common.c revision 97868
140939Sdes/*-
240939Sdes * Copyright (c) 1998 Dag-Erling Co�dan Sm�rgrav
340939Sdes * All rights reserved.
440939Sdes *
540939Sdes * Redistribution and use in source and binary forms, with or without
640939Sdes * modification, are permitted provided that the following conditions
740939Sdes * are met:
840939Sdes * 1. Redistributions of source code must retain the above copyright
940939Sdes *    notice, this list of conditions and the following disclaimer
1040939Sdes *    in this position and unchanged.
1140939Sdes * 2. Redistributions in binary form must reproduce the above copyright
1240939Sdes *    notice, this list of conditions and the following disclaimer in the
1340939Sdes *    documentation and/or other materials provided with the distribution.
1440939Sdes * 3. The name of the author may not be used to endorse or promote products
1540939Sdes *    derived from this software without specific prior written permission
1640939Sdes *
1740939Sdes * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
1840939Sdes * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
1940939Sdes * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
2040939Sdes * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
2140939Sdes * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
2240939Sdes * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
2340939Sdes * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
2440939Sdes * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
2540939Sdes * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
2640939Sdes * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
2740939Sdes */
2840939Sdes
2984203Sdillon#include <sys/cdefs.h>
3084203Sdillon__FBSDID("$FreeBSD: head/lib/libfetch/common.c 97868 2002-06-05 12:46:36Z des $");
3184203Sdillon
3241862Sdes#include <sys/param.h>
3340939Sdes#include <sys/socket.h>
3455557Sdes#include <sys/time.h>
3562981Sdes#include <sys/uio.h>
3640939Sdes#include <netinet/in.h>
3740939Sdes
3840939Sdes#include <errno.h>
3940939Sdes#include <netdb.h>
4060924Sdes#include <stdarg.h>
4141862Sdes#include <stdlib.h>
4241862Sdes#include <stdio.h>
4340939Sdes#include <string.h>
4440939Sdes#include <unistd.h>
4540939Sdes
4640939Sdes#include "fetch.h"
4740939Sdes#include "common.h"
4840939Sdes
4940975Sdes
5040939Sdes/*** Local data **************************************************************/
5140939Sdes
5240939Sdes/*
5340939Sdes * Error messages for resolver errors
5440939Sdes */
5540939Sdesstatic struct fetcherr _netdb_errlist[] = {
5690267Sdes	{ EAI_NODATA,	FETCH_RESOLV,	"Host not found" },
5790267Sdes	{ EAI_AGAIN,	FETCH_TEMP,	"Transient resolver failure" },
5890267Sdes	{ EAI_FAIL,	FETCH_RESOLV,	"Non-recoverable resolver failure" },
5990267Sdes	{ EAI_NONAME,	FETCH_RESOLV,	"No address record" },
6090267Sdes	{ -1,		FETCH_UNKNOWN,	"Unknown resolver error" }
6140939Sdes};
6240939Sdes
6362981Sdes/* End-of-Line */
6475891Sarchiestatic const char ENDL[2] = "\r\n";
6540939Sdes
6662981Sdes
6740939Sdes/*** Error-reporting functions ***********************************************/
6840939Sdes
6940939Sdes/*
7040939Sdes * Map error code to string
7140939Sdes */
7260924Sdesstatic struct fetcherr *
7340975Sdes_fetch_finderr(struct fetcherr *p, int e)
7440939Sdes{
7590267Sdes	while (p->num != -1 && p->num != e)
7690267Sdes		p++;
7790267Sdes	return (p);
7840939Sdes}
7940939Sdes
8040939Sdes/*
8140939Sdes * Set error code
8240939Sdes */
8340939Sdesvoid
8440939Sdes_fetch_seterr(struct fetcherr *p, int e)
