243 lines
7.4 KiB
C
Raw Normal View History

2015-04-27 22:25:09 +02:00
/***************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
2023-07-02 19:51:09 +02:00
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
2015-04-27 22:25:09 +02:00
*
* This software is licensed as described in the file COPYING, which
* you should have received as part of this distribution. The terms
2021-09-14 00:13:48 +02:00
* are also available at https://curl.se/docs/copyright.html.
2015-04-27 22:25:09 +02:00
*
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
* copies of the Software, and permit persons to whom the Software is
* furnished to do so, under the terms of the COPYING file.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
2022-11-16 20:14:03 +01:00
* SPDX-License-Identifier: curl
*
2015-04-27 22:25:09 +02:00
***************************************************************************/
#include "curl_setup.h"
#ifndef CURL_DISABLE_GOPHER
#include "urldata.h"
#include <curl/curl.h>
#include "transfer.h"
#include "sendf.h"
2023-05-23 16:38:00 +02:00
#include "cfilters.h"
2020-08-30 11:54:41 +02:00
#include "connect.h"
2015-04-27 22:25:09 +02:00
#include "progress.h"
#include "gopher.h"
#include "select.h"
2019-11-11 23:01:05 +01:00
#include "strdup.h"
2021-09-14 00:13:48 +02:00
#include "vtls/vtls.h"
2015-04-27 22:25:09 +02:00
#include "url.h"
2017-04-14 19:02:05 +02:00
#include "escape.h"
2015-04-27 22:25:09 +02:00
#include "warnless.h"
2019-11-11 23:01:05 +01:00
#include "curl_printf.h"
2015-04-27 22:25:09 +02:00
#include "curl_memory.h"
/* The last #include file should be: */
#include "memdebug.h"
/*
* Forward declarations.
*/
2021-09-14 00:13:48 +02:00
static CURLcode gopher_do(struct Curl_easy *data, bool *done);
#ifdef USE_SSL
static CURLcode gopher_connect(struct Curl_easy *data, bool *done);
static CURLcode gopher_connecting(struct Curl_easy *data, bool *done);
#endif
2015-04-27 22:25:09 +02:00
/*
* Gopher protocol handler.
* This is also a nice simple template to build off for simple
* connect-command-download protocols.
*/
const struct Curl_handler Curl_handler_gopher = {
"GOPHER", /* scheme */
ZERO_NULL, /* setup_connection */
gopher_do, /* do_it */
ZERO_NULL, /* done */
ZERO_NULL, /* do_more */
ZERO_NULL, /* connect_it */
ZERO_NULL, /* connecting */
ZERO_NULL, /* doing */
ZERO_NULL, /* proto_getsock */
ZERO_NULL, /* doing_getsock */
ZERO_NULL, /* domore_getsock */
ZERO_NULL, /* perform_getsock */
ZERO_NULL, /* disconnect */
ZERO_NULL, /* readwrite */
2018-01-26 17:06:56 +01:00
ZERO_NULL, /* connection_check */
2021-09-14 00:13:48 +02:00
ZERO_NULL, /* attach connection */
2015-04-27 22:25:09 +02:00
PORT_GOPHER, /* defport */
CURLPROTO_GOPHER, /* protocol */
2021-09-14 00:13:48 +02:00
CURLPROTO_GOPHER, /* family */
2015-04-27 22:25:09 +02:00
PROTOPT_NONE /* flags */
};
2021-09-14 00:13:48 +02:00
#ifdef USE_SSL
const struct Curl_handler Curl_handler_gophers = {
"GOPHERS", /* scheme */
ZERO_NULL, /* setup_connection */
gopher_do, /* do_it */
ZERO_NULL, /* done */
ZERO_NULL, /* do_more */
gopher_connect, /* connect_it */
gopher_connecting, /* connecting */
ZERO_NULL, /* doing */
ZERO_NULL, /* proto_getsock */
ZERO_NULL, /* doing_getsock */
ZERO_NULL, /* domore_getsock */
ZERO_NULL, /* perform_getsock */
ZERO_NULL, /* disconnect */
ZERO_NULL, /* readwrite */
ZERO_NULL, /* connection_check */
ZERO_NULL, /* attach connection */
PORT_GOPHER, /* defport */
CURLPROTO_GOPHERS, /* protocol */
CURLPROTO_GOPHER, /* family */
PROTOPT_SSL /* flags */
};
static CURLcode gopher_connect(struct Curl_easy *data, bool *done)
{
(void)data;
(void)done;
return CURLE_OK;
}
static CURLcode gopher_connecting(struct Curl_easy *data, bool *done)
{
struct connectdata *conn = data->conn;
2023-05-23 16:38:00 +02:00
CURLcode result;
result = Curl_conn_connect(data, FIRSTSOCKET, TRUE, done);
2021-09-14 00:13:48 +02:00
if(result)
connclose(conn, "Failed TLS connection");
*done = TRUE;
return result;
}
