Annotation of embedaddon/curl/src/tool_doswin.c, revision 1.1.1.1

1.1       misho       1: /***************************************************************************
                      2:  *                                  _   _ ____  _
                      3:  *  Project                     ___| | | |  _ \| |
                      4:  *                             / __| | | | |_) | |
                      5:  *                            | (__| |_| |  _ <| |___
                      6:  *                             \___|\___/|_| \_\_____|
                      7:  *
                      8:  * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
                      9:  *
                     10:  * This software is licensed as described in the file COPYING, which
                     11:  * you should have received as part of this distribution. The terms
                     12:  * are also available at https://curl.haxx.se/docs/copyright.html.
                     13:  *
                     14:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
                     15:  * copies of the Software, and permit persons to whom the Software is
                     16:  * furnished to do so, under the terms of the COPYING file.
                     17:  *
                     18:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
                     19:  * KIND, either express or implied.
                     20:  *
                     21:  ***************************************************************************/
                     22: #include "tool_setup.h"
                     23: 
                     24: #if defined(MSDOS) || defined(WIN32)
                     25: 
                     26: #if defined(HAVE_LIBGEN_H) && defined(HAVE_BASENAME)
                     27: #  include <libgen.h>
                     28: #endif
                     29: 
                     30: #ifdef WIN32
                     31: #  include <tlhelp32.h>
                     32: #  include "tool_cfgable.h"
                     33: #  include "tool_libinfo.h"
                     34: #endif
                     35: 
                     36: #include "tool_bname.h"
                     37: #include "tool_doswin.h"
                     38: 
                     39: #include "memdebug.h" /* keep this as LAST include */
                     40: 
                     41: #ifdef WIN32
                     42: #  undef  PATH_MAX
                     43: #  define PATH_MAX MAX_PATH
                     44: #endif
                     45: 
                     46: #ifndef S_ISCHR
                     47: #  ifdef S_IFCHR
                     48: #    define S_ISCHR(m) (((m) & S_IFMT) == S_IFCHR)
                     49: #  else
                     50: #    define S_ISCHR(m) (0) /* cannot tell if file is a device */
                     51: #  endif
                     52: #endif
                     53: 
                     54: #ifdef WIN32
                     55: #  define _use_lfn(f) (1)   /* long file names always available */
                     56: #elif !defined(__DJGPP__) || (__DJGPP__ < 2)  /* DJGPP 2.0 has _use_lfn() */
                     57: #  define _use_lfn(f) (0)  /* long file names never available */
                     58: #elif defined(__DJGPP__)
                     59: #  include <fcntl.h>                /* _use_lfn(f) prototype */
                     60: #endif
                     61: 
                     62: #ifndef UNITTESTS
                     63: static SANITIZEcode truncate_dryrun(const char *path,
                     64:                                     const size_t truncate_pos);
                     65: #ifdef MSDOS
                     66: static SANITIZEcode msdosify(char **const sanitized, const char *file_name,
                     67:                              int flags);
                     68: #endif
                     69: static SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
                     70:                                                        const char *file_name,
                     71:                                                        int flags);
                     72: #endif /* !UNITTESTS (static declarations used if no unit tests) */
                     73: 
                     74: 
                     75: /*
                     76: Sanitize a file or path name.
                     77: 
                     78: All banned characters are replaced by underscores, for example:
                     79: f?*foo => f__foo
                     80: f:foo::$DATA => f_foo__$DATA
                     81: f:\foo:bar => f__foo_bar
                     82: f:\foo:bar => f:\foo:bar   (flag SANITIZE_ALLOW_PATH)
                     83: 
                     84: This function was implemented according to the guidelines in 'Naming Files,
                     85: Paths, and Namespaces' section 'Naming Conventions'.
                     86: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
                     87: 
                     88: Flags
                     89: -----
                     90: SANITIZE_ALLOW_COLONS:     Allow colons.
