File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / curl / src / tool_paramhlp.c
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Wed Jun 3 10:01:15 2020 UTC (4 years, 10 months ago) by misho
Branches: curl, MAIN
CVS tags: v7_70_0p4, HEAD
curl

    1: /***************************************************************************
    2:  *                                  _   _ ____  _
    3:  *  Project                     ___| | | |  _ \| |
    4:  *                             / __| | | | |_) | |
    5:  *                            | (__| |_| |  _ <| |___
    6:  *                             \___|\___/|_| \_\_____|
    7:  *
    8:  * Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
    9:  *
   10:  * This software is licensed as described in the file COPYING, which
   11:  * you should have received as part of this distribution. The terms
   12:  * are also available at https://curl.haxx.se/docs/copyright.html.
   13:  *
   14:  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
   15:  * copies of the Software, and permit persons to whom the Software is
   16:  * furnished to do so, under the terms of the COPYING file.
   17:  *
   18:  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
   19:  * KIND, either express or implied.
   20:  *
   21:  ***************************************************************************/
   22: #include "tool_setup.h"
   23: 
   24: #include "strcase.h"
   25: 
   26: #define ENABLE_CURLX_PRINTF
   27: /* use our own printf() functions */
   28: #include "curlx.h"
   29: 
   30: #include "tool_cfgable.h"
   31: #include "tool_getparam.h"
   32: #include "tool_getpass.h"
   33: #include "tool_homedir.h"
   34: #include "tool_msgs.h"
   35: #include "tool_paramhlp.h"
   36: #include "tool_version.h"
   37: 
   38: #include "memdebug.h" /* keep this as LAST include */
   39: 
   40: struct getout *new_getout(struct OperationConfig *config)
   41: {
   42:   struct getout *node = calloc(1, sizeof(struct getout));
   43:   struct getout *last = config->url_last;
   44:   if(node) {
   45:     /* append this new node last in the list */
   46:     if(last)
   47:       last->next = node;
   48:     else
   49:       config->url_list = node; /* first node */
   50: 
   51:     /* move the last pointer */
   52:     config->url_last = node;
   53: 
   54:     node->flags = config->default_node_flags;
   55:   }
   56:   return node;
   57: }
   58: 
   59: ParameterError file2string(char **bufp, FILE *file)
   60: {
   61:   char *string = NULL;
   62:   if(file) {
   63:     char *ptr;
   64:     size_t alloc = 512;
   65:     size_t alloc_needed;
   66:     char buffer[256];
   67:     size_t stringlen = 0;
   68:     string = calloc(1, alloc);
   69:     if(!string)
   70:       return PARAM_NO_MEM;
   71: 
   72:     while(fgets(buffer, sizeof(buffer), file)) {
   73:       size_t buflen;
   74:       ptr = strchr(buffer, '\r');
   75:       if(ptr)
   76:         *ptr = '\0';
   77:       ptr = strchr(buffer, '\n');
   78:       if(ptr)
   79:         *ptr = '\0';
   80:       buflen = strlen(buffer);
   81:       alloc_needed = stringlen + buflen + 1;
   82:       if(alloc < alloc_needed) {
   83: #if SIZEOF_SIZE_T < 8
   84:         if(alloc >= (size_t)SIZE_T_MAX/2) {
   85:           Curl_safefree(string);
   86:           return PARAM_NO_MEM;
   87:         }
   88: #endif
   89:         /* doubling is enough since the string to add is always max 256 bytes
   90:            and the alloc size start at 512 */
   91:         alloc *= 2;
   92:         ptr = realloc(string, alloc);
   93:         if(!ptr) {
   94:           Curl_safefree(string);
   95:           return PARAM_NO_MEM;
   96:         }
   97:         string = ptr;
   98:       }
   99:       strcpy(string + stringlen, buffer);
  100:       stringlen += buflen;
  101:     }
  102:   }
  103:   *bufp = string;
  104:   return PARAM_OK;
  105: }
  106: 
