/src/openssl30/crypto/http/http_lib.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 2001-2023 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | #include <stdio.h>       /* for sscanf() */ | 
| 11 |  | #include <string.h> | 
| 12 |  | #include <openssl/http.h> | 
| 13 |  | #include <openssl/httperr.h> | 
| 14 |  | #include <openssl/bio.h> /* for BIO_snprintf() */ | 
| 15 |  | #include <openssl/err.h> | 
| 16 |  | #include "internal/cryptlib.h" /* for ossl_assert() */ | 
| 17 |  |  | 
| 18 |  | static void init_pstring(char **pstr) | 
| 19 | 0 | { | 
| 20 | 0 |     if (pstr != NULL) { | 
| 21 | 0 |         *pstr = NULL; | 
| 22 | 0 |     } | 
| 23 | 0 | } | 
| 24 |  |  | 
| 25 |  | static void init_pint(int *pint) | 
| 26 | 0 | { | 
| 27 | 0 |     if (pint != NULL) { | 
| 28 | 0 |         *pint = 0; | 
| 29 | 0 |     } | 
| 30 | 0 | } | 
| 31 |  |  | 
| 32 |  | static int copy_substring(char **dest, const char *start, const char *end) | 
| 33 | 0 | { | 
| 34 | 0 |     return dest == NULL | 
| 35 | 0 |         || (*dest = OPENSSL_strndup(start, end - start)) != NULL; | 
| 36 | 0 | } | 
| 37 |  |  | 
| 38 |  | static void free_pstring(char **pstr) | 
| 39 | 0 | { | 
| 40 | 0 |     if (pstr != NULL) { | 
| 41 | 0 |         OPENSSL_free(*pstr); | 
| 42 | 0 |         *pstr = NULL; | 
| 43 | 0 |     } | 
| 44 | 0 | } | 
| 45 |  |  | 
| 46 |  | int OSSL_parse_url(const char *url, char **pscheme, char **puser, char **phost, | 
| 47 |  |                    char **pport, int *pport_num, | 
| 48 |  |                    char **ppath, char **pquery, char **pfrag) | 
| 49 | 0 | { | 
| 50 | 0 |     const char *p, *tmp; | 
| 51 | 0 |     const char *scheme, *scheme_end; | 
| 52 | 0 |     const char *user, *user_end; | 
| 53 | 0 |     const char *host, *host_end; | 
| 54 | 0 |     const char *port, *port_end; | 
| 55 | 0 |     unsigned int portnum; | 
| 56 | 0 |     const char *path, *path_end; | 
| 57 | 0 |     const char *query, *query_end; | 
| 58 | 0 |     const char *frag, *frag_end; | 
| 59 |  | 
 | 
| 60 | 0 |     init_pstring(pscheme); | 
| 61 | 0 |     init_pstring(puser); | 
| 62 | 0 |     init_pstring(phost); | 
| 63 | 0 |     init_pstring(pport); | 
| 64 | 0 |     init_pint(pport_num); | 
| 65 | 0 |     init_pstring(ppath); | 
| 66 | 0 |     init_pstring(pfrag); | 
| 67 | 0 |     init_pstring(pquery); | 
| 68 |  | 
 | 
| 69 | 0 |     if (url == NULL) { | 
| 70 | 0 |         ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); | 
| 71 | 0 |         return 0; | 
| 72 | 0 |     } | 
| 73 |  |  | 
| 74 |  |     /* check for optional prefix "<scheme>://" */ | 
| 75 | 0 |     scheme = scheme_end = url; | 
| 76 | 0 |     p = strstr(url, "://"); | 
| 77 | 0 |     if (p == NULL) { | 
| 78 | 0 |         p = url; | 
| 79 | 0 |     } else { | 
| 80 | 0 |         scheme_end = p; | 
| 81 | 0 |         if (scheme_end == scheme) | 
| 82 | 0 |             goto parse_err; | 
| 83 | 0 |         p += strlen("://"); | 
| 84 | 0 |     } | 
| 85 |  |  | 
| 86 |  |     /* parse optional "userinfo@" */ | 
| 87 | 0 |     user = user_end = host = p; | 
| 88 | 0 |     host = strchr(p, '@'); | 
| 89 | 0 |     if (host != NULL) | 