                     91: Without this flag colons are sanitized.
                     92: 
                     93: SANITIZE_ALLOW_PATH:       Allow path separators and colons.
                     94: Without this flag path separators and colons are sanitized.
                     95: 
                     96: SANITIZE_ALLOW_RESERVED:   Allow reserved device names.
                     97: Without this flag a reserved device name is renamed (COM1 => _COM1) unless it's
                     98: in a UNC prefixed path.
                     99: 
                    100: SANITIZE_ALLOW_TRUNCATE:   Allow truncating a long filename.
                    101: Without this flag if the sanitized filename or path will be too long an error
                    102: occurs. With this flag the filename --and not any other parts of the path-- may
                    103: be truncated to at least a single character. A filename followed by an
                    104: alternate data stream (ADS) cannot be truncated in any case.
                    105: 
                    106: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
                    107: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
                    108: */
                    109: SANITIZEcode sanitize_file_name(char **const sanitized, const char *file_name,
                    110:                                 int flags)
                    111: {
                    112:   char *p, *target;
                    113:   size_t len;
                    114:   SANITIZEcode sc;
                    115:   size_t max_sanitized_len;
                    116: 
                    117:   if(!sanitized)
                    118:     return SANITIZE_ERR_BAD_ARGUMENT;
                    119: 
                    120:   *sanitized = NULL;
                    121: 
                    122:   if(!file_name)
                    123:     return SANITIZE_ERR_BAD_ARGUMENT;
                    124: 
                    125:   if((flags & SANITIZE_ALLOW_PATH)) {
                    126: #ifndef MSDOS
                    127:     if(file_name[0] == '\\' && file_name[1] == '\\')
                    128:       /* UNC prefixed path \\ (eg \\?\C:\foo) */
                    129:       max_sanitized_len = 32767-1;
                    130:     else
                    131: #endif
                    132:       max_sanitized_len = PATH_MAX-1;
                    133:   }
                    134:   else
                    135:     /* The maximum length of a filename.
                    136:        FILENAME_MAX is often the same as PATH_MAX, in other words it is 260 and
                    137:        does not discount the path information therefore we shouldn't use it. */
                    138:     max_sanitized_len = (PATH_MAX-1 > 255) ? 255 : PATH_MAX-1;
                    139: 
                    140:   len = strlen(file_name);
                    141:   if(len > max_sanitized_len) {
                    142:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) ||
                    143:        truncate_dryrun(file_name, max_sanitized_len))
                    144:       return SANITIZE_ERR_INVALID_PATH;
                    145: 
                    146:     len = max_sanitized_len;
                    147:   }
                    148: 
                    149:   target = malloc(len + 1);
                    150:   if(!target)
                    151:     return SANITIZE_ERR_OUT_OF_MEMORY;
                    152: 
                    153:   strncpy(target, file_name, len);
                    154:   target[len] = '\0';
                    155: 
                    156: #ifndef MSDOS
                    157:   if((flags & SANITIZE_ALLOW_PATH) && !strncmp(target, "\\\\?\\", 4))
                    158:     /* Skip the literal path prefix \\?\ */
                    159:     p = target + 4;
                    160:   else
                    161: #endif
                    162:     p = target;
                    163: 
                    164:   /* replace control characters and other banned characters */
                    165:   for(; *p; ++p) {
                    166:     const char *banned;
                    167: 
                    168:     if((1 <= *p && *p <= 31) ||
                    169:        (!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *p == ':') ||
                    170:        (!(flags & SANITIZE_ALLOW_PATH) && (*p == '/' || *p == '\\'))) {
                    171:       *p = '_';
                    172:       continue;
                    173:     }
                    174: 
                    175:     for(banned = "|<>\"?*"; *banned; ++banned) {
                    176:       if(*p == *banned) {
                    177:         *p = '_';
                    178:         break;
                    179:       }
                    180:     }
                    181:   }
                    182: 
                    183:   /* remove trailing spaces and periods if not allowing paths */
                    184:   if(!(flags & SANITIZE_ALLOW_PATH) && len) {
                    185:     char *clip = NULL;
                    186: 
                    187:     p = &target[len];
                    188:     do {
                    189:       --p;
                    190:       if(*p != ' ' && *p != '.')
