File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / curl / src / tool_doswin.c
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 10:01:15 2020 UTC (4 years, 10 months ago) by misho
Branches: curl, MAIN
CVS tags: v7_70_0p4, HEAD
curl

    1: /***************************************************************************
    2:  *                                  _   _ ____  _
    3:  *  Project                     ___| | | |  _ \| |
    4:  *                             / __| | | | |_) | |
    5:  *                            | (__| |_| |  _ <| |___
    6:  *                             \___|\___/|_| \_\_____|
    7:  *
    8:  * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
    9:  *
   10:  * This software is licensed as described in the file COPYING, which
   11:  * you should have received as part of this distribution. The terms
   12:  * are also available at https://curl.haxx.se/docs/copyright.html.
   13:  *
   14:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
   15:  * copies of the Software, and permit persons to whom the Software is
   16:  * furnished to do so, under the terms of the COPYING file.
   17:  *
   18:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
   19:  * KIND, either express or implied.
   20:  *
   21:  ***************************************************************************/
   22: #include "tool_setup.h"
   23: 
   24: #if defined(MSDOS) || defined(WIN32)
   25: 
   26: #if defined(HAVE_LIBGEN_H) && defined(HAVE_BASENAME)
   27: #  include <libgen.h>
   28: #endif
   29: 
   30: #ifdef WIN32
   31: #  include <tlhelp32.h>
   32: #  include "tool_cfgable.h"
   33: #  include "tool_libinfo.h"
   34: #endif
   35: 
   36: #include "tool_bname.h"
   37: #include "tool_doswin.h"
   38: 
   39: #include "memdebug.h" /* keep this as LAST include */
   40: 
   41: #ifdef WIN32
   42: #  undef  PATH_MAX
   43: #  define PATH_MAX MAX_PATH
   44: #endif
   45: 
   46: #ifndef S_ISCHR
   47: #  ifdef S_IFCHR
   48: #    define S_ISCHR(m) (((m) & S_IFMT) == S_IFCHR)
   49: #  else
   50: #    define S_ISCHR(m) (0) /* cannot tell if file is a device */
   51: #  endif
   52: #endif
   53: 
   54: #ifdef WIN32
   55: #  define _use_lfn(f) (1)   /* long file names always available */
   56: #elif !defined(__DJGPP__) || (__DJGPP__ < 2)  /* DJGPP 2.0 has _use_lfn() */
   57: #  define _use_lfn(f) (0)  /* long file names never available */
   58: #elif defined(__DJGPP__)
   59: #  include <fcntl.h>                /* _use_lfn(f) prototype */
   60: #endif
   61: 
   62: #ifndef UNITTESTS
   63: static SANITIZEcode truncate_dryrun(const char *path,
   64:                                     const size_t truncate_pos);
   65: #ifdef MSDOS
   66: static SANITIZEcode msdosify(char **const sanitized, const char *file_name,
   67:                              int flags);
   68: #endif
   69: static SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
   70:                                                        const char *file_name,
   71:                                                        int flags);
   72: #endif /* !UNITTESTS (static declarations used if no unit tests) */
   73: 
   74: 
   75: /*
   76: Sanitize a file or path name.
   77: 
   78: All banned characters are replaced by underscores, for example:
   79: f?*foo => f__foo
   80: f:foo::$DATA => f_foo__$DATA
   81: f:\foo:bar => f__foo_bar
   82: f:\foo:bar => f:\foo:bar   (flag SANITIZE_ALLOW_PATH)
   83: 
   84: This function was implemented according to the guidelines in 'Naming Files,
   85: Paths, and Namespaces' section 'Naming Conventions'.
   86: https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
   87: 
   88: Flags
   89: -----
   90: SANITIZE_ALLOW_COLONS:     Allow colons.
   91: Without this flag colons are sanitized.
   92: 
   93: SANITIZE_ALLOW_PATH:       Allow path separators and colons.
   94: Without this flag path separators and colons are sanitized.
   95: 
   96: SANITIZE_ALLOW_RESERVED:   Allow reserved device names.
   97: Without this flag a reserved device name is renamed (COM1 => _COM1) unless it's
   98: in a UNC prefixed path.
   99: 
  100: SANITIZE_ALLOW_TRUNCATE:   Allow truncating a long filename.