| 90 | 0 |         user_end = host++; | 
| 91 | 0 |     else | 
| 92 | 0 |         host = p; | 
| 93 |  |  | 
| 94 |  |     /* parse host name/address as far as needed here */ | 
| 95 | 0 |     if (host[0] == '[') { | 
| 96 |  |         /* ipv6 literal, which may include ':' */ | 
| 97 | 0 |         host_end = strchr(host + 1, ']'); | 
| 98 | 0 |         if (host_end == NULL) | 
| 99 | 0 |             goto parse_err; | 
| 100 | 0 |         p = ++host_end; | 
| 101 | 0 |     } else { | 
| 102 |  |         /* look for start of optional port, path, query, or fragment */ | 
| 103 | 0 |         host_end = strchr(host, ':'); | 
| 104 | 0 |         if (host_end == NULL) | 
| 105 | 0 |             host_end = strchr(host, '/'); | 
| 106 | 0 |         if (host_end == NULL) | 
| 107 | 0 |             host_end = strchr(host, '?'); | 
| 108 | 0 |         if (host_end == NULL) | 
| 109 | 0 |             host_end = strchr(host, '#'); | 
| 110 | 0 |         if (host_end == NULL) /* the remaining string is just the hostname */ | 
| 111 | 0 |             host_end = host + strlen(host); | 
| 112 | 0 |         p = host_end; | 
| 113 | 0 |     } | 
| 114 |  |  | 
| 115 |  |     /* parse optional port specification starting with ':' */ | 
| 116 | 0 |     port = "0"; /* default */ | 
| 117 | 0 |     if (*p == ':') | 
| 118 | 0 |         port = ++p; | 
| 119 |  |     /* remaining port spec handling is also done for the default values */ | 
| 120 |  |     /* make sure a decimal port number is given */ | 
| 121 | 0 |     if (!sscanf(port, "%u", &portnum) || portnum > 65535) { | 
| 122 | 0 |         ERR_raise_data(ERR_LIB_HTTP, HTTP_R_INVALID_PORT_NUMBER, "%s", port); | 
| 123 | 0 |         goto err; | 
| 124 | 0 |     } | 
| 125 | 0 |     for (port_end = port; '0' <= *port_end && *port_end <= '9'; port_end++) | 
| 126 | 0 |         ; | 
| 127 | 0 |     if (port == p) /* port was given explicitly */ | 
| 128 | 0 |         p += port_end - port; | 
| 129 |  |  | 
| 130 |  |     /* check for optional path starting with '/' or '?'. Else must start '#' */ | 
| 131 | 0 |     path = p; | 
| 132 | 0 |     if (*path != '\0' && *path != '/' && *path != '?' && *path != '#') { | 
| 133 | 0 |         ERR_raise(ERR_LIB_HTTP, HTTP_R_INVALID_URL_PATH); | 
| 134 | 0 |         goto parse_err; | 
| 135 | 0 |     } | 
| 136 | 0 |     path_end = query = query_end = frag = frag_end = path + strlen(path); | 
| 137 |  |  | 
| 138 |  |     /* parse optional "?query" */ | 
| 139 | 0 |     tmp = strchr(p, '?'); | 
| 140 | 0 |     if (tmp != NULL) { | 
| 141 | 0 |         p = tmp; | 
| 142 | 0 |         if (pquery != NULL) { | 
| 143 | 0 |             path_end = p; | 
| 144 | 0 |             query = p + 1; | 
| 145 | 0 |         } | 
| 146 | 0 |     } | 
| 147 |  |  | 
| 148 |  |     /* parse optional "#fragment" */ | 
| 149 | 0 |     tmp = strchr(p, '#'); | 
| 150 | 0 |     if (tmp != NULL) { | 
| 151 | 0 |         if (query == path_end) /* we did not record a query component */ | 
| 152 | 0 |             path_end = tmp; | 
| 153 | 0 |         query_end = tmp; | 
| 154 | 0 |         frag = tmp + 1; | 
| 155 | 0 |     } | 
| 156 |  | 