                    191:         break;
                    192:       clip = p;
                    193:     } while(p != target);
                    194: 
                    195:     if(clip) {
                    196:       *clip = '\0';
                    197:       len = clip - target;
                    198:     }
                    199:   }
                    200: 
                    201: #ifdef MSDOS
                    202:   sc = msdosify(&p, target, flags);
                    203:   free(target);
                    204:   if(sc)
                    205:     return sc;
                    206:   target = p;
                    207:   len = strlen(target);
                    208: 
                    209:   if(len > max_sanitized_len) {
                    210:     free(target);
                    211:     return SANITIZE_ERR_INVALID_PATH;
                    212:   }
                    213: #endif
                    214: 
                    215:   if(!(flags & SANITIZE_ALLOW_RESERVED)) {
                    216:     sc = rename_if_reserved_dos_device_name(&p, target, flags);
                    217:     free(target);
                    218:     if(sc)
                    219:       return sc;
                    220:     target = p;
                    221:     len = strlen(target);
                    222: 
                    223:     if(len > max_sanitized_len) {
                    224:       free(target);
                    225:       return SANITIZE_ERR_INVALID_PATH;
                    226:     }
                    227:   }
                    228: 
                    229:   *sanitized = target;
                    230:   return SANITIZE_ERR_OK;
                    231: }
                    232: 
                    233: 
                    234: /*
                    235: Test if truncating a path to a file will leave at least a single character in
                    236: the filename. Filenames suffixed by an alternate data stream can't be
                    237: truncated. This performs a dry run, nothing is modified.
                    238: 
                    239: Good truncate_pos 9:    C:\foo\bar  =>  C:\foo\ba
                    240: Good truncate_pos 6:    C:\foo      =>  C:\foo
                    241: Good truncate_pos 5:    C:\foo      =>  C:\fo
                    242: Bad* truncate_pos 5:    C:foo       =>  C:foo
                    243: Bad truncate_pos 5:     C:\foo:ads  =>  C:\fo
                    244: Bad truncate_pos 9:     C:\foo:ads  =>  C:\foo:ad
                    245: Bad truncate_pos 5:     C:\foo\bar  =>  C:\fo
                    246: Bad truncate_pos 5:     C:\foo\     =>  C:\fo
                    247: Bad truncate_pos 7:     C:\foo\     =>  C:\foo\
                    248: Error truncate_pos 7:   C:\foo      =>  (pos out of range)
                    249: Bad truncate_pos 1:     C:\foo\     =>  C
                    250: 
                    251: * C:foo is ambiguous, C could end up being a drive or file therefore something
                    252:   like C:superlongfilename can't be truncated.
