2002-09-03 13:52:59 +02:00
|
|
|
|
/***************************************************************************
|
2004-05-12 14:04:38 +02:00
|
|
|
|
* _ _ ____ _
|
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
|
* | (__| |_| | _ <| |___
|
2001-01-03 10:29:33 +01:00
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
|
*
|
2009-01-13 23:21:14 +01:00
|
|
|
|
* Copyright (C) 1998 - 2009, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2001-01-03 10:29:33 +01:00
|
|
|
|
*
|
2002-09-03 13:52:59 +02:00
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
2004-05-12 14:04:38 +02:00
|
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 13:52:59 +02:00
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
2001-01-03 10:29:33 +01:00
|
|
|
|
*
|
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
|
* KIND, either express or implied.
|
|
|
|
|
*
|
|
|
|
|
* $Id$
|
2002-09-03 13:52:59 +02:00
|
|
|
|
***************************************************************************/
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
/***
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RECEIVING COOKIE INFORMATION
|
|
|
|
|
============================
|
|
|
|
|
|
|
|
|
|
struct CookieInfo *cookie_init(char *file);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
Inits a cookie struct to store data in a local file. This is always
|
|
|
|
|
called before any cookies are set.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
int cookies_set(struct CookieInfo *cookie, char *cookie_line);
|
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
The 'cookie_line' parameter is a full "Set-cookie:" line as
|
|
|
|
|
received from a server.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
The function need to replace previously stored lines that this new
|
|
|
|
|
line superceeds.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
It may remove lines that are expired.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
It should return an indication of success/error.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SENDING COOKIE INFORMATION
|
|
|
|
|
==========================
|
|
|
|
|
|
|
|
|
|
struct Cookies *cookie_getlist(struct CookieInfo *cookie,
|
|
|
|
|
char *host, char *path, bool secure);
|
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
For a given host and path, return a linked list of cookies that
|
|
|
|
|
the client should send to the server if used now. The secure
|
|
|
|
|
boolean informs the cookie if a secure connection is achieved or
|
|
|
|
|
not.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2004-10-06 09:50:18 +02:00
|
|
|
|
It shall only return cookies that haven't expired.
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
Example set of cookies:
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
Set-cookie: PRODUCTINFO=webxpress; domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: PERSONALIZE=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/ftgw; secure
|
|
|
|
|
Set-cookie: FidHist=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: FidOrder=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: DisPend=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: FidDis=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie:
|
|
|
|
|
Session_Key@6791a9e0-901a-11d0-a1c8-9b012c88aa77=none;expires=Monday,
|
|
|
|
|
13-Jun-1988 03:04:55 GMT; domain=.fidelity.com; path=/; secure
|
|
|
|
|
****/
|
|
|
|
|
|
2003-03-31 17:59:17 +02:00
|
|
|
|
|
2000-08-24 16:26:33 +02:00
|
|
|
|
#include "setup.h"
|
|
|
|
|
|
2004-12-06 00:59:32 +01:00
|
|
|
|
#if !defined(CURL_DISABLE_HTTP) && !defined(CURL_DISABLE_COOKIES)
|
