Mercurial > hgrepos > Python2 > PyMuPDF
comparison mupdf-source/thirdparty/curl/src/tool_metalink.c @ 2:b50eed0cc0ef upstream
ADD: MuPDF v1.26.7: the MuPDF source as downloaded by a default build of PyMuPDF 1.26.4.
The directory name has changed: no version number in the expanded directory now.
| author | Franz Glasner <fzglas.hg@dom66.de> |
|---|---|
| date | Mon, 15 Sep 2025 11:43:07 +0200 |
| parents | |
| children |
comparison
equal
deleted
inserted
replaced
| 1:1d09e1dec1d9 | 2:b50eed0cc0ef |
|---|---|
| 1 /*************************************************************************** | |
| 2 * _ _ ____ _ | |
| 3 * Project ___| | | | _ \| | | |
| 4 * / __| | | | |_) | | | |
| 5 * | (__| |_| | _ <| |___ | |
| 6 * \___|\___/|_| \_\_____| | |
| 7 * | |
| 8 * Copyright (C) 1998 - 2019, Daniel Stenberg, <daniel@haxx.se>, et al. | |
| 9 * | |
| 10 * This software is licensed as described in the file COPYING, which | |
| 11 * you should have received as part of this distribution. The terms | |
| 12 * are also available at https://curl.haxx.se/docs/copyright.html. | |
| 13 * | |
| 14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell | |
| 15 * copies of the Software, and permit persons to whom the Software is | |
| 16 * furnished to do so, under the terms of the COPYING file. | |
| 17 * | |
| 18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | |
| 19 * KIND, either express or implied. | |
| 20 * | |
| 21 ***************************************************************************/ | |
| 22 #include "tool_setup.h" | |
| 23 | |
| 24 #ifdef USE_METALINK | |
| 25 | |
| 26 #include <sys/stat.h> | |
| 27 #include <stdlib.h> | |
| 28 | |
| 29 #ifdef HAVE_FCNTL_H | |
| 30 # include <fcntl.h> | |
| 31 #endif | |
| 32 | |
| 33 #undef HAVE_NSS_CONTEXT | |
| 34 | |
| 35 #ifdef USE_OPENSSL | |
| 36 # include <openssl/md5.h> | |
| 37 # include <openssl/sha.h> | |
| 38 #elif defined(USE_GNUTLS_NETTLE) | |
| 39 # include <nettle/md5.h> | |
| 40 # include <nettle/sha.h> | |
| 41 # define MD5_CTX struct md5_ctx | |
| 42 # define SHA_CTX struct sha1_ctx | |
| 43 # define SHA256_CTX struct sha256_ctx | |
| 44 #elif defined(USE_GNUTLS) | |
| 45 # include <gcrypt.h> | |
| 46 # define MD5_CTX gcry_md_hd_t | |
| 47 # define SHA_CTX gcry_md_hd_t | |
| 48 # define SHA256_CTX gcry_md_hd_t | |
| 49 #elif defined(USE_NSS) | |
| 50 # include <nss.h> | |
| 51 # include <pk11pub.h> | |
| 52 # define MD5_CTX void * | |
| 53 # define SHA_CTX void * | |
| 54 # define SHA256_CTX void * | |
| 55 # define HAVE_NSS_CONTEXT | |
| 56 static NSSInitContext *nss_context; | |
| 57 #elif defined(USE_POLARSSL) | |
| 58 # include <polarssl/md5.h> | |
| 59 # include <polarssl/sha1.h> | |
| 60 # include <polarssl/sha256.h> | |
| 61 # define MD5_CTX md5_context | |
| 62 # define SHA_CTX sha1_context | |
| 63 # define SHA256_CTX sha256_context | |
| 64 #elif (defined(__MAC_OS_X_VERSION_MAX_ALLOWED) && \ | |
| 65 (__MAC_OS_X_VERSION_MAX_ALLOWED >= 1040)) || \ | |
| 66 (defined(__IPHONE_OS_VERSION_MAX_ALLOWED) && \ | |
| 67 (__IPHONE_OS_VERSION_MAX_ALLOWED >= 20000)) | |
| 68 /* For Apple operating systems: CommonCrypto has the functions we need. | |
| 69 The library's headers are even backward-compatible with OpenSSL's | |
| 70 headers as long as we define COMMON_DIGEST_FOR_OPENSSL first. | |
| 71 | |
| 72 These functions are available on Tiger and later, as well as iOS 2.0 | |
| 73 and later. If you're building for an older cat, well, sorry. */ | |
| 74 # define COMMON_DIGEST_FOR_OPENSSL | |
| 75 # include <CommonCrypto/CommonDigest.h> | |
| 76 #elif defined(WIN32) | |
| 77 /* For Windows: If no other crypto library is provided, we fallback | |
| 78 to the hash functions provided within the Microsoft Windows CryptoAPI */ | |
| 79 # include <wincrypt.h> | |
| 80 /* Custom structure in order to store the required provider and hash handle */ | |
| 81 struct win32_crypto_hash { | |
| 82 HCRYPTPROV hCryptProv; | |
| 83 HCRYPTHASH hHash; | |
| 84 }; | |
| 85 /* Custom Microsoft AES Cryptographic Provider defines required for MinGW */ | |
| 86 # ifndef ALG_SID_SHA_256 | |
| 87 # define ALG_SID_SHA_256 12 | |
| 88 # endif | |