8540939Sdes{
8690267Sdes	p = _fetch_finderr(p, e);
8790267Sdes	fetchLastErrCode = p->cat;
8890267Sdes	snprintf(fetchLastErrString, MAXERRSTRING, "%s", p->string);
8940939Sdes}
9040939Sdes
9140939Sdes/*
9240939Sdes * Set error code according to errno
9340939Sdes */
9440939Sdesvoid
9540939Sdes_fetch_syserr(void)
9640939Sdes{
9790267Sdes	switch (errno) {
9890267Sdes	case 0:
9990267Sdes		fetchLastErrCode = FETCH_OK;
10090267Sdes		break;
10190267Sdes	case EPERM:
10290267Sdes	case EACCES:
10390267Sdes	case EROFS:
10490267Sdes	case EAUTH:
10590267Sdes	case ENEEDAUTH:
10690267Sdes		fetchLastErrCode = FETCH_AUTH;
10790267Sdes		break;
10890267Sdes	case ENOENT:
10990267Sdes	case EISDIR: /* XXX */
11090267Sdes		fetchLastErrCode = FETCH_UNAVAIL;
11190267Sdes		break;
11290267Sdes	case ENOMEM:
11390267Sdes		fetchLastErrCode = FETCH_MEMORY;
11490267Sdes		break;
11590267Sdes	case EBUSY:
11690267Sdes	case EAGAIN:
11790267Sdes		fetchLastErrCode = FETCH_TEMP;
11890267Sdes		break;
11990267Sdes	case EEXIST:
12090267Sdes		fetchLastErrCode = FETCH_EXISTS;
12190267Sdes		break;
12290267Sdes	case ENOSPC:
12390267Sdes		fetchLastErrCode = FETCH_FULL;
12490267Sdes		break;
12590267Sdes	case EADDRINUSE:
12690267Sdes	case EADDRNOTAVAIL:
12790267Sdes	case ENETDOWN:
12890267Sdes	case ENETUNREACH:
12990267Sdes	case ENETRESET:
13090267Sdes	case EHOSTUNREACH:
13190267Sdes		fetchLastErrCode = FETCH_NETWORK;
13290267Sdes		break;
13390267Sdes	case ECONNABORTED:
13490267Sdes	case ECONNRESET:
13590267Sdes		fetchLastErrCode = FETCH_ABORT;
13690267Sdes		break;
13790267Sdes	case ETIMEDOUT:
13890267Sdes		fetchLastErrCode = FETCH_TIMEOUT;
13990267Sdes		break;
14090267Sdes	case ECONNREFUSED:
14190267Sdes	case EHOSTDOWN:
14290267Sdes		fetchLastErrCode = FETCH_DOWN;
14390267Sdes		break;
14490267Sdesdefault:
14590267Sdes		fetchLastErrCode = FETCH_UNKNOWN;
14690267Sdes	}
14790267Sdes	snprintf(fetchLastErrString, MAXERRSTRING, "%s", strerror(errno));
14840939Sdes}
14940939Sdes
15040939Sdes
15141862Sdes/*
15241862Sdes * Emit status message
15341862Sdes */
15460924Sdesvoid
15575891Sarchie_fetch_info(const char *fmt, ...)
15641862Sdes{
15790267Sdes	va_list ap;
15890267Sdes
15990267Sdes	va_start(ap, fmt);
16090267Sdes	vfprintf(stderr, fmt, ap);
16190267Sdes	va_end(ap);
16290267Sdes	fputc('\n', stderr);
16341862Sdes}
16441862Sdes
16541862Sdes
16640939Sdes/*** Network-related utility functions ***************************************/
16740939Sdes
16840939Sdes/*
16968551Sdes * Return the default port for a scheme
17068551Sdes */
17168551Sdesint
17275891Sarchie_fetch_default_port(const char *scheme)
17368551Sdes{
17490267Sdes	struct servent *se;
17568551Sdes
17690267Sdes	if ((se = getservbyname(scheme, "tcp")) != NULL)
17790267Sdes		return (ntohs(se->s_port));
17890267Sdes	if (strcasecmp(scheme, SCHEME_FTP) == 0)
17990267Sdes		return (FTP_DEFAULT_PORT);
18090267Sdes	if (strcasecmp(scheme, SCHEME_HTTP) == 0)
18190267Sdes		return (HTTP_DEFAULT_PORT);
18290267Sdes	return (0);
18368551Sdes}
18468551Sdes
18568551Sdes/*
18668551Sdes * Return the default proxy port for a scheme
18768551Sdes */
18868551Sdesint
18975891Sarchie_fetch_default_proxy_port(const char *scheme)
19068551Sdes{
19190267Sdes	if (strcasecmp(scheme, SCHEME_FTP) == 0)
19290267Sdes		return (FTP_DEFAULT_PROXY_PORT);
19390267Sdes	if (strcasecmp(scheme, SCHEME_HTTP) == 0)
19490267Sdes		return (HTTP_DEFAULT_PROXY_PORT);
19590267Sdes	return (0);
19668551Sdes}
19768551Sdes
19868551Sdes/*
19997866Sdes * Create a connection for an existing descriptor.
