Annotation of embedaddon/curl/src/tool_paramhlp.c, revision 1.1.1.1
1.1 misho 1: /***************************************************************************
2: * _ _ ____ _
3: * Project ___| | | | _ \| |
4: * / __| | | | |_) | |
5: * | (__| |_| | _ <| |___
6: * \___|\___/|_| \_\_____|
7: *
8: * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
9: *
10: * This software is licensed as described in the file COPYING, which
11: * you should have received as part of this distribution. The terms
12: * are also available at https://curl.haxx.se/docs/copyright.html.
13: *
14: * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15: * copies of the Software, and permit persons to whom the Software is
16: * furnished to do so, under the terms of the COPYING file.
17: *
18: * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19: * KIND, either express or implied.
20: *
21: ***************************************************************************/
22: #include "tool_setup.h"
23:
24: #include "strcase.h"
25:
26: #define ENABLE_CURLX_PRINTF
27: /* use our own printf() functions */
28: #include "curlx.h"
29:
30: #include "tool_cfgable.h"
31: #include "tool_getparam.h"
32: #include "tool_getpass.h"
33: #include "tool_homedir.h"
34: #include "tool_msgs.h"
35: #include "tool_paramhlp.h"
36: #include "tool_version.h"
37:
38: #include "memdebug.h" /* keep this as LAST include */
39:
40: struct getout *new_getout(struct OperationConfig *config)
41: {
42: struct getout *node = calloc(1, sizeof(struct getout));
43: struct getout *last = config->url_last;
44: if(node) {
45: /* append this new node last in the list */
46: if(last)
47: last->next = node;
48: else
49: config->url_list = node; /* first node */
50:
51: /* move the last pointer */
52: config->url_last = node;
53:
54: node->flags = config->default_node_flags;
55: }
56: return node;
57: }
58:
59: ParameterError file2string(char **bufp, FILE *file)
60: {
61: char *string = NULL;
62: if(file) {
63: char *ptr;
64: size_t alloc = 512;
65: size_t alloc_needed;
66: char buffer[256];
67: size_t stringlen = 0;
68: string = calloc(1, alloc);
69: if(!string)
70: return PARAM_NO_MEM;
71:
72: while(fgets(buffer, sizeof(buffer), file)) {
73: size_t buflen;
74: ptr = strchr(buffer, '\r');
75: if(ptr)
76: *ptr = '\0';
77: ptr = strchr(buffer, '\n');
78: if(ptr)
79: *ptr = '\0';
80: buflen = strlen(buffer);
81: alloc_needed = stringlen + buflen + 1;
82: if(alloc < alloc_needed) {
83: #if SIZEOF_SIZE_T < 8
84: if(alloc >= (size_t)SIZE_T_MAX/2) {
85: Curl_safefree(string);
86: return PARAM_NO_MEM;
87: }
88: #endif
89: /* doubling is enough since the string to add is always max 256 bytes
90: and the alloc size start at 512 */
91: alloc *= 2;
92: ptr = realloc(string, alloc);
93: if(!ptr) {
94: Curl_safefree(string);
95: return PARAM_NO_MEM;
96: }
97: string = ptr;
98: }
99: strcpy(string + stringlen, buffer);
100: stringlen += buflen;
101: }
102: }
103: *bufp = string;
104: return PARAM_OK;
105: }
106:
107: ParameterError file2memory(char **bufp, size_t *size, FILE *file)
108: {
109: char *newbuf;
110: char *buffer = NULL;
111: size_t nused = 0;
112:
113: if(file) {
114: size_t nread;
115: size_t alloc = 512;
116: do {
117: if(!buffer || (alloc == nused)) {
118: /* size_t overflow detection for huge files */
119: if(alloc + 1 > ((size_t)-1)/2) {
120: Curl_safefree(buffer);
121: return PARAM_NO_MEM;
122: }
123: alloc *= 2;
124: /* allocate an extra char, reserved space, for null termination */
125: newbuf = realloc(buffer, alloc + 1);
126: if(!newbuf) {
127: Curl_safefree(buffer);
128: return PARAM_NO_MEM;
129: }
130: buffer = newbuf;
131: }
132: nread = fread(buffer + nused, 1, alloc-nused, file);
133: nused += nread;
134: } while(nread);
135: /* null terminate the buffer in case it's used as a string later */
136: buffer[nused] = '\0';
137: /* free trailing slack space, if possible */
138: if(alloc != nused) {
139: newbuf = realloc(buffer, nused + 1);
140: if(!newbuf) {
141: Curl_safefree(buffer);
142: return PARAM_NO_MEM;
143: }
144: buffer = newbuf;
145: }
146: /* discard buffer if nothing was read */
147: if(!nused) {
148: Curl_safefree(buffer); /* no string */
149: }
150: }
151: *size = nused;
152: *bufp = buffer;
153: return PARAM_OK;
154: }
155:
156: void cleanarg(char *str)
157: {
158: #ifdef HAVE_WRITABLE_ARGV
159: /* now that GetStr has copied the contents of nextarg, wipe the next
160: * argument out so that the username:password isn't displayed in the
161: * system process list */
162: if(str) {
163: size_t len = strlen(str);
164: memset(str, ' ', len);
165: }
166: #else
167: (void)str;
168: #endif
169: }
170:
171: /*
172: * Parse the string and write the long in the given address. Return PARAM_OK
173: * on success, otherwise a parameter specific error enum.