                    253: 
                    254: Returns
                    255: SANITIZE_ERR_OK: Good -- 'path' can be truncated
                    256: SANITIZE_ERR_INVALID_PATH: Bad -- 'path' cannot be truncated
                    257: != SANITIZE_ERR_OK && != SANITIZE_ERR_INVALID_PATH: Error
                    258: */
                    259: SANITIZEcode truncate_dryrun(const char *path, const size_t truncate_pos)
                    260: {
                    261:   size_t len;
                    262: 
                    263:   if(!path)
                    264:     return SANITIZE_ERR_BAD_ARGUMENT;
                    265: 
                    266:   len = strlen(path);
                    267: 
                    268:   if(truncate_pos > len)
                    269:     return SANITIZE_ERR_BAD_ARGUMENT;
                    270: 
                    271:   if(!len || !truncate_pos)
                    272:     return SANITIZE_ERR_INVALID_PATH;
                    273: 
                    274:   if(strpbrk(&path[truncate_pos - 1], "\\/:"))
                    275:     return SANITIZE_ERR_INVALID_PATH;
                    276: 
                    277:   /* C:\foo can be truncated but C:\foo:ads can't */
                    278:   if(truncate_pos > 1) {
                    279:     const char *p = &path[truncate_pos - 1];
                    280:     do {
                    281:       --p;
                    282:       if(*p == ':')
                    283:         return SANITIZE_ERR_INVALID_PATH;
                    284:     } while(p != path && *p != '\\' && *p != '/');
                    285:   }
                    286: 
                    287:   return SANITIZE_ERR_OK;
                    288: }
                    289: 
                    290: /* The functions msdosify, rename_if_dos_device_name and __crt0_glob_function
                    291:  * were taken with modification from the DJGPP port of tar 1.12. They use
                    292:  * algorithms originally from DJTAR.
                    293:  */
                    294: 
                    295: /*
                    296: Extra sanitization MSDOS for file_name.
                    297: 
                    298: This is a supporting function for sanitize_file_name.
                    299: 
                    300: Warning: This is an MSDOS legacy function and was purposely written in a way
                    301: that some path information may pass through. For example drive letter names
                    302: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
                    303: sanitize_file_name.
                    304: 
                    305: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
                    306: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
                    307: */
                    308: #if defined(MSDOS) || defined(UNITTESTS)
                    309: SANITIZEcode msdosify(char **const sanitized, const char *file_name,
                    310:                       int flags)
                    311: {
                    312:   char dos_name[PATH_MAX];
                    313:   static const char illegal_chars_dos[] = ".+, ;=[]" /* illegal in DOS */
                    314:     "|<>/\\\":?*"; /* illegal in DOS & W95 */
                    315:   static const char *illegal_chars_w95 = &illegal_chars_dos[8];
                    316:   int idx, dot_idx;
                    317:   const char *s = file_name;
                    318:   char *d = dos_name;
                    319:   const char *const dlimit = dos_name + sizeof(dos_name) - 1;
                    320:   const char *illegal_aliens = illegal_chars_dos;
                    321:   size_t len = sizeof(illegal_chars_dos) - 1;
                    322: 
                    323:   if(!sanitized)
                    324:     return SANITIZE_ERR_BAD_ARGUMENT;
                    325: 
                    326:   *sanitized = NULL;
                    327: 
                    328:   if(!file_name)
                    329:     return SANITIZE_ERR_BAD_ARGUMENT;
                    330: 
                    331:   if(strlen(file_name) > PATH_MAX-1 &&
                    332:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
                    333:       truncate_dryrun(file_name, PATH_MAX-1)))
                    334:     return SANITIZE_ERR_INVALID_PATH;
                    335: 
                    336:   /* Support for Windows 9X VFAT systems, when available. */
                    337:   if(_use_lfn(file_name)) {
                    338:     illegal_aliens = illegal_chars_w95;
                    339:     len -= (illegal_chars_w95 - illegal_chars_dos);
                    340:   }
                    341: 
                    342:   /* Get past the drive letter, if any. */
                    343:   if(s[0] >= 'A' && s[0] <= 'z' && s[1] == ':') {
                    344:     *d++ = *s++;
                    345:     *d = ((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) ? ':' : '_';
                    346:     ++d, ++s;
                    347:   }
                    348: 
                    349:   for(idx = 0, dot_idx = -1; *s && d < dlimit; s++, d++) {
                    350:     if(memchr(illegal_aliens, *s, len)) {
                    351: 