20097866Sdes */
20197866Sdesconn_t *
20297866Sdes_fetch_reopen(int sd)
20397866Sdes{
20497866Sdes	conn_t *conn;
20597866Sdes
20697866Sdes	/* allocate and fill connection structure */
20797866Sdes	if ((conn = calloc(1, sizeof *conn)) == NULL)
20897866Sdes		return (NULL);
20997866Sdes	conn->sd = sd;
21097866Sdes	return (conn);
21197866Sdes}
21297866Sdes
21397866Sdes
21497866Sdes/*
21540939Sdes * Establish a TCP connection to the specified port on the specified host.
21640939Sdes */
21797856Sdesconn_t *
21875891Sarchie_fetch_connect(const char *host, int port, int af, int verbose)
21940939Sdes{
22097856Sdes	conn_t *conn;
22190267Sdes	char pbuf[10];
22290267Sdes	struct addrinfo hints, *res, *res0;
22390267Sdes	int sd, err;
22440939Sdes
22590267Sdes	DEBUG(fprintf(stderr, "---> %s:%d\n", host, port));
22641862Sdes
22790267Sdes	if (verbose)
22890267Sdes		_fetch_info("looking up %s", host);
22940939Sdes
23090267Sdes	/* look up host name and set up socket address structure */
23190267Sdes	snprintf(pbuf, sizeof(pbuf), "%d", port);
23290267Sdes	memset(&hints, 0, sizeof(hints));
23390267Sdes	hints.ai_family = af;
23490267Sdes	hints.ai_socktype = SOCK_STREAM;
23590267Sdes	hints.ai_protocol = 0;
23690267Sdes	if ((err = getaddrinfo(host, pbuf, &hints, &res0)) != 0) {
23790267Sdes		_netdb_seterr(err);
23897856Sdes		return (NULL);
23990267Sdes	}
24090267Sdes
24190267Sdes	if (verbose)
24290267Sdes		_fetch_info("connecting to %s:%d", host, port);
24390267Sdes
24490267Sdes	/* try to connect */
24590267Sdes	for (sd = -1, res = res0; res; res = res->ai_next) {
24690267Sdes		if ((sd = socket(res->ai_family, res->ai_socktype,
24762981Sdes			 res->ai_protocol)) == -1)
24890267Sdes			continue;
24990267Sdes		if (connect(sd, res->ai_addr, res->ai_addrlen) != -1)
25090267Sdes			break;
25190267Sdes		close(sd);
25290267Sdes		sd = -1;
25390267Sdes	}
25490267Sdes	freeaddrinfo(res0);
25590267Sdes	if (sd == -1) {
25690267Sdes		_fetch_syserr();
25797856Sdes		return (NULL);
25890267Sdes	}
25940939Sdes
26097866Sdes	if ((conn = _fetch_reopen(sd)) == NULL)
26197856Sdes		close(sd);
26297856Sdes	return (conn);
26340939Sdes}
26441989Sdes
26541989Sdes
26655557Sdes/*
26797868Sdes * Enable SSL on a connection.