| 89 # ifndef CALG_SHA_256 | |
| 90 # define CALG_SHA_256 (ALG_CLASS_HASH | ALG_TYPE_ANY | ALG_SID_SHA_256) | |
| 91 # endif | |
| 92 # define MD5_CTX struct win32_crypto_hash | |
| 93 # define SHA_CTX struct win32_crypto_hash | |
| 94 # define SHA256_CTX struct win32_crypto_hash | |
| 95 #else | |
| 96 # error "Can't compile METALINK support without a crypto library." | |
| 97 #endif | |
| 98 | |
| 99 #define ENABLE_CURLX_PRINTF | |
| 100 /* use our own printf() functions */ | |
| 101 #include "curlx.h" | |
| 102 | |
| 103 #include "tool_getparam.h" | |
| 104 #include "tool_paramhlp.h" | |
| 105 #include "tool_cfgable.h" | |
| 106 #include "tool_metalink.h" | |
| 107 #include "tool_operate.h" | |
| 108 #include "tool_msgs.h" | |
| 109 | |
| 110 #include "memdebug.h" /* keep this as LAST include */ | |
| 111 | |
| 112 /* Copied from tool_getparam.c */ | |
| 113 #define GetStr(str,val) do { \ | |
| 114 if(*(str)) { \ | |
| 115 free(*(str)); \ | |
| 116 *(str) = NULL; \ | |
| 117 } \ | |
| 118 if((val)) \ | |
| 119 *(str) = strdup((val)); \ | |
| 120 if(!(val)) \ | |
| 121 return PARAM_NO_MEM; \ | |
| 122 } WHILE_FALSE | |
| 123 | |
| 124 #if defined(USE_OPENSSL) | |
| 125 /* Functions are already defined */ | |
| 126 #elif defined(USE_GNUTLS_NETTLE) | |
| 127 | |
| 128 static int MD5_Init(MD5_CTX *ctx) | |
| 129 { | |
| 130 md5_init(ctx); | |
| 131 return 1; | |
| 132 } | |
| 133 | |
| 134 static void MD5_Update(MD5_CTX *ctx, | |
| 135 const unsigned char *input, | |
| 136 unsigned int inputLen) | |
| 137 { | |
| 138 md5_update(ctx, inputLen, input); | |
| 139 } | |
| 140 | |
| 141 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) | |
| 142 { | |
| 143 md5_digest(ctx, 16, digest); | |
| 144 } | |
| 145 | |
| 146 static int SHA1_Init(SHA_CTX *ctx) | |
| 147 { | |
| 148 sha1_init(ctx); | |
| 149 return 1; | |
| 150 } | |
| 151 | |
| 152 static void SHA1_Update(SHA_CTX *ctx, | |
| 153 const unsigned char *input, | |
| 154 unsigned int inputLen) | |
| 155 { | |
| 156 sha1_update(ctx, inputLen, input); | |
| 157 } | |
| 158 | |
| 159 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) | |
| 160 { | |
| 161 sha1_digest(ctx, 20, digest); | |
| 162 } | |
| 163 | |
| 164 static int SHA256_Init(SHA256_CTX *ctx) | |
| 165 { | |
| 166 sha256_init(ctx); | |
| 167 return 1; | |
| 168 } | |
| 169 | |
| 170 static void SHA256_Update(SHA256_CTX *ctx, | |
| 171 const unsigned char *input, | |
| 172 unsigned int inputLen) | |
| 173 { | |
| 174 sha256_update(ctx, inputLen, input); | |
| 175 } | |
| 176 | |
| 177 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) | |
| 178 { | |
| 179 sha256_digest(ctx, 32, digest); | |
| 180 } | |
| 181 | |
| 182 #elif defined(USE_GNUTLS) | |
| 183 | |
| 184 static int MD5_Init(MD5_CTX *ctx) | |
| 185 { | |
| 186 gcry_md_open(ctx, GCRY_MD_MD5, 0); | |
| 187 return 1; | |
| 188 } | |
| 189 | |
| 190 static void MD5_Update(MD5_CTX *ctx, | |
| 191 const unsigned char *input, | |
| 192 unsigned int inputLen) | |
| 193 { | |
| 194 gcry_md_write(*ctx, input, inputLen); | |
| 195 } | |
| 196 | |
| 197 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) | |
| 198 { | |
| 199 memcpy(digest, gcry_md_read(*ctx, 0), 16); | |
| 200 gcry_md_close(*ctx); | |
| 201 } | |
| 202 | |
| 203 static int SHA1_Init(SHA_CTX *ctx) | |
| 204 { | |
| 205 gcry_md_open(ctx, GCRY_MD_SHA1, 0); | |
| 206 return 1; | |
| 207 } | |
| 208 | |
| 209 static void SHA1_Update(SHA_CTX *ctx, | |
| 210 const unsigned char *input, | |
| 211 unsigned int inputLen) | |
| 212 { | |
| 213 gcry_md_write(*ctx, input, inputLen); | |
| 214 } | |
| 215 | |
| 216 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) | |
| 217 { | |
| 218 memcpy(digest, gcry_md_read(*ctx, 0), 20); | |
| 219 gcry_md_close(*ctx); | |
| 220 } | |
| 221 | |
| 222 static int SHA256_Init(SHA256_CTX *ctx) | |
| 223 { | |
| 224 gcry_md_open(ctx, GCRY_MD_SHA256, 0); | |
| 225 return 1; | |
| 226 } | |
| 227 | |
| 228 static void SHA256_Update(SHA256_CTX *ctx, | |
| 229 const unsigned char *input, | |
| 230 unsigned int inputLen) | |
| 231 { | |
| 232 gcry_md_write(*ctx, input, inputLen); | |
| 233 } | |
| 234 | |
