2022-01-15 05:16:34 +00:00
|
|
|
/*
|
|
|
|
* Unreal Internet Relay Chat Daemon, src/url.c
|
|
|
|
* (C) 2021 Bram Matthys and the UnrealIRCd team
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License as published by
|
|
|
|
* the Free Software Foundation; either version 1, or (at your option)
|
|
|
|
* any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "unrealircd.h"
|
|
|
|
#include "dns.h"
|
|
|
|
|
|
|
|
/* Structs */
|
|
|
|
|
|
|
|
/* Stores information about the async transfer.
|
|
|
|
* Used to maintain information about the transfer
|
|
|
|
* to trigger the callback upon completion.
|
|
|
|
*/
|
|
|
|
typedef struct Download Download;
|
|
|
|
|
|
|
|
struct Download
|
|
|
|
{
|
|
|
|
Download *prev, *next;
|
|
|
|
vFP callback;
|
|
|
|
void *callback_data;
|
|
|
|
FILE *file_fd; /**< File open for writing (otherwise NULL) */
|
|
|
|
char filename[PATH_MAX];
|
|
|
|
char *url; /*< must be free()d by url_do_transfers_async() */
|
|
|
|
char errorbuf[512];
|
|
|
|
time_t cachetime;
|
|
|
|
char *hostname; /**< Parsed hostname (from 'url') */
|
|
|
|
int port; /**< Parsed port (from 'url') */
|
|
|
|
char *username;
|
|
|
|
char *password;
|
|
|
|
char *document; /**< Parsed document (from 'url') */
|
|
|
|
char *ip; /**< Resolved IP */
|
|
|
|
int ipv6;
|
|
|
|
SSL *ssl;
|
|
|
|
int fd; /**< Socket */
|
|
|
|
int connected;
|
|
|
|
int got_response;
|
|
|
|
int http_status_code;
|
|
|
|
char *lefttoparse;
|
|
|
|
long long lefttoparselen; /* size of data in lefttoparse (note: not used for first header parsing) */
|
|
|
|
time_t last_modified;
|
|
|
|
time_t download_started;
|
|
|
|
int dns_refcnt;
|
|
|
|
TransferEncoding transfer_encoding;
|
|
|
|
long chunk_remaining;
|
|
|
|
/* for redirects: */
|
|
|
|
int redirects_remaining;
|
|
|
|
char *redirect_new_location;
|
|
|
|
char *redirect_original_url;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Variables */
|
|
|
|
Download *downloads = NULL;
|
|
|
|
SSL_CTX *https_ctx = NULL;
|
|
|
|
|
|
|
|
/* Forward declarations */
|
|
|
|
void url_resolve_cb(void *arg, int status, int timeouts, struct hostent *he);
|
|
|
|
void unreal_https_initiate_connect(Download *handle);
|
|
|
|
int url_parse(const char *url, char **host, int *port, char **username, char **password, char **document);
|
|
|
|
SSL_CTX *https_new_ctx(void);
|
|
|
|
void unreal_https_connect_handshake(int fd, int revents, void *data);
|
|
|
|
int https_connect(Download *handle);
|
|
|
|
int https_fatal_tls_error(int ssl_error, int my_errno, Download *handle);
|
|
|
|
void https_connect_send_header(Download *handle);
|
|
|
|
void https_receive_response(int fd, int revents, void *data);
|
|
|
|
int https_handle_response_header(Download *handle, char *readbuf, int n);
|
|
|
|
int https_handle_response_file(Download *handle, char *readbuf, int n);
|
|
|
|
void https_done(Download *handle);
|
|
|
|
void https_done_cached(Download *handle);
|
|
|
|
void https_redirect(Download *handle);
|
|
|
|
int https_parse_header(char *buffer, int len, char **key, char **value, char **lastloc, int *end_of_request);
|
|
|
|
char *url_find_end_of_request(char *header, int totalsize, int *remaining_bytes);
|
|
|
|
void https_cancel(Download *handle, FORMAT_STRING(const char *pattern), ...) __attribute__((format(printf,2,3)));
|
|
|
|
|
|
|
|
void url_free_handle(Download *handle)
|
|
|
|
{
|
|
|
|
DelListItem(handle, downloads);
|
|
|
|
if (handle->fd > 0)
|
|
|
|
{
|
|
|
|
fd_close(handle->fd);
|
|
|
|
fd_unnotify(handle->fd);
|
|
|
|
}
|
|
|
|
if (handle->file_fd)
|
|
|
|
fclose(handle->file_fd);
|
|
|
|
safe_free(handle->url);
|
|
|
|
safe_free(handle->hostname);
|
|
|
|
safe_free(handle->username);
|
|
|
|
safe_free(handle->password);
|
|
|
|
safe_free(handle->document);
|
|
|
|
safe_free(handle->ip);
|
|
|
|
if (handle->ssl)
|
|
|
|
SSL_free(handle->ssl);
|
|
|
|
safe_free(handle->lefttoparse);
|
|
|
|
safe_free(handle->redirect_new_location);
|
|
|
|
safe_free(handle->redirect_original_url);
|
|
|
|
safe_free(handle);
|
|
|
|
}
|
|
|
|
|
2023-05-05 22:12:01 +00:00
|
|
|
void url_cancel_handle_by_callback_data(void *ptr)
|
|
|
|
{
|
|
|
|
Download *d, *d_next;
|
|
|
|
|
|
|
|
for (d = downloads; d; d = d_next)
|
|
|
|
{
|
|
|
|
d_next = d->next;
|
|
|
|
if (d->callback_data == ptr)
|
|
|
|
{
|
|
|
|
d->callback = NULL;
|
|
|
|
d->callback_data = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-01-15 05:16:34 +00:00
|
|
|
void https_cancel(Download *handle, FORMAT_STRING(const char *pattern), ...)