2002-06-11 13:13:01 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
|
2005-07-28 00:17:14 +02:00
|
|
|
|
#define _MPRINTF_REPLACE /* without this on windows OS we get undefined reference to snprintf */
|
|
|
|
|
#include <curl/mprintf.h>
|
|
|
|
|
|
2003-08-11 11:55:11 +02:00
|
|
|
|
#include "urldata.h"
|
1999-12-29 15:20:26 +01:00
|
|
|
|
#include "cookie.h"
|
2000-05-22 16:12:12 +02:00
|
|
|
|
#include "strequal.h"
|
2001-05-30 13:06:56 +02:00
|
|
|
|
#include "strtok.h"
|
2003-08-11 11:55:11 +02:00
|
|
|
|
#include "sendf.h"
|
2009-04-21 13:46:16 +02:00
|
|
|
|
#include "curl_memory.h"
|
2005-08-17 10:55:43 +02:00
|
|
|
|
#include "share.h"
|
|
|
|
|
#include "strtoofft.h"
|
2008-10-23 13:49:19 +02:00
|
|
|
|
#include "rawstr.h"
|
2009-09-28 18:05:20 +02:00
|
|
|
|
#include "curl_memrchr.h"
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2000-10-09 13:12:34 +02:00
|
|
|
|
/* The last #include file should be: */
|
|
|
|
|
#include "memdebug.h"
|
|
|
|
|
|
2004-10-03 23:02:01 +02:00
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
static void freecookie(struct Cookie *co)
|
2002-05-07 11:58:13 +02:00
|
|
|
|
{
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(co->expirestr)
|
|
|
|
|
free(co->expirestr);
|
2002-05-07 11:58:13 +02:00
|
|
|
|
if(co->domain)
|
|
|
|
|
free(co->domain);
|
|
|
|
|
if(co->path)
|
|
|
|
|
free(co->path);
|
|
|
|
|
if(co->name)
|
|
|
|
|
free(co->name);
|
|
|
|
|
if(co->value)
|
|
|
|
|
free(co->value);
|
2004-10-16 15:54:40 +02:00
|
|
|
|
if(co->maxage)
|
|
|
|
|
free(co->maxage);
|
2004-12-22 23:33:31 +01:00
|
|
|
|
if(co->version)
|
|
|
|
|
free(co->version);
|
2002-05-07 11:58:13 +02:00
|
|
|
|
|
|
|
|
|
free(co);
|
|
|
|
|
}
|
|
|
|
|
|
2003-04-30 19:03:43 +02:00
|
|
|
|
static bool tailmatch(const char *little, const char *bigone)
|
|
|
|
|
{
|
2004-02-26 14:40:43 +01:00
|
|
|
|
size_t littlelen = strlen(little);
|
|
|
|
|
size_t biglen = strlen(bigone);
|
2003-04-30 19:03:43 +02:00
|
|
|
|
|
|
|
|
|
if(littlelen > biglen)
|
|
|
|
|
return FALSE;
|
|
|
|
|
|
2008-10-23 03:20:57 +02:00
|
|
|
|
return (bool)Curl_raw_equal(little, bigone+biglen-littlelen);
|
2003-04-30 19:03:43 +02:00
|
|
|
|
}
|
|
|
|
|
|
2005-08-17 10:55:43 +02:00
|
|
|
|
/*
|
|
|
|
|
* Load cookies from all given cookie files (CURLOPT_COOKIEFILE).
|
|
|
|
|
*/
|
|
|
|
|
void Curl_cookie_loadfiles(struct SessionHandle *data)
|
|
|
|
|
{
|
|
|
|
|
struct curl_slist *list = data->change.cookielist;
|
|
|
|
|
if(list) {
|
|
|
|
|
Curl_share_lock(data, CURL_LOCK_DATA_COOKIE, CURL_LOCK_ACCESS_SINGLE);
|
|
|
|
|
while(list) {
|
|
|
|
|
data->cookies = Curl_cookie_init(data,
|
|
|
|
|
list->data,
|
|
|
|
|
data->cookies,
|
|
|
|
|
data->set.cookiesession);
|
|
|
|
|
list = list->next;
|
|
|
|
|
}
|
|
|
|
|
Curl_share_unlock(data, CURL_LOCK_DATA_COOKIE);
|
|
|
|
|
curl_slist_free_all(data->change.cookielist); /* clean up list */
|
|
|
|
|
data->change.cookielist = NULL; /* don't do this again! */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2009-05-25 14:23:22 +02:00
|
|
|
|
/*
|
|
|
|
|
* strstore() makes a strdup() on the 'newstr' and if '*str' is non-NULL
|
|
|
|
|
* that will be freed before the allocated string is stored there.
|
|
|
|
|
*
|
|
|
|
|
* It is meant to easily replace strdup()
|
|
|
|
|
*/
|
|
|
|
|
static void strstore(char **str, const char *newstr)
|
|
|
|
|
{
|
|
|
|
|
if(*str)
|
|
|
|
|
free(*str);
|
|
|
|
|
*str = strdup(newstr);
|
|
|
|
|
}
|
|
|
|
|
|
2009-09-26 22:51:51 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_add()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Add a single cookie line to the cookie keeping object.