| 235 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) | |
| 236 { | |
| 237 memcpy(digest, gcry_md_read(*ctx, 0), 32); | |
| 238 gcry_md_close(*ctx); | |
| 239 } | |
| 240 | |
| 241 #elif defined(USE_NSS) | |
| 242 | |
| 243 static int nss_hash_init(void **pctx, SECOidTag hash_alg) | |
| 244 { | |
| 245 PK11Context *ctx; | |
| 246 | |
| 247 /* we have to initialize NSS if not initialized already */ | |
| 248 if(!NSS_IsInitialized() && !nss_context) { | |
| 249 static NSSInitParameters params; | |
| 250 params.length = sizeof(params); | |
| 251 nss_context = NSS_InitContext("", "", "", "", ¶ms, NSS_INIT_READONLY | |
| 252 | NSS_INIT_NOCERTDB | NSS_INIT_NOMODDB | NSS_INIT_FORCEOPEN | |
| 253 | NSS_INIT_NOROOTINIT | NSS_INIT_OPTIMIZESPACE | NSS_INIT_PK11RELOAD); | |
| 254 } | |
| 255 | |
| 256 ctx = PK11_CreateDigestContext(hash_alg); | |
| 257 if(!ctx) | |
| 258 return /* failure */ 0; | |
| 259 | |
| 260 if(PK11_DigestBegin(ctx) != SECSuccess) { | |
| 261 PK11_DestroyContext(ctx, PR_TRUE); | |
| 262 return /* failure */ 0; | |
| 263 } | |
| 264 | |
| 265 *pctx = ctx; | |
| 266 return /* success */ 1; | |
| 267 } | |
| 268 | |
| 269 static void nss_hash_final(void **pctx, unsigned char *out, unsigned int len) | |
| 270 { | |
| 271 PK11Context *ctx = *pctx; | |
| 272 unsigned int outlen; | |
| 273 PK11_DigestFinal(ctx, out, &outlen, len); | |
| 274 PK11_DestroyContext(ctx, PR_TRUE); | |
| 275 } | |
| 276 | |
| 277 static int MD5_Init(MD5_CTX *pctx) | |
| 278 { | |
| 279 return nss_hash_init(pctx, SEC_OID_MD5); | |
| 280 } | |
| 281 | |
| 282 static void MD5_Update(MD5_CTX *pctx, | |
| 283 const unsigned char *input, | |
| 284 unsigned int input_len) | |
| 285 { | |
| 286 PK11_DigestOp(*pctx, input, input_len); | |
| 287 } | |
| 288 | |
| 289 static void MD5_Final(unsigned char digest[16], MD5_CTX *pctx) | |
| 290 { | |
| 291 nss_hash_final(pctx, digest, 16); | |
| 292 } | |
| 293 | |
| 294 static int SHA1_Init(SHA_CTX *pctx) | |
| 295 { | |
| 296 return nss_hash_init(pctx, SEC_OID_SHA1); | |
| 297 } | |
| 298 | |
| 299 static void SHA1_Update(SHA_CTX *pctx, | |
| 300 const unsigned char *input, | |
| 301 unsigned int input_len) | |
| 302 { | |
| 303 PK11_DigestOp(*pctx, input, input_len); | |
| 304 } | |
| 305 | |
| 306 static void SHA1_Final(unsigned char digest[20], SHA_CTX *pctx) | |
| 307 { | |
| 308 nss_hash_final(pctx, digest, 20); | |
| 309 } | |
| 310 | |
| 311 static int SHA256_Init(SHA256_CTX *pctx) | |
| 312 { | |
| 313 return nss_hash_init(pctx, SEC_OID_SHA256); | |
| 314 } | |
| 315 | |
| 316 static void SHA256_Update(SHA256_CTX *pctx, | |
| 317 const unsigned char *input, | |
| 318 unsigned int input_len) | |
| 319 { | |
| 320 PK11_DigestOp(*pctx, input, input_len); | |
| 321 } | |
| 322 | |
| 323 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *pctx) | |
| 324 { | |
| 325 nss_hash_final(pctx, digest, 32); | |
| 326 } | |
| 327 | |
| 328 #elif defined(USE_POLARSSL) | |
| 329 | |
| 330 static int MD5_Init(MD5_CTX *ctx) | |
| 331 { | |
| 332 md5_starts(ctx); | |
| 333 return 1; | |
| 334 } | |
| 335 | |
| 336 static void MD5_Update(MD5_CTX *ctx, | |
| 337 const unsigned char *input, | |
| 338 unsigned int inputLen) | |
| 339 { | |
| 340 md5_update(ctx, input, inputLen); | |
| 341 } | |
| 342 | |
| 343 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) | |
| 344 { | |
| 345 md5_finish(ctx, digest); | |
| 346 } | |
| 347 | |
| 348 static int SHA1_Init(SHA_CTX *ctx) | |
| 349 { | |
| 350 sha1_starts(ctx); | |
| 351 return 1; | |
| 352 } | |
| 353 | |
| 354 static void SHA1_Update(SHA_CTX *ctx, | |
| 355 const unsigned char *input, | |
| 356 unsigned int inputLen) | |
| 357 { | |
| 358 sha1_update(ctx, input, inputLen); | |
| 359 } | |
| 360 | |
| 361 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) | |
| 362 { | |
| 363 sha1_finish(ctx, digest); | |
| 364 } | |
| 365 | |
| 366 static int SHA256_Init(SHA256_CTX *ctx) | |
| 367 { | |
| 368 sha256_starts(ctx, 0); /* 0 = sha256 */ | |
| 369 return 1; | |
| 370 } | |
| 371 | |
| 372 static void SHA256_Update(SHA256_CTX *ctx, | |
| 373 const unsigned char *input, | |
| 374 unsigned int inputLen) | |
| 375 { | |