174: *
175: * Since this function gets called with the 'nextarg' pointer from within the
176: * getparameter a lot, we must check it for NULL before accessing the str
177: * data.
178: */
179:
180: ParameterError str2num(long *val, const char *str)
181: {
182: if(str) {
183: char *endptr;
184: long num;
185: errno = 0;
186: num = strtol(str, &endptr, 10);
187: if(errno == ERANGE)
188: return PARAM_NUMBER_TOO_LARGE;
189: if((endptr != str) && (endptr == str + strlen(str))) {
190: *val = num;
191: return PARAM_OK; /* Ok */
192: }
193: }
194: return PARAM_BAD_NUMERIC; /* badness */
195: }
196:
197: /*
198: * Parse the string and write the long in the given address. Return PARAM_OK
199: * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
200: *
201: * Since this function gets called with the 'nextarg' pointer from within the
202: * getparameter a lot, we must check it for NULL before accessing the str
203: * data.
204: */
205:
206: ParameterError str2unum(long *val, const char *str)
207: {
208: ParameterError result = str2num(val, str);
209: if(result != PARAM_OK)
210: return result;
211: if(*val < 0)
212: return PARAM_NEGATIVE_NUMERIC;
213:
214: return PARAM_OK;
215: }
216:
217: /*
218: * Parse the string and write the long in the given address if it is below the
219: * maximum allowed value. Return PARAM_OK on success, otherwise a parameter
220: * error enum. ONLY ACCEPTS POSITIVE NUMBERS!
221: *
222: * Since this function gets called with the 'nextarg' pointer from within the
223: * getparameter a lot, we must check it for NULL before accessing the str
224: * data.
225: */
226:
227: ParameterError str2unummax(long *val, const char *str, long max)
228: {
229: ParameterError result = str2unum(val, str);
230: if(result != PARAM_OK)
231: return result;
232: if(*val > max)
233: return PARAM_NUMBER_TOO_LARGE;
234:
235: return PARAM_OK;
236: }
237:
238:
239: /*
240: * Parse the string and write the double in the given address. Return PARAM_OK
241: * on success, otherwise a parameter specific error enum.
242: *
243: * The 'max' argument is the maximum value allowed, as the numbers are often
244: * multiplied when later used.
245: *
246: * Since this function gets called with the 'nextarg' pointer from within the
247: * getparameter a lot, we must check it for NULL before accessing the str
248: * data.
249: */
250:
251: static ParameterError str2double(double *val, const char *str, long max)
252: {
253: if(str) {
254: char *endptr;
255: double num;
256: errno = 0;
257: num = strtod(str, &endptr);
258: if(errno == ERANGE)
259: return PARAM_NUMBER_TOO_LARGE;
260: if(num > max) {
261: /* too large */
262: return PARAM_NUMBER_TOO_LARGE;
263: }
264: if((endptr != str) && (endptr == str + strlen(str))) {
265: *val = num;
266: return PARAM_OK; /* Ok */
267: }
268: }
269: return PARAM_BAD_NUMERIC; /* badness */
270: }
271:
272: /*
273: * Parse the string and write the double in the given address. Return PARAM_OK
274: * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
275: *
276: * The 'max' argument is the maximum value allowed, as the numbers are often
277: * multiplied when later used.