  107: ParameterError file2memory(char **bufp, size_t *size, FILE *file)
  108: {
  109:   char *newbuf;
  110:   char *buffer = NULL;
  111:   size_t nused = 0;
  112: 
  113:   if(file) {
  114:     size_t nread;
  115:     size_t alloc = 512;
  116:     do {
  117:       if(!buffer || (alloc == nused)) {
  118:         /* size_t overflow detection for huge files */
  119:         if(alloc + 1 > ((size_t)-1)/2) {
  120:           Curl_safefree(buffer);
  121:           return PARAM_NO_MEM;
  122:         }
  123:         alloc *= 2;
  124:         /* allocate an extra char, reserved space, for null termination */
  125:         newbuf = realloc(buffer, alloc + 1);
  126:         if(!newbuf) {
  127:           Curl_safefree(buffer);
  128:           return PARAM_NO_MEM;
  129:         }
  130:         buffer = newbuf;
  131:       }
  132:       nread = fread(buffer + nused, 1, alloc-nused, file);
  133:       nused += nread;
  134:     } while(nread);
  135:     /* null terminate the buffer in case it's used as a string later */
  136:     buffer[nused] = '\0';
  137:     /* free trailing slack space, if possible */
  138:     if(alloc != nused) {
  139:       newbuf = realloc(buffer, nused + 1);
  140:       if(!newbuf) {
  141:         Curl_safefree(buffer);
  142:         return PARAM_NO_MEM;
  143:       }
  144:       buffer = newbuf;
  145:     }
  146:     /* discard buffer if nothing was read */
  147:     if(!nused) {
  148:       Curl_safefree(buffer); /* no string */
  149:     }
  150:   }
  151:   *size = nused;
  152:   *bufp = buffer;
  153:   return PARAM_OK;
  154: }
  155: 
  156: void cleanarg(char *str)
  157: {
  158: #ifdef HAVE_WRITABLE_ARGV
  159:   /* now that GetStr has copied the contents of nextarg, wipe the next
  160:    * argument out so that the username:password isn't displayed in the
  161:    * system process list */
  162:   if(str) {
  163:     size_t len = strlen(str);
  164:     memset(str, ' ', len);
  165:   }
  166: #else
  167:   (void)str;
  168: #endif
  169: }
  170: 
  171: /*
  172:  * Parse the string and write the long in the given address. Return PARAM_OK
  173:  * on success, otherwise a parameter specific error enum.
  174:  *
  175:  * Since this function gets called with the 'nextarg' pointer from within the
  176:  * getparameter a lot, we must check it for NULL before accessing the str
  177:  * data.
  178:  */
  179: 
  180: ParameterError str2num(long *val, const char *str)
  181: {
  182:   if(str) {
  183:     char *endptr;
  184:     long num;
  185:     errno = 0;
  186:     num = strtol(str, &endptr, 10);
  187:     if(errno == ERANGE)
  188:       return PARAM_NUMBER_TOO_LARGE;
  189:     if((endptr != str) && (endptr == str + strlen(str))) {
  190:       *val = num;
  191:       return PARAM_OK;  /* Ok */
  192:     }
  193:   }
  194:   return PARAM_BAD_NUMERIC; /* badness */
  195: }
  196: 
  197: /*
  198:  * Parse the string and write the long in the given address. Return PARAM_OK
  199:  * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
  200:  *
  201:  * Since this function gets called with the 'nextarg' pointer from within the
  202:  * getparameter a lot, we must check it for NULL before accessing the str
  203:  * data.
  204:  */
  205: 
  206: ParameterError str2unum(long *val, const char *str)
  207: {
  208:   ParameterError result = str2num(val, str);
  209:   if(result != PARAM_OK)
  210:     return result;
  211:   if(*val < 0)
  212:     return PARAM_NEGATIVE_NUMERIC;
  213: 
  214:   return PARAM_OK;
  215: }
  216: 
  217: /*
  218:  * Parse the string and write the long in the given address if it is below the
  219:  * maximum allowed value. Return PARAM_OK on success, otherwise a parameter
  220:  * error enum. ONLY ACCEPTS POSITIVE NUMBERS!
  221:  *
  222:  * Since this function gets called with the 'nextarg' pointer from within the
  223:  * getparameter a lot, we must check it for NULL before accessing the str
  224:  * data.