|
|
|
|
{
|
|
|
|
va_list vl;
|
|
|
|
va_start(vl, pattern);
|
|
|
|
vsnprintf(handle->errorbuf, sizeof(handle->errorbuf), pattern, vl);
|
|
|
|
va_end(vl);
|
2023-05-05 22:12:01 +00:00
|
|
|
if (handle->callback)
|
|
|
|
handle->callback(handle->url, NULL, handle->errorbuf, 0, handle->callback_data);
|
2022-01-15 05:16:34 +00:00
|
|
|
url_free_handle(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
void download_file_async(const char *url, time_t cachetime, vFP callback, void *callback_data, char *original_url, int maxredirects)
|
|
|
|
{
|
|
|
|
char *file;
|
|
|
|
const char *filename;
|
|
|
|
char *tmp;
|
|
|
|
Download *handle = NULL;
|
|
|
|
int ipv6 = 0;
|
|
|
|
char *host;
|
|
|
|
int port;
|
|
|
|
char *username;
|
|
|
|
char *password;
|
|
|
|
char *document;
|
|
|
|
|
|
|
|
handle = safe_alloc(sizeof(Download));
|
|
|
|
handle->download_started = TStime();
|
|
|
|
handle->callback = callback;
|
|
|
|
handle->callback_data = callback_data;
|
|
|
|
handle->cachetime = cachetime;
|
|
|
|
safe_strdup(handle->url, url);
|
|
|
|
safe_strdup(handle->redirect_original_url, original_url);
|
|
|
|
handle->redirects_remaining = maxredirects;
|
|
|
|
AddListItem(handle, downloads);
|
|
|
|
|
|
|
|
if (strncmp(url, "https://", 8))
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Only https:// is supported (either rebuild UnrealIRCd with curl support or use https)");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (!url_parse(url, &host, &port, &username, &password, &document))
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Failed to parse HTTP url");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
safe_strdup(handle->hostname, host);
|
|
|
|
handle->port = port;
|
|
|
|
safe_strdup(handle->username, username);
|
|
|
|
safe_strdup(handle->password, password);
|
|
|
|
safe_strdup(handle->document, document);
|
|
|
|
|
|
|
|
file = url_getfilename(url);
|
|
|
|
filename = unreal_getfilename(file);
|
|
|
|
tmp = unreal_mktemp(TMPDIR, filename ? filename : "download.conf");
|
|
|
|
|
|
|
|
handle->file_fd = fopen(tmp, "wb");
|
|
|
|
if (!handle->file_fd)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Cannot create '%s': %s", tmp, strerror(ERRNO));
|
|
|
|
safe_free(file);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
strlcpy(handle->filename, tmp, sizeof(handle->filename));
|
|
|
|
safe_free(file);
|
|
|
|
|
|
|
|
|
|
|
|
// todo: allocate handle, select en weetikt allemaal
|
|
|
|
// add to some global struct linkedlist, for timeouts
|
|
|
|
// register in i/o
|
|
|
|
|
|
|
|
if (is_valid_ip(handle->hostname))
|
|
|
|
{
|
|
|
|
/* Nothing to resolve, eg https://127.0.0.1/ */
|
|
|
|
safe_strdup(handle->ip, handle->hostname);
|
|
|
|
unreal_https_initiate_connect(handle);
|
|
|
|
} else {
|
|
|
|
/* Hostname, so start resolving... */
|
|
|
|
handle->dns_refcnt++;
|
|
|
|
ares_gethostbyname(resolver_channel, handle->hostname, AF_INET, url_resolve_cb, handle);
|
|
|
|
// TODO: check return value?
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void url_resolve_cb(void *arg, int status, int timeouts, struct hostent *he)
|
|
|
|
{
|
|
|
|
Download *handle = (Download *)arg;
|
|
|
|
int n;
|
|
|
|
struct hostent *he2;
|
|
|
|
char ipbuf[HOSTLEN+1];
|
|
|
|
const char *ip = NULL;
|
|
|
|
|
|
|
|
handle->dns_refcnt--;
|
|
|
|
|
|
|
|
if ((status != 0) || !he->h_addr_list || !he->h_addr_list[0])
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Unable to resolve hostname '%s'", handle->hostname);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!he->h_addr_list[0] || (he->h_length != (handle->ipv6 ? 16 : 4)) ||
|
|
|
|
!(ip = inetntop(handle->ipv6 ? AF_INET6 : AF_INET, he->h_addr_list[0], ipbuf, sizeof(ipbuf))))
|
|
|
|
{
|
|
|
|
/* Illegal response -- fatal */
|
|
|
|
https_cancel(handle, "Unable to resolve hostname '%s'", handle->hostname);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Ok, since we got here, it seems things were actually succesfull */
|
|
|
|
|
|
|
|
safe_strdup(handle->ip, ip);
|
|
|
|
|
|
|
|
unreal_https_initiate_connect(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
void unreal_https_initiate_connect(Download *handle)
|
|
|
|
{
|
|
|
|
// todo: allocate handle, select en weetikt allemaal
|
|
|
|
// add to some global struct linkedlist, for timeouts
|
|
|
|
// register in i/o
|
|
|
|
|
|
|
|
if (!handle->ip)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "No IP address found to connect to");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
handle->fd = fd_socket(handle->ipv6 ? AF_INET6 : AF_INET, SOCK_STREAM, 0, "HTTPS");
|
|
|
|
if (handle->fd < 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Could not create socket: %s", strerror(ERRNO));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