278: *
279: * Since this function gets called with the 'nextarg' pointer from within the
280: * getparameter a lot, we must check it for NULL before accessing the str
281: * data.
282: */
283:
284: ParameterError str2udouble(double *valp, const char *str, long max)
285: {
286: double value;
287: ParameterError result = str2double(&value, str, max);
288: if(result != PARAM_OK)
289: return result;
290: if(value < 0)
291: return PARAM_NEGATIVE_NUMERIC;
292:
293: *valp = value;
294: return PARAM_OK;
295: }
296:
297: /*
298: * Parse the string and modify the long in the given address. Return
299: * non-zero on failure, zero on success.
300: *
301: * The string is a list of protocols
302: *
303: * Since this function gets called with the 'nextarg' pointer from within the
304: * getparameter a lot, we must check it for NULL before accessing the str
305: * data.
306: */
307:
308: long proto2num(struct OperationConfig *config, long *val, const char *str)
309: {
310: char *buffer;
311: const char *sep = ",";
312: char *token;
313:
314: static struct sprotos {
315: const char *name;
316: long bit;
317: } const protos[] = {
318: { "all", CURLPROTO_ALL },
319: { "http", CURLPROTO_HTTP },
320: { "https", CURLPROTO_HTTPS },
321: { "ftp", CURLPROTO_FTP },
322: { "ftps", CURLPROTO_FTPS },
323: { "scp", CURLPROTO_SCP },
324: { "sftp", CURLPROTO_SFTP },
325: { "telnet", CURLPROTO_TELNET },
326: { "ldap", CURLPROTO_LDAP },
327: { "ldaps", CURLPROTO_LDAPS },
328: { "dict", CURLPROTO_DICT },
329: { "file", CURLPROTO_FILE },
330: { "tftp", CURLPROTO_TFTP },
331: { "imap", CURLPROTO_IMAP },
332: { "imaps", CURLPROTO_IMAPS },
333: { "pop3", CURLPROTO_POP3 },
334: { "pop3s", CURLPROTO_POP3S },
335: { "smtp", CURLPROTO_SMTP },
336: { "smtps", CURLPROTO_SMTPS },
337: { "rtsp", CURLPROTO_RTSP },
338: { "gopher", CURLPROTO_GOPHER },
339: { "smb", CURLPROTO_SMB },
340: { "smbs", CURLPROTO_SMBS },
341: { NULL, 0 }
342: };
343:
344: if(!str)
345: return 1;
346:
347: buffer = strdup(str); /* because strtok corrupts it */
348: if(!buffer)
349: return 1;
350:
351: /* Allow strtok() here since this isn't used threaded */
352: /* !checksrc! disable BANNEDFUNC 2 */
353: for(token = strtok(buffer, sep);
354: token;
355: token = strtok(NULL, sep)) {
356: enum e_action { allow, deny, set } action = allow;
357:
358: struct sprotos const *pp;
359:
360: /* Process token modifiers */
361: while(!ISALNUM(*token)) { /* may be NULL if token is all modifiers */
362: switch (*token++) {
363: case '=':
364: action = set;
365: break;
366: case '-':
367: action = deny;
368: break;
369: case '+':
370: action = allow;
371: break;
372: default: /* Includes case of terminating NULL */
373: Curl_safefree(buffer);
374: return 1;
375: }
376: }
377:
378: for(pp = protos; pp->name; pp++) {
379: if(curl_strequal(token, pp->name)) {
380: switch(action) {
381: case deny:
382: *val &= ~(pp->bit);
383: break;
384: case allow:
385: *val |= pp->bit;
386: break;
387: case set:
388: *val = pp->bit;
389: break;
390: }
391: break;
392: }
393: }
394:
395: if(!(pp->name)) { /* unknown protocol */
396: /* If they have specified only this protocol, we say treat it as
397: if no protocols are allowed */
398: if(action == set)
399: *val = 0;
400: warnf(config->global, "unrecognized protocol '%s'\n", token);
401: }
402: }
403: Curl_safefree(buffer);
404: return 0;
405: }
406:
407: /**
408: * Check if the given string is a protocol supported by libcurl
409: *
410: * @param str the protocol name
411: * @return PARAM_OK protocol supported
412: * @return PARAM_LIBCURL_UNSUPPORTED_PROTOCOL protocol not supported
413: * @return PARAM_REQUIRES_PARAMETER missing parameter
414: */
415: int check_protocol(const char *str)
416: {
417: const char * const *pp;
418: const curl_version_info_data *curlinfo = curl_version_info(CURLVERSION_NOW);
419: if(!str)
420: return PARAM_REQUIRES_PARAMETER;
421: for(pp = curlinfo->protocols; *pp; pp++) {
422: if(curl_strequal(*pp, str))
423: return PARAM_OK;
424: }
425: return PARAM_LIBCURL_UNSUPPORTED_PROTOCOL;
426: }
427:
428: /**
429: * Parses the given string looking for an offset (which may be a
430: * larger-than-integer value). The offset CANNOT be negative!