  225:  */
  226: 
  227: ParameterError str2unummax(long *val, const char *str, long max)
  228: {
  229:   ParameterError result = str2unum(val, str);
  230:   if(result != PARAM_OK)
  231:     return result;
  232:   if(*val > max)
  233:     return PARAM_NUMBER_TOO_LARGE;
  234: 
  235:   return PARAM_OK;
  236: }
  237: 
  238: 
  239: /*
  240:  * Parse the string and write the double in the given address. Return PARAM_OK
  241:  * on success, otherwise a parameter specific error enum.
  242:  *
  243:  * The 'max' argument is the maximum value allowed, as the numbers are often
  244:  * multiplied when later used.
  245:  *
  246:  * Since this function gets called with the 'nextarg' pointer from within the
  247:  * getparameter a lot, we must check it for NULL before accessing the str
  248:  * data.
  249:  */
  250: 
  251: static ParameterError str2double(double *val, const char *str, long max)
  252: {
  253:   if(str) {
  254:     char *endptr;
  255:     double num;
  256:     errno = 0;
  257:     num = strtod(str, &endptr);
  258:     if(errno == ERANGE)
  259:       return PARAM_NUMBER_TOO_LARGE;
  260:     if(num > max) {
  261:       /* too large */
  262:       return PARAM_NUMBER_TOO_LARGE;
  263:     }
  264:     if((endptr != str) && (endptr == str + strlen(str))) {
  265:       *val = num;
  266:       return PARAM_OK;  /* Ok */
  267:     }
  268:   }
  269:   return PARAM_BAD_NUMERIC; /* badness */
  270: }
  271: 
  272: /*
  273:  * Parse the string and write the double in the given address. Return PARAM_OK
  274:  * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
  275:  *
  276:  * The 'max' argument is the maximum value allowed, as the numbers are often
  277:  * multiplied when later used.
  278:  *
  279:  * Since this function gets called with the 'nextarg' pointer from within the
  280:  * getparameter a lot, we must check it for NULL before accessing the str
  281:  * data.
  282:  */
  283: 
  284: ParameterError str2udouble(double *valp, const char *str, long max)
  285: {
  286:   double value;
  287:   ParameterError result = str2double(&value, str, max);
  288:   if(result != PARAM_OK)
  289:     return result;
  290:   if(value < 0)
  291:     return PARAM_NEGATIVE_NUMERIC;
  292: 
  293:   *valp = value;
  294:   return PARAM_OK;
  295: }
  296: 
  297: /*
  298:  * Parse the string and modify the long in the given address. Return
  299:  * non-zero on failure, zero on success.
  300:  *
  301:  * The string is a list of protocols
  302:  *
  303:  * Since this function gets called with the 'nextarg' pointer from within the
  304:  * getparameter a lot, we must check it for NULL before accessing the str
  305:  * data.
  306:  */
  307: 
  308: long proto2num(struct OperationConfig *config, long *val, const char *str)
  309: {
  310:   char *buffer;
  311:   const char *sep = ",";
  312:   char *token;
  313: 
  314:   static struct sprotos {
  315:     const char *name;
  316:     long bit;
  317:   } const protos[] = {
  318:     { "all", CURLPROTO_ALL },
  319:     { "http", CURLPROTO_HTTP },
  320:     { "https", CURLPROTO_HTTPS },
  321:     { "ftp", CURLPROTO_FTP },
  322:     { "ftps", CURLPROTO_FTPS },
  323:     { "scp", CURLPROTO_SCP },
  324:     { "sftp", CURLPROTO_SFTP },
  325:     { "telnet", CURLPROTO_TELNET },
  326:     { "ldap", CURLPROTO_LDAP },
  327:     { "ldaps", CURLPROTO_LDAPS },
  328:     { "dict", CURLPROTO_DICT },
  329:     { "file", CURLPROTO_FILE },