|
|
|
|
|
*
|
|
|
|
|
***************************************************************************/
|
|
|
|
|
|
2001-01-05 11:11:41 +01:00
|
|
|
|
struct Cookie *
|
2003-08-11 11:55:11 +02:00
|
|
|
|
Curl_cookie_add(struct SessionHandle *data,
|
|
|
|
|
/* The 'data' pointer here may be NULL at times, and thus
|
|
|
|
|
must only be used very carefully for things that can deal
|
|
|
|
|
with data being NULL. Such as infof() and similar */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2003-08-11 11:55:11 +02:00
|
|
|
|
struct CookieInfo *c,
|
2001-01-05 11:11:41 +01:00
|
|
|
|
bool httpheader, /* TRUE if HTTP header-style line */
|
2002-07-30 00:22:49 +02:00
|
|
|
|
char *lineptr, /* first character of the line */
|
2007-08-29 07:36:53 +02:00
|
|
|
|
const char *domain, /* default domain */
|
|
|
|
|
const char *path) /* full path used when this cookie is set,
|
2009-09-26 22:51:51 +02:00
|
|
|
|
used to get default path for the cookie
|
|
|
|
|
unless set */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *clist;
|
|
|
|
|
char name[MAX_NAME];
|
|
|
|
|
struct Cookie *co;
|
2001-08-23 16:05:25 +02:00
|
|
|
|
struct Cookie *lastc=NULL;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
time_t now = time(NULL);
|
|
|
|
|
bool replace_old = FALSE;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
bool badcookie = FALSE; /* cookies are good by default. mmmmm yummy */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2007-03-25 04:30:58 +02:00
|
|
|
|
#ifdef CURL_DISABLE_VERBOSE_STRINGS
|
|
|
|
|
(void)data;
|
|
|
|
|
#endif
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* First, alloc and init a new struct for it */
|
2008-09-06 06:47:14 +02:00
|
|
|
|
co = calloc(sizeof(struct Cookie), 1);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(!co)
|
|
|
|
|
return NULL; /* bail out if we're this low on memory */
|
|
|
|
|
|
|
|
|
|
if(httpheader) {
|
|
|
|
|
/* This line was read off a HTTP-header */
|
2007-08-29 07:36:53 +02:00
|
|
|
|
const char *ptr;
|
|
|
|
|
const char *sep;
|
|
|
|
|
const char *semiptr;
|
|
|
|
|
char *what;
|
2004-06-22 23:15:51 +02:00
|
|
|
|
|
|
|
|
|
what = malloc(MAX_COOKIE_LINE);
|
|
|
|
|
if(!what) {
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
semiptr=strchr(lineptr, ';'); /* first, find a semicolon */
|
2002-07-30 00:22:49 +02:00
|
|
|
|
|
2007-02-13 18:47:27 +01:00
|
|
|
|
while(*lineptr && ISBLANK(*lineptr))
|
2002-07-30 00:22:49 +02:00
|
|
|
|
lineptr++;
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
ptr = lineptr;
|
2000-09-26 00:14:42 +02:00
|
|
|
|
do {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* we have a <what>=<this> pair or a 'secure' word here */
|
2002-02-26 14:07:53 +01:00
|
|
|
|
sep = strchr(ptr, '=');
|
|
|
|
|
if(sep && (!semiptr || (semiptr>sep)) ) {
|
|
|
|
|
/*
|
|
|
|
|
* There is a = sign and if there was a semicolon too, which make sure
|
|
|
|
|
* that the semicolon comes _after_ the equal sign.
|
|
|
|
|
*/
|
|
|
|
|
|
2000-02-02 00:54:51 +01:00
|
|
|
|
name[0]=what[0]=0; /* init the buffers */
|
2002-02-26 14:07:53 +01:00
|
|
|
|
if(1 <= sscanf(ptr, "%" MAX_NAME_TXT "[^;=]=%"
|
2002-02-27 08:38:04 +01:00
|
|
|
|
MAX_COOKIE_LINE_TXT "[^;\r\n]",
|
1999-12-29 15:20:26 +01:00
|
|
|
|
name, what)) {
|
2009-05-25 14:23:22 +02:00
|
|
|
|
/* this is a <name>=<what> pair. We use strstore() below to properly
|
|
|
|
|
deal with received cookie headers that have the same string
|
|
|
|
|