431: *
432: * @param val the offset to populate
433: * @param str the buffer containing the offset
434: * @return PARAM_OK if successful, a parameter specific error enum if failure.
435: */
436: ParameterError str2offset(curl_off_t *val, const char *str)
437: {
438: char *endptr;
439: if(str[0] == '-')
440: /* offsets aren't negative, this indicates weird input */
441: return PARAM_NEGATIVE_NUMERIC;
442:
443: #if(SIZEOF_CURL_OFF_T > SIZEOF_LONG)
444: {
445: CURLofft offt = curlx_strtoofft(str, &endptr, 0, val);
446: if(CURL_OFFT_FLOW == offt)
447: return PARAM_NUMBER_TOO_LARGE;
448: else if(CURL_OFFT_INVAL == offt)
449: return PARAM_BAD_NUMERIC;
450: }
451: #else
452: errno = 0;
453: *val = strtol(str, &endptr, 0);
454: if((*val == LONG_MIN || *val == LONG_MAX) && errno == ERANGE)
455: return PARAM_NUMBER_TOO_LARGE;
456: #endif
457: if((endptr != str) && (endptr == str + strlen(str)))
458: return PARAM_OK;
459:
460: return PARAM_BAD_NUMERIC;
461: }
462:
463: static CURLcode checkpasswd(const char *kind, /* for what purpose */
464: const size_t i, /* operation index */
465: const bool last, /* TRUE if last operation */
466: char **userpwd) /* pointer to allocated string */
467: {
468: char *psep;
469: char *osep;
470:
471: if(!*userpwd)
472: return CURLE_OK;
473:
474: /* Attempt to find the password separator */
475: psep = strchr(*userpwd, ':');
476:
477: /* Attempt to find the options separator */
478: osep = strchr(*userpwd, ';');
479:
480: if(!psep && **userpwd != ';') {
481: /* no password present, prompt for one */
482: char passwd[256] = "";
483: char prompt[256];
484: size_t passwdlen;
485: size_t userlen = strlen(*userpwd);
486: char *passptr;
487:
488: if(osep)
489: *osep = '\0';
490:
491: /* build a nice-looking prompt */
492: if(!i && last)
493: curlx_msnprintf(prompt, sizeof(prompt),
494: "Enter %s password for user '%s':",
495: kind, *userpwd);
496: else
497: curlx_msnprintf(prompt, sizeof(prompt),
498: "Enter %s password for user '%s' on URL #%zu:",
499: kind, *userpwd, i + 1);
500:
501: /* get password */
502: getpass_r(prompt, passwd, sizeof(passwd));
503: passwdlen = strlen(passwd);
504:
505: if(osep)
506: *osep = ';';
507:
508: /* extend the allocated memory area to fit the password too */
509: passptr = realloc(*userpwd,
510: passwdlen + 1 + /* an extra for the colon */
511: userlen + 1); /* an extra for the zero */
512: if(!passptr)
513: return CURLE_OUT_OF_MEMORY;
514:
515: /* append the password separated with a colon */
516: passptr[userlen] = ':';
517: memcpy(&passptr[userlen + 1], passwd, passwdlen + 1);
518: *userpwd = passptr;
519: }
520:
521: return CURLE_OK;
522: }
523:
524: ParameterError add2list(struct curl_slist **list, const char *ptr)
525: {
526: struct curl_slist *newlist = curl_slist_append(*list, ptr);
527: if(newlist)
528: *list = newlist;
529: else
530: return PARAM_NO_MEM;
531:
532: return PARAM_OK;
533: }
534:
535: int ftpfilemethod(struct OperationConfig *config, const char *str)
536: {
537: if(curl_strequal("singlecwd", str))
538: return CURLFTPMETHOD_SINGLECWD;
539: if(curl_strequal("nocwd", str))
540: return CURLFTPMETHOD_NOCWD;
541: if(curl_strequal("multicwd", str))
542: return CURLFTPMETHOD_MULTICWD;
