links/http.c

1398 lines
40 KiB
C

/* http.c
* HTTP protocol client implementation
* (c) 2002 Mikulas Patocka
* This file is a part of the Links program, released under GPL.
*/
#include "links.h"
struct http_connection_info {
int bl_flags;
int http10;
int https_forward;
int close;
int send_close;
off_t length;
int version;
int chunk_remaining;
};
/* prototypes */
static void http_send_header(struct connection *c);
static void http_get_header(struct connection *c);
static void test_restart(struct connection *c);
static void add_user_agent(unsigned char **hdr, int *l, unsigned char *url);
static void add_referer(unsigned char **hdr, int *l, unsigned char *url, unsigned char *prev_url);
static void add_accept(unsigned char **hdr, int *l, struct connection *c);
static void add_accept_language(unsigned char **hdr, int *l, struct http_connection_info *info);
static void add_accept_encoding(unsigned char **hdr, int *l, unsigned char *url, struct connection *c);
static void add_accept_charset(unsigned char **hdr, int *l, struct http_connection_info *info);
static void add_connection(unsigned char **hdr, int *l, int http10, int proxy, int post);
static void add_upgrade(unsigned char **hdr, int *l);
static void add_dnt(unsigned char **hdr, int *l);
static void add_if_modified(unsigned char **hdr, int *l, struct connection *c);
static void add_range(unsigned char **hdr, int *l, unsigned char *url, struct connection *c);
static void add_pragma_no_cache(unsigned char **hdr, int *l, int no_cache);
static void add_proxy_auth_string(unsigned char **hdr, int *l, unsigned char *url);
static void add_auth_string(unsigned char **hdr, int *l, unsigned char *url);
static void add_post_header(unsigned char **hdr, int *l, unsigned char **post);
static void add_extra_options(unsigned char **hdr, int *l);
/* Returns a string pointer with value of the item.
* The string must be destroyed after usage with mem_free.
*/
unsigned char *parse_http_header(unsigned char *head, unsigned char *item, unsigned char **ptr)
{
unsigned char *i, *f, *g, *h;
if (!head) return NULL;
for (f = head; *f; f++) {
if (*f != 10) continue;
f++;
for (i = item; *i && *f; i++, f++)
if (upcase(*i) != upcase(*f)) goto cont;
if (!*f) break;
if (f[0] == ':') {
while (f[1] == ' ') f++;
for (g = ++f; *g >= ' '; g++)
;
while (g > f && g[-1] == ' ') g--;
h = memacpy(f, g - f);
if (ptr) {
*ptr = f;
}
return h;
}
cont:
f--;
}
return NULL;
}
unsigned char *parse_header_param(unsigned char *x, unsigned char *e, int all)
{
unsigned char u;
size_t le = strlen(cast_const_char e);
int lp;
unsigned char *y = x;
if (!all) {
a:
if (!(y = cast_uchar strchr(cast_const_char y, ';'))) return NULL;
}
while (*y && (*y == ';' || *y <= ' ')) y++;
if (strlen(cast_const_char y) < le) return NULL;
if (casecmp(y, e, le)) goto a;
y += le;
while (*y && (*y <= ' ' || *y == '=')) y++;
u = ';';
if (*y == '\'' || *y == '"') u = *y++;
lp = 0;
while (y[lp] >= ' ' && y[lp] != u) {
lp++;
if (lp == MAXINT) overalloc();
}
return memacpy(y, lp);
}
int get_http_code(unsigned char *head, int *code, int *version)
{
if (!head) return -1;
while (head[0] == ' ') head++;
if (upcase(head[0]) != 'H' || upcase(head[1]) != 'T' || upcase(head[2]) != 'T' ||
upcase(head[3]) != 'P') return -1;
if (head[4] == '/' && head[5] >= '0' && head[5] <= '9'
&& head[6] == '.' && head[7] >= '0' && head[7] <= '9' && head[8] <= ' ') {
if (version) *version = (head[5] - '0') * 10 + head[7] - '0';
} else if (version) *version = 0;
for (head += 4; *head > ' '; head++)
;
if (*head++ != ' ') return -1;
if (head[0] < '1' || head [0] > '9' || head[1] < '0' || head[1] > '9' ||
head[2] < '0' || head [2] > '9') {
if (code) *code = 200;
return 0;
}
if (code) *code = (head[0]-'0')*100 + (head[1]-'0')*10 + head[2]-'0';
return 0;
}
static const unsigned char *months[12] = {
cast_uchar "Jan",
cast_uchar "Feb",
cast_uchar "Mar",
cast_uchar "Apr",
cast_uchar "May",
cast_uchar "Jun",
cast_uchar "Jul",
cast_uchar "Aug",
cast_uchar "Sep",
cast_uchar "Oct",
cast_uchar "Nov",
cast_uchar "Dec"
};
#ifdef HAVE_GMTIME
static const unsigned char *days[7] = {
cast_uchar "Sun",
cast_uchar "Mon",
cast_uchar "Tue",
cast_uchar "Wed",
cast_uchar "Thu",
cast_uchar "Fri",
cast_uchar "Sat",
};
#endif
time_t parse_http_date(unsigned char *date) /* this functions is bad !!! */
{
#ifdef HAVE_MKTIME
time_t t = 0;
time_t offset;
/* Mon, 03 Jan 2000 21:29:33 GMT */
int y;
struct tm tm;
memset(&tm, 0, sizeof(struct tm));
date = cast_uchar strchr(cast_const_char date, ' ');
if (!date) return (time_t)-1;
date++;
if (*date >= '0' && *date <= '9') {
/* Sun, 06 Nov 1994 08:49:37 GMT */
/* Sunday, 06-Nov-94 08:49:37 GMT */
y = 0;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
tm.tm_mday = (date[0] - '0') * 10 + date[1] - '0';
date += 2;
if (*date != ' ' && *date != '-') return (time_t)-1;
date += 1;
for (tm.tm_mon = 0; tm.tm_mon < 12; tm.tm_mon++)
if (!casecmp(date, months[tm.tm_mon], 3)) goto f1;
return (time_t)-1;
f1:
date += 3;
if (*date != '-' && *date != ' ') return (time_t)-1;
