if(truncate_pos > 1) {
        !           279:     const char *p = &path[truncate_pos - 1];
        !           280:     do {
        !           281:       --p;
        !           282:       if(*p == ':')
        !           283:         return SANITIZE_ERR_INVALID_PATH;
        !           284:     } while(p != path && *p != '\\' && *p != '/');
        !           285:   }
        !           286: 
        !           287:   return SANITIZE_ERR_OK;
        !           288: }
        !           289: 
        !           290: /* The functions msdosify, rename_if_dos_device_name and __crt0_glob_function
        !           291:  * were taken with modification from the DJGPP port of tar 1.12. They use
        !           292:  * algorithms originally from DJTAR.
        !           293:  */
        !           294: 
        !           295: /*
        !           296: Extra sanitization MSDOS for file_name.
        !           297: 
        !           298: This is a supporting function for sanitize_file_name.
        !           299: 
        !           300: Warning: This is an MSDOS legacy function and was purposely written in a way
        !           301: that some path information may pass through. For example drive letter names
        !           302: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
        !           303: sanitize_file_name.
        !           304: 
        !           305: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
        !           306: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
        !           307: */
        !           308: #if defined(MSDOS) || defined(UNITTESTS)
        !           309: SANITIZEcode msdosify(char **const sanitized, const char *file_name,
        !           310:                       int flags)
        !           311: {
        !           312:   char dos_name[PATH_MAX];
        !           313:   static const char illegal_chars_dos[] = ".+, ;=[]" /* illegal in DOS */
        !           314:     "|<>/\\\":?*"; /* illegal in DOS & W95 */
        !           315:   static const char *illegal_chars_w95 = &illegal_chars_dos[8];
        !           316:   int idx, dot_idx;
        !           317:   const char *s = file_name;
        !           318:   char *d = dos_name;
        !           319:   const char *const dlimit = dos_name + sizeof(dos_name) - 1;
        !           320:   const char *illegal_aliens = illegal_chars_dos;
        !           321:   size_t len = sizeof(illegal_chars_dos) - 1;
        !           322: 
        !           323:   if(!sanitized)
        !           324:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           325: 
        !           326:   *sanitized = NULL;
        !           327: 
        !           328:   if(!file_name)
        !           329:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           330: 
        !           331:   if(strlen(file_name) > PATH_MAX-1 &&
        !           332:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
        !           333:       truncate_dryrun(file_name, PATH_MAX-1)))
        !           334:     return SANITIZE_ERR_INVALID_PATH;
        !           335: 
        !           336:   /* Support for Windows 9X VFAT systems, when available. */
        !           337:   if(_use_lfn(file_name)) {
        !           338:     illegal_aliens = illegal_chars_w95;
        !           339:     len -= (illegal_chars_w95 - illegal_chars_dos);
        !           340:   }
        !           341: 
        !           342:   /* Get past the drive letter, if any. */
        !           343:   if(s[0] >= 'A' && s[0] <= 'z' && s[1] == ':') {
        !           344:     *d++ = *s++;
        !           345:     *d = ((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) ? ':' : '_';
        !           346:     ++d, ++s;
        !           347:   }
        !           348: 
        !           349:   for(idx = 0, dot_idx = -1; *s && d < dlimit; s++, d++) {
        !           350:     if(memchr(illegal_aliens, *s, len)) {
        !           351: 
        !           352:       if((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *s == ':')
        !           353:         *d = ':';
        !           354:       else if((flags & SANITIZE_ALLOW_PATH) && (*s == '/' || *s == '\\'))
        !           355:         *d = *s;
        !           356:       /* Dots are special: DOS doesn't allow them as the leading character,
        !           357:          and a file name cannot have more than a single dot.  We leave the
        !           358:          first non-leading dot alone, unless it comes too close to the
        !           359:          beginning of the name: we want sh.lex.c to become sh_lex.c, not
        !           360:          sh.lex-c.  */
        !           361:       else if(*s == '.') {
        !           362:         if((flags & SANITIZE_ALLOW_PATH) && idx == 0 &&
        !           363:            (s[1] == '/' || s[1] == '\\' ||
        !           364:             (s[1] == '.' && (s[2] == '/' || s[2] == '\\')))) {
        !           365:           /* Copy "./" and "../" verbatim.  */
        !           366:           *d++ = *s++;
        !           367:           if(d == dlimit)
        !           368:             break;
        !           369:           if(*s == '.') {
        !           370:             *d++ = *s++;
        !           371:             if(d == dlimit)
        !           372:               break;
        !           373:           }
        !           374:           *d = *s;
        !           375:         }
        !           376:         else if(idx == 0)
        !           377:           *d = '_';
        !           378:         else if(dot_idx >= 0) {
        !           379:           if(dot_idx < 5) { /* 5 is a heuristic ad-hoc'ery */
        !           380:             d[dot_idx - idx] = '_'; /* replace previous dot */
        !           381:             *d = '.';
        !           382:           }
        !           383:           else
        !           384:             *d = '-';
        !           385:         }
        !           386:         else
        !           387:           *d = '.';
        !           388: 
        !           389:         if(*s == '.')