set_sock_opts(handle->fd, NULL, handle->ipv6);
|
|
|
|
if (!unreal_connect(handle->fd, handle->ip, handle->port, handle->ipv6))
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Could not connect: %s", strerror(ERRNO));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_WRITE, unreal_https_connect_handshake, handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
// based on unreal_tls_client_handshake()
|
|
|
|
void unreal_https_connect_handshake(int fd, int revents, void *data)
|
|
|
|
{
|
|
|
|
Download *handle = data;
|
|
|
|
handle->ssl = SSL_new(https_ctx);
|
|
|
|
if (!handle->ssl)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Failed to setup SSL");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
SSL_set_fd(handle->ssl, handle->fd);
|
|
|
|
SSL_set_connect_state(handle->ssl);
|
|
|
|
SSL_set_nonblocking(handle->ssl);
|
|
|
|
SSL_set_tlsext_host_name(handle->ssl, handle->hostname);
|
|
|
|
|
|
|
|
if (https_connect(handle) < 0)
|
|
|
|
{
|
|
|
|
/* Some fatal error already */
|
|
|
|
https_cancel(handle, "TLS_connect() failed early");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Is now connecting... */
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_CTX *https_new_ctx(void)
|
|
|
|
{
|
|
|
|
SSL_CTX *ctx_client;
|
|
|
|
char buf1[512], buf2[512];
|
|
|
|
char *curl_ca_bundle = buf1;
|
|
|
|
|
|
|
|
SSL_load_error_strings();
|
|
|
|
SSLeay_add_ssl_algorithms();
|
|
|
|
|
|
|
|
ctx_client = SSL_CTX_new(SSLv23_client_method());
|
|
|
|
if (!ctx_client)
|
|
|
|
return NULL;
|
|
|
|
#ifdef HAS_SSL_CTX_SET_MIN_PROTO_VERSION
|
|
|
|
SSL_CTX_set_min_proto_version(ctx_client, TLS1_2_VERSION);
|
|
|
|
#endif
|
|
|
|
SSL_CTX_set_options(ctx_client, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3|SSL_OP_NO_TLSv1|SSL_OP_NO_TLSv1_1);
|
|
|
|
|
|
|
|
/* Verify peer certificate */
|
|
|
|
snprintf(buf1, sizeof(buf1), "%s/tls/curl-ca-bundle.crt", CONFDIR);
|
|
|
|
if (!file_exists(buf1))
|
|
|
|
{
|
|
|
|
snprintf(buf2, sizeof(buf2), "%s/doc/conf/tls/curl-ca-bundle.crt", BUILDDIR);
|
|
|
|
if (!file_exists(buf2))
|
|
|
|
{
|
|
|
|
unreal_log(ULOG_ERROR, "url", "CA_BUNDLE_NOT_FOUND", NULL,
|
|
|
|
"Neither $filename1 nor $filename2 exist.\n"
|
|
|
|
"Cannot use built-in https client without curl-ca-bundle.crt\n",
|
|
|
|
log_data_string("filename1", buf1),
|
|
|
|
log_data_string("filename2", buf2));
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
curl_ca_bundle = buf2;
|
|
|
|
}
|
|
|
|
SSL_CTX_load_verify_locations(ctx_client, curl_ca_bundle, NULL);
|
|
|
|
SSL_CTX_set_verify(ctx_client, SSL_VERIFY_PEER, NULL);
|
|
|
|
|
|
|
|
/* Limit ciphers as well */
|
|
|
|
SSL_CTX_set_cipher_list(ctx_client, UNREALIRCD_DEFAULT_CIPHERS);
|
|
|
|
|
|
|
|
return ctx_client;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Based on unreal_tls_connect_retry
|
|
|
|
void https_connect_retry(int fd, int revents, void *data)
|
|
|
|
{
|
|
|
|
Download *handle = data;
|
|
|
|
https_connect(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Based on unreal_tls_connect()
|
|
|
|
int https_connect(Download *handle)
|
|
|
|
{
|
|
|
|
int ssl_err;
|
|
|
|
char *errstr;
|
|
|
|
|
|
|
|
if ((ssl_err = SSL_connect(handle->ssl)) <= 0)
|
|
|
|
{
|
|
|
|
ssl_err = SSL_get_error(handle->ssl, ssl_err);
|
|
|
|
switch(ssl_err)
|
|
|
|
{
|
|
|
|
case SSL_ERROR_SYSCALL:
|
|
|
|
if (ERRNO == P_EINTR || ERRNO == P_EWOULDBLOCK || ERRNO == P_EAGAIN)
|
|
|
|
{
|
|
|
|
/* Hmmm. This implementation is different than in unreal_tls_accept().
|
|
|
|
* One of them must be wrong -- better check! (TODO)
|
|
|
|
*/
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_READ|FD_SELECT_WRITE, https_connect_retry, handle);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
return https_fatal_tls_error(ssl_err, ERRNO, handle);
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_READ, https_connect_retry, handle);
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_WRITE, NULL, handle);
|
|
|
|
return 0;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_READ, NULL, handle);
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_WRITE, https_connect_retry, handle);
|
|
|
|
return 0;
|
|
|
|
default:
|
|
|
|
return https_fatal_tls_error(ssl_err, ERRNO, handle);
|
|
|
|
}
|
|
|
|
/* NOTREACHED */
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We are connected now. */
|
|
|
|
|
|
|
|
if (!verify_certificate(handle->ssl, handle->hostname, &errstr))
|
|
|
|
{
|
|
|
|
https_cancel(handle, "TLS Certificate error for server: %s", errstr);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
https_connect_send_header(handle);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Report a fatal TLS error and terminate the download.