| 376 sha256_update(ctx, input, inputLen); | |
| 377 } | |
| 378 | |
| 379 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) | |
| 380 { | |
| 381 sha256_finish(ctx, digest); | |
| 382 } | |
| 383 | |
| 384 #elif defined(WIN32) | |
| 385 | |
| 386 static void win32_crypto_final(struct win32_crypto_hash *ctx, | |
| 387 unsigned char *digest, | |
| 388 unsigned int digestLen) | |
| 389 { | |
| 390 unsigned long length; | |
| 391 CryptGetHashParam(ctx->hHash, HP_HASHVAL, NULL, &length, 0); | |
| 392 if(length == digestLen) | |
| 393 CryptGetHashParam(ctx->hHash, HP_HASHVAL, digest, &length, 0); | |
| 394 if(ctx->hHash) | |
| 395 CryptDestroyHash(ctx->hHash); | |
| 396 if(ctx->hCryptProv) | |
| 397 CryptReleaseContext(ctx->hCryptProv, 0); | |
| 398 } | |
| 399 | |
| 400 static int MD5_Init(MD5_CTX *ctx) | |
| 401 { | |
| 402 if(CryptAcquireContext(&ctx->hCryptProv, NULL, NULL, | |
| 403 PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) { | |
| 404 CryptCreateHash(ctx->hCryptProv, CALG_MD5, 0, 0, &ctx->hHash); | |
| 405 } | |
| 406 return 1; | |
| 407 } | |
| 408 | |
| 409 static void MD5_Update(MD5_CTX *ctx, | |
| 410 const unsigned char *input, | |
| 411 unsigned int inputLen) | |
| 412 { | |
| 413 CryptHashData(ctx->hHash, (unsigned char *)input, inputLen, 0); | |
| 414 } | |
| 415 | |
| 416 static void MD5_Final(unsigned char digest[16], MD5_CTX *ctx) | |
| 417 { | |
| 418 win32_crypto_final(ctx, digest, 16); | |
| 419 } | |
| 420 | |
| 421 static int SHA1_Init(SHA_CTX *ctx) | |
| 422 { | |
| 423 if(CryptAcquireContext(&ctx->hCryptProv, NULL, NULL, | |
| 424 PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) { | |
| 425 CryptCreateHash(ctx->hCryptProv, CALG_SHA1, 0, 0, &ctx->hHash); | |
| 426 } | |
| 427 return 1; | |
| 428 } | |
| 429 | |
| 430 static void SHA1_Update(SHA_CTX *ctx, | |
| 431 const unsigned char *input, | |
| 432 unsigned int inputLen) | |
| 433 { | |
| 434 CryptHashData(ctx->hHash, (unsigned char *)input, inputLen, 0); | |
| 435 } | |
| 436 | |
| 437 static void SHA1_Final(unsigned char digest[20], SHA_CTX *ctx) | |
| 438 { | |
| 439 win32_crypto_final(ctx, digest, 20); | |
| 440 } | |
| 441 | |
| 442 static int SHA256_Init(SHA256_CTX *ctx) | |
| 443 { | |
| 444 if(CryptAcquireContext(&ctx->hCryptProv, NULL, NULL, | |
| 445 PROV_RSA_AES, CRYPT_VERIFYCONTEXT)) { | |
| 446 CryptCreateHash(ctx->hCryptProv, CALG_SHA_256, 0, 0, &ctx->hHash); | |
| 447 } | |
| 448 return 1; | |
| 449 } | |
| 450 | |
| 451 static void SHA256_Update(SHA256_CTX *ctx, | |
| 452 const unsigned char *input, | |
| 453 unsigned int inputLen) | |
| 454 { | |
| 455 CryptHashData(ctx->hHash, (unsigned char *)input, inputLen, 0); | |
| 456 } | |
| 457 | |
| 458 static void SHA256_Final(unsigned char digest[32], SHA256_CTX *ctx) | |
| 459 { | |
| 460 win32_crypto_final(ctx, digest, 32); | |
| 461 } | |
| 462 | |
| 463 #endif /* CRYPTO LIBS */ | |
| 464 | |
| 465 const digest_params MD5_DIGEST_PARAMS[] = { | |
| 466 { | |
| 467 CURLX_FUNCTION_CAST(Curl_digest_init_func, MD5_Init), | |
| 468 CURLX_FUNCTION_CAST(Curl_digest_update_func, MD5_Update), | |
| 469 CURLX_FUNCTION_CAST(Curl_digest_final_func, MD5_Final), | |
| 470 sizeof(MD5_CTX), | |
| 471 16 | |
| 472 } | |
| 473 }; | |
| 474 | |
| 475 const digest_params SHA1_DIGEST_PARAMS[] = { | |
| 476 { | |
| 477 CURLX_FUNCTION_CAST(Curl_digest_init_func, SHA1_Init), | |
| 478 CURLX_FUNCTION_CAST(Curl_digest_update_func, SHA1_Update), | |
| 479 CURLX_FUNCTION_CAST(Curl_digest_final_func, SHA1_Final), | |
| 480 sizeof(SHA_CTX), | |
| 481 20 | |
| 482 } | |
| 483 }; | |
| 484 | |
| 485 const digest_params SHA256_DIGEST_PARAMS[] = { | |
| 486 { | |
| 487 CURLX_FUNCTION_CAST(Curl_digest_init_func, SHA256_Init), | |
| 488 CURLX_FUNCTION_CAST(Curl_digest_update_func, SHA256_Update), | |
| 489 CURLX_FUNCTION_CAST(Curl_digest_final_func, SHA256_Final), | |
| 490 sizeof(SHA256_CTX), | |
| 491 32 | |
| 492 } | |
| 493 }; | |
| 494 | |
| 495 static const metalink_digest_def SHA256_DIGEST_DEF[] = { | |
| 496 {"sha-256", SHA256_DIGEST_PARAMS} | |
| 497 }; | |
| 498 | |
| 499 static const metalink_digest_def SHA1_DIGEST_DEF[] = { | |
| 500 {"sha-1", SHA1_DIGEST_PARAMS} | |