property set more than once, and then we use the last one. */
|
2002-02-27 08:38:04 +01:00
|
|
|
|
|
2007-08-29 07:36:53 +02:00
|
|
|
|
const char *whatptr;
|
2002-04-14 20:21:17 +02:00
|
|
|
|
|
2002-02-27 08:38:04 +01:00
|
|
|
|
/* Strip off trailing whitespace from the 'what' */
|
2004-02-26 14:40:43 +01:00
|
|
|
|
size_t len=strlen(what);
|
2007-02-13 18:47:27 +01:00
|
|
|
|
while(len && ISBLANK(what[len-1])) {
|
2002-02-27 08:38:04 +01:00
|
|
|
|
what[len-1]=0;
|
|
|
|
|
len--;
|
|
|
|
|
}
|
|
|
|
|
|
2002-04-14 20:21:17 +02:00
|
|
|
|
/* Skip leading whitespace from the 'what' */
|
|
|
|
|
whatptr=what;
|
2007-02-13 18:47:27 +01:00
|
|
|
|
while(*whatptr && ISBLANK(*whatptr)) {
|
2002-04-14 20:21:17 +02:00
|
|
|
|
whatptr++;
|
|
|
|
|
}
|
|
|
|
|
|
2008-10-16 10:23:48 +02:00
|
|
|
|
if(Curl_raw_equal("path", name)) {
|
2009-05-25 14:23:22 +02:00
|
|
|
|
strstore(&co->path, whatptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->path) {
|
|
|
|
|
badcookie = TRUE; /* out of memory bad */
|
|
|
|
|
break;
|
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2008-10-16 10:23:48 +02:00
|
|
|
|
else if(Curl_raw_equal("domain", name)) {
|
2003-04-30 19:03:43 +02:00
|
|
|
|
/* note that this name may or may not have a preceeding dot, but
|
|
|
|
|
we don't care about that, we treat the names the same anyway */
|
|
|
|
|
|
2004-01-29 14:56:45 +01:00
|
|
|
|
const char *domptr=whatptr;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
int dotcount=1;
|
|
|
|
|
|
2004-08-04 14:26:27 +02:00
|
|
|
|
/* Count the dots, we need to make sure that there are enough
|
|
|
|
|
of them. */
|
2003-04-30 19:03:43 +02:00
|
|
|
|
|
|
|
|
|
if('.' == whatptr[0])
|
|
|
|
|
/* don't count the initial dot, assume it */
|
2004-01-29 14:56:45 +01:00
|
|
|
|
domptr++;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
|
|
|
|
|
do {
|
2004-01-29 14:56:45 +01:00
|
|
|
|
domptr = strchr(domptr, '.');
|
|
|
|
|
if(domptr) {
|
|
|
|
|
domptr++;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
dotcount++;
|
|
|
|
|
}
|
2004-01-29 14:56:45 +01:00
|
|
|
|
} while(domptr);
|
2003-04-30 19:03:43 +02:00
|
|
|
|
|
2003-08-05 01:05:57 +02:00
|
|
|
|
/* The original Netscape cookie spec defined that this domain name
|
|
|
|
|
MUST have three dots (or two if one of the seven holy TLDs),
|
|
|
|
|
but it seems that these kinds of cookies are in use "out there"
|
|
|
|
|
so we cannot be that strict. I've therefore lowered the check
|
|
|
|
|
to not allow less than two dots. */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2003-08-05 01:05:57 +02:00
|
|
|
|
if(dotcount < 2) {
|
2003-04-30 19:03:43 +02:00
|
|
|
|
/* Received and skipped a cookie with a domain using too few
|
|
|
|
|
dots. */
|
|
|
|
|
badcookie=TRUE; /* mark this as a bad cookie */
|
2004-07-26 17:42:07 +02:00
|
|
|
|
infof(data, "skipped cookie with illegal dotcount domain: %s\n",
|
2003-08-11 11:55:11 +02:00
|
|
|
|
whatptr);
|
2003-05-16 00:28:19 +02:00
|
|
|
|
}
|
2003-04-30 19:03:43 +02:00
|
|
|
|
else {
|
|
|
|
|
/* Now, we make sure that our host is within the given domain,
|
|
|
|
|
or the given domain is not valid and thus cannot be set. */
|
|
|
|
|
|
2004-05-21 22:40:15 +02:00
|
|
|
|
if('.' == whatptr[0])
|
|
|
|
|
whatptr++; /* ignore preceeding dot */
|
|
|
|
|
|
2003-04-30 19:03:43 +02:00
|
|
|
|
if(!domain || tailmatch(whatptr, domain)) {
|
2004-01-29 14:56:45 +01:00
|
|
|
|
const char *tailptr=whatptr;
|
|
|
|
|
if(tailptr[0] == '.')