|
|
|
|
*
|
|
|
|
* @param ssl_error The error as from OpenSSL.
|
|
|
|
* @param where The location, one of the SAFE_SSL_* defines.
|
|
|
|
* @param my_errno A preserved value of errno to pass to ssl_error_str().
|
|
|
|
* @param client The client the error is associated with.
|
|
|
|
*/
|
|
|
|
int https_fatal_tls_error(int ssl_error, int my_errno, Download *handle)
|
|
|
|
{
|
|
|
|
const char *ssl_errstr;
|
|
|
|
unsigned long additional_errno = ERR_get_error();
|
|
|
|
char additional_info[256];
|
|
|
|
const char *one, *two;
|
|
|
|
|
|
|
|
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
|
|
|
|
/* Fetch additional error information from OpenSSL 3.0.0+ */
|
|
|
|
two = ERR_reason_error_string(additional_errno);
|
|
|
|
if (two && *two)
|
|
|
|
{
|
|
|
|
snprintf(additional_info, sizeof(additional_info), ": %s", two);
|
|
|
|
} else {
|
|
|
|
*additional_info = '\0';
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
/* Fetch additional error information from OpenSSL. This is new as of Nov 2017 (4.0.16+) */
|
|
|
|
one = ERR_func_error_string(additional_errno);
|
|
|
|
two = ERR_reason_error_string(additional_errno);
|
|
|
|
if (one && *one && two && *two)
|
|
|
|
{
|
|
|
|
snprintf(additional_info, sizeof(additional_info), ": %s: %s", one, two);
|
|
|
|
} else {
|
|
|
|
*additional_info = '\0';
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
ssl_errstr = ssl_error_str(ssl_error, my_errno);
|
|
|
|
|
|
|
|
https_cancel(handle, "%s [%s]", ssl_errstr, additional_info);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
// copied 100% from modulemanager parse_url()
|
|
|
|
int url_parse(const char *url, char **hostname, int *port, char **username, char **password, char **document)
|
|
|
|
{
|
|
|
|
char *p, *p2;
|
|
|
|
static char hostbuf[256];
|
|
|
|
static char documentbuf[512];
|
|
|
|
|
|
|
|
*hostname = *username = *password = *document = NULL;
|
|
|
|
*port = 443;
|
|
|
|
|
|
|
|
if (strncmp(url, "https://", 8))
|
|
|
|
return 0;
|
|
|
|
url += 8; /* skip over https:// part */
|
|
|
|
|
|
|
|
p = strchr(url, '/');
|
|
|
|
if (!p)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
strlncpy(hostbuf, url, sizeof(hostbuf), p - url);
|
|
|
|
|
|
|
|
strlcpy(documentbuf, p, sizeof(documentbuf));
|
|
|
|
|
|
|
|
*hostname = hostbuf;
|
|
|
|
*document = documentbuf;
|
|
|
|
|
|
|
|
/* Actually we may still need to extract the port */
|
|
|
|
p = strchr(hostbuf, '@');
|
|
|
|
if (p)
|
|
|
|
{
|
|
|
|
*p++ = '\0';
|
|
|
|
|
|
|
|
*username = hostbuf;
|
|
|
|
p2 = strchr(hostbuf, ':');
|
|
|
|
if (p2)
|
|
|
|
{
|
|
|
|
*p2++ = '\0';
|
|
|
|
*password = p2;
|
|
|
|
}
|
|
|
|
*hostname = p;
|
|
|
|
}
|
|
|
|
p = strchr(*hostname, ':');
|
|
|
|
if (p)
|
|
|
|
{
|
|
|
|
*p++ = '\0';
|
|
|
|
*port = atoi(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void https_connect_send_header(Download *handle)
|
|
|
|
{
|
|
|
|
char buf[1024];
|
|
|
|
char hostandport[512];
|
|
|
|
int ssl_err;
|
|
|
|
char *host;
|
|
|
|
int port;
|
|
|
|
char *document;
|
|
|
|
|
|
|
|
handle->connected = 1;
|
|
|
|
snprintf(hostandport, sizeof(hostandport), "%s:%d", handle->hostname, handle->port);
|
|
|
|
|
|
|
|
/* Prepare the header */
|
|
|
|
snprintf(buf, sizeof(buf), "GET %s HTTP/1.1\r\n"
|
|
|
|
"User-Agent: UnrealIRCd %s\r\n"
|
|
|
|
"Host: %s\r\n"
|
|
|
|
"Connection: close\r\n",
|
|
|
|
handle->document,
|
|
|
|
VERSIONONLY,
|
|
|
|
hostandport);
|
|
|
|
if (handle->username && handle->password)
|
|
|
|
{
|
|
|
|
char wbuf[128];
|
|
|
|
char obuf[256];
|
|
|
|
char header[512];
|
|
|
|
|
|
|
|
snprintf(wbuf, sizeof(wbuf), "%s:%s", handle->username, handle->password);
|
|
|
|
if (b64_encode(wbuf, strlen(wbuf), obuf, sizeof(obuf)-1) > 0)
|
|
|
|
{
|
|
|
|
snprintf(header, sizeof(header), "Authorization: Basic %s\r\n", obuf);
|
|
|
|
strlcat(buf, header, sizeof(buf));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (handle->cachetime > 0)
|
|
|
|
{
|
|
|
|
const char *datestr = rfc2616_time(handle->cachetime);
|
|
|
|
if (datestr)
|
|
|
|
{
|
|
|
|
// snprintf_append...