| 501 }; | |
| 502 | |
| 503 static const metalink_digest_def MD5_DIGEST_DEF[] = { | |
| 504 {"md5", MD5_DIGEST_PARAMS} | |
| 505 }; | |
| 506 | |
| 507 /* | |
| 508 * The alias of supported hash functions in the order by preference | |
| 509 * (basically stronger hash comes first). We included "sha-256" and | |
| 510 * "sha256". The former is the name defined in the IANA registry named | |
| 511 * "Hash Function Textual Names". The latter is widely (and | |
| 512 * historically) used in Metalink version 3. | |
| 513 */ | |
| 514 static const metalink_digest_alias digest_aliases[] = { | |
| 515 {"sha-256", SHA256_DIGEST_DEF}, | |
| 516 {"sha256", SHA256_DIGEST_DEF}, | |
| 517 {"sha-1", SHA1_DIGEST_DEF}, | |
| 518 {"sha1", SHA1_DIGEST_DEF}, | |
| 519 {"md5", MD5_DIGEST_DEF}, | |
| 520 {NULL, NULL} | |
| 521 }; | |
| 522 | |
| 523 digest_context *Curl_digest_init(const digest_params *dparams) | |
| 524 { | |
| 525 digest_context *ctxt; | |
| 526 | |
| 527 /* Create digest context */ | |
| 528 ctxt = malloc(sizeof(*ctxt)); | |
| 529 | |
| 530 if(!ctxt) | |
| 531 return ctxt; | |
| 532 | |
| 533 ctxt->digest_hashctx = malloc(dparams->digest_ctxtsize); | |
| 534 | |
| 535 if(!ctxt->digest_hashctx) { | |
| 536 free(ctxt); | |
| 537 return NULL; | |
| 538 } | |
| 539 | |
| 540 ctxt->digest_hash = dparams; | |
| 541 | |
| 542 if(dparams->digest_init(ctxt->digest_hashctx) != 1) { | |
| 543 free(ctxt->digest_hashctx); | |
| 544 free(ctxt); | |
| 545 return NULL; | |
| 546 } | |
| 547 | |
| 548 return ctxt; | |
| 549 } | |
| 550 | |
| 551 int Curl_digest_update(digest_context *context, | |
| 552 const unsigned char *data, | |
| 553 unsigned int len) | |
| 554 { | |
| 555 (*context->digest_hash->digest_update)(context->digest_hashctx, data, len); | |
| 556 | |
| 557 return 0; | |
| 558 } | |
| 559 | |
| 560 int Curl_digest_final(digest_context *context, unsigned char *result) | |
| 561 { | |
| 562 if(result) | |
| 563 (*context->digest_hash->digest_final)(result, context->digest_hashctx); | |
| 564 | |
| 565 free(context->digest_hashctx); | |
| 566 free(context); | |
| 567 | |
| 568 return 0; | |
| 569 } | |
| 570 | |
| 571 static unsigned char hex_to_uint(const char *s) | |
| 572 { | |
| 573 char buf[3]; | |
| 574 unsigned long val; | |
| 575 buf[0] = s[0]; | |
| 576 buf[1] = s[1]; | |
| 577 buf[2] = 0; | |
| 578 val = strtoul(buf, NULL, 16); | |
| 579 return (unsigned char)(val&0xff); | |
| 580 } | |
| 581 | |
| 582 /* | |
| 583 * Check checksum of file denoted by filename. The expected hash value | |
| 584 * is given in hex_hash which is hex-encoded string. | |
| 585 * | |
| 586 * This function returns 1 if it succeeds or one of the following | |
| 587 * integers: | |
| 588 * | |
| 589 * 0: | |
| 590 * Checksum didn't match. | |
| 591 * -1: | |
| 592 * Could not open file; or could not read data from file. | |
| 593 * -2: | |
| 594 * Hash algorithm not available. | |
| 595 */ | |
| 596 static int check_hash(const char *filename, | |
| 597 const metalink_digest_def *digest_def, | |
| 598 const unsigned char *digest, FILE *error) | |
| 599 { | |
| 600 unsigned char *result; | |
| 601 digest_context *dctx; | |
| 602 int check_ok, flags, fd; | |
| 603 | |
| 604 flags = O_RDONLY; | |
| 605 #ifdef O_BINARY | |
| 606 /* O_BINARY is required in order to avoid binary EOF in text mode */ | |
| 607 flags |= O_BINARY; | |
| 608 #endif | |
| 609 | |
| 610 fd = open(filename, flags); | |
| 611 if(fd == -1) { | |
| 612 fprintf(error, "Metalink: validating (%s) [%s] FAILED (%s)\n", filename, | |
| 613 digest_def->hash_name, strerror(errno)); | |
| 614 return -1; | |
| 615 } | |
| 616 | |
| 617 dctx = Curl_digest_init(digest_def->dparams); | |
| 618 if(!dctx) { | |
| 619 fprintf(error, "Metalink: validating (%s) [%s] FAILED (%s)\n", filename, | |
| 620 digest_def->hash_name, "failed to initialize hash algorithm"); | |
| 621 close(fd); | |
| 622 return -2; | |
| 623 } | |
| 624 | |
| 625 result = malloc(digest_def->dparams->digest_resultlen); | |
| 626 if(!result) { | |
| 627 close(fd); | |
| 628 Curl_digest_final(dctx, NULL); | |
| 629 return -1; | |
| 630 } | |
| 631 while(1) { | |