 | 
| 157 | 0 |     if (!copy_substring(pscheme, scheme, scheme_end) | 
| 158 | 0 |             || !copy_substring(phost, host, host_end) | 
| 159 | 0 |             || !copy_substring(pport, port, port_end) | 
| 160 | 0 |             || !copy_substring(puser, user, user_end) | 
| 161 | 0 |             || !copy_substring(pquery, query, query_end) | 
| 162 | 0 |             || !copy_substring(pfrag, frag, frag_end)) | 
| 163 | 0 |         goto err; | 
| 164 | 0 |     if (pport_num != NULL) | 
| 165 | 0 |         *pport_num = (int)portnum; | 
| 166 | 0 |     if (*path == '/') { | 
| 167 | 0 |         if (!copy_substring(ppath, path, path_end)) | 
| 168 | 0 |             goto err; | 
| 169 | 0 |     } else if (ppath != NULL) { /* must prepend '/' */ | 
| 170 | 0 |         size_t buflen = 1 + path_end - path + 1; | 
| 171 |  | 
 | 
| 172 | 0 |         if ((*ppath = OPENSSL_malloc(buflen)) == NULL) | 
| 173 | 0 |             goto err; | 
| 174 | 0 |         BIO_snprintf(*ppath, buflen, "/%s", path); | 
| 175 | 0 |     } | 
| 176 | 0 |     return 1; | 
| 177 |  |  | 
| 178 | 0 |  parse_err: | 
| 179 | 0 |     ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_PARSING_URL); | 
| 180 |  | 
 | 
| 181 | 0 |  err: | 
| 182 | 0 |     free_pstring(pscheme); | 
| 183 | 0 |     free_pstring(puser); | 
| 184 | 0 |     free_pstring(phost); | 
| 185 | 0 |     free_pstring(pport); | 
| 186 | 0 |     free_pstring(ppath); | 
| 187 | 0 |     free_pstring(pquery); | 
| 188 | 0 |     free_pstring(pfrag); | 
| 189 | 0 |     return 0; | 
| 190 | 0 | } | 
| 191 |  |  | 
| 192 |  | int OSSL_HTTP_parse_url(const char *url, int *pssl, char **puser, char **phost, | 
| 193 |  |                         char **pport, int *pport_num, | 
| 194 |  |                         char **ppath, char **pquery, char **pfrag) | 
| 195 | 0 | { | 
| 196 | 0 |     char *scheme, *port; | 
| 197 | 0 |     int ssl = 0, portnum; | 
| 198 |  | 
 | 
| 199 | 0 |     init_pstring(pport); | 
| 200 | 0 |     if (pssl != NULL) | 
| 201 | 0 |         *pssl = 0; | 
| 202 | 0 |     if (!OSSL_parse_url(url, &scheme, puser, phost, &port, pport_num, | 
| 203 | 0 |                         ppath, pquery, pfrag)) | 
| 204 | 0 |         return 0; | 
| 205 |  |  | 
| 206 |  |     /* check for optional HTTP scheme "http[s]" */ | 
| 207 | 0 |     if (strcmp(scheme, OSSL_HTTPS_NAME) == 0) { | 
| 208 | 0 |         ssl = 1; | 
| 209 | 0 |         if (pssl != NULL) | 
| 210 | 0 |             *pssl = ssl; | 
| 211 | 0 |     } else if (*scheme != '\0' && strcmp(scheme, OSSL_HTTP_NAME) != 0) { | 
| 212 | 0 |         ERR_raise(ERR_LIB_HTTP, HTTP_R_INVALID_URL_SCHEME); | 
| 213 | 0 |         OPENSSL_free(scheme); | 
| 214 | 0 |         OPENSSL_free(port); | 
| 215 | 0 |         goto err; | 
| 216 | 0 |     } | 
| 217 | 0 |     OPENSSL_free(scheme); | 
| 218 |  | 
 | 
| 219 | 0 |     if (strcmp(port, "0") == 0) { | 
| 220 |  |         /* set default port */ | 
| 221 | 0 |         OPENSSL_free(port); | 
| 222 | 0 |         port = ssl ? OSSL_HTTPS_PORT : OSSL_HTTP_PORT; | 
| 223 | 0 |         if (!ossl_assert(sscanf(port, "%d", &portnum) == 1)) | 
| 224 | 0 |             goto err; | 