        !           390:           dot_idx = idx;
        !           391:       }
        !           392:       else if(*s == '+' && s[1] == '+') {
        !           393:         if(idx - 2 == dot_idx) { /* .c++, .h++ etc. */
        !           394:           *d++ = 'x';
        !           395:           if(d == dlimit)
        !           396:             break;
        !           397:           *d   = 'x';
        !           398:         }
        !           399:         else {
        !           400:           /* libg++ etc.  */
        !           401:           if(dlimit - d < 4) {
        !           402:             *d++ = 'x';
        !           403:             if(d == dlimit)
        !           404:               break;
        !           405:             *d   = 'x';
        !           406:           }
        !           407:           else {
        !           408:             memcpy(d, "plus", 4);
        !           409:             d += 3;
        !           410:           }
        !           411:         }
        !           412:         s++;
        !           413:         idx++;
        !           414:       }
        !           415:       else
        !           416:         *d = '_';
        !           417:     }
        !           418:     else
        !           419:       *d = *s;
        !           420:     if(*s == '/' || *s == '\\') {
        !           421:       idx = 0;
        !           422:       dot_idx = -1;
        !           423:     }
        !           424:     else
        !           425:       idx++;
        !           426:   }
        !           427:   *d = '\0';
        !           428: 
        !           429:   if(*s) {
        !           430:     /* dos_name is truncated, check that truncation requirements are met,
        !           431:        specifically truncating a filename suffixed by an alternate data stream
        !           432:        or truncating the entire filename is not allowed. */
        !           433:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) || strpbrk(s, "\\/:") ||
        !           434:        truncate_dryrun(dos_name, d - dos_name))
        !           435:       return SANITIZE_ERR_INVALID_PATH;
        !           436:   }
        !           437: 
        !           438:   *sanitized = strdup(dos_name);
        !           439:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
        !           440: }
        !           441: #endif /* MSDOS || UNITTESTS */
        !           442: 
        !           443: /*
        !           444: Rename file_name if it's a reserved dos device name.
        !           445: 
        !           446: This is a supporting function for sanitize_file_name.
        !           447: 
        !           448: Warning: This is an MSDOS legacy function and was purposely written in a way
        !           449: that some path information may pass through. For example drive letter names
        !           450: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
        !           451: sanitize_file_name.