| 632 unsigned char buf[4096]; | |
| 633 ssize_t len = read(fd, buf, sizeof(buf)); | |
| 634 if(len == 0) { | |
| 635 break; | |
| 636 } | |
| 637 else if(len == -1) { | |
| 638 fprintf(error, "Metalink: validating (%s) [%s] FAILED (%s)\n", filename, | |
| 639 digest_def->hash_name, strerror(errno)); | |
| 640 Curl_digest_final(dctx, result); | |
| 641 close(fd); | |
| 642 return -1; | |
| 643 } | |
| 644 Curl_digest_update(dctx, buf, (unsigned int)len); | |
| 645 } | |
| 646 Curl_digest_final(dctx, result); | |
| 647 check_ok = memcmp(result, digest, | |
| 648 digest_def->dparams->digest_resultlen) == 0; | |
| 649 /* sha*sum style verdict output */ | |
| 650 if(check_ok) | |
| 651 fprintf(error, "Metalink: validating (%s) [%s] OK\n", filename, | |
| 652 digest_def->hash_name); | |
| 653 else | |
| 654 fprintf(error, "Metalink: validating (%s) [%s] FAILED (digest mismatch)\n", | |
| 655 filename, digest_def->hash_name); | |
| 656 | |
| 657 free(result); | |
| 658 close(fd); | |
| 659 return check_ok; | |
| 660 } | |
| 661 | |
| 662 int metalink_check_hash(struct GlobalConfig *config, | |
| 663 metalinkfile *mlfile, | |
| 664 const char *filename) | |
| 665 { | |
| 666 int rv; | |
| 667 fprintf(config->errors, "Metalink: validating (%s)...\n", filename); | |
| 668 if(mlfile->checksum == NULL) { | |
| 669 fprintf(config->errors, | |
| 670 "Metalink: validating (%s) FAILED (digest missing)\n", filename); | |
| 671 return -2; | |
| 672 } | |
| 673 rv = check_hash(filename, mlfile->checksum->digest_def, | |
| 674 mlfile->checksum->digest, config->errors); | |
| 675 return rv; | |
| 676 } | |
| 677 | |
| 678 static metalink_checksum * | |
| 679 checksum_from_hex_digest(const metalink_digest_def *digest_def, | |
| 680 const char *hex_digest) | |
| 681 { | |
| 682 metalink_checksum *chksum; | |
| 683 unsigned char *digest; | |
| 684 size_t i; | |
| 685 size_t len = strlen(hex_digest); | |
| 686 digest = malloc(len/2); | |
| 687 if(!digest) | |
| 688 return 0; | |
| 689 | |
| 690 for(i = 0; i < len; i += 2) { | |
| 691 digest[i/2] = hex_to_uint(hex_digest + i); | |
| 692 } | |
| 693 chksum = malloc(sizeof(metalink_checksum)); | |
| 694 if(chksum) { | |
| 695 chksum->digest_def = digest_def; | |
| 696 chksum->digest = digest; | |
| 697 } | |
| 698 else | |
| 699 free(digest); | |
| 700 return chksum; | |
| 701 } | |
| 702 | |
| 703 static metalink_resource *new_metalink_resource(const char *url) | |
| 704 { | |
| 705 metalink_resource *res; | |
| 706 res = malloc(sizeof(metalink_resource)); | |
| 707 if(res) { | |
| 708 res->next = NULL; | |
| 709 res->url = strdup(url); | |
| 710 if(!res->url) { | |
| 711 free(res); | |
| 712 return NULL; | |
| 713 } | |
| 714 } | |
| 715 return res; | |
| 716 } | |
| 717 | |
| 718 /* Returns nonzero if hex_digest is properly formatted; that is each | |
| 719 letter is in [0-9A-Za-z] and the length of the string equals to the | |
| 720 result length of digest * 2. */ | |
| 721 static int check_hex_digest(const char *hex_digest, | |
| 722 const metalink_digest_def *digest_def) | |
| 723 { | |
| 724 size_t i; | |
| 725 for(i = 0; hex_digest[i]; ++i) { | |
| 726 char c = hex_digest[i]; | |
| 727 if(!(('0' <= c && c <= '9') || ('a' <= c && c <= 'z') || | |
| 728 ('A' <= c && c <= 'Z'))) { | |
| 729 return 0; | |
| 730 } | |
| 731 } | |
| 732 return digest_def->dparams->digest_resultlen * 2 == i; | |
| 733 } | |
| 734 | |
| 735 static metalinkfile *new_metalinkfile(metalink_file_t *fileinfo) | |
| 736 { | |
| 737 metalinkfile *f; | |
| 738 f = (metalinkfile*)malloc(sizeof(metalinkfile)); | |
| 739 if(!f) | |
| 740 return NULL; | |
| 741 | |
| 742 f->next = NULL; | |
| 743 f->filename = strdup(fileinfo->name); | |
| 744 if(!f->filename) { | |
| 745 free(f); | |
| 746 return NULL; | |
| 747 } | |
| 748 f->checksum = NULL; | |
| 749 f->resource = NULL; | |
| 750 if(fileinfo->checksums) { | |
| 751 const metalink_digest_alias *digest_alias; | |
| 752 for(digest_alias = digest_aliases; digest_alias->alias_name; | |
| 753 ++digest_alias) { | |
| 754 metalink_checksum_t **p; | |
| 755 for(p = fileinfo->checksums; *p; ++p) { | |
| 756 if(curl_strequal(digest_alias->alias_name, (*p)->type) && | |