  101: Without this flag if the sanitized filename or path will be too long an error
  102: occurs. With this flag the filename --and not any other parts of the path-- may
  103: be truncated to at least a single character. A filename followed by an
  104: alternate data stream (ADS) cannot be truncated in any case.
  105: 
  106: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
  107: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
  108: */
  109: SANITIZEcode sanitize_file_name(char **const sanitized, const char *file_name,
  110:                                 int flags)
  111: {
  112:   char *p, *target;
  113:   size_t len;
  114:   SANITIZEcode sc;
  115:   size_t max_sanitized_len;
  116: 
  117:   if(!sanitized)
  118:     return SANITIZE_ERR_BAD_ARGUMENT;
  119: 
  120:   *sanitized = NULL;
  121: 
  122:   if(!file_name)
  123:     return SANITIZE_ERR_BAD_ARGUMENT;
  124: 
  125:   if((flags & SANITIZE_ALLOW_PATH)) {
  126: #ifndef MSDOS
  127:     if(file_name[0] == '\\' && file_name[1] == '\\')
  128:       /* UNC prefixed path \\ (eg \\?\C:\foo) */
  129:       max_sanitized_len = 32767-1;
  130:     else
  131: #endif
  132:       max_sanitized_len = PATH_MAX-1;
  133:   }
  134:   else
  135:     /* The maximum length of a filename.
  136:        FILENAME_MAX is often the same as PATH_MAX, in other words it is 260 and
  137:        does not discount the path information therefore we shouldn't use it. */
  138:     max_sanitized_len = (PATH_MAX-1 > 255) ? 255 : PATH_MAX-1;
  139: 
  140:   len = strlen(file_name);
  141:   if(len > max_sanitized_len) {
  142:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) ||
  143:        truncate_dryrun(file_name, max_sanitized_len))
  144:       return SANITIZE_ERR_INVALID_PATH;
  145: 
  146:     len = max_sanitized_len;
  147:   }
  148: 
  149:   target = malloc(len + 1);
  150:   if(!target)
  151:     return SANITIZE_ERR_OUT_OF_MEMORY;
  152: 
  153:   strncpy(target, file_name, len);
  154:   target[len] = '\0';
  155: 
  156: #ifndef MSDOS
  157:   if((flags & SANITIZE_ALLOW_PATH) && !strncmp(target, "\\\\?\\", 4))
  158:     /* Skip the literal path prefix \\?\ */
  159:     p = target + 4;
  160:   else
  161: #endif
  162:     p = target;
  163: 
  164:   /* replace control characters and other banned characters */
  165:   for(; *p; ++p) {
  166:     const char *banned;
  167: 
  168:     if((1 <= *p && *p <= 31) ||
  169:        (!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *p == ':') ||
  170:        (!(flags & SANITIZE_ALLOW_PATH) && (*p == '/' || *p == '\\'))) {
  171:       *p = '_';
  172:       continue;
  173:     }
  174: 
  175:     for(banned = "|<>\"?*"; *banned; ++banned) {
  176:       if(*p == *banned) {
  177:         *p = '_';
  178:         break;
  179:       }
  180:     }
  181:   }
  182: 
  183:   /* remove trailing spaces and periods if not allowing paths */
  184:   if(!(flags & SANITIZE_ALLOW_PATH) && len) {
  185:     char *clip = NULL;
  186: 
  187:     p = &target[len];
  188:     do {
  189:       --p;
  190:       if(*p != ' ' && *p != '.')
  191:         break;
  192:       clip = p;
  193:     } while(p != target);
  194: 
  195:     if(clip) {
  196:       *clip = '\0';
  197:       len = clip - target;
  198:     }
  199:   }
  200: 
  201: #ifdef MSDOS
  202:   sc = msdosify(&p, target, flags);
  203:   free(target);
  204:   if(sc)
  205:     return sc;
  206:   target = p;
  207:   len = strlen(target);
  208: 
  209:   if(len > max_sanitized_len) {
  210:     free(target);
  211:     return SANITIZE_ERR_INVALID_PATH;
  212:   }
  213: #endif
  214: 
  215:   if(!(flags & SANITIZE_ALLOW_RESERVED)) {
  216:     sc = rename_if_reserved_dos_device_name(&p, target, flags);
  217:     free(target);
  218:     if(sc)
  219:       return sc;
  220:     target = p;
  221:     len = strlen(target);
  222: 
  223:     if(len > max_sanitized_len) {
  224:       free(target);
  225:       return SANITIZE_ERR_INVALID_PATH;
  226:     }
  227:   }
  228: 
  229:   *sanitized = target;
  230:   return SANITIZE_ERR_OK;
  231: }
  232: 
  233: 
  234: /*
  235: Test if truncating a path to a file will leave at least a single character in
  236: the filename. Filenames suffixed by an alternate data stream can't be
  237: truncated. This performs a dry run, nothing is modified.