  330:     { "tftp", CURLPROTO_TFTP },
  331:     { "imap", CURLPROTO_IMAP },
  332:     { "imaps", CURLPROTO_IMAPS },
  333:     { "pop3", CURLPROTO_POP3 },
  334:     { "pop3s", CURLPROTO_POP3S },
  335:     { "smtp", CURLPROTO_SMTP },
  336:     { "smtps", CURLPROTO_SMTPS },
  337:     { "rtsp", CURLPROTO_RTSP },
  338:     { "gopher", CURLPROTO_GOPHER },
  339:     { "smb", CURLPROTO_SMB },
  340:     { "smbs", CURLPROTO_SMBS },
  341:     { NULL, 0 }
  342:   };
  343: 
  344:   if(!str)
  345:     return 1;
  346: 
  347:   buffer = strdup(str); /* because strtok corrupts it */
  348:   if(!buffer)
  349:     return 1;
  350: 
  351:   /* Allow strtok() here since this isn't used threaded */
  352:   /* !checksrc! disable BANNEDFUNC 2 */
  353:   for(token = strtok(buffer, sep);
  354:       token;
  355:       token = strtok(NULL, sep)) {
  356:     enum e_action { allow, deny, set } action = allow;
  357: 
  358:     struct sprotos const *pp;
  359: 
  360:     /* Process token modifiers */
  361:     while(!ISALNUM(*token)) { /* may be NULL if token is all modifiers */
  362:       switch (*token++) {
  363:       case '=':
  364:         action = set;
  365:         break;
  366:       case '-':
  367:         action = deny;
  368:         break;
  369:       case '+':
  370:         action = allow;
  371:         break;
  372:       default: /* Includes case of terminating NULL */
  373:         Curl_safefree(buffer);
  374:         return 1;
  375:       }
  376:     }
  377: 
  378:     for(pp = protos; pp->name; pp++) {
  379:       if(curl_strequal(token, pp->name)) {
  380:         switch(action) {
  381:         case deny:
  382:           *val &= ~(pp->bit);
  383:           break;
  384:         case allow:
  385:           *val |= pp->bit;
  386:           break;
  387:         case set:
  388:           *val = pp->bit;
  389:           break;
  390:         }
  391:         break;
  392:       }
  393:     }
  394: 
  395:     if(!(pp->name)) { /* unknown protocol */
  396:       /* If they have specified only this protocol, we say treat it as
  397:          if no protocols are allowed */
  398:       if(action == set)
  399:         *val = 0;
  400:       warnf(config->global, "unrecognized protocol '%s'\n", token);
  401:     }
  402:   }
  403:   Curl_safefree(buffer);
  404:   return 0;
  405: }
  406: 
  407: /**
  408:  * Check if the given string is a protocol supported by libcurl
  409:  *
  410:  * @param str  the protocol name
  411:  * @return PARAM_OK  protocol supported
  412:  * @return PARAM_LIBCURL_UNSUPPORTED_PROTOCOL  protocol not supported
  413:  * @return PARAM_REQUIRES_PARAMETER   missing parameter
  414:  */
  415: int check_protocol(const char *str)
  416: {
  417:   const char * const *pp;
  418:   const curl_version_info_data *curlinfo = curl_version_info(CURLVERSION_NOW);
  419:   if(!str)
  420:     return PARAM_REQUIRES_PARAMETER;
  421:   for(pp = curlinfo->protocols; *pp; pp++) {
  422:     if(curl_strequal(*pp, str))
  423:       return PARAM_OK;
  424:   }
  425:   return PARAM_LIBCURL_UNSUPPORTED_PROTOCOL;
  426: }
  427: 
  428: /**
  429:  * Parses the given string looking for an offset (which may be a
  430:  * larger-than-integer value). The offset CANNOT be negative!
  431:  *
  432:  * @param val  the offset to populate
  433:  * @param str  the buffer containing the offset
  434:  * @return PARAM_OK if successful, a parameter specific error enum if failure.