date++;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
if (date[2] == ' ') {
/* Sunday, 06-Nov-94 08:49:37 GMT */
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
tm.tm_year = (date[0] >= '7' ? 1900 : 2000) + (date[0] - '0') * 10 + date[1] - '0' - 1900;
date += 2;
} else if (date[2] >= '0' && date[2] <= '9' && date[3] >= '0' && date[3] <= '9') {
/* Sun, 06 Nov 1994 08:49:37 GMT */
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
if (date[2] < '0' || date[2] > '9') return (time_t)-1;
if (date[3] < '0' || date[3] > '9') return (time_t)-1;
tm.tm_year = (date[0] - '0') * 1000 + (date[1] - '0') * 100 + (date[2] - '0') * 10 + date[3] - '0' - 1900;
date += 4;
} else return (time_t)-1;
if (*date != ' ') return (time_t)-1;
date++;
} else {
/* Sun Nov 6 08:49:37 1994 */
y = 1;
for (tm.tm_mon = 0; tm.tm_mon < 12; tm.tm_mon++)
if (!casecmp(date, months[tm.tm_mon], 3)) goto f2;
return (time_t)-1;
f2:
date += 3;
while (*date == ' ') date++;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
tm.tm_mday = date[0] - '0';
date++;
if (*date != ' ') {
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
tm.tm_mday = tm.tm_mday * 10 + date[0] - '0';
date++;
}
if (*date != ' ') return (time_t)-1;
date++;
}
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
tm.tm_hour = (date[0] - '0') * 10 + date[1] - '0';
date += 2;
if (*date != ':') return (time_t)-1;
date++;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
tm.tm_min = (date[0] - '0') * 10 + date[1] - '0';
date += 2;
if (*date != ':') return (time_t)-1;
date++;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
tm.tm_sec = (date[0] - '0') * 10 + date[1] - '0';
date += 2;
if (y) {
if (*date != ' ') return (time_t)-1;
date++;
if (date[0] < '0' || date[0] > '9') return (time_t)-1;
if (date[1] < '0' || date[1] > '9') return (time_t)-1;
if (date[2] < '0' || date[2] > '9') return (time_t)-1;
if (date[3] < '0' || date[3] > '9') return (time_t)-1;
tm.tm_year = (date[0] - '0') * 1000 + (date[1] - '0') * 100 + (date[2] - '0') * 10 + date[3] - '0' - 1900;
date += 4;
}
if (*date != ' ' && *date) return (time_t)-1;
/*debug("%02d:%02d:%02d", tm.tm_hour, tm.tm_min, tm.tm_sec);*/
#if defined(HAVE_TIMEGM) && !defined(HAIKU)
t = timegm(&tm);
if (t == (time_t)-1)
return (time_t)-1;
offset = 0;
#else
t = mktime(&tm);
if (t == (time_t)-1)
return (time_t)-1;
memset(&tm, 0, sizeof(struct tm));
tm.tm_year = 80;
tm.tm_mday = 1;
offset = 315532800 - mktime(&tm);
#endif
return (time_t)((uttime)t + (uttime)offset);
#else
return (time_t)-1;
#endif
}
unsigned char *print_http_date(time_t date)
{
static unsigned char str[64];
#ifdef HAVE_GMTIME
struct tm *tm = gmtime(&date);
snprintf(cast_char str, sizeof str, "%s %s %2d %02d:%02d:%02d %04d", days[tm->tm_wday], months[tm->tm_mon], tm->tm_mday, tm->tm_hour, tm->tm_min, tm->tm_sec, tm->tm_year + 1900);
#else
snprintf(cast_char str, sizeof str, "%.0f", (double)date);
#endif
return str;
}
static struct {
char *name;
int bugs;
} buggy_servers[] = {
{ "mod_czech/3.1.0", BL_HTTP10 },
{ "Purveyor", BL_HTTP10 },
{ "Netscape-Enterprise", BL_HTTP10 | BL_NO_ACCEPT_LANGUAGE },
{ "Apache Coyote", BL_HTTP10 },
{ "lighttpd", BL_HTTP10 },
{ "FORPSI", BL_NO_RANGE },
{ "Sausalito", BL_HTTP10 },
{ NULL, 0 }
};
static int check_http_server_bugs(unsigned char *url, struct http_connection_info *info, unsigned char *head)
{
unsigned char *server;
int i, bugs;
if (!http_options.allow_blacklist || info->http10) return 0;
if (!(server = parse_http_header(head, cast_uchar "Server", NULL))) return 0;
bugs = 0;
for (i = 0; buggy_servers[i].name; i++) if (strstr(cast_const_char server, cast_const_char buggy_servers[i].name)) bugs |= buggy_servers[i].bugs;
mem_free(server);
if (bugs && (server = get_host_name(url))) {
add_blacklist_entry(server, bugs);
mem_free(server);
return bugs & ~BL_NO_RANGE;
}
return 0;
}
static void http_end_request(struct connection *c, int notrunc, int nokeepalive, int state)
{
struct http_connection_info *info = c->info;
if (state == S__OK) {
if (c->cache) {
if (!notrunc) truncate_entry(c->cache, c->from, 1);
c->cache->incomplete = 0;
}
}
setcstate(c, state);
if (c->info &&
!info->close &&
!info->send_close &&
!nokeepalive) {
add_keepalive_socket(c, HTTP_KEEPALIVE_TIMEOUT, 0);
} else {
abort_connection(c);
}
}
void http_func(struct connection *c)
{
/*setcstate(c, S_CONN);*/
/*set_connection_timeout(c);*/
if (get_keepalive_socket(c, NULL)) {
int p;
if ((p = get_port(c->url)) == -1) {
setcstate(c, S_BAD_URL);
abort_connection(c);
return;
}
make_connection(c, p, &c->sock1, http_send_header);
} else {
http_send_header(c);
}
}
void proxy_func(struct connection *c)
{
http_func(c);
}
static void add_url_to_str(unsigned char **str, int *l, unsigned char *url)
{
unsigned char *sp;
for (sp = url; *sp && *sp != POST_CHAR; sp++) {
if (*sp <= ' ' || *sp >= 127) {
unsigned char esc[4];
sprintf(cast_char esc, "%%%02X", (int)*sp);
add_to_str(str, l, esc);
} else {
add_chr_to_str(str, l, *sp);
}
}
}
static void http_send_header(struct connection *c)
{
struct http_connection_info *info;