  238: 
  239: Good truncate_pos 9:    C:\foo\bar  =>  C:\foo\ba
  240: Good truncate_pos 6:    C:\foo      =>  C:\foo
  241: Good truncate_pos 5:    C:\foo      =>  C:\fo
  242: Bad* truncate_pos 5:    C:foo       =>  C:foo
  243: Bad truncate_pos 5:     C:\foo:ads  =>  C:\fo
  244: Bad truncate_pos 9:     C:\foo:ads  =>  C:\foo:ad
  245: Bad truncate_pos 5:     C:\foo\bar  =>  C:\fo
  246: Bad truncate_pos 5:     C:\foo\     =>  C:\fo
  247: Bad truncate_pos 7:     C:\foo\     =>  C:\foo\
  248: Error truncate_pos 7:   C:\foo      =>  (pos out of range)
  249: Bad truncate_pos 1:     C:\foo\     =>  C
  250: 
  251: * C:foo is ambiguous, C could end up being a drive or file therefore something
  252:   like C:superlongfilename can't be truncated.
  253: 
  254: Returns
  255: SANITIZE_ERR_OK: Good -- 'path' can be truncated
  256: SANITIZE_ERR_INVALID_PATH: Bad -- 'path' cannot be truncated
  257: != SANITIZE_ERR_OK && != SANITIZE_ERR_INVALID_PATH: Error
  258: */
  259: SANITIZEcode truncate_dryrun(const char *path, const size_t truncate_pos)
  260: {
  261:   size_t len;
  262: 
  263:   if(!path)
  264:     return SANITIZE_ERR_BAD_ARGUMENT;
  265: 
  266:   len = strlen(path);
  267: 
  268:   if(truncate_pos > len)
  269:     return SANITIZE_ERR_BAD_ARGUMENT;
  270: 
  271:   if(!len || !truncate_pos)
  272:     return SANITIZE_ERR_INVALID_PATH;
  273: 
  274:   if(strpbrk(&path[truncate_pos - 1], "\\/:"))
  275:     return SANITIZE_ERR_INVALID_PATH;
  276: 
  277:   /* C:\foo can be truncated but C:\foo:ads can't */
  278:   if(truncate_pos > 1) {
  279:     const char *p = &path[truncate_pos - 1];
  280:     do {
  281:       --p;
  282:       if(*p == ':')
  283:         return SANITIZE_ERR_INVALID_PATH;
  284:     } while(p != path && *p != '\\' && *p != '/');
  285:   }
  286: 
  287:   return SANITIZE_ERR_OK;
  288: }
  289: 
  290: /* The functions msdosify, rename_if_dos_device_name and __crt0_glob_function
  291:  * were taken with modification from the DJGPP port of tar 1.12. They use
  292:  * algorithms originally from DJTAR.
  293:  */
  294: 
  295: /*
  296: Extra sanitization MSDOS for file_name.
  297: 
  298: This is a supporting function for sanitize_file_name.
  299: 
  300: Warning: This is an MSDOS legacy function and was purposely written in a way
  301: that some path information may pass through. For example drive letter names
  302: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
  303: sanitize_file_name.