|
|
|
|
|
tailptr++;
|
2009-05-25 14:23:22 +02:00
|
|
|
|
strstore(&co->domain, tailptr); /* don't prefix w/dots
|
|
|
|
|
internally */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->domain) {
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2003-04-30 19:03:43 +02:00
|
|
|
|
co->tailmatch=TRUE; /* we always do that if the domain name was
|
|
|
|
|
given */
|
|
|
|
|
}
|
2003-05-16 00:28:19 +02:00
|
|
|
|
else {
|
2003-04-30 19:03:43 +02:00
|
|
|
|
/* we did not get a tailmatch and then the attempted set domain
|
|
|
|
|
is not a domain to which the current host belongs. Mark as
|
|
|
|
|
bad. */
|
|
|
|
|
badcookie=TRUE;
|
2004-07-26 17:42:07 +02:00
|
|
|
|
infof(data, "skipped cookie with bad tailmatch domain: %s\n",
|
2003-08-11 11:55:11 +02:00
|
|
|
|
whatptr);
|
2003-05-16 00:28:19 +02:00
|
|
|
|
}
|
2003-04-30 19:03:43 +02:00
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2008-10-16 10:23:48 +02:00
|
|
|
|
else if(Curl_raw_equal("version", name)) {
|
2009-05-25 14:23:22 +02:00
|
|
|
|
strstore(&co->version, whatptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->version) {
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2000-02-02 00:54:51 +01:00
|
|
|
|
}
|
2008-10-16 10:23:48 +02:00
|
|
|
|
else if(Curl_raw_equal("max-age", name)) {
|
2000-02-02 00:54:51 +01:00
|
|
|
|
/* Defined in RFC2109:
|
|
|
|
|
|
|
|
|
|
Optional. The Max-Age attribute defines the lifetime of the
|
|
|
|
|
cookie, in seconds. The delta-seconds value is a decimal non-
|
|
|
|
|
negative integer. After delta-seconds seconds elapse, the
|
|
|
|
|
client should discard the cookie. A value of zero means the
|
|
|
|
|
cookie should be discarded immediately.
|
|
|
|
|
|
|
|
|
|
*/
|
2009-05-25 14:23:22 +02:00
|
|
|
|
strstore(&co->maxage, whatptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->maxage) {
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2000-02-02 00:54:51 +01:00
|
|
|
|
co->expires =
|
2008-09-08 13:36:19 +02:00
|
|
|
|
atoi((*co->maxage=='\"')?&co->maxage[1]:&co->maxage[0]) +
|
|
|
|
|
(long)now;
|
2000-02-02 00:54:51 +01:00
|
|
|
|
}
|
2008-10-16 10:23:48 +02:00
|
|
|
|
else if(Curl_raw_equal("expires", name)) {
|
2009-05-25 14:23:22 +02:00
|
|
|
|
strstore(&co->expirestr, whatptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->expirestr) {
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
2008-09-08 13:36:19 +02:00
|
|
|
|
/* Note that we store -1 in 'expires' here if the date couldn't
|
|
|
|
|
get parsed for whatever reason. This will have the effect that
|
|
|
|
|
the cookie won't match. */
|
2005-08-17 11:11:27 +02:00
|
|
|
|
co->expires = curl_getdate(what, &now);
|
2009-09-25 22:26:44 +02:00
|
|
|
|
|
2009-09-10 23:06:50 +02:00
|
|
|
|
/* Session cookies have expires set to 0 so if we get that back
|
2009-09-25 22:26:44 +02:00
|
|
|
|
from the date parser let's add a second to make it a
|
2009-09-10 23:06:50 +02:00
|
|
|
|
non-session cookie */
|
|
|
|
|
if (co->expires == 0)
|
2009-09-25 22:26:44 +02:00
|
|
|
|
co->expires = 1;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else if(!co->name) {
|
|
|
|
|
co->name = strdup(name);
|
2002-04-14 20:21:17 +02:00
|
|
|
|
co->value = strdup(whatptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->name || !co->value) {
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
break;
|
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2001-08-14 10:17:29 +02:00
|
|
|
|
/*
|
|
|
|
|
else this is the second (or more) name we don't know
|
|
|
|
|
about! */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* this is an "illegal" <what>=<this> pair */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(sscanf(ptr, "%" MAX_COOKIE_LINE_TXT "[^;\r\n]",
|
1999-12-29 15:20:26 +01:00
|
|
|
|
what)) {
|
2008-10-16 10:23:48 +02:00
|
|
|
|
if(Curl_raw_equal("secure", what)) {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
co->secure = TRUE;