|
|
|
|
snprintf(buf+strlen(buf), sizeof(buf)-strlen(buf),
|
|
|
|
"If-Modified-Since: %s\r\n", datestr);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
strlcat(buf, "\r\n", sizeof(buf));
|
|
|
|
|
|
|
|
ssl_err = SSL_write(handle->ssl, buf, strlen(buf));
|
|
|
|
if (ssl_err < 0)
|
|
|
|
{
|
|
|
|
https_fatal_tls_error(ssl_err, ERRNO, handle);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_WRITE, NULL, handle);
|
|
|
|
fd_setselect(handle->fd, FD_SELECT_READ, https_receive_response, handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
void https_receive_response(int fd, int revents, void *data)
|
|
|
|
{
|
|
|
|
Download *handle = data;
|
|
|
|
int n;
|
|
|
|
char readbuf[2048];
|
|
|
|
|
|
|
|
n = SSL_read(handle->ssl, readbuf, sizeof(readbuf)-1);
|
|
|
|
if (n == 0)
|
|
|
|
{
|
|
|
|
/* Graceful close */
|
|
|
|
https_done(handle);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (n < 0)
|
|
|
|
{
|
|
|
|
int ssl_err = SSL_get_error(handle->ssl, n);
|
|
|
|
switch (ssl_err)
|
|
|
|
{
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
fd_setselect(fd, FD_SELECT_READ, NULL, handle);
|
|
|
|
fd_setselect(fd, FD_SELECT_WRITE, https_receive_response, handle);
|
|
|
|
return;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
/* Wants to read more data; let it call us next time again */
|
|
|
|
return;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
|
|
|
case SSL_ERROR_SSL:
|
|
|
|
default:
|
|
|
|
https_fatal_tls_error(ssl_err, ERRNO, handle);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
readbuf[n] = '\0';
|
|
|
|
|
|
|
|
//fprintf(stderr, "Got: '%s'\n", readbuf);
|
|
|
|
|
|
|
|
if (!handle->got_response)
|
|
|
|
{
|
|
|
|
https_handle_response_header(handle, readbuf, n);
|
|
|
|
return;
|
|
|
|
} else
|
|
|
|
if (handle->got_response)
|
|
|
|
{
|
|
|
|
if (!https_handle_response_file(handle, readbuf, n))
|
|
|
|
return; /* handle is already freed! */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Based on websocket_handle_handshake()
|
|
|
|
int https_handle_response_header(Download *handle, char *readbuf, int n)
|
|
|
|
{
|
|
|
|
char *key, *value;
|
|
|
|
int r, end_of_request;
|
|
|
|
char netbuf[4096], netbuf2[4096];
|
|
|
|
char *lastloc = NULL;
|
|
|
|
int maxcopy, nprefix=0;
|
|
|
|
int totalsize;
|
|
|
|
|
|
|
|
/* Yeah, totally paranoid: */
|
|
|
|
memset(netbuf, 0, sizeof(netbuf));
|
|
|
|
memset(netbuf2, 0, sizeof(netbuf2));
|
|
|
|
|
|
|
|
/** Frame re-assembling starts here **/
|
|
|
|
*netbuf = '\0';
|
|
|
|
if (handle->lefttoparse)
|
|
|
|
{
|
|
|
|
strlcpy(netbuf, handle->lefttoparse, sizeof(netbuf));
|
|
|
|
nprefix = strlen(netbuf);
|
|
|
|
}
|
|
|
|
maxcopy = sizeof(netbuf) - nprefix - 1;
|
|
|
|
/* (Need to some manual checking here as strlen() can't be safely used
|
|
|
|
* on readbuf. Same is true for strlncat since it uses strlen().)
|
|
|
|
*/
|
|
|
|
if (n > maxcopy)
|
|
|
|
n = maxcopy;
|
|
|
|
if (n <= 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Oversized line in HTTP response");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
memcpy(netbuf+nprefix, readbuf, n); /* SAFE: see checking above */
|
|
|
|
totalsize = n + nprefix;
|
|
|
|
netbuf[totalsize] = '\0';
|
|
|
|
memcpy(netbuf2, netbuf, totalsize+1); // copy, including the "always present \0 at the end just in case we use strstr etc".
|
|
|
|
safe_free(handle->lefttoparse);
|
|
|
|
|
|
|
|
/** Now step through the lines.. **/
|
|
|
|
for (r = https_parse_header(netbuf, strlen(netbuf), &key, &value, &lastloc, &end_of_request);
|
|
|
|
r;
|
|
|
|
r = https_parse_header(NULL, 0, &key, &value, &lastloc, &end_of_request))
|
|
|
|
{
|
|
|
|
// do something actually with the header here ;)
|
|
|
|
if (!strcasecmp(key, "RESPONSE"))
|
|
|
|
{
|
|
|
|
handle->http_status_code = atoi(value);
|
|
|
|
if (handle->http_status_code == 304)
|
|
|
|
{
|
|
|
|
/* 304 Not Modified: cache hit */
|
|
|
|
https_done_cached(handle);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
else if ((handle->http_status_code >= 301) && (handle->http_status_code <= 308))
|
|
|
|
{
|
|
|
|
/* Redirect */
|
|
|
|
if (handle->redirects_remaining == 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Too many HTTP redirects (%d)", DOWNLOAD_MAX_REDIRECTS);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Let it continue.. we handle it later, as we need to
|
|
|
|
* receive the "Location" header as well.