                    352:       if((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *s == ':')
                    353:         *d = ':';
                    354:       else if((flags & SANITIZE_ALLOW_PATH) && (*s == '/' || *s == '\\'))
                    355:         *d = *s;
                    356:       /* Dots are special: DOS doesn't allow them as the leading character,
                    357:          and a file name cannot have more than a single dot.  We leave the
                    358:          first non-leading dot alone, unless it comes too close to the
                    359:          beginning of the name: we want sh.lex.c to become sh_lex.c, not
                    360:          sh.lex-c.  */
                    361:       else if(*s == '.') {
                    362:         if((flags & SANITIZE_ALLOW_PATH) && idx == 0 &&
                    363:            (s[1] == '/' || s[1] == '\\' ||
                    364:             (s[1] == '.' && (s[2] == '/' || s[2] == '\\')))) {
                    365:           /* Copy "./" and "../" verbatim.  */
                    366:           *d++ = *s++;
                    367:           if(d == dlimit)
                    368:             break;
                    369:           if(*s == '.') {
                    370:             *d++ = *s++;
                    371:             if(d == dlimit)
                    372:               break;
                    373:           }
                    374:           *d = *s;
                    375:         }
                    376:         else if(idx == 0)
                    377:           *d = '_';
                    378:         else if(dot_idx >= 0) {
                    379:           if(dot_idx < 5) { /* 5 is a heuristic ad-hoc'ery */
                    380:             d[dot_idx - idx] = '_'; /* replace previous dot */
                    381:             *d = '.';
                    382:           }
                    383:           else
                    384:             *d = '-';
                    385:         }
                    386:         else
                    387:           *d = '.';
                    388: 
                    389:         if(*s == '.')
                    390:           dot_idx = idx;
                    391:       }
                    392:       else if(*s == '+' && s[1] == '+') {
                    393:         if(idx - 2 == dot_idx) { /* .c++, .h++ etc. */
                    394:           *d++ = 'x';
                    395:           if(d == dlimit)
                    396:             break;
                    397:           *d   = 'x';
                    398:         }
                    399:         else {
                    400:           /* libg++ etc.  */
                    401:           if(dlimit - d < 4) {
                    402:             *d++ = 'x';
                    403:             if(d == dlimit)
                    404:               break;
                    405:             *d   = 'x';
                    406:           }
                    407:           else {
                    408:             memcpy(d, "plus", 4);
                    409:             d += 3;
                    410:           }
                    411:         }
                    412:         s++;
                    413:         idx++;
                    414:       }
                    415:       else
                    416:         *d = '_';
                    417:     }
                    418:     else
                    419:       *d = *s;
                    420:     if(*s == '/' || *s == '\\') {
                    421:       idx = 0;
                    422:       dot_idx = -1;
                    423:     }
                    424:     else
                    425:       idx++;
                    426:   }
                    427:   *d = '\0';
                    428: 
                    429:   if(*s) {
                    430:     /* dos_name is truncated, check that truncation requirements are met,
                    431:        specifically truncating a filename suffixed by an alternate data stream
                    432:        or truncating the entire filename is not allowed. */
                    433:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) || strpbrk(s, "\\/:") ||
                    434:        truncate_dryrun(dos_name, d - dos_name))
                    435:       return SANITIZE_ERR_INVALID_PATH;
                    436:   }
                    437: 
                    438:   *sanitized = strdup(dos_name);
                    439:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
                    440: }
                    441: #endif /* MSDOS || UNITTESTS */
                    442: 
                    443: /*
                    444: Rename file_name if it's a reserved dos device name.
                    445: 
                    446: This is a supporting function for sanitize_file_name.
                    447: 
                    448: Warning: This is an MSDOS legacy function and was purposely written in a way
                    449: that some path information may pass through. For example drive letter names
                    450: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
                    451: sanitize_file_name.