|
2008-01-31 13:21:57 +01:00
|
|
|
|
}
|
2008-10-16 10:23:48 +02:00
|
|
|
|
else if (Curl_raw_equal("httponly", what)) {
|
2008-01-31 13:21:57 +01:00
|
|
|
|
co->httponly = TRUE;
|
|
|
|
|
}
|
2001-08-14 10:17:29 +02:00
|
|
|
|
/* else,
|
|
|
|
|
unsupported keyword without assign! */
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
2002-02-26 14:07:53 +01:00
|
|
|
|
if(!semiptr || !*semiptr) {
|
|
|
|
|
/* we already know there are no more cookies */
|
|
|
|
|
semiptr = NULL;
|
|
|
|
|
continue;
|
|
|
|
|
}
|
2000-09-26 00:14:42 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
ptr=semiptr+1;
|
2009-06-10 23:26:11 +02:00
|
|
|
|
while(*ptr && ISBLANK(*ptr))
|
1999-12-29 15:20:26 +01:00
|
|
|
|
ptr++;
|
|
|
|
|
semiptr=strchr(ptr, ';'); /* now, find the next semicolon */
|
2002-01-08 00:05:36 +01:00
|
|
|
|
|
|
|
|
|
if(!semiptr && *ptr)
|
|
|
|
|
/* There are no more semicolons, but there's a final name=value pair
|
|
|
|
|
coming up */
|
2002-02-26 14:07:53 +01:00
|
|
|
|
semiptr=strchr(ptr, '\0');
|
2000-09-26 00:14:42 +02:00
|
|
|
|
} while(semiptr);
|
2001-09-26 09:08:29 +02:00
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!badcookie && !co->domain) {
|
|
|
|
|
if(domain) {
|
|
|
|
|
/* no domain was given in the header line, set the default */
|
|
|
|
|
co->domain=strdup(domain);
|
|
|
|
|
if(!co->domain)
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
}
|
2002-02-26 14:07:53 +01:00
|
|
|
|
}
|
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!badcookie && !co->path && path) {
|
2009-09-26 22:51:51 +02:00
|
|
|
|
/* No path was given in the header line, set the default.
|
|
|
|
|
Note that the passed-in path to this function MAY have a '?' and
|
|
|
|
|
following part that MUST not be stored as part of the path. */
|
|
|
|
|
char *queryp = strchr(path, '?');
|
|
|
|
|
|
|
|
|
|
/* queryp is where the interesting part of the path ends, so now we
|
|
|
|
|
want to the find the last */
|
|
|
|
|
char *endslash;
|
|
|
|
|
if(!queryp)
|
|
|
|
|
endslash = strrchr(path, '/');
|
|
|
|
|
else
|
2009-09-28 19:01:23 +02:00
|
|
|
|
endslash = memrchr(path, '/', (size_t)(queryp - path));
|
2003-04-30 19:03:43 +02:00
|
|
|
|
if(endslash) {
|
2009-09-28 19:01:23 +02:00
|
|
|
|
size_t pathlen = (size_t)(endslash-path+1); /* include ending slash */
|
2003-04-30 19:03:43 +02:00
|
|
|
|
co->path=malloc(pathlen+1); /* one extra for the zero byte */
|
|
|
|
|
if(co->path) {
|
|
|
|
|
memcpy(co->path, path, pathlen);
|
|
|
|
|
co->path[pathlen]=0; /* zero terminate */
|
|
|
|
|
}
|
2004-05-12 14:04:38 +02:00
|
|
|
|
else
|
|
|
|
|
badcookie = TRUE;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
}
|
|
|
|
|
}
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2004-06-22 23:15:51 +02:00
|
|
|
|
free(what);
|
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(badcookie || !co->name) {
|
|
|
|
|
/* we didn't get a cookie name or a bad one,
|
|
|
|
|
this is an illegal line, bail out */
|
|
|
|
|
freecookie(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* This line is NOT a HTTP header style line, we do offer support for
|
|
|
|
|
reading the odd netscape cookies-file format here */
|
2007-08-29 07:36:53 +02:00
|
|
|
|
char *ptr;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
char *firstptr;
|
2009-01-15 09:32:58 +01:00
|
|
|
|
char *tok_buf=NULL;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
int fields;
|
|
|
|
|
|
2008-09-08 13:36:19 +02:00
|
|
|
|
/* IE introduced HTTP-only cookies to prevent XSS attacks. Cookies
|
|
|
|
|
marked with httpOnly after the domain name are not accessible
|
|
|
|
|
from javascripts, but since curl does not operate at javascript
|
|
|
|
|
level, we include them anyway. In Firefox's cookie files, these
|
2008-01-31 13:21:57 +01:00
|
|
|
|
lines are preceeded with #HttpOnly_ and then everything is
|
|
|
|
|
as usual, so we skip 10 characters of the line..
