/src/openssl30/crypto/http/http_lib.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2001-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <stdio.h> /* for sscanf() */ |
11 | | #include <string.h> |
12 | | #ifndef OPENSSL_NO_SOCK |
13 | | # include "../bio/bio_local.h" /* for NI_MAXHOST */ |
14 | | #endif |
15 | | #include <openssl/http.h> |
16 | | #include <openssl/httperr.h> |
17 | | #include <openssl/bio.h> /* for BIO_snprintf() */ |
18 | | #include <openssl/err.h> |
19 | | #include "internal/cryptlib.h" /* for ossl_assert() */ |
20 | | #ifndef NI_MAXHOST |
21 | | # define NI_MAXHOST 255 |
22 | | #endif |
23 | | #include "crypto/ctype.h" /* for ossl_isspace() */ |
24 | | |
25 | | static void init_pstring(char **pstr) |
26 | 0 | { |
27 | 0 | if (pstr != NULL) { |
28 | 0 | *pstr = NULL; |
29 | 0 | } |
30 | 0 | } |
31 | | |
32 | | static void init_pint(int *pint) |
33 | 0 | { |
34 | 0 | if (pint != NULL) { |
35 | 0 | *pint = 0; |
36 | 0 | } |
37 | 0 | } |
38 | | |
39 | | static int copy_substring(char **dest, const char *start, const char *end) |
40 | 0 | { |
41 | 0 | return dest == NULL |
42 | 0 | || (*dest = OPENSSL_strndup(start, end - start)) != NULL; |
43 | 0 | } |
44 | | |
45 | | static void free_pstring(char **pstr) |
46 | 0 | { |
47 | 0 | if (pstr != NULL) { |
48 | 0 | OPENSSL_free(*pstr); |
49 | 0 | *pstr = NULL; |
50 | 0 | } |
51 | 0 | } |
52 | | |
53 | | int OSSL_parse_url(const char *url, char **pscheme, char **puser, char **phost, |
54 | | char **pport, int *pport_num, |
55 | | char **ppath, char **pquery, char **pfrag) |
56 | 0 | { |
57 | 0 | const char *p, *tmp; |
58 | 0 | const char *scheme, *scheme_end; |
59 | 0 | const char *user, *user_end; |
60 | 0 | const char *host, *host_end; |
61 | 0 | const char *port, *port_end; |
62 | 0 | unsigned int portnum; |
63 | 0 | const char *path, *path_end; |
64 | 0 | const char *query, *query_end; |
65 | 0 | const char *frag, *frag_end; |
66 | |
|
67 | 0 | init_pstring(pscheme); |
68 | 0 | init_pstring(puser); |
69 | 0 | init_pstring(phost); |
70 | 0 | init_pstring(pport); |
71 | 0 | init_pint(pport_num); |
72 | 0 | init_pstring(ppath); |
73 | 0 | init_pstring(pfrag); |
74 | 0 | init_pstring(pquery); |
75 | |
|
76 | 0 | if (url == NULL) { |
77 | 0 | ERR_raise(ERR_LIB_HTTP, ERR_R_PASSED_NULL_PARAMETER); |
78 | 0 | return 0; |
79 | 0 | } |
80 | | |
81 | | /* check for optional prefix "<scheme>://" */ |
82 | 0 | scheme = scheme_end = url; |
83 | 0 | p = strstr(url, "://"); |
84 | 0 | if (p == NULL) { |
85 | 0 | p = url; |
86 | 0 | } else { |
87 | 0 | scheme_end = p; |
88 | 0 | if (scheme_end == scheme) |
89 | 0 | goto parse_err; |
90 | 0 | p += strlen("://"); |
91 | 0 | } |
92 | | |
93 | | /* parse optional "userinfo@" */ |
94 | 0 | user = user_end = host = p; |
95 | 0 | host = strchr(p, '@'); |
96 | 0 | if (host != NULL) |
97 | 0 | user_end = host++; |
98 | 0 | else |
99 | 0 | host = p; |
100 | | |
101 | | /* parse host name/address as far as needed here */ |
102 | 0 | if (host[0] == '[') { |
103 | | /* ipv6 literal, which may include ':' */ |
104 | 0 | host_end = strchr(host + 1, ']'); |
105 | 0 | if (host_end == NULL) |
106 | 0 | goto parse_err; |
107 | 0 | p = ++host_end; |
108 | 0 | } else { |
109 | | /* look for start of optional port, path, query, or fragment */ |
110 | 0 | host_end = strchr(host, ':'); |
111 | 0 | if (host_end == NULL) |
112 | 0 | host_end = strchr(host, '/'); |
113 | 0 | if (host_end == NULL) |
114 | 0 | host_end = strchr(host, '?'); |
115 | 0 | if (host_end == NULL) |
116 | 0 | host_end = strchr(host, '#'); |