                    452: 
                    453: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
                    454: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
                    455: */
                    456: SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
                    457:                                                 const char *file_name,
                    458:                                                 int flags)
                    459: {
                    460:   /* We could have a file whose name is a device on MS-DOS.  Trying to
                    461:    * retrieve such a file would fail at best and wedge us at worst.  We need
                    462:    * to rename such files. */
                    463:   char *p, *base;
                    464:   char fname[PATH_MAX];
                    465: #ifdef MSDOS
                    466:   struct_stat st_buf;
                    467: #endif
                    468: 
                    469:   if(!sanitized)
                    470:     return SANITIZE_ERR_BAD_ARGUMENT;
                    471: 
                    472:   *sanitized = NULL;
                    473: 
                    474:   if(!file_name)
                    475:     return SANITIZE_ERR_BAD_ARGUMENT;
                    476: 
                    477:   /* Ignore UNC prefixed paths, they are allowed to contain a reserved name. */
                    478: #ifndef MSDOS
                    479:   if((flags & SANITIZE_ALLOW_PATH) &&
                    480:      file_name[0] == '\\' && file_name[1] == '\\') {
                    481:     size_t len = strlen(file_name);
                    482:     *sanitized = malloc(len + 1);
                    483:     if(!*sanitized)
                    484:       return SANITIZE_ERR_OUT_OF_MEMORY;
                    485:     strncpy(*sanitized, file_name, len + 1);
                    486:     return SANITIZE_ERR_OK;
                    487:   }
                    488: #endif
                    489: 
                    490:   if(strlen(file_name) > PATH_MAX-1 &&
                    491:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
                    492:       truncate_dryrun(file_name, PATH_MAX-1)))
                    493:     return SANITIZE_ERR_INVALID_PATH;
                    494: 
                    495:   strncpy(fname, file_name, PATH_MAX-1);
                    496:   fname[PATH_MAX-1] = '\0';
                    497:   base = basename(fname);
                    498: 
                    499:   /* Rename reserved device names that are known to be accessible without \\.\
                    500:      Examples: CON => _CON, CON.EXT => CON_EXT, CON:ADS => CON_ADS
                    501:      https://support.microsoft.com/en-us/kb/74496
                    502:      https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
                    503:      */
                    504:   for(p = fname; p; p = (p == fname && fname != base ? base : NULL)) {
                    505:     size_t p_len;
                    506:     int x = (curl_strnequal(p, "CON", 3) ||
                    507:              curl_strnequal(p, "PRN", 3) ||
                    508:              curl_strnequal(p, "AUX", 3) ||
                    509:              curl_strnequal(p, "NUL", 3)) ? 3 :
                    510:             (curl_strnequal(p, "CLOCK$", 6)) ? 6 :
                    511:             (curl_strnequal(p, "COM", 3) || curl_strnequal(p, "LPT", 3)) ?
                    512:               (('1' <= p[3] && p[3] <= '9') ? 4 : 3) : 0;
                    513: 
                    514:     if(!x)
                    515:       continue;
                    516: 
                    517:     /* the devices may be accessible with an extension or ADS, for
                    518:        example CON.AIR and 'CON . AIR' and CON:AIR access console */
                    519: 
                    520:     for(; p[x] == ' '; ++x)
                    521:       ;
                    522: 
                    523:     if(p[x] == '.') {
                    524:       p[x] = '_';
                    525:       continue;
                    526:     }
                    527:     else if(p[x] == ':') {
                    528:       if(!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) {
                    529:         p[x] = '_';
                    530:         continue;
                    531:       }
                    532:       ++x;
                    533:     }
                    534:     else if(p[x]) /* no match */
                    535:       continue;
                    536: 
                    537:     /* p points to 'CON' or 'CON ' or 'CON:', etc */
                    538:     p_len = strlen(p);
                    539: 
                    540:     /* Prepend a '_' */
                    541:     if(strlen(fname) == PATH_MAX-1) {
                    542:       --p_len;
                    543:       if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(p, p_len))
                    544:         return SANITIZE_ERR_INVALID_PATH;
                    545:       p[p_len] = '\0';
                    546:     }
                    547:     memmove(p + 1, p, p_len + 1);
                    548:     p[0] = '_';
                    549:     ++p_len;
                    550: 