543:
544: warnf(config->global, "unrecognized ftp file method '%s', using default\n",
545: str);
546:
547: return CURLFTPMETHOD_MULTICWD;
548: }
549:
550: int ftpcccmethod(struct OperationConfig *config, const char *str)
551: {
552: if(curl_strequal("passive", str))
553: return CURLFTPSSL_CCC_PASSIVE;
554: if(curl_strequal("active", str))
555: return CURLFTPSSL_CCC_ACTIVE;
556:
557: warnf(config->global, "unrecognized ftp CCC method '%s', using default\n",
558: str);
559:
560: return CURLFTPSSL_CCC_PASSIVE;
561: }
562:
563: long delegation(struct OperationConfig *config, const char *str)
564: {
565: if(curl_strequal("none", str))
566: return CURLGSSAPI_DELEGATION_NONE;
567: if(curl_strequal("policy", str))
568: return CURLGSSAPI_DELEGATION_POLICY_FLAG;
569: if(curl_strequal("always", str))
570: return CURLGSSAPI_DELEGATION_FLAG;
571:
572: warnf(config->global, "unrecognized delegation method '%s', using none\n",
573: str);
574:
575: return CURLGSSAPI_DELEGATION_NONE;
576: }
577:
578: /*
579: * my_useragent: returns allocated string with default user agent
580: */
581: static char *my_useragent(void)
582: {
583: return strdup(CURL_NAME "/" CURL_VERSION);
584: }
585:
586: CURLcode get_args(struct OperationConfig *config, const size_t i)
587: {
588: CURLcode result = CURLE_OK;
589: bool last = (config->next ? FALSE : TRUE);
590:
591: /* Check we have a password for the given host user */
592: if(config->userpwd && !config->oauth_bearer) {
593: result = checkpasswd("host", i, last, &config->userpwd);
594: if(result)
595: return result;
596: }
597:
598: /* Check we have a password for the given proxy user */
599: if(config->proxyuserpwd) {
600: result = checkpasswd("proxy", i, last, &config->proxyuserpwd);
601: if(result)
602: return result;
603: }
604:
605: /* Check we have a user agent */
606: if(!config->useragent) {
607: config->useragent = my_useragent();
608: if(!config->useragent) {
609: errorf(config->global, "out of memory\n");
610: result = CURLE_OUT_OF_MEMORY;
611: }
612: }
613:
614: return result;
615: }
616:
617: /*
618: * Parse the string and modify ssl_version in the val argument. Return PARAM_OK
619: * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
620: *
621: * Since this function gets called with the 'nextarg' pointer from within the
622: * getparameter a lot, we must check it for NULL before accessing the str
623: * data.
624: */
625:
626: ParameterError str2tls_max(long *val, const char *str)
627: {
628: static struct s_tls_max {
629: const char *tls_max_str;
630: long tls_max;
631: } const tls_max_array[] = {
632: { "default", CURL_SSLVERSION_MAX_DEFAULT },
633: { "1.0", CURL_SSLVERSION_MAX_TLSv1_0 },
634: { "1.1", CURL_SSLVERSION_MAX_TLSv1_1 },
635: { "1.2", CURL_SSLVERSION_MAX_TLSv1_2 },
636: { "1.3", CURL_SSLVERSION_MAX_TLSv1_3 }
637: };
638: size_t i = 0;
639: if(!str)
640: return PARAM_REQUIRES_PARAMETER;
641: for(i = 0; i < sizeof(tls_max_array)/sizeof(tls_max_array[0]); i++) {
642: if(!strcmp(str, tls_max_array[i].tls_max_str)) {
643: *val = tls_max_array[i].tls_max;
644: return PARAM_OK;
645: }
646: }
647: return PARAM_BAD_USE;
648: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>