26897868Sdes */
26997868Sdesint
27097868Sdes_fetch_ssl(conn_t *conn, int verbose)
27197868Sdes{
27297868Sdes
27397868Sdes	/* Init the SSL library and context */
27497868Sdes	if (!SSL_library_init()){
27597868Sdes		fprintf(stderr, "SSL library init failed\n");
27697868Sdes		return (-1);
27797868Sdes	}
27897868Sdes
27997868Sdes	SSL_load_error_strings();
28097868Sdes
28197868Sdes	conn->ssl_meth = SSLv23_client_method();
28297868Sdes	conn->ssl_ctx = SSL_CTX_new(conn->ssl_meth);
28397868Sdes
28497868Sdes	conn->ssl = SSL_new(conn->ssl_ctx);
28597868Sdes	if (conn->ssl == NULL){
28697868Sdes		fprintf(stderr, "SSL context creation failed\n");
28797868Sdes		return (-1);
28897868Sdes	}
28997868Sdes	SSL_set_fd(conn->ssl, conn->sd);
29097868Sdes	if (SSL_connect(conn->ssl) == -1){
29197868Sdes		ERR_print_errors_fp(stderr);
29297868Sdes		return (-1);
29397868Sdes	}
29497868Sdes
29597868Sdes	if (verbose) {
29697868Sdes		X509_NAME *name;
29797868Sdes		char *str;
29897868Sdes
29997868Sdes		fprintf(stderr, "SSL connection established using %s\n",
30097868Sdes		    SSL_get_cipher(conn->ssl));
30197868Sdes		conn->ssl_cert = SSL_get_peer_certificate(conn->ssl);
30297868Sdes		name = X509_get_subject_name(conn->ssl_cert);
30397868Sdes		str = X509_NAME_oneline(name, 0, 0);
30497868Sdes		printf("Certificate subject: %s\n", str);
30597868Sdes		free(str);
30697868Sdes		name = X509_get_issuer_name(conn->ssl_cert);
30797868Sdes		str = X509_NAME_oneline(name, 0, 0);
30897868Sdes		printf("Certificate issuer: %s\n", str);
30997868Sdes		free(str);
31097868Sdes	}
31197868Sdes
31297868Sdes	return (0);
31397868Sdes}
31497868Sdes
31597868Sdes/*
31697866Sdes * Read a character from a connection w/ timeout
31755557Sdes */
31897866Sdesssize_t
31997866Sdes_fetch_read(conn_t *conn, char *buf, size_t len)
32055557Sdes{
32190267Sdes	struct timeval now, timeout, wait;
32290267Sdes	fd_set readfds;
32397866Sdes	ssize_t rlen, total;
32490267Sdes	int r;
32590267Sdes
32655557Sdes	if (fetchTimeout) {
32797866Sdes		FD_ZERO(&readfds);
32890267Sdes		gettimeofday(&timeout, NULL);
32990267Sdes		timeout.tv_sec += fetchTimeout;
33055557Sdes	}
33190267Sdes
33297866Sdes	total = 0;
33397866Sdes	while (len > 0) {
33497866Sdes		while (fetchTimeout && !FD_ISSET(conn->sd, &readfds)) {
33597856Sdes			FD_SET(conn->sd, &readfds);
33690267Sdes			gettimeofday(&now, NULL);
33790267Sdes			wait.tv_sec = timeout.tv_sec - now.tv_sec;
33890267Sdes			wait.tv_usec = timeout.tv_usec - now.tv_usec;
33990267Sdes			if (wait.tv_usec < 0) {
34090267Sdes				wait.tv_usec += 1000000;
34190267Sdes				wait.tv_sec--;
34290267Sdes			}
34397866Sdes			if (wait.tv_sec < 0)
34497866Sdes				return (rlen);
34597866Sdes			errno = 0;
34697856Sdes			r = select(conn->sd + 1, &readfds, NULL, NULL, &wait);
34790267Sdes			if (r == -1) {
34890267Sdes				if (errno == EINTR && fetchRestartCalls)