| 757 check_hex_digest((*p)->hash, digest_alias->digest_def)) { | |
| 758 f->checksum = | |
| 759 checksum_from_hex_digest(digest_alias->digest_def, | |
| 760 (*p)->hash); | |
| 761 break; | |
| 762 } | |
| 763 } | |
| 764 if(f->checksum) { | |
| 765 break; | |
| 766 } | |
| 767 } | |
| 768 } | |
| 769 if(fileinfo->resources) { | |
| 770 metalink_resource_t **p; | |
| 771 metalink_resource root, *tail; | |
| 772 root.next = NULL; | |
| 773 tail = &root; | |
| 774 for(p = fileinfo->resources; *p; ++p) { | |
| 775 metalink_resource *res; | |
| 776 /* Filter by type if it is non-NULL. In Metalink v3, type | |
| 777 includes the type of the resource. In curl, we are only | |
| 778 interested in HTTP, HTTPS and FTP. In addition to them, | |
| 779 Metalink v3 file may contain bittorrent type URL, which | |
| 780 points to the BitTorrent metainfo file. We ignore it here. | |
| 781 In Metalink v4, type was deprecated and all | |
| 782 fileinfo->resources point to the target file. BitTorrent | |
| 783 metainfo file URL may be appeared in fileinfo->metaurls. | |
| 784 */ | |
| 785 if((*p)->type == NULL || | |
| 786 curl_strequal((*p)->type, "http") || | |
| 787 curl_strequal((*p)->type, "https") || | |
| 788 curl_strequal((*p)->type, "ftp") || | |
| 789 curl_strequal((*p)->type, "ftps")) { | |
| 790 res = new_metalink_resource((*p)->url); | |
| 791 if(res) { | |
| 792 tail->next = res; | |
| 793 tail = res; | |
| 794 } | |
| 795 else { | |
| 796 tail = root.next; | |
| 797 | |
| 798 /* clean up the linked list */ | |
| 799 while(tail) { | |
| 800 res = tail->next; | |
| 801 free(tail->url); | |
| 802 free(tail); | |
| 803 tail = res; | |
| 804 } | |
| 805 free(f->filename); | |
| 806 free(f); | |
| 807 return NULL; | |
| 808 } | |
| 809 } | |
| 810 } | |
| 811 f->resource = root.next; | |
| 812 } | |
| 813 return f; | |
| 814 } | |
| 815 | |
| 816 int parse_metalink(struct OperationConfig *config, struct OutStruct *outs, | |
| 817 const char *metalink_url) | |
| 818 { | |
| 819 metalink_error_t r; | |
| 820 metalink_t* metalink; | |
| 821 metalink_file_t **files; | |
| 822 bool warnings = FALSE; | |
| 823 | |
| 824 /* metlaink_parse_final deletes outs->metalink_parser */ | |
| 825 r = metalink_parse_final(outs->metalink_parser, NULL, 0, &metalink); | |
| 826 outs->metalink_parser = NULL; | |
| 827 if(r != 0) { | |
| 828 return -1; | |
| 829 } | |
| 830 if(metalink->files == NULL) { | |
| 831 fprintf(config->global->errors, "Metalink: parsing (%s) WARNING " | |
| 832 "(missing or invalid file name)\n", | |
| 833 metalink_url); | |
| 834 metalink_delete(metalink); | |
| 835 return -1; | |
| 836 } | |
| 837 for(files = metalink->files; *files; ++files) { | |
| 838 struct getout *url; | |
| 839 /* Skip an entry which has no resource. */ | |
| 840 if(!(*files)->resources) { | |
| 841 fprintf(config->global->errors, "Metalink: parsing (%s) WARNING " | |
| 842 "(missing or invalid resource)\n", | |
| 843 metalink_url); | |
| 844 continue; | |
| 845 } | |
| 846 if(config->url_get || | |
| 847 ((config->url_get = config->url_list) != NULL)) { | |
| 848 /* there's a node here, if it already is filled-in continue to | |
| 849 find an "empty" node */ | |
| 850 while(config->url_get && (config->url_get->flags & GETOUT_URL)) | |
| 851 config->url_get = config->url_get->next; | |
| 852 } | |
| 853 | |
| 854 /* now there might or might not be an available node to fill in! */ | |
| 855 | |
| 856 if(config->url_get) | |
| 857 /* existing node */ | |
| 858 url = config->url_get; | |
| 859 else | |
| 860 /* there was no free node, create one! */ | |
| 861 url = new_getout(config); | |
| 862 | |
| 863 if(url) { | |
| 864 metalinkfile *mlfile = new_metalinkfile(*files); | |
| 865 if(!mlfile) | |
| 866 break; | |
| 867 | |
| 868 if(!mlfile->checksum) { | |
| 869 warnings = TRUE; | |
| 870 fprintf(config->global->errors, | |
| 871 "Metalink: parsing (%s) WARNING (digest missing)\n", | |
| 872 metalink_url); | |
| 873 } | |
| 874 /* Set name as url */ | |
| 875 GetStr(&url->url, mlfile->filename); | |
| 876 | |
| 877 /* set flag metalink here */ | |
| 878 url->flags |= GETOUT_URL | GETOUT_METALINK; | |