int http10 = http_options.http10;
int proxy;
unsigned char *hdr;
unsigned char *h, *u;
unsigned char *u2;
int l = 0;
unsigned char *post = NULL;
unsigned char *host;
if (!c->cache) {
if (!find_in_cache(c->url, &c->cache))
c->cache->refcount--;
}
proxy = is_proxy_url(c->url);
host = remove_proxy_prefix(c->url);
set_connection_timeout_keepal(c);
info = mem_calloc(sizeof(struct http_connection_info));
c->info = info;
#ifdef HAVE_SSL
info->https_forward = !c->ssl && proxy && host && !casecmp(host, cast_uchar "https://", 8);
if (c->ssl) proxy = 0;
#endif
hdr = init_str();
if (!host) {
http_bad_url:
mem_free(hdr);
http_end_request(c, 0, 1, S_BAD_URL);
return;
}
if (!info->https_forward && (h = get_host_name(host))) {
info->bl_flags = get_blacklist_flags(h);
mem_free(h);
}
if (info->bl_flags & BL_HTTP10) http10 = 1;
info->http10 = http10;
if (!info->https_forward) {
post = cast_uchar strchr(cast_const_char host, POST_CHAR);
if (post) post++;
}
info->send_close = info->https_forward || http10;
#ifdef HAVE_SSL
if (info->https_forward) {
add_to_str(&hdr, &l, cast_uchar "CONNECT ");
h = get_host_name(host);
if (!h) goto http_bad_url;
add_to_str(&hdr, &l, h);
mem_free(h);
h = get_port_str(host);
if (!h) h = stracpy(cast_uchar "443");
add_chr_to_str(&hdr, &l, ':');
add_to_str(&hdr, &l, h);
mem_free(h);
goto added_connect;
} else
#endif
if (!post) {
add_to_str(&hdr, &l, cast_uchar "GET ");
} else {
add_to_str(&hdr, &l, cast_uchar "POST ");
c->unrestartable = 2;
}
if (!proxy) {
add_chr_to_str(&hdr, &l, '/');
u = get_url_data(host);
} else {
u = host;
}
if (post && post < u) {
goto http_bad_url;
}
u2 = u;
if (proxy && !*c->socks_proxy && *proxies.dns_append) {
unsigned char *u_host;
int u_host_len;
int u2_len = 0;
if (parse_url(u, NULL, NULL, NULL, NULL, NULL, &u_host, &u_host_len, NULL, NULL, NULL, NULL, NULL)) goto http_bad_url;
u2 = init_str();
add_bytes_to_str(&u2, &u2_len, u, u_host + u_host_len - u);
add_to_str(&u2, &u2_len, proxies.dns_append);
add_to_str(&u2, &u2_len, u_host + u_host_len);
}
add_url_to_str(&hdr, &l, u2);
if (u2 != u) mem_free(u2);
#ifdef HAVE_SSL
added_connect:
#endif
if (!http10) add_to_str(&hdr, &l, cast_uchar " HTTP/1.1\r\n");
else add_to_str(&hdr, &l, cast_uchar " HTTP/1.0\r\n");
if (!info->https_forward && (h = get_host_name(host))) {
add_to_str(&hdr, &l, cast_uchar "Host: ");
if (*h && h[strlen(cast_const_char h) - 1] == '.') {
h[strlen(cast_const_char h) - 1] = 0;
}
if (h[0] == '[' && h[strlen(cast_const_char h) - 1] == ']') {
unsigned char *pc = cast_uchar strchr(cast_const_char h, '%');
if (pc) {
pc[0] = ']';
pc[1] = 0;
}
}
add_to_str(&hdr, &l, h);
mem_free(h);
if ((h = get_port_str(host))) {
unsigned char *default_port = cast_uchar "80";
#ifdef HAVE_SSL
if (c->ssl) default_port = cast_uchar "443";
#endif
if (strcmp(cast_const_char h, cast_const_char default_port)) {
add_chr_to_str(&hdr, &l, ':');
add_to_str(&hdr, &l, h);
}
mem_free(h);
}
add_to_str(&hdr, &l, cast_uchar "\r\n");
}
add_user_agent(&hdr, &l, info->https_forward ? NULL : host);
if (proxy) add_proxy_auth_string(&hdr, &l, c->url);
if (!info->https_forward) {
test_restart(c);
if (!c->doh) {
add_referer(&hdr, &l, host, c->prev_url);
}
add_accept(&hdr, &l, c);
if (!c->doh) {
add_accept_language(&hdr, &l, info);
add_accept_encoding(&hdr, &l, host, c);
add_accept_charset(&hdr, &l, info);
}
add_dnt(&hdr, &l);
add_connection(&hdr, &l, http10, proxy, !info->send_close);
if (!c->doh) {
add_upgrade(&hdr, &l);
add_if_modified(&hdr, &l, c);
add_range(&hdr, &l, host, c);
add_pragma_no_cache(&hdr, &l, c->no_cache);
add_auth_string(&hdr, &l, host);
}
add_post_header(&hdr, &l, &post);
if (!c->doh) {
add_cookies(&hdr, &l, host);
}
add_extra_options(&hdr, &l);
}
add_to_str(&hdr, &l, cast_uchar "\r\n");
if (post) {
while (post[0] && post[1]) {
int h1, h2;
h1 = post[0] <= '9' ? (unsigned)post[0] - '0' : post[0] >= 'A' ? upcase(post[0]) - 'A' + 10 : 0;
if (h1 < 0 || h1 >= 16) h1 = 0;
h2 = post[1] <= '9' ? (unsigned)post[1] - '0' : post[1] >= 'A' ? upcase(post[1]) - 'A' + 10 : 0;
if (h2 < 0 || h2 >= 16) h2 = 0;
add_chr_to_str(&hdr, &l, h1 * 16 + h2);
post += 2;
}
}
write_to_socket(c, c->sock1, hdr, l, http_get_header);
mem_free(hdr);
setcstate(c, S_SENT);
}
static void test_restart(struct connection *c)
{
/* If the cached entity is compressed, request the whole file and turn off compression */
if (c->cache && c->from) {
unsigned char *d;
if ((d = parse_http_header(c->cache->head, cast_uchar "Content-Encoding", NULL))) {
mem_free(d);
c->from = 0;
c->no_compress = 1;
#ifdef HAVE_ANY_COMPRESSION
if (c->tries >= 1) {
unsigned char *h;
if ((h = get_host_name(c->url))) {
add_blacklist_entry(h, BL_NO_COMPRESSION);
mem_free(h);
}
}
#endif
}
}
}
static void add_user_agent(unsigned char **hdr, int *l, unsigned char *url)
{
add_to_str(hdr, l, cast_uchar "User-Agent: ");
if (SCRUB_HEADERS) {
add_to_str(hdr, l, cast_uchar "Mozilla/5.0 (Windows NT 10.0; rv:102.0) Gecko/20100101 Firefox/102.0\r\n");
} else if (!(*http_options.header.fake_useragent)) {
/*
* Google started to return css-styled page for searches.