        !           452: 
        !           453: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
        !           454: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
        !           455: */
        !           456: SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
        !           457:                                                 const char *file_name,
        !           458:                                                 int flags)
        !           459: {
        !           460:   /* We could have a file whose name is a device on MS-DOS.  Trying to
        !           461:    * retrieve such a file would fail at best and wedge us at worst.  We need
        !           462:    * to rename such files. */
        !           463:   char *p, *base;
        !           464:   char fname[PATH_MAX];
        !           465: #ifdef MSDOS
        !           466:   struct_stat st_buf;
        !           467: #endif
        !           468: 
        !           469:   if(!sanitized)
        !           470:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           471: 
        !           472:   *sanitized = NULL;
        !           473: 
        !           474:   if(!file_name)
        !           475:     return SANITIZE_ERR_BAD_ARGUMENT;
        !           476: 
        !           477:   /* Ignore UNC prefixed paths, they are allowed to contain a reserved name. */
        !           478: #ifndef MSDOS
        !           479:   if((flags & SANITIZE_ALLOW_PATH) &&
        !           480:      file_name[0] == '\\' && file_name[1] == '\\') {
        !           481:     size_t len = strlen(file_name);
        !           482:     *sanitized = malloc(len + 1);
        !           483:     if(!*sanitized)
        !           484:       return SANITIZE_ERR_OUT_OF_MEMORY;
        !           485:     strncpy(*sanitized, file_name, len + 1);
        !           486:     return SANITIZE_ERR_OK;
        !           487:   }
        !           488: #endif
        !           489: 
        !           490:   if(strlen(file_name) > PATH_MAX-1 &&
        !           491:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
        !           492:       truncate_dryrun(file_name, PATH_MAX-1)))
        !           493:     return SANITIZE_ERR_INVALID_PATH;
        !           494: 
        !           495:   strncpy(fname, file_name, PATH_MAX-1);
        !           496:   fname[PATH_MAX-1] = '\0';
        !           497:   base = basename(fname);
        !           498: 
        !           499:   /* Rename reserved device names that are known to be accessible without \\.\
        !           500:      Examples: CON => _CON, CON.EXT => CON_EXT, CON:ADS => CON_ADS
        !           501:      https://support.microsoft.com/en-us/kb/74496
        !           502:      https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
        !           503:      */
        !           504:   for(p = fname; p; p = (p == fname && fname != base ? base : NULL)) {
        !           505:     size_t p_len;
        !           506:     int x = (curl_strnequal(p, "CON", 3) ||
        !           507:              curl_strnequal(p, "PRN", 3) ||
        !           508:              curl_strnequal(p, "AUX", 3) ||
        !           509:              curl_strnequal(p, "NUL", 3)) ? 3 :
        !           510:             (curl_strnequal(p, "CLOCK$", 6)) ? 6 :
        !           511:             (curl_strnequal(p, "COM", 3) || curl_strnequal(p, "LPT", 3)) ?
        !           512:               (('1' <= p[3] && p[3] <= '9') ? 4 : 3) : 0;
        !           513: 
        !           514:     if(!x)
        !           515:       continue;
        !           516: 
        !           517:     /* the devices may be accessible with an extension or ADS, for
        !           518:        example CON.AIR and 'CON . AIR' and CON:AIR access console */
        !           519: 
        !           520:     for(; p[x] == ' '; ++x)
        !           521:       ;
        !           522: 
        !           523:     if(p[x] == '.') {
        !           524:       p[x] = '_';
        !           525:       continue;
        !           526:     }
        !           527:     else if(p[x] == ':') {
        !           528:       if(!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) {
        !           529:         p[x] = '_';
        !           530:         continue;
        !           531:       }
        !           532:       ++x;
        !           533:     }
        !           534:     else if(p[x]) /* no match */
        !           535:       continue;
        !           536: 
        !           537:     /* p points to 'CON' or 'CON ' or 'CON:', etc */
        !           538:     p_len = strlen(p);
        !           539: 
        !           540:     /* Prepend a '_' */
        !           541:     if(strlen(fname) == PATH_MAX-1) {
        !           542:       --p_len;
        !           543:       if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(p, p_len))
        !           544:         return SANITIZE_ERR_INVALID_PATH;
        !           545:       p[p_len] = '\0';
        !           546:     }
        !           547:     memmove(p + 1, p, p_len + 1);
        !           548:     p[0] = '_';
        !           549:     ++p_len;
        !           550: 