#endif
static CURLcode gopher_do(struct Curl_easy *data, bool *done)
2015-04-27 22:25:09 +02:00
{
2018-01-26 17:06:56 +01:00
CURLcode result = CURLE_OK;
2021-09-14 00:13:48 +02:00
struct connectdata *conn = data->conn;
2015-04-27 22:25:09 +02:00
curl_socket_t sockfd = conn->sock[FIRSTSOCKET];
2019-11-11 23:01:05 +01:00
char *gopherpath;
2018-11-29 20:27:00 +01:00
char *path = data->state.up.path;
2019-11-11 23:01:05 +01:00
char *query = data->state.up.query;
2017-07-20 19:35:53 +02:00
char *sel = NULL;
2015-04-27 22:25:09 +02:00
char *sel_org = NULL;
2020-08-30 11:54:41 +02:00
timediff_t timeout_ms;
2015-04-27 22:25:09 +02:00
ssize_t amount, k;
2017-04-14 19:02:05 +02:00
size_t len;
2020-08-30 11:54:41 +02:00
int what;
2015-04-27 22:25:09 +02:00
*done = TRUE; /* unconditionally */
2019-11-11 23:01:05 +01:00
/* path is guaranteed non-NULL */
DEBUGASSERT(path);
if(query)
gopherpath = aprintf("%s?%s", path, query);
else
gopherpath = strdup(path);
if(!gopherpath)
return CURLE_OUT_OF_MEMORY;
2015-04-27 22:25:09 +02:00
/* Create selector. Degenerate cases: / and /1 => convert to "" */
2019-11-11 23:01:05 +01:00
if(strlen(gopherpath) <= 2) {
2015-04-27 22:25:09 +02:00
sel = (char *)"";
2018-10-28 12:09:07 +01:00
len = strlen(sel);
2019-11-11 23:01:05 +01:00
free(gopherpath);
2016-09-11 17:22:32 +02:00
}
2015-04-27 22:25:09 +02:00
else {
char *newp;
/* Otherwise, drop / and the first character (i.e., item type) ... */
2019-11-11 23:01:05 +01:00
newp = gopherpath;
2018-01-26 17:06:56 +01:00
newp += 2;
2015-04-27 22:25:09 +02:00
/* ... and finally unescape */
2022-08-04 22:12:04 +02:00
result = Curl_urldecode(newp, 0, &sel, &len, REJECT_ZERO);
2019-11-11 23:01:05 +01:00
free(gopherpath);
2017-07-20 19:35:53 +02:00
if(result)
return result;
2015-04-27 22:25:09 +02:00
sel_org = sel;
}
2016-09-11 17:22:32 +02:00
k = curlx_uztosz(len);
2015-04-27 22:25:09 +02:00
for(;;) {
2021-09-14 00:13:48 +02:00
/* Break out of the loop if the selector is empty because OpenSSL and/or
LibreSSL fail with errno 0 if this is the case. */
if(strlen(sel) < 1)
break;
result = Curl_write(data, sockfd, sel, k, &amount);
2015-11-17 17:22:37 +01:00
if(!result) { /* Which may not have written it all! */
2021-09-14 00:13:48 +02:00
result = Curl_client_write(data, CLIENTWRITE_HEADER, sel, amount);
2017-04-14 19:02:05 +02:00
if(result)
break;
2015-04-27 22:25:09 +02:00
k -= amount;
sel += amount;
if(k < 1)
break; /* but it did write it all */
}
2017-04-14 19:02:05 +02:00
else
break;
2021-09-14 00:13:48 +02:00
timeout_ms = Curl_timeleft(data, NULL, FALSE);
2020-08-30 11:54:41 +02:00
if(timeout_ms < 0) {
result = CURLE_OPERATION_TIMEDOUT;
break;
}
if(!timeout_ms)
timeout_ms = TIMEDIFF_T_MAX;
2015-04-27 22:25:09 +02:00
/* Don't busyloop. The entire loop thing is a work-around as it causes a
BLOCKING behavior which is a NO-NO. This function should rather be
split up in a do and a doing piece where the pieces that aren't
possible to send now will be sent in the doing function repeatedly
until the entire request is sent.
*/
2020-08-30 11:54:41 +02:00
what = SOCKET_WRITABLE(sockfd, timeout_ms);
if(what < 0) {
2017-04-14 19:02:05 +02:00
result = CURLE_SEND_ERROR;
break;
}
2020-08-30 11:54:41 +02:00
else if(!what) {
result = CURLE_OPERATION_TIMEDOUT;
break;
}
2015-04-27 22:25:09 +02:00
}
2015-11-17 17:22:37 +01:00
free(sel_org);
2015-04-27 22:25:09 +02:00
2017-04-14 19:02:05 +02:00
if(!result)
2021-09-14 00:13:48 +02:00
result = Curl_write(data, sockfd, "\r\n", 2, &amount);
2015-11-17 17:22:37 +01:00
if(result) {
2015-04-27 22:25:09 +02:00
failf(data, "Failed sending Gopher request");
return result;
}
2021-09-14 00:13:48 +02:00
result = Curl_client_write(data, CLIENTWRITE_HEADER, (char *)"\r\n", 2);
2015-04-27 22:25:09 +02:00
if(result)
return result;
2019-11-11 23:01:05 +01:00
Curl_setup_transfer(data, FIRSTSOCKET, -1, FALSE, -1);
2015-04-27 22:25:09 +02:00
return CURLE_OK;
}
2023-05-23 16:38:00 +02:00
#endif /* CURL_DISABLE_GOPHER */