|
|
|
|
|
*/
|
|
|
|
|
if (strncmp(lineptr, "#HttpOnly_", 10) == 0) {
|
|
|
|
|
lineptr += 10;
|
|
|
|
|
co->httponly = TRUE;
|
|
|
|
|
}
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(lineptr[0]=='#') {
|
|
|
|
|
/* don't even try the comments */
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
/* strip off the possible end-of-line characters */
|
2000-05-22 16:12:12 +02:00
|
|
|
|
ptr=strchr(lineptr, '\r');
|
|
|
|
|
if(ptr)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*ptr=0; /* clear it */
|
2000-05-22 16:12:12 +02:00
|
|
|
|
ptr=strchr(lineptr, '\n');
|
|
|
|
|
if(ptr)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*ptr=0; /* clear it */
|
|
|
|
|
|
2004-05-12 14:04:38 +02:00
|
|
|
|
firstptr=strtok_r(lineptr, "\t", &tok_buf); /* tokenize it on the TAB */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
/* Here's a quick check to eliminate normal HTTP-headers from this */
|
|
|
|
|
if(!firstptr || strchr(firstptr, ':')) {
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Now loop through the fields and init the struct we already have
|
|
|
|
|
allocated */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
for(ptr=firstptr, fields=0; ptr && !badcookie;
|
2003-04-30 19:03:43 +02:00
|
|
|
|
ptr=strtok_r(NULL, "\t", &tok_buf), fields++) {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
switch(fields) {
|
|
|
|
|
case 0:
|
2003-05-16 00:28:19 +02:00
|
|
|
|
if(ptr[0]=='.') /* skip preceeding dots */
|
|
|
|
|
ptr++;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
co->domain = strdup(ptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->domain)
|
|
|
|
|
badcookie = TRUE;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 1:
|
2001-05-23 15:04:19 +02:00
|
|
|
|
/* This field got its explanation on the 23rd of May 2001 by
|
|
|
|
|
Andr<EFBFBD>s Garc<EFBFBD>a:
|
|
|
|
|
|
|
|
|
|
flag: A TRUE/FALSE value indicating if all machines within a given
|
|
|
|
|
domain can access the variable. This value is set automatically by
|
|
|
|
|
the browser, depending on the value you set for the domain.
|
|
|
|
|
|
|
|
|
|
As far as I can see, it is set to true when the cookie says
|
|
|
|
|
.domain.com and to false when the domain is complete www.domain.com
|
|
|
|
|
*/
|
2008-10-16 10:23:48 +02:00
|
|
|
|
co->tailmatch=(bool)Curl_raw_equal(ptr, "TRUE"); /* store information */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 2:
|
2001-05-23 11:26:45 +02:00
|
|
|
|
/* It turns out, that sometimes the file format allows the path
|
|
|
|
|
field to remain not filled in, we try to detect this and work
|
|
|
|
|
around it! Andr<EFBFBD>s Garc<EFBFBD>a made us aware of this... */
|
2007-11-07 10:21:35 +01:00
|
|
|
|
if(strcmp("TRUE", ptr) && strcmp("FALSE", ptr)) {
|
2001-05-23 11:26:45 +02:00
|
|
|
|
/* only if the path doesn't look like a boolean option! */
|
|
|
|
|
co->path = strdup(ptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->path)
|
|
|
|
|
badcookie = TRUE;
|
2001-05-23 11:26:45 +02:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
/* this doesn't look like a path, make one up! */
|
|
|
|
|
co->path = strdup("/");
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->path)
|
|
|
|
|
badcookie = TRUE;
|
2001-05-23 11:26:45 +02:00
|
|
|
|
fields++; /* add a field and fall down to secure */
|
|
|
|
|
/* FALLTHROUGH */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
case 3:
|
2008-10-16 10:23:48 +02:00
|
|
|
|
co->secure = (bool)Curl_raw_equal(ptr, "TRUE");
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 4:
|
2005-08-17 10:55:43 +02:00
|
|
|
|
co->expires = curlx_strtoofft(ptr, NULL, 10);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 5:
|
|
|
|
|
co->name = strdup(ptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->name)
|
|
|
|
|
badcookie = TRUE;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 6:
|
|
|
|
|
co->value = strdup(ptr);
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->value)
|
|
|
|
|
badcookie = TRUE;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
2003-08-11 11:55:11 +02:00
|
|
|
|
if(6 == fields) {
|
|
|
|
|
/* we got a cookie with blank contents, fix it */
|
|
|
|
|
co->value = strdup("");
|
2004-05-12 14:04:38 +02:00
|
|
|
|
if(!co->value)
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
else
|
|
|
|
|