* It returns non-css page if the user agent begins with Lynx.
*/
#if 0
if (url &&
(casestrstr(url, cast_uchar "/www.google.") ||
casestrstr(url, cast_uchar "/google.")) &&
strstr(cast_const_char url, "/search?") &&
(strstr(cast_const_char url, "?q=") ||
strstr(cast_const_char url, "&q=")) &&
!strstr(cast_const_char url, "?tbm=isch") &&
!strstr(cast_const_char url, "&tbm=isch")
)
add_to_str(hdr, l, cast_uchar("Lynx/"));
#endif
add_to_str(hdr, l, cast_uchar("Links (" VERSION_STRING "; "));
add_to_str(hdr, l, system_name);
add_to_str(hdr, l, cast_uchar "; ");
add_to_str(hdr, l, compiler_name);
add_to_str(hdr, l, cast_uchar "; ");
if (!F && !list_empty(terminals)) {
struct terminal *term;
struct list_head *lterm;
unsigned char *t = cast_uchar "text";
foreach(struct terminal, term, lterm, terminals) if (term->spec->braille) t = cast_uchar "braille";
add_to_str(hdr, l, t);
}
#ifdef G
else if (F && drv) {
add_to_str(hdr, l, drv->name);
}
#endif
else {
add_to_str(hdr, l, cast_uchar "dump");
}
add_to_str(hdr, l, cast_uchar ")\r\n");
} else {
add_to_str(hdr, l, http_options.header.fake_useragent);
add_to_str(hdr, l, cast_uchar "\r\n");
}
}
static void add_referer(unsigned char **hdr, int *l, unsigned char *url, unsigned char *prev_url)
{
switch (http_options.header.referer) {
case REFERER_FAKE: {
add_to_str(hdr, l, cast_uchar "Referer: ");
add_to_str(hdr, l, http_options.header.fake_referer);
add_to_str(hdr, l, cast_uchar "\r\n");
break;
}
case REFERER_SAME_URL: {
add_to_str(hdr, l, cast_uchar "Referer: ");
add_url_to_str(hdr, l, url);
add_to_str(hdr, l, cast_uchar "\r\n");
break;
}
case REFERER_REAL_SAME_SERVER: {
unsigned char *h, *j;
int brk = 1;
if ((h = get_host_name(url))) {
if ((j = get_host_name(prev_url))) {
if (!casestrcmp(h, j)) brk = 0;
else if (!casestrcmp(h, cast_uchar "imageproxy.jxs.cz")) {
int l = (int)strlen(cast_const_char j);
int q = (int)strlen(".blog.cz");
if (l > q && !casestrcmp((j + l - q), cast_uchar ".blog.cz")) brk = 0;
else if (!casestrcmp(j, cast_uchar "blog.cz")) brk = 0;
} else if (!casestrcmp(h, cast_uchar "www.google.com")) {
unsigned char *c = get_url_data(url);
if (c && !strncmp(cast_const_char c, "recaptcha/api/", 14)) brk = 0;
}
mem_free(j);
}
mem_free(h);
}
if (brk) break;
}
/*-fallthrough*/
case REFERER_REAL: {
unsigned char *ref;
unsigned char *user, *ins;
int ulen;
if (!prev_url) break; /* no referrer */
ref = stracpy(prev_url);
if (!parse_url(ref, NULL, &user, &ulen, NULL, NULL, &ins, NULL, NULL, NULL, NULL, NULL, NULL) && ulen && ins) {
memmove(user, ins, strlen(cast_const_char ins) + 1);
}
add_to_str(hdr, l, cast_uchar "Referer: ");
add_url_to_str(hdr, l, ref);
add_to_str(hdr, l, cast_uchar "\r\n");
mem_free(ref);
break;
}
}
}
static void add_accept(unsigned char **hdr, int *l, struct connection *c)
{
if (c->doh) {
add_to_str(hdr, l, cast_uchar "Accept: application/dns-message\r\n");
} else if (SCRUB_HEADERS) {
add_to_str(hdr, l, cast_uchar "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8\r\n");
} else {
add_to_str(hdr, l, cast_uchar "Accept: */*\r\n");
}
}
static void add_accept_language(unsigned char **hdr, int *l, struct http_connection_info *info)
{
if (!(info->bl_flags & BL_NO_ACCEPT_LANGUAGE)) {
add_to_str(hdr, l, cast_uchar "Accept-Language: ");
if (SCRUB_HEADERS) {
add_to_str(hdr, l, cast_uchar "en-US,en;q=0.5\r\n");
} else {
int la;
la = *l;
add_to_str(hdr, l, get_text_translation(TEXT_(T__ACCEPT_LANGUAGE), NULL));
add_chr_to_str(hdr, l, ',');
if (!strstr(cast_const_char(*hdr + la), "en,") &&
!strstr(cast_const_char(*hdr + la), "en;")) add_to_str(hdr, l, cast_uchar "en;q=0.2,");
add_to_str(hdr, l, cast_uchar "*;q=0.1\r\n");
}
}
}
#ifdef HAVE_ANY_COMPRESSION
static int advertise_compression(unsigned char *url, struct connection *c)
{
struct http_connection_info *info = c->info;
unsigned char *extd;
if (c->no_compress || http_options.no_compression || info->bl_flags & BL_NO_COMPRESSION)
return 0;
/* Fix for bugzilla. The attachment may be compressed and if the server
compresses it again, we can't decompress the inner compression */
if (strstr(cast_const_char url, "/attachment.cgi?"))