| 225 | 0 |         if (pport_num != NULL) | 
| 226 | 0 |             *pport_num = portnum; | 
| 227 | 0 |         if (pport != NULL) { | 
| 228 | 0 |             *pport = OPENSSL_strdup(port); | 
| 229 | 0 |             if (*pport == NULL) | 
| 230 | 0 |                 goto err; | 
| 231 | 0 |         } | 
| 232 | 0 |     } else { | 
| 233 | 0 |         if (pport != NULL) | 
| 234 | 0 |             *pport = port; | 
| 235 | 0 |         else | 
| 236 | 0 |             OPENSSL_free(port); | 
| 237 | 0 |     } | 
| 238 | 0 |     return 1; | 
| 239 |  |  | 
| 240 | 0 |  err: | 
| 241 | 0 |     free_pstring(puser); | 
| 242 | 0 |     free_pstring(phost); | 
| 243 | 0 |     free_pstring(ppath); | 
| 244 | 0 |     free_pstring(pquery); | 
| 245 | 0 |     free_pstring(pfrag); | 
| 246 | 0 |     return 0; | 
| 247 | 0 | } | 
| 248 |  |  | 
| 249 |  | /* Respect no_proxy, taking default value from environment variable(s) */ | 
| 250 |  | static int use_proxy(const char *no_proxy, const char *server) | 
| 251 | 0 | { | 
| 252 | 0 |     size_t sl; | 
| 253 | 0 |     const char *found = NULL; | 
| 254 |  | 
 | 
| 255 | 0 |     if (!ossl_assert(server != NULL)) | 
| 256 | 0 |         return 0; | 
| 257 | 0 |     sl = strlen(server); | 
| 258 |  |  | 
| 259 |  |     /* | 
| 260 |  |      * using environment variable names, both lowercase and uppercase variants, | 
| 261 |  |      * compatible with other HTTP client implementations like wget, curl and git | 
| 262 |  |      */ | 
| 263 | 0 |     if (no_proxy == NULL) | 
| 264 | 0 |         no_proxy = ossl_safe_getenv("no_proxy"); | 
| 265 | 0 |     if (no_proxy == NULL) | 
| 266 | 0 |         no_proxy = ossl_safe_getenv(OPENSSL_NO_PROXY); | 
| 267 |  | 
 | 
| 268 | 0 |     if (no_proxy != NULL) | 
| 269 | 0 |         found = strstr(no_proxy, server); | 
| 270 | 0 |     while (found != NULL | 
| 271 | 0 |            && ((found != no_proxy && found[-1] != ' ' && found[-1] != ',') | 
| 272 | 0 |                || (found[sl] != '\0' && found[sl] != ' ' && found[sl] != ','))) | 
| 273 | 0 |         found = strstr(found + 1, server); | 
| 274 | 0 |     return found == NULL; | 
| 275 | 0 | } | 
| 276 |  |  | 
| 277 |  | /* Take default value from environment variable(s), respect no_proxy */ | 
| 278 |  | const char *OSSL_HTTP_adapt_proxy(const char *proxy, const char *no_proxy, | 
| 279 |  |                                   const char *server, int use_ssl) | 
| 280 | 0 | { | 
| 281 |  |     /* | 
| 282 |  |      * using environment variable names, both lowercase and uppercase variants, | 
| 283 |  |      * compatible with other HTTP client implementations like wget, curl and git | 
| 284 |  |      */ | 
| 285 | 0 |     if (proxy == NULL) | 
| 286 | 0 |         proxy = ossl_safe_getenv(use_ssl ? "https_proxy" : "http_proxy"); | 
| 287 | 0 |     if (proxy == NULL) | 
| 288 | 0 |         proxy = ossl_safe_getenv(use_ssl ? OPENSSL_HTTP_PROXY : OPENSSL_HTTPS_PROXY); | 
| 289 |  | 
 | 
| 290 | 0 |     if (proxy == NULL || *proxy == '\0' || !use_proxy(no_proxy, server)) | 
| 291 | 0 |         return NULL; | 
| 292 | 0 |     return proxy; | 
| 293 | 0 | } |