                    551:     /* if fname was just modified then the basename pointer must be updated */
                    552:     if(p == fname)
                    553:       base = basename(fname);
                    554:   }
                    555: 
                    556:   /* This is the legacy portion from rename_if_dos_device_name that checks for
                    557:      reserved device names. It only works on MSDOS. On Windows XP the stat
                    558:      check errors with EINVAL if the device name is reserved. On Windows
                    559:      Vista/7/8 it sets mode S_IFREG (regular file or device). According to MSDN
                    560:      stat doc the latter behavior is correct, but that doesn't help us identify
                    561:      whether it's a reserved device name and not a regular file name. */
                    562: #ifdef MSDOS
                    563:   if(base && ((stat(base, &st_buf)) == 0) && (S_ISCHR(st_buf.st_mode))) {
                    564:     /* Prepend a '_' */
                    565:     size_t blen = strlen(base);
                    566:     if(blen) {
                    567:       if(strlen(fname) == PATH_MAX-1) {
                    568:         --blen;
                    569:         if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(base, blen))
                    570:           return SANITIZE_ERR_INVALID_PATH;
                    571:         base[blen] = '\0';
                    572:       }
                    573:       memmove(base + 1, base, blen + 1);
                    574:       base[0] = '_';
                    575:     }
                    576:   }
                    577: #endif
                    578: 
                    579:   *sanitized = strdup(fname);
                    580:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
                    581: }
                    582: 
                    583: #if defined(MSDOS) && (defined(__DJGPP__) || defined(__GO32__))
                    584: 
                    585: /*
                    586:  * Disable program default argument globbing. We do it on our own.
                    587:  */
                    588: char **__crt0_glob_function(char *arg)
                    589: {
                    590:   (void)arg;
                    591:   return (char **)0;
                    592: }
                    593: 
                    594: #endif /* MSDOS && (__DJGPP__ || __GO32__) */
                    595: 
                    596: #ifdef WIN32
                    597: 
                    598: /*
                    599:  * Function to find CACert bundle on a Win32 platform using SearchPath.
                    600:  * (SearchPath is already declared via inclusions done in setup header file)
                    601:  * (Use the ASCII version instead of the unicode one!)
                    602:  * The order of the directories it searches is:
                    603:  *  1. application's directory
                    604:  *  2. current working directory
                    605:  *  3. Windows System directory (e.g. C:\windows\system32)
                    606:  *  4. Windows Directory (e.g. C:\windows)
                    607:  *  5. all directories along %PATH%
                    608:  *
                    609:  * For WinXP and later search order actually depends on registry value:
                    610:  * HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SafeProcessSearchMode
                    611:  */
                    612: 
                    613: CURLcode FindWin32CACert(struct OperationConfig *config,
                    614:                          curl_sslbackend backend,
                    615:                          const char *bundle_file)
                    616: {
                    617:   CURLcode result = CURLE_OK;
                    618: 
                    619:   /* Search and set cert file only if libcurl supports SSL.
                    620:    *
                    621:    * If Schannel is the selected SSL backend then these locations are
                    622:    * ignored. We allow setting CA location for schannel only when explicitly
                    623:    * specified by the user via CURLOPT_CAINFO / --cacert.
                    624:    */
                    625:   if((curlinfo->features & CURL_VERSION_SSL) &&
                    626:      backend != CURLSSLBACKEND_SCHANNEL) {
                    627: 
                    628:     DWORD res_len;
                    629:     char buf[PATH_MAX];
                    630:     char *ptr = NULL;
                    631: 
                    632:     buf[0] = '\0';
                    633: 
                    634:     res_len = SearchPathA(NULL, bundle_file, NULL, PATH_MAX, buf, &ptr);
                    635:     if(res_len > 0) {
                    636:       Curl_safefree(config->cacert);
                    637:       config->cacert = strdup(buf);
                    638:       if(!config->cacert)
                    639:         result = CURLE_OUT_OF_MEMORY;
                    640:     }
                    641:   }
                    642: 
                    643:   return result;
                    644: }
                    645: 
                    646: 
                    647: /* Get a list of all loaded modules with full paths.