  435:  */
  436: ParameterError str2offset(curl_off_t *val, const char *str)
  437: {
  438:   char *endptr;
  439:   if(str[0] == '-')
  440:     /* offsets aren't negative, this indicates weird input */
  441:     return PARAM_NEGATIVE_NUMERIC;
  442: 
  443: #if(SIZEOF_CURL_OFF_T > SIZEOF_LONG)
  444:   {
  445:     CURLofft offt = curlx_strtoofft(str, &endptr, 0, val);
  446:     if(CURL_OFFT_FLOW == offt)
  447:       return PARAM_NUMBER_TOO_LARGE;
  448:     else if(CURL_OFFT_INVAL == offt)
  449:       return PARAM_BAD_NUMERIC;
  450:   }
  451: #else
  452:   errno = 0;
  453:   *val = strtol(str, &endptr, 0);
  454:   if((*val == LONG_MIN || *val == LONG_MAX) && errno == ERANGE)
  455:     return PARAM_NUMBER_TOO_LARGE;
  456: #endif
  457:   if((endptr != str) && (endptr == str + strlen(str)))
  458:     return PARAM_OK;
  459: 
  460:   return PARAM_BAD_NUMERIC;
  461: }
  462: 
  463: static CURLcode checkpasswd(const char *kind, /* for what purpose */
  464:                             const size_t i,   /* operation index */
  465:                             const bool last,  /* TRUE if last operation */
  466:                             char **userpwd)   /* pointer to allocated string */
  467: {
  468:   char *psep;
  469:   char *osep;
  470: 
  471:   if(!*userpwd)
  472:     return CURLE_OK;
  473: 
  474:   /* Attempt to find the password separator */
  475:   psep = strchr(*userpwd, ':');
  476: 
  477:   /* Attempt to find the options separator */
  478:   osep = strchr(*userpwd, ';');
  479: 
  480:   if(!psep && **userpwd != ';') {
  481:     /* no password present, prompt for one */
  482:     char passwd[256] = "";
  483:     char prompt[256];
  484:     size_t passwdlen;
  485:     size_t userlen = strlen(*userpwd);
  486:     char *passptr;
  487: 
  488:     if(osep)
  489:       *osep = '\0';
  490: 
  491:     /* build a nice-looking prompt */
  492:     if(!i && last)
  493:       curlx_msnprintf(prompt, sizeof(prompt),
  494:                       "Enter %s password for user '%s':",
  495:                       kind, *userpwd);
  496:     else
  497:       curlx_msnprintf(prompt, sizeof(prompt),
  498:                       "Enter %s password for user '%s' on URL #%zu:",
  499:                       kind, *userpwd, i + 1);
  500: 
  501:     /* get password */
  502:     getpass_r(prompt, passwd, sizeof(passwd));
  503:     passwdlen = strlen(passwd);
  504: 
  505:     if(osep)
  506:       *osep = ';';
  507: 
  508:     /* extend the allocated memory area to fit the password too */
  509:     passptr = realloc(*userpwd,
  510:                       passwdlen + 1 + /* an extra for the colon */
  511:                       userlen + 1);   /* an extra for the zero */
  512:     if(!passptr)
  513:       return CURLE_OUT_OF_MEMORY;
  514: 
  515:     /* append the password separated with a colon */
  516:     passptr[userlen] = ':';
  517:     memcpy(&passptr[userlen + 1], passwd, passwdlen + 1);
  518:     *userpwd = passptr;
  519:   }
  520: 
  521:   return CURLE_OK;
  522: }
  523: 
  524: ParameterError add2list(struct curl_slist **list, const char *ptr)
  525: {
  526:   struct curl_slist *newlist = curl_slist_append(*list, ptr);
  527:   if(newlist)
  528:     *list = newlist;
  529:   else
  530:     return PARAM_NO_MEM;
  531: 
  532:   return PARAM_OK;
  533: }
  534: 
  535: int ftpfilemethod(struct OperationConfig *config, const char *str)
  536: {
  537:   if(curl_strequal("singlecwd", str))
  538:     return CURLFTPMETHOD_SINGLECWD;
  539:   if(curl_strequal("nocwd", str))
  540:     return CURLFTPMETHOD_NOCWD;
  541:   if(curl_strequal("multicwd", str))