  304: 
  305: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
  306: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
  307: */
  308: #if defined(MSDOS) || defined(UNITTESTS)
  309: SANITIZEcode msdosify(char **const sanitized, const char *file_name,
  310:                       int flags)
  311: {
  312:   char dos_name[PATH_MAX];
  313:   static const char illegal_chars_dos[] = ".+, ;=[]" /* illegal in DOS */
  314:     "|<>/\\\":?*"; /* illegal in DOS & W95 */
  315:   static const char *illegal_chars_w95 = &illegal_chars_dos[8];
  316:   int idx, dot_idx;
  317:   const char *s = file_name;
  318:   char *d = dos_name;
  319:   const char *const dlimit = dos_name + sizeof(dos_name) - 1;
  320:   const char *illegal_aliens = illegal_chars_dos;
  321:   size_t len = sizeof(illegal_chars_dos) - 1;
  322: 
  323:   if(!sanitized)
  324:     return SANITIZE_ERR_BAD_ARGUMENT;
  325: 
  326:   *sanitized = NULL;
  327: 
  328:   if(!file_name)
  329:     return SANITIZE_ERR_BAD_ARGUMENT;
  330: 
  331:   if(strlen(file_name) > PATH_MAX-1 &&
  332:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
  333:       truncate_dryrun(file_name, PATH_MAX-1)))
  334:     return SANITIZE_ERR_INVALID_PATH;
  335: 
  336:   /* Support for Windows 9X VFAT systems, when available. */
  337:   if(_use_lfn(file_name)) {
  338:     illegal_aliens = illegal_chars_w95;
  339:     len -= (illegal_chars_w95 - illegal_chars_dos);
  340:   }
  341: 
  342:   /* Get past the drive letter, if any. */
  343:   if(s[0] >= 'A' && s[0] <= 'z' && s[1] == ':') {
  344:     *d++ = *s++;
  345:     *d = ((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) ? ':' : '_';
  346:     ++d, ++s;
  347:   }
  348: 
  349:   for(idx = 0, dot_idx = -1; *s && d < dlimit; s++, d++) {
  350:     if(memchr(illegal_aliens, *s, len)) {
  351: 
  352:       if((flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH)) && *s == ':')
  353:         *d = ':';
  354:       else if((flags & SANITIZE_ALLOW_PATH) && (*s == '/' || *s == '\\'))
  355:         *d = *s;
  356:       /* Dots are special: DOS doesn't allow them as the leading character,
  357:          and a file name cannot have more than a single dot.  We leave the
  358:          first non-leading dot alone, unless it comes too close to the
  359:          beginning of the name: we want sh.lex.c to become sh_lex.c, not
  360:          sh.lex-c.  */
  361:       else if(*s == '.') {
  362:         if((flags & SANITIZE_ALLOW_PATH) && idx == 0 &&
  363:            (s[1] == '/' || s[1] == '\\' ||
  364:             (s[1] == '.' && (s[2] == '/' || s[2] == '\\')))) {
  365:           /* Copy "./" and "../" verbatim.  */
  366:           *d++ = *s++;
  367:           if(d == dlimit)
  368:             break;
  369:           if(*s == '.') {
  370:             *d++ = *s++;
  371:             if(d == dlimit)
  372:               break;
  373:           }
  374:           *d = *s;
  375:         }
  376:         else if(idx == 0)
  377:           *d = '_';
  378:         else if(dot_idx >= 0) {
  379:           if(dot_idx < 5) { /* 5 is a heuristic ad-hoc'ery */
  380:             d[dot_idx - idx] = '_'; /* replace previous dot */
  381:             *d = '.';
  382:           }
  383:           else
  384:             *d = '-';
  385:         }
  386:         else
  387:           *d = '.';
  388: 
  389:         if(*s == '.')
  390:           dot_idx = idx;
  391:       }
  392:       else if(*s == '+' && s[1] == '+') {
  393:         if(idx - 2 == dot_idx) { /* .c++, .h++ etc. */
  394:           *d++ = 'x';
  395:           if(d == dlimit)
  396:             break;
  397:           *d   = 'x';
  398:         }
  399:         else {
  400:           /* libg++ etc.  */
  401:           if(dlimit - d < 4) {
  402:             *d++ = 'x';
  403:             if(d == dlimit)
  404:               break;
  405:             *d   = 'x';
  406:           }
  407:           else {
  408:             memcpy(d, "plus", 4);
  409:             d += 3;
  410:           }
  411:         }
  412:         s++;
  413:         idx++;
  414:       }
  415:       else
  416:         *d = '_';
  417:     }
  418:     else
  419:       *d = *s;
  420:     if(*s == '/' || *s == '\\') {
  421:       idx = 0;
  422:       dot_idx = -1;
  423:     }
  424:     else
  425:       idx++;
  426:   }
  427:   *d = '\0';
  428: 
  429:   if(*s) {
  430:     /* dos_name is truncated, check that truncation requirements are met,
  431:        specifically truncating a filename suffixed by an alternate data stream
  432:        or truncating the entire filename is not allowed. */
  433:     if(!(flags & SANITIZE_ALLOW_TRUNCATE) || strpbrk(s, "\\/:") ||
  434:        truncate_dryrun(dos_name, d - dos_name))
  435:       return SANITIZE_ERR_INVALID_PATH;
  436:   }
  437: 
  438:   *sanitized = strdup(dos_name);
  439:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
  440: }
  441: #endif /* MSDOS || UNITTESTS */
  442: 
  443: /*
  444: Rename file_name if it's a reserved dos device name.