|
|
|
|
*/
|
|
|
|
}
|
|
|
|
else if (handle->http_status_code != 200)
|
|
|
|
{
|
|
|
|
/* HTTP Failure code */
|
|
|
|
https_cancel(handle, "HTTP Error: %s", value);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
if (!strcasecmp(key, "Last-Modified") && value)
|
|
|
|
{
|
|
|
|
handle->last_modified = rfc2616_time_to_unix_time(value);
|
|
|
|
} else
|
|
|
|
if (!strcasecmp(key, "Location") && value)
|
|
|
|
{
|
|
|
|
safe_strdup(handle->redirect_new_location, value);
|
|
|
|
} else
|
|
|
|
if (!strcasecmp(key, "Transfer-Encoding") && value)
|
|
|
|
{
|
|
|
|
if (value && !strcasecmp(value, "chunked"))
|
|
|
|
handle->transfer_encoding = TRANSFER_ENCODING_CHUNKED;
|
|
|
|
}
|
|
|
|
//fprintf(stderr, "\nHEADER '%s'\n\n", key);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (end_of_request)
|
|
|
|
{
|
|
|
|
int remaining_bytes = 0;
|
|
|
|
char *nextframe;
|
|
|
|
|
|
|
|
safe_free(handle->lefttoparse);
|
|
|
|
handle->got_response = 1;
|
|
|
|
|
|
|
|
if (handle->http_status_code == 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Invalid HTTP response");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (handle->http_status_code != 200)
|
|
|
|
{
|
|
|
|
if (handle->redirect_new_location)
|
|
|
|
{
|
|
|
|
https_redirect(handle);
|
|
|
|
return 0; /* this old request dies */
|
|
|
|
} else {
|
|
|
|
https_cancel(handle, "HTTP Redirect encountered but no URL specified!?");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nextframe = url_find_end_of_request(netbuf2, totalsize, &remaining_bytes);
|
|
|
|
if (nextframe)
|
|
|
|
{
|
|
|
|
if (!https_handle_response_file(handle, nextframe, remaining_bytes))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (lastloc)
|
|
|
|
{
|
|
|
|
/* Last line was cut somewhere, save it for next round. */
|
|
|
|
safe_strdup(handle->lefttoparse, lastloc);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int https_handle_response_file(Download *handle, char *readbuf, int pktsize)
|
|
|
|
{
|
|
|
|
char *buf;
|
|
|
|
long long n;
|
|
|
|
char *free_this_buffer = NULL;
|
|
|
|
|
|
|
|
// TODO we fail to check for write errors ;)
|
|
|
|
// TODO: Makes sense to track if we got everything? :D
|
|
|
|
|
|
|
|
if (handle->transfer_encoding == TRANSFER_ENCODING_NONE)
|
|
|
|
{
|
|
|
|
/* Ohh.. so easy! */
|
|
|
|
fwrite(readbuf, 1, pktsize, handle->file_fd);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fill 'buf' nd set 'buflen' with what we had + what we have now.
|
|
|
|
* Makes things easy.
|
|
|
|
*/
|
|
|
|
if (handle->lefttoparse)
|
|
|
|
{
|
|
|
|
n = handle->lefttoparselen + pktsize;
|
|
|
|
free_this_buffer = buf = safe_alloc(n);
|
|
|
|
memcpy(buf, handle->lefttoparse, handle->lefttoparselen);
|
|
|
|
memcpy(buf+handle->lefttoparselen, readbuf, pktsize);
|
|
|
|
safe_free(handle->lefttoparse);
|
|
|
|
handle->lefttoparselen = 0;
|
|
|
|
} else {
|
|
|
|
n = pktsize;
|
|
|
|
buf = readbuf;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Chunked transfers.. yayyyy.. */
|
|
|
|
while (n > 0)
|
|
|
|
{
|
|
|
|
if (handle->chunk_remaining > 0)
|
|
|
|
{
|
|
|
|
/* Eat it */
|
|
|
|
int eat = MIN(handle->chunk_remaining, n);
|
|
|
|
fwrite(buf, 1, eat, handle->file_fd);
|
|
|
|
n -= eat;
|
|
|
|
buf += eat;
|
|
|
|
handle->chunk_remaining -= eat;
|
|
|
|
} else
|
|
|
|
{
|
|
|
|
int gotlf = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* First check if it is a (trailing) empty line,
|
|
|
|
* eg from a previous chunk. Skip over.
|
|
|
|
*/
|
|
|
|
if ((n >= 2) && !strncmp(buf, "\r\n", 2))
|
|
|
|
{
|
|
|
|
buf += 2;
|
|
|
|
n -= 2;
|
|
|
|
} else
|
|
|
|
if ((n >= 1) && !strncmp(buf, "\n", 1))
|
|
|
|
{
|
|
|
|
buf++;
|
|
|
|
n--;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Now we are (possibly) at the chunk size line,
|
|
|
|
* this is or example '7f' + newline.
|
|
|
|
* So first, check if we have a newline at all.
|
|
|
|
*/
|
|
|
|
for (i=0; i < n; i++)
|
|
|
|
{
|
|
|
|
if (buf[i] == '\n')
|
|
|
|
{
|
|
|
|
gotlf = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!gotlf)
|
|
|
|
{
|
|
|
|
/* The line telling us the chunk size is incomplete,
|
|
|
|
* as it does not contain an \n. Wait for more data
|
|
|
|
* from the network socket.