34990267Sdes					continue;
35090267Sdes				return (-1);
35190267Sdes			}
35290267Sdes		}
35397866Sdes		if (conn->ssl != NULL)
35497866Sdes			rlen = SSL_read(conn->ssl, buf, len);
35597866Sdes		else
35697866Sdes			rlen = read(conn->sd, buf, len);
35797866Sdes		if (rlen == 0)
35890267Sdes			break;
35997866Sdes		if (rlen < 0) {
36090267Sdes			if (errno == EINTR && fetchRestartCalls)
36190267Sdes				continue;
36290267Sdes			return (-1);
36390267Sdes		}
36497866Sdes		len -= rlen;
36597866Sdes		buf += rlen;
36697866Sdes		total += rlen;
36797866Sdes	}
36897866Sdes	return (total);
36997866Sdes}
37097866Sdes
37197866Sdes/*
37297866Sdes * Read a line of text from a connection w/ timeout
37397866Sdes */
37497866Sdes#define MIN_BUF_SIZE 1024
37597866Sdes
37697866Sdesint
37797866Sdes_fetch_getln(conn_t *conn)
37897866Sdes{
37997866Sdes	char *tmp;
38097866Sdes	size_t tmpsize;
38197866Sdes	char c;
38297866Sdes
38397866Sdes	if (conn->buf == NULL) {
38497866Sdes		if ((conn->buf = malloc(MIN_BUF_SIZE)) == NULL) {
38597866Sdes			errno = ENOMEM;
38697866Sdes			return (-1);
38797866Sdes		}
38897866Sdes		conn->bufsize = MIN_BUF_SIZE;
38997866Sdes	}
39097866Sdes
39197866Sdes	conn->buf[0] = '\0';
39297866Sdes	conn->buflen = 0;
39397866Sdes
39497866Sdes	do {
39597866Sdes		if (_fetch_read(conn, &c, 1) == -1)
39697866Sdes			return (-1);
39797856Sdes		conn->buf[conn->buflen++] = c;
39897856Sdes		if (conn->buflen == conn->bufsize) {
39997856Sdes			tmp = conn->buf;
40097856Sdes			tmpsize = conn->bufsize * 2 + 1;
40197856Sdes			if ((tmp = realloc(tmp, tmpsize)) == NULL) {
40290267Sdes				errno = ENOMEM;
40390267Sdes				return (-1);
40490267Sdes			}
40597856Sdes			conn->buf = tmp;
40697856Sdes			conn->bufsize = tmpsize;
40790267Sdes		}
40890267Sdes	} while (c != '\n');
40990267Sdes
41097856Sdes	conn->buf[conn->buflen] = '\0';
41197856Sdes	DEBUG(fprintf(stderr, "<<< %s", conn->buf));
41290267Sdes	return (0);
41355557Sdes}
41455557Sdes
41555557Sdes
41662981Sdes/*
41797866Sdes * Write to a connection w/ timeout
41862981Sdes */
41997866Sdesssize_t
42097866Sdes_fetch_write(conn_t *conn, const char *buf, size_t len)
42197866Sdes{
42297866Sdes	struct timeval now, timeout, wait;
42397866Sdes	fd_set writefds;
42497866Sdes	ssize_t wlen, total;
42597866Sdes	int r;
42697866Sdes
42797866Sdes	if (fetchTimeout) {
42897866Sdes		FD_ZERO(&writefds);
42997866Sdes		gettimeofday(&timeout, NULL);
43097866Sdes		timeout.tv_sec += fetchTimeout;
43197866Sdes	}
43297866Sdes
43397866Sdes	while (len > 0) {
43497866Sdes		while (fetchTimeout && !FD_ISSET(conn->sd, &writefds)) {
43597866Sdes			FD_SET(conn->sd, &writefds);
43697866Sdes			gettimeofday(&now, NULL);
43797866Sdes			wait.tv_sec = timeout.tv_sec - now.tv_sec;
43897866Sdes			wait.tv_usec = timeout.tv_usec - now.tv_usec;