  445: 
  446: This is a supporting function for sanitize_file_name.
  447: 
  448: Warning: This is an MSDOS legacy function and was purposely written in a way
  449: that some path information may pass through. For example drive letter names
  450: (C:, D:, etc) are allowed to pass through. For sanitizing a filename use
  451: sanitize_file_name.
  452: 
  453: Success: (SANITIZE_ERR_OK) *sanitized points to a sanitized copy of file_name.
  454: Failure: (!= SANITIZE_ERR_OK) *sanitized is NULL.
  455: */
  456: SANITIZEcode rename_if_reserved_dos_device_name(char **const sanitized,
  457:                                                 const char *file_name,
  458:                                                 int flags)
  459: {
  460:   /* We could have a file whose name is a device on MS-DOS.  Trying to
  461:    * retrieve such a file would fail at best and wedge us at worst.  We need
  462:    * to rename such files. */
  463:   char *p, *base;
  464:   char fname[PATH_MAX];
  465: #ifdef MSDOS
  466:   struct_stat st_buf;
  467: #endif
  468: 
  469:   if(!sanitized)
  470:     return SANITIZE_ERR_BAD_ARGUMENT;
  471: 
  472:   *sanitized = NULL;
  473: 
  474:   if(!file_name)
  475:     return SANITIZE_ERR_BAD_ARGUMENT;
  476: 
  477:   /* Ignore UNC prefixed paths, they are allowed to contain a reserved name. */
  478: #ifndef MSDOS
  479:   if((flags & SANITIZE_ALLOW_PATH) &&
  480:      file_name[0] == '\\' && file_name[1] == '\\') {
  481:     size_t len = strlen(file_name);
  482:     *sanitized = malloc(len + 1);
  483:     if(!*sanitized)
  484:       return SANITIZE_ERR_OUT_OF_MEMORY;
  485:     strncpy(*sanitized, file_name, len + 1);
  486:     return SANITIZE_ERR_OK;
  487:   }
  488: #endif
  489: 
  490:   if(strlen(file_name) > PATH_MAX-1 &&
  491:      (!(flags & SANITIZE_ALLOW_TRUNCATE) ||
  492:       truncate_dryrun(file_name, PATH_MAX-1)))
  493:     return SANITIZE_ERR_INVALID_PATH;
  494: 
  495:   strncpy(fname, file_name, PATH_MAX-1);
  496:   fname[PATH_MAX-1] = '\0';
  497:   base = basename(fname);
  498: 
  499:   /* Rename reserved device names that are known to be accessible without \\.\
  500:      Examples: CON => _CON, CON.EXT => CON_EXT, CON:ADS => CON_ADS
  501:      https://support.microsoft.com/en-us/kb/74496
  502:      https://msdn.microsoft.com/en-us/library/windows/desktop/aa365247.aspx
  503:      */
  504:   for(p = fname; p; p = (p == fname && fname != base ? base : NULL)) {
  505:     size_t p_len;
  506:     int x = (curl_strnequal(p, "CON", 3) ||
  507:              curl_strnequal(p, "PRN", 3) ||
  508:              curl_strnequal(p, "AUX", 3) ||
  509:              curl_strnequal(p, "NUL", 3)) ? 3 :
  510:             (curl_strnequal(p, "CLOCK$", 6)) ? 6 :
  511:             (curl_strnequal(p, "COM", 3) || curl_strnequal(p, "LPT", 3)) ?
