Newer
Older
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
}
if (word == NULL)
goto ferr;
while ((word = fetch_read_word(f)) != NULL) {
if (strcmp(word, "login") == 0) {
if ((word = fetch_read_word(f)) == NULL)
goto ferr;
if (snprintf(url->user, sizeof(url->user),
"%s", word) > (int)sizeof(url->user)) {
fetch_info("login name in .netrc is too long");
url->user[0] = '\0';
}
} else if (strcmp(word, "password") == 0) {
if ((word = fetch_read_word(f)) == NULL)
goto ferr;
if (snprintf(url->pwd, sizeof(url->pwd),
"%s", word) > (int)sizeof(url->pwd)) {
fetch_info("password in .netrc is too long");
url->pwd[0] = '\0';
}
} else if (strcmp(word, "account") == 0) {
if ((word = fetch_read_word(f)) == NULL)
goto ferr;
/* XXX not supported! */
} else {
break;
}
}
fclose(f);
return (0);
ferr:
fclose(f);
return (-1);
}
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
#define MAX_ADDRESS_BYTES sizeof(struct in6_addr)
#define MAX_ADDRESS_STRING (4*8+1)
#define MAX_CIDR_STRING (MAX_ADDRESS_STRING+4)
static size_t host_to_address(uint8_t *buf, size_t buf_len, const char *host, size_t len)
{
char tmp[MAX_ADDRESS_STRING];
if (len >= sizeof tmp) return 0;
if (buf_len < sizeof(struct in6_addr)) return 0;
/* Make zero terminated copy of the hostname */
memcpy(tmp, host, len);
tmp[len] = 0;
if (inet_pton(AF_INET, tmp, (struct in_addr *) buf))
return sizeof(struct in_addr);
if (inet_pton(AF_INET6, tmp, (struct in6_addr *) buf))
return sizeof(struct in6_addr);
return 0;
}
static int bitcmp(const uint8_t *a, const uint8_t *b, int len)
{
int bytes, bits, mask, r;
bytes = len / 8;
bits = len % 8;
if (bytes != 0) {
r = memcmp(a, b, bytes);
if (r != 0) return r;
}
if (bits != 0) {
mask = (0xff << (8 - bits)) & 0xff;
return ((int) (a[bytes] & mask)) - ((int) (b[bytes] & mask));
}
return 0;
}
static int cidr_match(const uint8_t *addr, size_t addr_len, const char *cidr, size_t cidr_len)
{
const char *slash;
uint8_t cidr_addr[MAX_ADDRESS_BYTES];
size_t cidr_addrlen;
long bits;
if (!addr_len || cidr_len > MAX_CIDR_STRING) return 0;
slash = memchr(cidr, '/', cidr_len);
if (!slash) return 0;
bits = strtol(slash + 1, NULL, 10);
if (!bits || bits > 128) return 0;
cidr_addrlen = host_to_address(cidr_addr, sizeof cidr_addr, cidr, slash - cidr);
if (cidr_addrlen != addr_len || bits > addr_len*8) return 0;
return bitcmp(cidr_addr, addr, bits) == 0;
}
/*
* The no_proxy environment variable specifies a set of domains for
* which the proxy should not be consulted; the contents is a comma-,
* or space-separated list of domain names. A single asterisk will
* override all proxy variables and no transactions will be proxied
* (for compatability with lynx and curl, see the discussion at
* <http://curl.haxx.se/mail/archive_pre_oct_99/0009.html>).
*/
int
fetch_no_proxy_match(const char *host)
{
const char *no_proxy, *p, *q;
uint8_t addr[MAX_ADDRESS_BYTES];
size_t h_len, d_len, addr_len;
if ((no_proxy = getenv("NO_PROXY")) == NULL &&
(no_proxy = getenv("no_proxy")) == NULL)
return (0);
/* asterisk matches any hostname */
if (strcmp(no_proxy, "*") == 0)
return (1);
h_len = strlen(host);
addr_len = host_to_address(addr, sizeof addr, host, h_len);
p = no_proxy;
do {
/* position p at the beginning of a domain suffix */
while (*p == ',' || isspace((unsigned char)*p))
p++;
/* position q at the first separator character */
for (q = p; *q; ++q)
if (*q == ',' || isspace((unsigned char)*q))
break;
d_len = q - p;
if (d_len > 0 && h_len >= d_len &&
strncasecmp(host + h_len - d_len,
p, d_len) == 0) {
/* domain name matches */
return (1);
}
if (cidr_match(addr, addr_len, p, d_len)) {
return (1);
}
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
p = q + 1;
} while (*q);
return (0);
}
struct fetchIO {
void *io_cookie;
ssize_t (*io_read)(void *, void *, size_t);
ssize_t (*io_write)(void *, const void *, size_t);
void (*io_close)(void *);
};
void
fetchIO_close(fetchIO *f)
{
if (f->io_close != NULL)
(*f->io_close)(f->io_cookie);
free(f);
}
fetchIO *
fetchIO_unopen(void *io_cookie, ssize_t (*io_read)(void *, void *, size_t),
ssize_t (*io_write)(void *, const void *, size_t),
void (*io_close)(void *))
{
fetchIO *f;
f = malloc(sizeof(*f));
if (f == NULL)
return f;
f->io_cookie = io_cookie;
f->io_read = io_read;
f->io_write = io_write;
f->io_close = io_close;
return f;
}
ssize_t
fetchIO_read(fetchIO *f, void *buf, size_t len)
{
if (f->io_read == NULL)
return EBADF;
return (*f->io_read)(f->io_cookie, buf, len);
}
ssize_t
fetchIO_write(fetchIO *f, const void *buf, size_t len)
{
if (f->io_read == NULL)
return EBADF;
return (*f->io_write)(f->io_cookie, buf, len);
}