return 0;
extd = cast_uchar strrchr(cast_const_char url, '.');
if (extd && get_compress_by_extension(extd + 1, cast_uchar strchr(cast_const_char(extd + 1), 0)))
return 0;
return 1;
}
#endif
static void add_accept_encoding(unsigned char **hdr, int *l, unsigned char *url, struct connection *c)
{
#if defined(HAVE_ANY_COMPRESSION)
#define info ((struct http_connection_info *)c->info)
if (advertise_compression(url, c)) {
int orig_l = *l;
int l1;
add_to_str(hdr, l, cast_uchar "Accept-Encoding: ");
l1 = *l;
#if defined(HAVE_ZLIB)
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "gzip, deflate");
#endif
#if defined(HAVE_BROTLI)
if ((!SCRUB_HEADERS
#ifdef HAVE_SSL
|| c->ssl
#endif
) && !(info->bl_flags & BL_NO_BZIP2)) {
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "br");
}
#endif
#if defined(HAVE_ZSTD)
if (!SCRUB_HEADERS && !(info->bl_flags & BL_NO_BZIP2)) {
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "zstd");
}
#endif
#if defined(HAVE_BZIP2)
if (!SCRUB_HEADERS && !(info->bl_flags & BL_NO_BZIP2)) {
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "bzip2");
}
#endif
/* LZMA on DOS often fails with out of memory, don't announce it */
#if defined(HAVE_LZMA) && !defined(DOS)
if (!SCRUB_HEADERS && !(info->bl_flags & BL_NO_BZIP2)) {
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "lzma, lzma2");
}
#endif
#if defined(HAVE_LZIP)
if (!SCRUB_HEADERS && !(info->bl_flags & BL_NO_BZIP2)) {
if (*l != l1) add_to_str(hdr, l, cast_uchar ", ");
add_to_str(hdr, l, cast_uchar "lzip");
}
#endif
if (*l != l1) add_to_str(hdr, l, cast_uchar "\r\n");
else *l = orig_l;
}
#undef info
#endif
}
static void add_accept_charset(unsigned char **hdr, int *l, struct http_connection_info *info)
{
static unsigned char *accept_charset = NULL;
if (SCRUB_HEADERS ||
info->bl_flags & BL_NO_CHARSET ||
http_options.no_accept_charset)
return;
if (!accept_charset) {
int i;
unsigned char *cs, *ac;
int aclen = 0;
ac = init_str();
for (i = 0; (cs = get_cp_mime_name(i)); i++) {
if (aclen) add_chr_to_str(&ac, &aclen, ',');
else add_to_str(&ac, &aclen, cast_uchar "Accept-Charset: ");
add_to_str(&ac, &aclen, cs);
}
if (aclen) add_to_str(&ac, &aclen, cast_uchar "\r\n");
if (!(accept_charset = cast_uchar strdup(cast_const_char ac))) {
add_to_str(hdr, l, ac);
mem_free(ac);
return;
}
mem_free(ac);
}
add_to_str(hdr, l, accept_charset);
}
static void add_dnt(unsigned char **hdr, int *l)
{
if (http_options.header.do_not_track)
add_to_str(hdr, l, cast_uchar "DNT: 1\r\n");
}
static void add_connection(unsigned char **hdr, int *l, int http10, int proxy, int alive)
{
if (!http10) {
if (!proxy) add_to_str(hdr, l, cast_uchar "Connection: ");
else add_to_str(hdr, l, cast_uchar "Proxy-Connection: ");
if (alive) add_to_str(hdr, l, cast_uchar "keep-alive\r\n");
else add_to_str(hdr, l, cast_uchar "close\r\n");
}
}
static void add_upgrade(unsigned char **hdr, int *l)
{
if (proxies.only_proxies) {
add_to_str(hdr, l, cast_uchar "Upgrade-Insecure-Requests: 1\r\n");
}
}
static void add_if_modified(unsigned char **hdr, int *l, struct connection *c)
{
struct cache_entry *e;
if ((e = c->cache)) {
int code = 0; /* against warning */
if (get_http_code(e->head, &code, NULL) || code >= 400) goto skip_ifmod;
if (!e->incomplete && e->head && c->no_cache <= NC_IF_MOD) {
unsigned char *m;
if (e->last_modified) m = stracpy(e->last_modified);
else if ((m = parse_http_header(e->head, cast_uchar "Date", NULL)))
;
else if ((m = parse_http_header(e->head, cast_uchar "Expires", NULL)))
;
else goto skip_ifmod;
add_to_str(hdr, l, cast_uchar "If-Modified-Since: ");
add_to_str(hdr, l, m);
add_to_str(hdr, l, cast_uchar "\r\n");
mem_free(m);
}
skip_ifmod:;
}
}
static void add_range(unsigned char **hdr, int *l, unsigned char *url, struct connection *c)
{
struct cache_entry *e;
struct http_connection_info *info = c->info;
if ((e = c->cache)) {
int code = 0; /* against warning */
if (!get_http_code(e->head, &code, NULL) && code >= 300)
return;
}
if (c->from /*&& (c->est_length == -1 || c->from < c->est_length)*/ && c->no_cache < NC_IF_MOD && !(info->bl_flags & BL_NO_RANGE)) {
add_to_str(hdr, l, cast_uchar "Range: bytes=");
add_num_to_str(hdr, l, c->from);
add_to_str(hdr, l, cast_uchar "-\r\n");
}
}
static void add_pragma_no_cache(unsigned char **hdr, int *l, int no_cache)
{
if (no_cache >= NC_PR_NO_CACHE) add_to_str(hdr, l, cast_uchar "Pragma: no-cache\r\nCache-Control: no-cache\r\n");
}
static void add_proxy_auth_string(unsigned char **hdr, int *l, unsigned char *url)
{
unsigned char *h;
if ((h = get_auth_string(url, 1))) {