117 | 0 | if (host_end == NULL) /* the remaining string is just the hostname */ |
118 | 0 | host_end = host + strlen(host); |
119 | 0 | p = host_end; |
120 | 0 | } |
121 | | |
122 | | /* parse optional port specification starting with ':' */ |
123 | 0 | port = "0"; /* default */ |
124 | 0 | if (*p == ':') |
125 | 0 | port = ++p; |
126 | | /* remaining port spec handling is also done for the default values */ |
127 | | /* make sure a decimal port number is given */ |
128 | 0 | if (sscanf(port, "%u", &portnum) <= 0 || portnum > 65535) { |
129 | 0 | ERR_raise_data(ERR_LIB_HTTP, HTTP_R_INVALID_PORT_NUMBER, "%s", port); |
130 | 0 | goto err; |
131 | 0 | } |
132 | 0 | for (port_end = port; '0' <= *port_end && *port_end <= '9'; port_end++) |
133 | 0 | ; |
134 | 0 | if (port == p) /* port was given explicitly */ |
135 | 0 | p += port_end - port; |
136 | | |
137 | | /* check for optional path starting with '/' or '?'. Else must start '#' */ |
138 | 0 | path = p; |
139 | 0 | if (*path != '\0' && *path != '/' && *path != '?' && *path != '#') { |
140 | 0 | ERR_raise(ERR_LIB_HTTP, HTTP_R_INVALID_URL_PATH); |
141 | 0 | goto parse_err; |
142 | 0 | } |
143 | 0 | path_end = query = query_end = frag = frag_end = path + strlen(path); |
144 | | |
145 | | /* parse optional "?query" */ |
146 | 0 | tmp = strchr(p, '?'); |
147 | 0 | if (tmp != NULL) { |
148 | 0 | p = tmp; |
149 | 0 | if (pquery != NULL) { |
150 | 0 | path_end = p; |
151 | 0 | query = p + 1; |
152 | 0 | } |
153 | 0 | } |
154 | | |
155 | | /* parse optional "#fragment" */ |
156 | 0 | tmp = strchr(p, '#'); |
157 | 0 | if (tmp != NULL) { |
158 | 0 | if (query == path_end) /* we did not record a query component */ |
159 | 0 | path_end = tmp; |
160 | 0 | query_end = tmp; |
161 | 0 | frag = tmp + 1; |
162 | 0 | } |
163 | |
|
164 | 0 | if (!copy_substring(pscheme, scheme, scheme_end) |
165 | 0 | || !copy_substring(phost, host, host_end) |
166 | 0 | || !copy_substring(pport, port, port_end) |
167 | 0 | || !copy_substring(puser, user, user_end) |
168 | 0 | || !copy_substring(pquery, query, query_end) |
169 | 0 | || !copy_substring(pfrag, frag, frag_end)) |
170 | 0 | goto err; |
171 | 0 | if (pport_num != NULL) |
172 | 0 | *pport_num = (int)portnum; |
173 | 0 | if (*path == '/') { |
174 | 0 | if (!copy_substring(ppath, path, path_end)) |
175 | 0 | goto err; |
176 | 0 | } else if (ppath != NULL) { /* must prepend '/' */ |
177 | 0 | size_t buflen = 1 + path_end - path + 1; |
178 | |
|
179 | 0 | if ((*ppath = OPENSSL_malloc(buflen)) == NULL) |
180 | 0 | goto err; |
181 | 0 | BIO_snprintf(*ppath, buflen, "/%s", path); |
182 | 0 | } |
183 | 0 | return 1; |
184 | | |
185 | 0 | parse_err: |
186 | 0 | ERR_raise(ERR_LIB_HTTP, HTTP_R_ERROR_PARSING_URL); |
187 | |
|
188 | 0 | err: |
189 | 0 | free_pstring(pscheme); |
190 | 0 | free_pstring(puser); |
191 | 0 | free_pstring(phost); |
192 | 0 | free_pstring(pport); |
193 | 0 | free_pstring(ppath); |
194 | 0 | free_pstring(pquery); |
195 | 0 | free_pstring(pfrag); |
196 | 0 | return 0; |
197 | 0 | } |
198 | | |
199 | | int OSSL_HTTP_parse_url(const char *url, int *pssl, char **puser, char **phost, |
200 | | char **pport, int *pport_num, |
201 | | char **ppath, char **pquery, char **pfrag) |
202 | 0 | { |
203 | 0 | char *scheme, *port; |
204 | 0 | int ssl = 0, portnum; |
205 | |
|
206 | 0 | init_pstring(pport); |
207 | 0 | if (pssl != NULL) |
208 | 0 | *pssl = 0; |
209 | 0 | if (!OSSL_parse_url(url, &scheme, puser, phost, &port, pport_num, |
210 | 0 | ppath, pquery, pfrag)) |
211 | 0 | return 0; |
212 | | |
213 | | /* check for optional HTTP scheme "http[s]" */ |