                    648:  * Returns slist on success or NULL on error.
                    649:  */
                    650: struct curl_slist *GetLoadedModulePaths(void)
                    651: {
                    652:   HANDLE hnd = INVALID_HANDLE_VALUE;
                    653:   MODULEENTRY32 mod = {0};
                    654:   struct curl_slist *slist = NULL;
                    655: 
                    656:   mod.dwSize = sizeof(MODULEENTRY32);
                    657: 
                    658:   do {
                    659:     hnd = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, 0);
                    660:   } while(hnd == INVALID_HANDLE_VALUE && GetLastError() == ERROR_BAD_LENGTH);
                    661: 
                    662:   if(hnd == INVALID_HANDLE_VALUE)
                    663:     goto error;
                    664: 
                    665:   if(!Module32First(hnd, &mod))
                    666:     goto error;
                    667: 
                    668:   do {
                    669:     char *path; /* points to stack allocated buffer */
                    670:     struct curl_slist *temp;
                    671: 
                    672: #ifdef UNICODE
                    673:     /* sizeof(mod.szExePath) is the max total bytes of wchars. the max total
                    674:        bytes of multibyte chars won't be more than twice that. */
                    675:     char buffer[sizeof(mod.szExePath) * 2];
                    676:     if(!WideCharToMultiByte(CP_ACP, 0, mod.szExePath, -1,
                    677:                             buffer, sizeof(buffer), NULL, NULL))
                    678:       goto error;
                    679:     path = buffer;
                    680: #else
                    681:     path = mod.szExePath;
                    682: #endif
                    683:     temp = curl_slist_append(slist, path);
                    684:     if(!temp)
                    685:       goto error;
                    686:     slist = temp;
                    687:   } while(Module32Next(hnd, &mod));
                    688: 
                    689:   goto cleanup;
                    690: 
                    691: error:
                    692:   curl_slist_free_all(slist);
                    693:   slist = NULL;
                    694: cleanup:
                    695:   if(hnd != INVALID_HANDLE_VALUE)
                    696:     CloseHandle(hnd);
                    697:   return slist;
                    698: }
                    699: 
                    700: LARGE_INTEGER tool_freq;
                    701: bool tool_isVistaOrGreater;
                    702: 
                    703: CURLcode win32_init(void)
                    704: {
                    705:   OSVERSIONINFOEXA osvi;
                    706:   unsigned __int64 mask = 0;
                    707:   unsigned char op = VER_GREATER_EQUAL;
                    708: 
                    709:   memset(&osvi, 0, sizeof(osvi));
                    710:   osvi.dwOSVersionInfoSize = sizeof(osvi);
                    711:   osvi.dwMajorVersion = 6;
                    712:   VER_SET_CONDITION(mask, VER_MAJORVERSION, op);
                    713:   VER_SET_CONDITION(mask, VER_MINORVERSION, op);
                    714: 
                    715:   if(VerifyVersionInfoA(&osvi, (VER_MAJORVERSION | VER_MINORVERSION), mask))
                    716:     tool_isVistaOrGreater = true;
                    717:   else if(GetLastError() == ERROR_OLD_WIN_VERSION)
                    718:     tool_isVistaOrGreater = false;
                    719:   else
                    720:     return CURLE_FAILED_INIT;
                    721: 
                    722:   QueryPerformanceFrequency(&tool_freq);
                    723:   return CURLE_OK;
                    724: }
                    725: 
                    726: #endif /* WIN32 */
                    727: 
                    728: #endif /* MSDOS || WIN32 */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>