43997866Sdes			if (wait.tv_usec < 0) {
44097866Sdes				wait.tv_usec += 1000000;
44197866Sdes				wait.tv_sec--;
44297866Sdes			}
44397866Sdes			if (wait.tv_sec < 0) {
44497866Sdes				errno = ETIMEDOUT;
44597866Sdes				return (-1);
44697866Sdes			}
44797866Sdes			errno = 0;
44897866Sdes			r = select(conn->sd + 1, NULL, &writefds, NULL, &wait);
44997866Sdes			if (r == -1) {
45097866Sdes				if (errno == EINTR && fetchRestartCalls)
45197866Sdes					continue;
45297866Sdes				return (-1);
45397866Sdes			}
45497866Sdes		}
45597866Sdes		errno = 0;
45697866Sdes		if (conn->ssl != NULL)
45797866Sdes			wlen = SSL_write(conn->ssl, buf, len);
45897866Sdes		else
45997866Sdes			wlen = write(conn->sd, buf, len);
46097866Sdes		if (wlen == 0)
46197866Sdes			/* we consider a short write a failure */
46297866Sdes			return (-1);
46397866Sdes		if (wlen < 0) {
46497866Sdes			if (errno == EINTR && fetchRestartCalls)
46597866Sdes				continue;
46697866Sdes			return (-1);
46797866Sdes		}
46897866Sdes		len -= wlen;
46997866Sdes		buf += wlen;
47097866Sdes		total += wlen;
47197866Sdes	}
47297866Sdes	return (total);
47397866Sdes}
47497866Sdes
47597866Sdes/*
47697866Sdes * Write a line of text to a connection w/ timeout
47797866Sdes */
47862981Sdesint
47997856Sdes_fetch_putln(conn_t *conn, const char *str, size_t len)
48062981Sdes{
48197866Sdes	if (_fetch_write(conn, str, len) == -1 ||
48297866Sdes	    _fetch_write(conn, ENDL, sizeof ENDL) == -1)
48390267Sdes		return (-1);
48490267Sdes	return (0);
48562981Sdes}
48662981Sdes
48762981Sdes
48897856Sdes/*
48997856Sdes * Close connection
49097856Sdes */
49197856Sdesint
49297856Sdes_fetch_close(conn_t *conn)
49397856Sdes{
49497856Sdes	int ret;
49597856Sdes
49697856Sdes	ret = close(conn->sd);
49797856Sdes	free(conn);
49897856Sdes	return (ret);
49997856Sdes}
50097856Sdes
50197856Sdes
50241989Sdes/*** Directory-related utility functions *************************************/
50341989Sdes
50441989Sdesint
50541989Sdes_fetch_add_entry(struct url_ent **p, int *size, int *len,
50690267Sdes    const char *name, struct url_stat *us)
50741989Sdes{
50890267Sdes	struct url_ent *tmp;
50941989Sdes
51090267Sdes	if (*p == NULL) {
51190268Sdes		*size = 0;
51290267Sdes		*len = 0;
51341989Sdes	}
51441989Sdes
51590267Sdes	if (*len >= *size - 1) {
51690268Sdes		tmp = realloc(*p, (*size * 2 + 1) * sizeof **p);
51790267Sdes		if (tmp == NULL) {
51890267Sdes			errno = ENOMEM;
51990267Sdes			_fetch_syserr();
52090267Sdes			return (-1);
52190267Sdes		}
52290268Sdes		*size = (*size * 2 + 1);
52390267Sdes		*p = tmp;
52490267Sdes	}
52541989Sdes
52690267Sdes	tmp = *p + *len;
52790267Sdes	snprintf(tmp->name, PATH_MAX, "%s", name);
52890267Sdes	bcopy(us, &tmp->stat, sizeof *us);
52941989Sdes
53090267Sdes	(*len)++;
53190267Sdes	(++tmp)->name[0] = 0;
53290267Sdes
53390267Sdes	return (0);
53441989Sdes}
535