214 | 0 | if (strcmp(scheme, OSSL_HTTPS_NAME) == 0) { |
215 | 0 | ssl = 1; |
216 | 0 | if (pssl != NULL) |
217 | 0 | *pssl = ssl; |
218 | 0 | } else if (*scheme != '\0' && strcmp(scheme, OSSL_HTTP_NAME) != 0) { |
219 | 0 | ERR_raise(ERR_LIB_HTTP, HTTP_R_INVALID_URL_SCHEME); |
220 | 0 | OPENSSL_free(scheme); |
221 | 0 | OPENSSL_free(port); |
222 | 0 | goto err; |
223 | 0 | } |
224 | 0 | OPENSSL_free(scheme); |
225 | |
|
226 | 0 | if (strcmp(port, "0") == 0) { |
227 | | /* set default port */ |
228 | 0 | OPENSSL_free(port); |
229 | 0 | port = ssl ? OSSL_HTTPS_PORT : OSSL_HTTP_PORT; |
230 | 0 | if (!ossl_assert(sscanf(port, "%d", &portnum) == 1)) |
231 | 0 | goto err; |
232 | 0 | if (pport_num != NULL) |
233 | 0 | *pport_num = portnum; |
234 | 0 | if (pport != NULL) { |
235 | 0 | *pport = OPENSSL_strdup(port); |
236 | 0 | if (*pport == NULL) |
237 | 0 | goto err; |
238 | 0 | } |
239 | 0 | } else { |
240 | 0 | if (pport != NULL) |
241 | 0 | *pport = port; |
242 | 0 | else |
243 | 0 | OPENSSL_free(port); |
244 | 0 | } |
245 | 0 | return 1; |
246 | | |
247 | 0 | err: |
248 | 0 | free_pstring(puser); |
249 | 0 | free_pstring(phost); |
250 | 0 | free_pstring(ppath); |
251 | 0 | free_pstring(pquery); |
252 | 0 | free_pstring(pfrag); |
253 | 0 | return 0; |
254 | 0 | } |
255 | | |
256 | | /* Respect no_proxy, taking default value from environment variable(s) */ |
257 | | static int use_proxy(const char *no_proxy, const char *server) |
258 | 0 | { |
259 | 0 | size_t sl; |
260 | 0 | const char *found = NULL; |
261 | 0 | char host[NI_MAXHOST]; |
262 | |
|
263 | 0 | if (!ossl_assert(server != NULL)) |
264 | 0 | return 0; |
265 | 0 | sl = strlen(server); |
266 | 0 | if (sl >= 2 && sl < sizeof(host) + 2 && server[0] == '[' && server[sl - 1] == ']') { |
267 | | /* strip leading '[' and trailing ']' from escaped IPv6 address */ |
268 | 0 | sl -= 2; |
269 | 0 | strncpy(host, server + 1, sl); |
270 | 0 | server = host; |
271 | 0 | } |
272 | | |
273 | | /* |
274 | | * using environment variable names, both lowercase and uppercase variants, |
275 | | * compatible with other HTTP client implementations like wget, curl and git |
276 | | */ |
277 | 0 | if (no_proxy == NULL) |
278 | 0 | no_proxy = ossl_safe_getenv("no_proxy"); |
279 | 0 | if (no_proxy == NULL) |
280 | 0 | no_proxy = ossl_safe_getenv(OPENSSL_NO_PROXY); |
281 | |
|
282 | 0 | if (no_proxy != NULL) |
283 | 0 | found = strstr(no_proxy, server); |
284 | 0 | while (found != NULL |
285 | 0 | && ((found != no_proxy && !ossl_isspace(found[-1]) && found[-1] != ',') |
286 | 0 | || (found[sl] != '\0' && !ossl_isspace(found[sl]) && found[sl] != ','))) |
287 | 0 | found = strstr(found + 1, server); |
288 | 0 | return found == NULL; |
289 | 0 | } |
290 | | |
291 | | /* Take default value from environment variable(s), respect no_proxy */ |
292 | | const char *OSSL_HTTP_adapt_proxy(const char *proxy, const char *no_proxy, |
293 | | const char *server, int use_ssl) |
294 | 0 | { |
295 | | /* |
296 | | * using environment variable names, both lowercase and uppercase variants, |
297 | | * compatible with other HTTP client implementations like wget, curl and git |
298 | | */ |
299 | 0 | if (proxy == NULL) |
300 | 0 | proxy = ossl_safe_getenv(use_ssl ? "https_proxy" : "http_proxy"); |
301 | 0 | if (proxy == NULL) |
302 | 0 | proxy = ossl_safe_getenv(use_ssl ? OPENSSL_HTTPS_PROXY : OPENSSL_HTTP_PROXY); |
303 | |
|
304 | 0 | if (proxy == NULL || *proxy == '\0' || !use_proxy(no_proxy, server)) |
305 | 0 | return NULL; |
306 | 0 | return proxy; |
307 | 0 | } |