add_to_str(hdr, l, h);
mem_free(h);
}
}
static void add_auth_string(unsigned char **hdr, int *l, unsigned char *url)
{
unsigned char *h;
if ((h = get_auth_string(url, 0))) {
add_to_str(hdr, l, h);
mem_free(h);
}
}
static void add_post_header(unsigned char **hdr, int *l, unsigned char **post)
{
if (*post) {
unsigned char *pd = cast_uchar strchr(cast_const_char *post, '\n');
if (pd) {
add_to_str(hdr, l, cast_uchar "Content-Type: ");
add_bytes_to_str(hdr, l, *post, pd - *post);
add_to_str(hdr, l, cast_uchar "\r\n");
*post = pd + 1;
}
add_to_str(hdr, l, cast_uchar "Content-Length: ");
add_num_to_str(hdr, l, strlen(cast_const_char *post) / 2);
add_to_str(hdr, l, cast_uchar "\r\n");
}
}
static void add_extra_options(unsigned char **hdr, int *l)
{
unsigned char *p = http_options.header.extra_header;
while (1) {
unsigned char *q = p + strcspn(cast_const_char p, "\\");
if (p != q) {
unsigned char *c;
unsigned char *s = memacpy(p, q - p);
c = cast_uchar strchr(cast_const_char s, ':');
if (c && casecmp(s, cast_uchar "Cookie:", 7)) {
unsigned char *v = NULL; /* against warning */
unsigned char *cc = memacpy(s, c - s);
unsigned char *x = parse_http_header(*hdr, cc, &v);
mem_free(cc);
if (x) {
unsigned char *new_hdr;
int new_l;
mem_free(x);
new_hdr = init_str();
new_l = 0;
add_bytes_to_str(&new_hdr, &new_l, *hdr, v - *hdr);
while (*++c == ' ')
;
add_to_str(&new_hdr, &new_l, c);
add_to_str(&new_hdr, &new_l, v + strcspn(cast_const_char v, "\r\n"));
mem_free(*hdr);
*hdr = new_hdr;
*l = new_l;
goto already_added;
}
}
add_to_str(hdr, l, s);
add_to_str(hdr, l, cast_uchar "\r\n");
already_added:
mem_free(s);
}
if (!*q) break;
p = q + 1;
}
}
static int is_line_in_buffer(struct read_buffer *rb)
{
int l;
for (l = 0; l < rb->len; l++) {
if (rb->data[l] == 10) return l + 1;
if (l < rb->len - 1 && rb->data[l] == 13 && rb->data[l + 1] == 10) return l + 2;
if (l == rb->len - 1 && rb->data[l] == 13) return 0;
if (rb->data[l] < ' ') return -1;
}
return 0;
}
static void read_http_data(struct connection *c, struct read_buffer *rb)
{
struct http_connection_info *info = c->info;
int a;
set_connection_timeout(c);
if (rb->close == 2) {
http_end_request(c, 0, 0, S__OK);
return;
}
if (info->length != -2) {
int l = rb->len;
if (info->length >= 0 && info->length < l) l = (int)info->length;
if ((off_t)(0UL + c->from + l) < 0) {
setcstate(c, S_LARGE_FILE);
abort_connection(c);
return;
}
c->received += l;
a = add_fragment(c->cache, c->from, rb->data, l);
if (a < 0) {
setcstate(c, a);
abort_connection(c);
return;
}
if (a == 1) c->tries = 0;
if (info->length >= 0) info->length -= l;
c->from += l;
kill_buffer_data(rb, l);
if (!info->length) {
http_end_request(c, 0, 0, S__OK);
return;
}
} else {
next_chunk:
if (info->chunk_remaining == -2) {
int l;
if ((l = is_line_in_buffer(rb))) {
if (l == -1) {
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
kill_buffer_data(rb, l);
if (l <= 2) {
http_end_request(c, 0, 0, S__OK);
return;
}
goto next_chunk;
}
} else if (info->chunk_remaining == -1) {
int l;
if ((l = is_line_in_buffer(rb))) {
char *end;
long n = 0; /* warning, go away */
if (l != -1) n = strtol(cast_const_char rb->data, &end, 16);
if (l == -1 || n < 0 || n >= MAXINT || cast_uchar end == rb->data) {
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
kill_buffer_data(rb, l);
if (!(info->chunk_remaining = (int)n)) info->chunk_remaining = -2;
goto next_chunk;
}
} else {
int l = info->chunk_remaining;
if (l > rb->len) l = rb->len;
if ((off_t)(0UL + c->from + l) < 0) {
setcstate(c, S_LARGE_FILE);
abort_connection(c);
return;
}
c->received += l;
a = add_fragment(c->cache, c->from, rb->data, l);
if (a < 0) {
setcstate(c, a);
abort_connection(c);
return;
}
if (a == 1) c->tries = 0;
info->chunk_remaining -= l;
c->from += l;
kill_buffer_data(rb, l);
if (!info->chunk_remaining && rb->len >= 1) {
if (rb->data[0] == 10) kill_buffer_data(rb, 1);
else {
if (rb->data[0] != 13 || (rb->len >= 2 && ((unsigned char *)rb->data)[1] != 10)) {
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
if (rb->len < 2) goto read_more;
kill_buffer_data(rb, 2);
}
info->chunk_remaining = -1;
goto next_chunk;
}
}
}
read_more:
read_from_socket(c, c->sock1, rb, read_http_data);
setcstate(c, S_TRANS);
}
static int get_header(struct read_buffer *rb)
{
int i;
if (rb->len <= 0) return 0;
if (rb->data[0] != 'H') return -2;
if (rb->len <= 1) return 0;
if (((unsigned char *)rb->data)[1] != 'T') return -2;
if (rb->len <= 2) return 0;
if (((unsigned char *)rb->data)[2] != 'T') return -2;
if (rb->len <= 3) return 0;