| 879 | |
| 880 if(config->metalinkfile_list) { | |
| 881 config->metalinkfile_last->next = mlfile; | |
| 882 config->metalinkfile_last = mlfile; | |
| 883 } | |
| 884 else { | |
| 885 config->metalinkfile_list = config->metalinkfile_last = mlfile; | |
| 886 } | |
| 887 } | |
| 888 } | |
| 889 metalink_delete(metalink); | |
| 890 return (warnings) ? -2 : 0; | |
| 891 } | |
| 892 | |
| 893 size_t metalink_write_cb(void *buffer, size_t sz, size_t nmemb, | |
| 894 void *userdata) | |
| 895 { | |
| 896 struct per_transfer *per = userdata; | |
| 897 struct OutStruct *outs = &per->outs; | |
| 898 struct OperationConfig *config = outs->config; | |
| 899 int rv; | |
| 900 | |
| 901 /* | |
| 902 * Once that libcurl has called back tool_write_cb() the returned value | |
| 903 * is checked against the amount that was intended to be written, if | |
| 904 * it does not match then it fails with CURLE_WRITE_ERROR. So at this | |
| 905 * point returning a value different from sz*nmemb indicates failure. | |
| 906 */ | |
| 907 const size_t failure = (sz && nmemb) ? 0 : 1; | |
| 908 | |
| 909 if(!config) | |
| 910 return failure; | |
| 911 | |
| 912 rv = metalink_parse_update(outs->metalink_parser, buffer, sz * nmemb); | |
| 913 if(rv == 0) | |
| 914 return sz * nmemb; | |
| 915 else { | |
| 916 fprintf(config->global->errors, "Metalink: parsing FAILED\n"); | |
| 917 return failure; | |
| 918 } | |
| 919 } | |
| 920 | |
| 921 /* | |
| 922 * Returns nonzero if content_type includes mediatype. | |
| 923 */ | |
| 924 static int check_content_type(const char *content_type, const char *media_type) | |
| 925 { | |
| 926 const char *ptr = content_type; | |
| 927 size_t media_type_len = strlen(media_type); | |
| 928 for(; *ptr && (*ptr == ' ' || *ptr == '\t'); ++ptr); | |
| 929 if(!*ptr) { | |
| 930 return 0; | |
| 931 } | |
| 932 return curl_strnequal(ptr, media_type, media_type_len) && | |
| 933 (*(ptr + media_type_len) == '\0' || *(ptr + media_type_len) == ' ' || | |
| 934 *(ptr + media_type_len) == '\t' || *(ptr + media_type_len) == ';'); | |
| 935 } | |
| 936 | |
| 937 int check_metalink_content_type(const char *content_type) | |
| 938 { | |
| 939 return check_content_type(content_type, "application/metalink+xml"); | |
| 940 } | |
| 941 | |
| 942 int count_next_metalink_resource(metalinkfile *mlfile) | |
| 943 { | |
| 944 int count = 0; | |
| 945 metalink_resource *res; | |
| 946 for(res = mlfile->resource; res; res = res->next, ++count); | |
| 947 return count; | |
| 948 } | |
| 949 | |
| 950 static void delete_metalink_checksum(metalink_checksum *chksum) | |
| 951 { | |
| 952 if(chksum == NULL) { | |
| 953 return; | |
| 954 } | |
| 955 Curl_safefree(chksum->digest); | |
| 956 Curl_safefree(chksum); | |
| 957 } | |
| 958 | |
| 959 static void delete_metalink_resource(metalink_resource *res) | |
| 960 { | |
| 961 if(res == NULL) { | |
| 962 return; | |
| 963 } | |
| 964 Curl_safefree(res->url); | |
| 965 Curl_safefree(res); | |
| 966 } | |
| 967 | |
| 968 static void delete_metalinkfile(metalinkfile *mlfile) | |
| 969 { | |
| 970 metalink_resource *res; | |
| 971 if(mlfile == NULL) { | |
| 972 return; | |
| 973 } | |
| 974 Curl_safefree(mlfile->filename); | |
| 975 delete_metalink_checksum(mlfile->checksum); | |
| 976 for(res = mlfile->resource; res;) { | |
| 977 metalink_resource *next; | |
| 978 next = res->next; | |
| 979 delete_metalink_resource(res); | |
| 980 res = next; | |
| 981 } | |
| 982 Curl_safefree(mlfile); | |
| 983 } | |
| 984 | |
| 985 void clean_metalink(struct OperationConfig *config) | |
| 986 { | |
| 987 while(config->metalinkfile_list) { | |
| 988 metalinkfile *mlfile = config->metalinkfile_list; | |
| 989 config->metalinkfile_list = config->metalinkfile_list->next; | |
| 990 delete_metalinkfile(mlfile); | |
| 991 } | |
| 992 config->metalinkfile_last = 0; | |
| 993 } | |
| 994 | |
| 995 void metalink_cleanup(void) | |
| 996 { | |
| 997 #ifdef HAVE_NSS_CONTEXT | |
| 998 if(nss_context) { | |
| 999 NSS_ShutdownContext(nss_context); | |
| 1000 nss_context = NULL; | |
| 1001 } | |
| 1002 #endif | |
| 1003 } | |
| 1004 | |
| 1005 #endif /* USE_METALINK */ |