        !           551:     /* if fname was just modified then the basename pointer must be updated */
        !           552:     if(p == fname)
        !           553:       base = basename(fname);
        !           554:   }
        !           555: 
        !           556:   /* This is the legacy portion from rename_if_dos_device_name that checks for
        !           557:      reserved device names. It only works on MSDOS. On Windows XP the stat
        !           558:      check errors with EINVAL if the device name is reserved. On Windows
        !           559:      Vista/7/8 it sets mode S_IFREG (regular file or device). According to MSDN
        !           560:      stat doc the latter behavior is correct, but that doesn't help us identify
        !           561:      whether it's a reserved device name and not a regular file name. */
        !           562: #ifdef MSDOS
        !           563:   if(base && ((stat(base, &st_buf)) == 0) && (S_ISCHR(st_buf.st_mode))) {
        !           564:     /* Prepend a '_' */
        !           565:     size_t blen = strlen(base);
        !           566:     if(blen) {
        !           567:       if(strlen(fname) == PATH_MAX-1) {
        !           568:         --blen;
        !           569:         if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(base, blen))
        !           570:           return SANITIZE_ERR_INVALID_PATH;
        !           571:         base[blen] = '\0';
        !           572:       }
        !           573:       memmove(base + 1, base, blen + 1);
        !           574:       base[0] = '_';
        !           575:     }
        !           576:   }
        !           577: #endif
        !           578: 
        !           579:   *sanitized = strdup(fname);
        !           580:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
        !           581: }
        !           582: 
        !           583: #if defined(MSDOS) && (defined(__DJGPP__) || defined(__GO32__))
        !           584: 
        !           585: /*
        !           586:  * Disable program default argument globbing. We do it on our own.
        !           587:  */
        !           588: char **__crt0_glob_function(char *arg)
        !           589: {
        !           590:   (void)arg;
        !           591:   return (char **)0;
        !           592: }
        !           593: 
        !           594: #endif /* MSDOS && (__DJGPP__ || __GO32__) */
        !           595: 
        !           596: #ifdef WIN32
        !           597: 
        !           598: /*
        !           599:  * Function to find CACert bundle on a Win32 platform using SearchPath.
        !           600:  * (SearchPath is already declared via inclusions done in setup header file)
        !           601:  * (Use the ASCII version instead of the unicode one!)
        !           602:  * The order of the directories it searches is:
        !           603:  *  1. application's directory
        !           604:  *  2. current working directory
        !           605:  *  3. Windows System directory (e.g. C:\windows\system32)
        !           606:  *  4. Windows Directory (e.g. C:\windows)
        !           607:  *  5. all directories along %PATH%
        !           608:  *
        !           609:  * For WinXP and later search order actually depends on registry value:
        !           610:  * HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SafeProcessSearchMode
        !           611:  */
        !           612: 
        !           613: CURLcode FindWin32CACert(struct OperationConfig *config,
        !           614:                          curl_sslbackend backend,
        !           615:                          const char *bundle_file)
        !           616: {
        !           617:   CURLcode result = CURLE_OK;
        !           618: 
        !           619:   /* Search and set cert file only if libcurl supports SSL.
        !           620:    *
        !           621:    * If Schannel is the selected SSL backend then these locations are
        !           622:    * ignored. We allow setting CA location for schannel only when explicitly
        !           623:    * specified by the user via CURLOPT_CAINFO / --cacert.
        !           624:    */
        !           625:   if((curlinfo->features & CURL_VERSION_SSL) &&
        !           626:      backend != CURLSSLBACKEND_SCHANNEL) {
        !           627: 
        !           628:     DWORD res_len;
        !           629:     char buf[PATH_MAX];
        !           630:     char *ptr = NULL;
        !           631: 
        !           632:     buf[0] = '\0';
        !           633: 
        !           634:     res_len = SearchPathA(NULL, bundle_file, NULL, PATH_MAX, buf, &ptr);
        !           635:     if(res_len > 0) {
        !           636:       Curl_safefree(config->cacert);
        !           637:       config->cacert = strdup(buf);
        !           638:       if(!config->cacert)
        !           639:         result = CURLE_OUT_OF_MEMORY;
        !           640:     }
        !           641:   }
        !           642: 
        !           643:   return result;
        !           644: }
        !           645: 
        !           646: 
        !           647: /* Get a list of all loaded modules with full paths.