if (((unsigned char *)rb->data)[3] != 'P') return -2;
for (i = 0; i < rb->len; i++) {
unsigned char a = rb->data[i];
if (/*a < ' ' && a != 10 && a != 13*/ !a) return -1;
if (i < rb->len - 1 && a == 10 && rb->data[i + 1] == 10) return i + 2;
if (i < rb->len - 3 && a == 13) {
if (rb->data[i + 1] != 10) return -1;
if (rb->data[i + 2] == 13) {
if (rb->data[i + 3] != 10) return -1;
return i + 4;
}
}
}
return 0;
}
static void http_got_header(struct connection *c, struct read_buffer *rb)
{
off_t cf;
int state = c->state != S_PROC ? S_GETH : S_PROC;
unsigned char *head;
int a, h = 0, version = 0; /* against warning */
unsigned char *d;
struct cache_entry *e;
int previous_http_code;
struct http_connection_info *info;
unsigned char *host = remove_proxy_prefix(c->url);
set_connection_timeout(c);
info = c->info;
if (rb->close == 2) {
unsigned char *hs;
if (!c->tries && (hs = get_host_name(host))) {
if (info->bl_flags & BL_NO_CHARSET) {
del_blacklist_entry(hs, BL_NO_CHARSET);
} else {
add_blacklist_entry(hs, BL_NO_CHARSET);
c->tries = -1;
}
mem_free(hs);
}
setcstate(c, S_CANT_READ);
retry_connection(c);
return;
}
rb->close = 0;
again:
if ((a = get_header(rb)) == -1) {
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
if (!a) {
read_from_socket(c, c->sock1, rb, http_got_header);
setcstate(c, state);
return;
}
if (a != -2) {
head = memacpy(rb->data, a);
kill_buffer_data(rb, a);
} else {
head = stracpy(cast_uchar "HTTP/0.9 200 OK\r\nContent-Type: text/html\r\n\r\n");
}
if (get_http_code(head, &h, &version) || h == 101) {
mem_free(head);
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
if (check_http_server_bugs(host, c->info, head) && is_connection_restartable(c)) {
mem_free(head);
setcstate(c, S_RESTART);
retry_connection(c);
return;
}
if (h == 100) {
mem_free(head);
state = S_PROC;
goto again;
}
if (h < 200) {
mem_free(head);
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
#ifdef HAVE_SSL
if (info->https_forward && h >= 200 && h < 300) {
mem_free(head);
mem_free(c->info);
c->info = 0;
c->ssl = DUMMY;
continue_connection(c, &c->sock1, http_send_header);
return;
}
if (info->https_forward && h != 407) {
mem_free(head);
setcstate(c, S_HTTPS_FWD_ERROR);
abort_connection(c);
return;
}
#endif
if (h != 401 && h != 407 && !c->doh) {
unsigned char *cookie;
unsigned char *ch = head;
while ((cookie = parse_http_header(ch, cast_uchar "Set-Cookie", &ch))) {
set_cookie(host, cookie);
mem_free(cookie);
}
}
if (h == 204) {
mem_free(head);
http_end_request(c, 0, 0, S_HTTP_204);
return;
}
if (h == 304) {
mem_free(head);
http_end_request(c, 1, 0, S__OK);
return;
}
if (h == 416 && c->from) {
mem_free(head);
http_end_request(c, 0, 1, S__OK);
return;
}
if (h == 431) {
unsigned char *hs;
if (!(info->bl_flags & BL_NO_CHARSET) && (hs = get_host_name(host))) {
mem_free(head);
add_blacklist_entry(hs, BL_NO_CHARSET);
mem_free(hs);
c->tries = -1;
setcstate(c, S_RESTART);
retry_connection(c);
return;
}
}
if ((h == 500 || h == 502 || h == 503 || h == 504) && http_options.retry_internal_errors && is_connection_restartable(c)) {
/* !!! FIXME: wait some time ... */
if (is_last_try(c)) {
unsigned char *h;
if ((h = get_host_name(host))) {
add_blacklist_entry(h, BL_NO_BZIP2);
mem_free(h);
}
}
mem_free(head);
setcstate(c, S_RESTART);
retry_connection(c);
return;
}
if (!c->cache) {
if (get_connection_cache_entry(c)) {
mem_free(head);
setcstate(c, S_OUT_OF_MEM);
abort_connection(c);
return;
}
c->cache->refcount--;
}
e = c->cache;
previous_http_code = e->http_code;
e->http_code = h;
if (e->head) mem_free(e->head);
e->head = head;
if (c->doh)
e->expire_time = 1;
if ((d = parse_http_header(head, cast_uchar "Expires", NULL))) {
time_t t = parse_http_date(d);
if (t != (time_t)-1 && e->expire_time != 1) e->expire_time = t;
mem_free(d);
}
if ((d = parse_http_header(head, cast_uchar "Pragma", NULL))) {
if (!casecmp(d, cast_uchar "no-cache", 8)) e->expire_time = 1;
mem_free(d);
}
if ((d = parse_http_header(head, cast_uchar "Cache-Control", NULL))) {
unsigned char *f = d;
while (1) {
while (*f && (*f == ' ' || *f == ',')) f++;
if (!*f) break;
if (!casecmp(f, cast_uchar "no-cache", 8) || !casecmp(f, cast_uchar "must-revalidate", 15)) {
e->expire_time = 1;
}
if (!casecmp(f, cast_uchar "max-age=", 8)) {
if (e->expire_time != 1) {
e->expire_time = get_absolute_seconds();
e->expire_time = (time_t)((uttime)e->expire_time + (uttime)atoi(cast_const_char(f + 8)));
}
}
while (*f && *f != ',') f++;
}
mem_free(d);
}
#ifdef HAVE_SSL
if (c->ssl) {
if (e->ssl_info) mem_free(e->ssl_info);
e->ssl_info = get_cipher_string(c->ssl);