|
|
|
|
*/
|
|
|
|
if (n > 0)
|
|
|
|
{
|
|
|
|
/* Store what we have first.. */
|
|
|
|
handle->lefttoparselen = n;
|
|
|
|
handle->lefttoparse = safe_alloc(n);
|
|
|
|
memcpy(handle->lefttoparse, buf, n);
|
|
|
|
}
|
|
|
|
safe_free(free_this_buffer);
|
|
|
|
return 1; /* WE WANT MORE! */
|
|
|
|
}
|
|
|
|
buf[i] = '\0'; /* cut at LF */
|
|
|
|
i++; /* point to next data */
|
|
|
|
handle->chunk_remaining = strtol(buf, NULL, 16);
|
|
|
|
if (handle->chunk_remaining < 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Negative chunk encountered (%ld)", handle->chunk_remaining);
|
|
|
|
safe_free(free_this_buffer);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (handle->chunk_remaining == 0)
|
|
|
|
{
|
|
|
|
https_done(handle);
|
|
|
|
safe_free(free_this_buffer);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
buf += i;
|
|
|
|
n -= i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
safe_free(free_this_buffer);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void https_done(Download *handle)
|
|
|
|
{
|
|
|
|
char *url = handle->redirect_original_url ? handle->redirect_original_url : handle->url;
|
|
|
|
|
|
|
|
fclose(handle->file_fd);
|
|
|
|
handle->file_fd = NULL;
|
|
|
|
|
2023-05-05 22:12:01 +00:00
|
|
|
if (!handle->callback)
|
|
|
|
; /* No special action, request was cancelled */
|
|
|
|
else if (!handle->got_response)
|
2022-01-15 05:16:34 +00:00
|
|
|
handle->callback(url, NULL, "HTTPS response not received", 0, handle->callback_data);
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (handle->last_modified > 0)
|
|
|
|
unreal_setfilemodtime(handle->filename, handle->last_modified);
|
|
|
|
handle->callback(url, handle->filename, NULL, 0, handle->callback_data);
|
|
|
|
}
|
|
|
|
url_free_handle(handle);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
void https_done_cached(Download *handle)
|
|
|
|
{
|
|
|
|
char *url = handle->redirect_original_url ? handle->redirect_original_url : handle->url;
|
|
|
|
|
|
|
|
fclose(handle->file_fd);
|
|
|
|
handle->file_fd = NULL;
|
2023-05-05 22:12:01 +00:00
|
|
|
if (handle->callback)
|
|
|
|
handle->callback(url, NULL, NULL, 1, handle->callback_data);
|
2022-01-15 05:16:34 +00:00
|
|
|
url_free_handle(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
void https_redirect(Download *handle)
|
|
|
|
{
|
|
|
|
if (handle->redirects_remaining == 0)
|
|
|
|
{
|
|
|
|
https_cancel(handle, "Too many HTTP redirects (%d)", DOWNLOAD_MAX_REDIRECTS);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
handle->redirects_remaining--;
|
|
|
|
|
2023-05-05 22:12:01 +00:00
|
|
|
if (handle->callback)
|
|
|
|
{
|
|
|
|
/* If still an outstanding request (not cancelled), follow the redirect.. */
|
|
|
|
download_file_async(handle->redirect_new_location, handle->cachetime, handle->callback, handle->callback_data,
|
|
|
|
handle->url, handle->redirects_remaining);
|
|
|
|
}
|
2022-01-15 05:16:34 +00:00
|
|
|
/* Don't call the hook, just free this, the new redirect from above will call the hook later */
|
|
|
|
url_free_handle(handle);
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Helper function to parse the HTTP header consisting of multiple 'Key: value' pairs */
|
|
|
|
int https_parse_header(char *buffer, int len, char **key, char **value, char **lastloc, int *end_of_request)
|
|
|
|
{
|
|
|
|
static char buf[4096], *nextptr;
|
|
|
|
char *p;
|
|
|
|
char *k = NULL, *v = NULL;
|
|
|
|
int foundlf = 0;
|
|
|
|
|
|
|
|
if (buffer)
|
|
|
|
{
|
|
|
|
/* Initialize */
|
|
|
|
if (len > sizeof(buf) - 1)
|
|
|
|
len = sizeof(buf) - 1;
|
|
|
|
|
|
|
|
memcpy(buf, buffer, len);
|
|
|
|
buf[len] = '\0';
|
|
|
|
nextptr = buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
*end_of_request = 0;
|
|
|
|
|
|
|
|
p = nextptr;
|
|
|
|
|
|
|
|
if (!p)
|
|
|
|
{
|
|
|
|
*key = *value = NULL;
|
|
|
|
return 0; /* done processing data */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!strncmp(p, "\n", 1) || !strncmp(p, "\r\n", 2))
|
|
|
|
{
|
|
|
|
*key = *value = NULL;
|
|
|
|
*end_of_request = 1;
|
|
|
|
// new compared to websocket handling:
|
|
|
|
if (*p == '\n')
|
|
|
|
*lastloc = p + 1;
|
|
|
|
else
|
|
|
|
*lastloc = p + 2;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Note: p *could* point to the NUL byte ('\0') */
|
|
|
|
|
|
|
|
/* Special handling for response line itself. */
|
|
|
|
if (!strncmp(p, "HTTP/1", 6) && (strlen(p)>=13))
|
|
|
|
{
|
|
|
|
k = "RESPONSE";
|
|
|
|
p += 9;
|
|
|
|
v = p; /* SET VALUE */
|
|
|
|
nextptr = NULL; /* set to "we are done" in case next for loop fails */
|
|
|
|
for (; *p; p++)
|
|
|
|
{
|
|
|
|
if (*p == '\r')
|
|
|
|
{
|
|
|
|
*p = '\0'; /* eat silently, but don't consider EOL */
|
|
|
|
}
|
|
|
|
else if (*p == '\n')
|
|
|
|
{
|
|
|
|
*p = '\0';
|
|
|
|
nextptr = p+1; /* safe, there is data or at least a \0 there */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*key = k;
|
|
|
|
*value = v;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Header parsing starts here.