  542:     return CURLFTPMETHOD_MULTICWD;
  543: 
  544:   warnf(config->global, "unrecognized ftp file method '%s', using default\n",
  545:         str);
  546: 
  547:   return CURLFTPMETHOD_MULTICWD;
  548: }
  549: 
  550: int ftpcccmethod(struct OperationConfig *config, const char *str)
  551: {
  552:   if(curl_strequal("passive", str))
  553:     return CURLFTPSSL_CCC_PASSIVE;
  554:   if(curl_strequal("active", str))
  555:     return CURLFTPSSL_CCC_ACTIVE;
  556: 
  557:   warnf(config->global, "unrecognized ftp CCC method '%s', using default\n",
  558:         str);
  559: 
  560:   return CURLFTPSSL_CCC_PASSIVE;
  561: }
  562: 
  563: long delegation(struct OperationConfig *config, const char *str)
  564: {
  565:   if(curl_strequal("none", str))
  566:     return CURLGSSAPI_DELEGATION_NONE;
  567:   if(curl_strequal("policy", str))
  568:     return CURLGSSAPI_DELEGATION_POLICY_FLAG;
  569:   if(curl_strequal("always", str))
  570:     return CURLGSSAPI_DELEGATION_FLAG;
  571: 
  572:   warnf(config->global, "unrecognized delegation method '%s', using none\n",
  573:         str);
  574: 
  575:   return CURLGSSAPI_DELEGATION_NONE;
  576: }
  577: 
  578: /*
  579:  * my_useragent: returns allocated string with default user agent
  580:  */
  581: static char *my_useragent(void)
  582: {
  583:   return strdup(CURL_NAME "/" CURL_VERSION);
  584: }
  585: 
  586: CURLcode get_args(struct OperationConfig *config, const size_t i)
  587: {
  588:   CURLcode result = CURLE_OK;
  589:   bool last = (config->next ? FALSE : TRUE);
  590: 
  591:   /* Check we have a password for the given host user */
  592:   if(config->userpwd && !config->oauth_bearer) {
  593:     result = checkpasswd("host", i, last, &config->userpwd);
  594:     if(result)
  595:       return result;
  596:   }
  597: 
  598:   /* Check we have a password for the given proxy user */
  599:   if(config->proxyuserpwd) {
  600:     result = checkpasswd("proxy", i, last, &config->proxyuserpwd);
  601:     if(result)
  602:       return result;
  603:   }
  604: 
  605:   /* Check we have a user agent */
  606:   if(!config->useragent) {
  607:     config->useragent = my_useragent();
  608:     if(!config->useragent) {
  609:       errorf(config->global, "out of memory\n");
  610:       result = CURLE_OUT_OF_MEMORY;
  611:     }
  612:   }
  613: 
  614:   return result;
  615: }
  616: 
  617: /*
  618:  * Parse the string and modify ssl_version in the val argument. Return PARAM_OK
  619:  * on success, otherwise a parameter error enum. ONLY ACCEPTS POSITIVE NUMBERS!
  620:  *
  621:  * Since this function gets called with the 'nextarg' pointer from within the
  622:  * getparameter a lot, we must check it for NULL before accessing the str
  623:  * data.
  624:  */
  625: 
  626: ParameterError str2tls_max(long *val, const char *str)
  627: {
  628:    static struct s_tls_max {
  629:     const char *tls_max_str;
  630:     long tls_max;
  631:   } const tls_max_array[] = {
  632:     { "default", CURL_SSLVERSION_MAX_DEFAULT },
  633:     { "1.0",     CURL_SSLVERSION_MAX_TLSv1_0 },
  634:     { "1.1",     CURL_SSLVERSION_MAX_TLSv1_1 },
  635:     { "1.2",     CURL_SSLVERSION_MAX_TLSv1_2 },
  636:     { "1.3",     CURL_SSLVERSION_MAX_TLSv1_3 }
  637:   };
  638:   size_t i = 0;
  639:   if(!str)
  640:     return PARAM_REQUIRES_PARAMETER;
  641:   for(i = 0; i < sizeof(tls_max_array)/sizeof(tls_max_array[0]); i++) {
  642:     if(!strcmp(str, tls_max_array[i].tls_max_str)) {
  643:       *val = tls_max_array[i].tls_max;
  644:       return PARAM_OK;
  645:     }
  646:   }
  647:   return PARAM_BAD_USE;
  648: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>