  512:               (('1' <= p[3] && p[3] <= '9') ? 4 : 3) : 0;
  513: 
  514:     if(!x)
  515:       continue;
  516: 
  517:     /* the devices may be accessible with an extension or ADS, for
  518:        example CON.AIR and 'CON . AIR' and CON:AIR access console */
  519: 
  520:     for(; p[x] == ' '; ++x)
  521:       ;
  522: 
  523:     if(p[x] == '.') {
  524:       p[x] = '_';
  525:       continue;
  526:     }
  527:     else if(p[x] == ':') {
  528:       if(!(flags & (SANITIZE_ALLOW_COLONS|SANITIZE_ALLOW_PATH))) {
  529:         p[x] = '_';
  530:         continue;
  531:       }
  532:       ++x;
  533:     }
  534:     else if(p[x]) /* no match */
  535:       continue;
  536: 
  537:     /* p points to 'CON' or 'CON ' or 'CON:', etc */
  538:     p_len = strlen(p);
  539: 
  540:     /* Prepend a '_' */
  541:     if(strlen(fname) == PATH_MAX-1) {
  542:       --p_len;
  543:       if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(p, p_len))
  544:         return SANITIZE_ERR_INVALID_PATH;
  545:       p[p_len] = '\0';
  546:     }
  547:     memmove(p + 1, p, p_len + 1);
  548:     p[0] = '_';
  549:     ++p_len;
  550: 
  551:     /* if fname was just modified then the basename pointer must be updated */
  552:     if(p == fname)
  553:       base = basename(fname);
  554:   }
  555: 
  556:   /* This is the legacy portion from rename_if_dos_device_name that checks for
  557:      reserved device names. It only works on MSDOS. On Windows XP the stat
  558:      check errors with EINVAL if the device name is reserved. On Windows
  559:      Vista/7/8 it sets mode S_IFREG (regular file or device). According to MSDN
  560:      stat doc the latter behavior is correct, but that doesn't help us identify
  561:      whether it's a reserved device name and not a regular file name. */
  562: #ifdef MSDOS
  563:   if(base && ((stat(base, &st_buf)) == 0) && (S_ISCHR(st_buf.st_mode))) {
  564:     /* Prepend a '_' */
  565:     size_t blen = strlen(base);
  566:     if(blen) {
  567:       if(strlen(fname) == PATH_MAX-1) {
  568:         --blen;
  569:         if(!(flags & SANITIZE_ALLOW_TRUNCATE) || truncate_dryrun(base, blen))
  570:           return SANITIZE_ERR_INVALID_PATH;
  571:         base[blen] = '\0';
  572:       }
  573:       memmove(base + 1, base, blen + 1);
  574:       base[0] = '_';
  575:     }
  576:   }
  577: #endif
  578: 
  579:   *sanitized = strdup(fname);
  580:   return (*sanitized ? SANITIZE_ERR_OK : SANITIZE_ERR_OUT_OF_MEMORY);
  581: }
  582: 
  583: #if defined(MSDOS) && (defined(__DJGPP__) || defined(__GO32__))
  584: 
  585: /*
  586:  * Disable program default argument globbing. We do it on our own.
  587:  */
  588: char **__crt0_glob_function(char *arg)
  589: {
  590:   (void)arg;
  591:   return (char **)0;
  592: }
  593: 
  594: #endif /* MSDOS && (__DJGPP__ || __GO32__) */
  595: 
  596: #ifdef WIN32
  597: 
  598: /*
  599:  * Function to find CACert bundle on a Win32 platform using SearchPath.
  600:  * (SearchPath is already declared via inclusions done in setup header file)
  601:  * (Use the ASCII version instead of the unicode one!)
  602:  * The order of the directories it searches is:
  603:  *  1. application's directory
  604:  *  2. current working directory
  605:  *  3. Windows System directory (e.g. C:\windows\system32)
  606:  *  4. Windows Directory (e.g. C:\windows)
  607:  *  5. all directories along %PATH%
  608:  *
  609:  * For WinXP and later search order actually depends on registry value:
  610:  * HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\SafeProcessSearchMode
  611:  */
  612: 
  613: CURLcode FindWin32CACert(struct OperationConfig *config,
  614:                          curl_sslbackend backend,
  615:                          const char *bundle_file)
  616: {
  617:   CURLcode result = CURLE_OK;
  618: 
  619:   /* Search and set cert file only if libcurl supports SSL.
  620:    *
  621:    * If Schannel is the selected SSL backend then these locations are
  622:    * ignored. We allow setting CA location for schannel only when explicitly
  623:    * specified by the user via CURLOPT_CAINFO / --cacert.