if (e->ssl_authority) mem_free(e->ssl_authority);
e->ssl_authority = stracpy(c->ssl->ca);
}
#endif
if (e->redirect) mem_free(e->redirect), e->redirect = NULL;
if ((h == 302 || h == 303 || h == 307 || h == 511) && !e->expire_time) e->expire_time = 1;
if (h == 301 || h == 302 || h == 303 || h == 307 || h == 308) {
if ((d = parse_http_header(e->head, cast_uchar "Location", NULL))) {
unsigned char *user, *ins;
unsigned char *newuser, *newpassword;
if (!parse_url(d, NULL, &user, NULL, NULL, NULL, &ins, NULL, NULL, NULL, NULL, NULL, NULL) && !user && ins && (newuser = get_user_name(host))) {
if (*newuser) {
int ins_off = (int)(ins - d);
newpassword = get_pass(host);
if (!newpassword) newpassword = stracpy(cast_uchar "");
add_to_strn(&newuser, cast_uchar ":");
add_to_strn(&newuser, newpassword);
add_to_strn(&newuser, cast_uchar "@");
extend_str(&d, (int)strlen(cast_const_char newuser));
ins = d + ins_off;
memmove(ins + strlen(cast_const_char newuser), ins, strlen(cast_const_char ins) + 1);
memcpy(ins, newuser, strlen(cast_const_char newuser));
mem_free(newpassword);
}
mem_free(newuser);
}
if (e->redirect) mem_free(e->redirect);
e->redirect = d;
if (h == 307 || h == 308) {
unsigned char *p;
if ((p = cast_uchar strchr(cast_const_char host, POST_CHAR)))
add_to_strn(&e->redirect, p);
}
}
}
if (!e->expire_time && strchr(cast_const_char c->url, POST_CHAR)) e->expire_time = 1;
info->close = 0;
info->length = -1;
info->version = version;
if ((d = parse_http_header(e->head, cast_uchar "Connection", NULL)) || (d = parse_http_header(e->head, cast_uchar "Proxy-Connection", NULL))) {
if (!casestrcmp(d, cast_uchar "close")) info->close = 1;
mem_free(d);
} else if (version < 11) info->close = 1;
cf = c->from;
c->from = 0;
if ((d = parse_http_header(e->head, cast_uchar "Content-Range", NULL))) {
if (strlen(cast_const_char d) > 6) {
d[5] = 0;
if (!(casestrcmp(d, cast_uchar "bytes")) && d[6] >= '0' && d[6] <= '9') {
my_strtoll_t f = my_strtoll(d + 6, NULL);
if (f >= 0 && (off_t)f >= 0 && (off_t)f == f) c->from = f;
}
}
mem_free(d);
} else if (h == 206) {
/* Hmm ... some servers send 206 partial but don't send Content-Range */
c->from = cf;
}
if (cf && !c->from && !c->unrestartable) c->unrestartable = 1;
if (c->from > cf || c->from < 0) {
setcstate(c, S_HTTP_ERROR);
abort_connection(c);
return;
}
if ((d = parse_http_header(e->head, cast_uchar "Content-Length", NULL))) {
unsigned char *ep;
my_strtoll_t l = my_strtoll(d, &ep);
if (!*ep && l >= 0 && (off_t)l >= 0 && (off_t)l == l) {
if (!info->close || version >= 11 || h / 100 == 3) info->length = l;
if (c->from + l >= 0) c->est_length = c->from + l;
}
mem_free(d);
}
if ((d = parse_http_header(e->head, cast_uchar "Accept-Ranges", NULL))) {
if (!casestrcmp(d, cast_uchar "none") && !c->unrestartable) c->unrestartable = 1;
mem_free(d);
} else {
if (!c->unrestartable && !c->from) c->unrestartable = 1;
}
if (info->bl_flags & BL_NO_RANGE && !c->unrestartable) c->unrestartable = 1;
if ((d = parse_http_header(e->head, cast_uchar "Transfer-Encoding", NULL))) {
if (!casestrcmp(d, cast_uchar "chunked")) {
info->length = -2;
info->chunk_remaining = -1;
}
mem_free(d);
}
if (!info->close && info->length == -1) info->close = 1;
if ((d = parse_http_header(e->head, cast_uchar "Last-Modified", NULL))) {
if (e->last_modified && casestrcmp(e->last_modified, d)) {
delete_entry_content(e);
if (c->from) {
c->from = 0;
mem_free(d);
setcstate(c, S_MODIFIED);
retry_connection(c);
return;
}
}
if (!e->last_modified) e->last_modified = d;
else mem_free(d);
}
if (!e->last_modified && (d = parse_http_header(e->head, cast_uchar "Date", NULL)))
e->last_modified = d;
if (info->length == -1 || (version < 11 && info->close)) rb->close = 1;
/*
* Truncate entry if:
* - we are using DNS-over-HTTPS
* - it is compressed (the mix of an old and new document
* would likely produce decompression error).
* - it was http authentication (the user doesn't need to see the
* authentication message).
*/
if (c->doh) {
truncate_entry(e, c->from, 0);
} else if ((d = parse_http_header(e->head, cast_uchar "Content-Encoding", NULL))) {
mem_free(d);
truncate_entry(e, c->from, 0);
} else if (previous_http_code == 401 || previous_http_code == 407) {
truncate_entry(e, c->from, 0);
}
if (info->https_forward && h == 407) {
http_end_request(c, 0, 1, S__OK);
return;
}
read_http_data(c, rb);
}
static void http_get_header(struct connection *c)
{
struct read_buffer *rb;
set_connection_timeout_keepal(c);
if (!(rb = alloc_read_buffer(c))) return;
rb->close = 1;
read_from_socket(c, c->sock1, rb, http_got_header);
}