        !           648:  * Returns slist on success or NULL on error.
        !           649:  */
        !           650: struct curl_slist *GetLoadedModulePaths(void)
        !           651: {
        !           652:   HANDLE hnd = INVALID_HANDLE_VALUE;
        !           653:   MODULEENTRY32 mod = {0};
        !           654:   struct curl_slist *slist = NULL;
        !           655: 
        !           656:   mod.dwSize = sizeof(MODULEENTRY32);
        !           657: 
        !           658:   do {
        !           659:     hnd = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, 0);
        !           660:   } while(hnd == INVALID_HANDLE_VALUE && GetLastError() == ERROR_BAD_LENGTH);
        !           661: 
        !           662:   if(hnd == INVALID_HANDLE_VALUE)
        !           663:     goto error;
        !           664: 
        !           665:   if(!Module32First(hnd, &mod))
        !           666:     goto error;
        !           667: 
        !           668:   do {
        !           669:     char *path; /* points to stack allocated buffer */
        !           670:     struct curl_slist *temp;
        !           671: 
        !           672: #ifdef UNICODE
        !           673:     /* sizeof(mod.szExePath) is the max total bytes of wchars. the max total
        !           674:        bytes of multibyte chars won't be more than twice that. */
        !           675:     char buffer[sizeof(mod.szExePath) * 2];
        !           676:     if(!WideCharToMultiByte(CP_ACP, 0, mod.szExePath, -1,
        !           677:                             buffer, sizeof(buffer), NULL, NULL))
        !           678:       goto error;
        !           679:     path = buffer;
        !           680: #else
        !           681:     path = mod.szExePath;
        !           682: #endif
        !           683:     temp = curl_slist_append(slist, path);
        !           684:     if(!temp)
        !           685:       goto error;
        !           686:     slist = temp;
        !           687:   } while(Module32Next(hnd, &mod));
        !           688: 
        !           689:   goto cleanup;
        !           690: 
        !           691: error:
        !           692:   curl_slist_free_all(slist);
        !           693:   slist = NULL;
        !           694: cleanup:
        !           695:   if(hnd != INVALID_HANDLE_VALUE)
        !           696:     CloseHandle(hnd);
        !           697:   return slist;
        !           698: }
        !           699: 
        !           700: LARGE_INTEGER tool_freq;
        !           701: bool tool_isVistaOrGreater;
        !           702: 
        !           703: CURLcode win32_init(void)
        !           704: {
        !           705:   OSVERSIONINFOEXA osvi;
        !           706:   unsigned __int64 mask = 0;
        !           707:   unsigned char op = VER_GREATER_EQUAL;
        !           708: 
        !           709:   memset(&osvi, 0, sizeof(osvi));
        !           710:   osvi.dwOSVersionInfoSize = sizeof(osvi);
        !           711:   osvi.dwMajorVersion = 6;
        !           712:   VER_SET_CONDITION(mask, VER_MAJORVERSION, op);
        !           713:   VER_SET_CONDITION(mask, VER_MINORVERSION, op);
        !           714: 
        !           715:   if(VerifyVersionInfoA(&osvi, (VER_MAJORVERSION | VER_MINORVERSION), mask))
        !           716:     tool_isVistaOrGreater = true;
        !           717:   else if(GetLastError() == ERROR_OLD_WIN_VERSION)
        !           718:     tool_isVistaOrGreater = false;
        !           719:   else
        !           720:     return CURLE_FAILED_INIT;
        !           721: 
        !           722:   QueryPerformanceFrequency(&tool_freq);
        !           723:   return CURLE_OK;
        !           724: }
        !           725: 
        !           726: #endif /* WIN32 */
        !           727: 
        !           728: #endif /* MSDOS || WIN32 */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>