|
|
|
|
* Example line "Host: www.unrealircd.org"
|
|
|
|
*/
|
|
|
|
k = p; /* SET KEY */
|
|
|
|
|
|
|
|
/* First check if the line contains a terminating \n. If not, don't process it
|
|
|
|
* as it may have been a cut header.
|
|
|
|
*/
|
|
|
|
for (; *p; p++)
|
|
|
|
{
|
|
|
|
if (*p == '\n')
|
|
|
|
{
|
|
|
|
foundlf = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!foundlf)
|
|
|
|
{
|
|
|
|
*key = *value = NULL;
|
|
|
|
*lastloc = k;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = k;
|
|
|
|
|
|
|
|
for (; *p; p++)
|
|
|
|
{
|
|
|
|
if ((*p == '\n') || (*p == '\r'))
|
|
|
|
{
|
|
|
|
/* Reached EOL but 'value' not found */
|
|
|
|
*p = '\0';
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (*p == ':')
|
|
|
|
{
|
|
|
|
*p++ = '\0';
|
|
|
|
if (*p++ != ' ')
|
|
|
|
break; /* missing mandatory space after ':' */
|
|
|
|
|
|
|
|
v = p; /* SET VALUE */
|
|
|
|
nextptr = NULL; /* set to "we are done" in case next for loop fails */
|
|
|
|
for (; *p; p++)
|
|
|
|
{
|
|
|
|
if (*p == '\r')
|
|
|
|
{
|
|
|
|
*p = '\0'; /* eat silently, but don't consider EOL */
|
|
|
|
}
|
|
|
|
else if (*p == '\n')
|
|
|
|
{
|
|
|
|
*p = '\0';
|
|
|
|
nextptr = p+1; /* safe, there is data or at least a \0 there */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* A key-value pair was succesfully parsed, return it */
|
|
|
|
*key = k;
|
|
|
|
*value = v;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Fatal parse error */
|
|
|
|
*key = *value = NULL;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/** Check if there is any data at the end of the request */
|
|
|
|
char *url_find_end_of_request(char *header, int totalsize, int *remaining_bytes)
|
|
|
|
{
|
|
|
|
char *nextframe1;
|
|
|
|
char *nextframe2;
|
|
|
|
char *nextframe = NULL;
|
|
|
|
|
|
|
|
// find first occurance, yeah this is just stupid, but it works.
|
|
|
|
nextframe1 = strstr(header, "\r\n\r\n"); // = +4
|
|
|
|
nextframe2 = strstr(header, "\n\n"); // = +2
|
|
|
|
if (nextframe1 && nextframe2)
|
|
|
|
{
|
|
|
|
if (nextframe1 < nextframe2)
|
|
|
|
{
|
|
|
|
nextframe = nextframe1 + 4;
|
|
|
|
} else {
|
|
|
|
nextframe = nextframe2 + 2;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
if (nextframe1)
|
|
|
|
{
|
|
|
|
nextframe = nextframe1 + 4;
|
|
|
|
} else
|
|
|
|
if (nextframe2)
|
|
|
|
{
|
|
|
|
nextframe = nextframe2 + 2;
|
|
|
|
}
|
|
|
|
if (nextframe)
|
|
|
|
{
|
|
|
|
*remaining_bytes = totalsize - (nextframe - header);
|
|
|
|
if (*remaining_bytes > 0)
|
|
|
|
return nextframe;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Handle timeouts. */
|
|
|
|
EVENT(url_socket_timeout)
|
|
|
|
{
|
|
|
|
Download *d, *d_next;
|
|
|
|
for (d = downloads; d; d = d_next)
|
|
|
|
{
|
|
|
|
d_next = d->next;
|
|
|
|
if (d->dns_refcnt)
|
|
|
|
continue; /* can't touch this... */
|
|
|
|
if (!d->connected && (TStime() - d->download_started > DOWNLOAD_CONNECT_TIMEOUT))
|
|
|
|
{
|
|
|
|
https_cancel(d, "Connect or DNS timeout after %ld seconds", (long)DOWNLOAD_CONNECT_TIMEOUT);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (d->connected && (TStime() - d->download_started > DOWNLOAD_TRANSFER_TIMEOUT))
|
|
|
|
{
|
|
|
|
https_cancel(d, "Download timeout after %ld seconds", (long)DOWNLOAD_TRANSFER_TIMEOUT);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void url_init(void)
|
|
|
|
{
|
|
|
|
https_ctx = https_new_ctx();
|
|
|
|
if (!https_ctx)
|
|
|
|
{
|
|
|
|
unreal_log(ULOG_ERROR, "url", "HTTPS_NEW_CTX_FAILED", NULL,
|
|
|
|
"Unable to initialize SSL context");
|
|
|
|
exit(-1);
|
|
|
|
}
|
|
|
|
EventAdd(NULL, "url_socket_timeout", url_socket_timeout, NULL, 500, 0);
|
|
|
|
}
|