  624:    */
  625:   if((curlinfo->features & CURL_VERSION_SSL) &&
  626:      backend != CURLSSLBACKEND_SCHANNEL) {
  627: 
  628:     DWORD res_len;
  629:     char buf[PATH_MAX];
  630:     char *ptr = NULL;
  631: 
  632:     buf[0] = '\0';
  633: 
  634:     res_len = SearchPathA(NULL, bundle_file, NULL, PATH_MAX, buf, &ptr);
  635:     if(res_len > 0) {
  636:       Curl_safefree(config->cacert);
  637:       config->cacert = strdup(buf);
  638:       if(!config->cacert)
  639:         result = CURLE_OUT_OF_MEMORY;
  640:     }
  641:   }
  642: 
  643:   return result;
  644: }
  645: 
  646: 
  647: /* Get a list of all loaded modules with full paths.
  648:  * Returns slist on success or NULL on error.
  649:  */
  650: struct curl_slist *GetLoadedModulePaths(void)
  651: {
  652:   HANDLE hnd = INVALID_HANDLE_VALUE;
  653:   MODULEENTRY32 mod = {0};
  654:   struct curl_slist *slist = NULL;
  655: 
  656:   mod.dwSize = sizeof(MODULEENTRY32);
  657: 
  658:   do {
  659:     hnd = CreateToolhelp32Snapshot(TH32CS_SNAPMODULE, 0);
  660:   } while(hnd == INVALID_HANDLE_VALUE && GetLastError() == ERROR_BAD_LENGTH);
  661: 
  662:   if(hnd == INVALID_HANDLE_VALUE)
  663:     goto error;
  664: 
  665:   if(!Module32First(hnd, &mod))
  666:     goto error;
  667: 
  668:   do {
  669:     char *path; /* points to stack allocated buffer */
  670:     struct curl_slist *temp;
  671: 
  672: #ifdef UNICODE
  673:     /* sizeof(mod.szExePath) is the max total bytes of wchars. the max total
  674:        bytes of multibyte chars won't be more than twice that. */
  675:     char buffer[sizeof(mod.szExePath) * 2];
  676:     if(!WideCharToMultiByte(CP_ACP, 0, mod.szExePath, -1,
  677:                             buffer, sizeof(buffer), NULL, NULL))
  678:       goto error;
  679:     path = buffer;
  680: #else
  681:     path = mod.szExePath;
  682: #endif
  683:     temp = curl_slist_append(slist, path);
  684:     if(!temp)
  685:       goto error;
  686:     slist = temp;
  687:   } while(Module32Next(hnd, &mod));
  688: 
  689:   goto cleanup;
  690: 
  691: error:
  692:   curl_slist_free_all(slist);
  693:   slist = NULL;
  694: cleanup:
  695:   if(hnd != INVALID_HANDLE_VALUE)
  696:     CloseHandle(hnd);
  697:   return slist;
  698: }
  699: 
  700: LARGE_INTEGER tool_freq;
  701: bool tool_isVistaOrGreater;
  702: 
  703: CURLcode win32_init(void)
  704: {
  705:   OSVERSIONINFOEXA osvi;
  706:   unsigned __int64 mask = 0;
  707:   unsigned char op = VER_GREATER_EQUAL;
  708: 
  709:   memset(&osvi, 0, sizeof(osvi));
  710:   osvi.dwOSVersionInfoSize = sizeof(osvi);
  711:   osvi.dwMajorVersion = 6;
  712:   VER_SET_CONDITION(mask, VER_MAJORVERSION, op);
  713:   VER_SET_CONDITION(mask, VER_MINORVERSION, op);
  714: 
  715:   if(VerifyVersionInfoA(&osvi, (VER_MAJORVERSION | VER_MINORVERSION), mask))
  716:     tool_isVistaOrGreater = true;
  717:   else if(GetLastError() == ERROR_OLD_WIN_VERSION)
  718:     tool_isVistaOrGreater = false;
  719:   else
  720:     return CURLE_FAILED_INIT;
  721: 
  722:   QueryPerformanceFrequency(&tool_freq);
  723:   return CURLE_OK;
  724: }
  725: 
  726: #endif /* WIN32 */
  727: 
  728: #endif /* MSDOS || WIN32 */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>