fields++;
|
2003-08-11 11:55:11 +02:00
|
|
|
|
}
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
|
|
|
|
if(!badcookie && (7 != fields))
|
|
|
|
|
/* we did not find the sufficient number of fields */
|
|
|
|
|
badcookie = TRUE;
|
|
|
|
|
|
|
|
|
|
if(badcookie) {
|
|
|
|
|
freecookie(co);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2002-05-07 11:58:13 +02:00
|
|
|
|
if(!c->running && /* read from a file */
|
|
|
|
|
c->newsession && /* clean session cookies */
|
|
|
|
|
!co->expires) { /* this is a session cookie since it doesn't expire! */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
freecookie(co);
|
2002-05-07 11:58:13 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
co->livecookie = c->running;
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* now, we have parsed the incoming line, we must now check if this
|
|
|
|
|
superceeds an already existing cookie, which it may if the previous have
|
|
|
|
|
the same domain and path as this */
|
|
|
|
|
|
|
|
|
|
clist = c->cookies;
|
|
|
|
|
replace_old = FALSE;
|
|
|
|
|
while(clist) {
|
2008-10-16 10:23:48 +02:00
|
|
|
|
if(Curl_raw_equal(clist->name, co->name)) {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* the names are identical */
|
|
|
|
|
|
|
|
|
|
if(clist->domain && co->domain) {
|
2008-10-16 10:23:48 +02:00
|
|
|
|
if(Curl_raw_equal(clist->domain, co->domain))
|
2003-05-16 00:28:19 +02:00
|
|
|
|
/* The domains are identical */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
replace_old=TRUE;
|
|
|
|
|
}
|
|
|
|
|
else if(!clist->domain && !co->domain)
|
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
|
|
|
|
|
if(replace_old) {
|
|
|
|
|
/* the domains were identical */
|
|
|
|
|
|
|
|
|
|
if(clist->path && co->path) {
|
2008-10-16 10:23:48 +02:00
|
|
|
|
if(Curl_raw_equal(clist->path, co->path)) {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
replace_old = FALSE;
|
|
|
|
|
}
|
|
|
|
|
else if(!clist->path && !co->path)
|
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
else
|
|
|
|
|
replace_old = FALSE;
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(replace_old && !co->livecookie && clist->livecookie) {
|
|
|
|
|
/* Both cookies matched fine, except that the already present
|
|
|
|
|
cookie is "live", which means it was set from a header, while
|
|
|
|
|
the new one isn't "live" and thus only read from a file. We let
|
|
|
|
|
live cookies stay alive */
|
|
|
|
|
|
|
|
|
|
/* Free the newcomer and get out of here! */
|
2004-05-12 14:04:38 +02:00
|
|
|
|
freecookie(co);
|
2001-08-23 16:05:25 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(replace_old) {
|
|
|
|
|
co->next = clist->next; /* get the next-pointer first */
|
|
|
|
|
|
|
|
|
|
/* then free all the old pointers */
|
2008-10-13 23:03:12 +02:00
|
|
|
|
free(clist->name);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(clist->value)
|
|
|
|
|
free(clist->value);
|
|
|
|
|
if(clist->domain)
|
|
|
|
|
free(clist->domain);
|
|
|
|
|
if(clist->path)
|
|
|
|
|
free(clist->path);
|
|
|
|
|
if(clist->expirestr)
|
|
|
|
|
free(clist->expirestr);
|
|
|
|
|
|
2000-02-02 00:54:51 +01:00
|
|
|
|
if(clist->version)
|
|
|
|
|
free(clist->version);
|
|
|
|
|
if(clist->maxage)
|
|
|
|
|
free(clist->maxage);
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*clist = *co; /* then store all the new data */
|
2001-10-24 13:36:55 +02:00
|
|
|
|
|
|
|
|
|
free(co); /* free the newly alloced memory */
|
|
|
|
|
co = clist; /* point to the previous struct instead */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2002-01-07 15:56:15 +01:00
|
|
|
|
/* We have replaced a cookie, now skip the rest of the list but
|
|
|
|
|
make sure the 'lastc' pointer is properly set */
|
|
|
|
|
do {
|
|
|
|
|
lastc = clist;
|
|
|
|
|
clist = clist->next;
|
|
|
|
|
} while(clist);
|
|
|
|
|
break;
|
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2001-08-23 16:05:25 +02:00
|
|
|
|
lastc = clist;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
clist = clist->next;
|
|
|
|
|
}
|
|
|
|
|
|
2003-08-11 11:55:11 +02:00
|
|
|
|
if(c->running)
|
|
|
|
|
/* Only show this when NOT reading the cookies from a file */
|
|
|
|
|
infof(data, "%s cookie %s=\"%s\" for domain %s, path %s, expire %d\n",
|
|
|
|
|
replace_old?"Replaced":"Added", co->name, co->value,
|
|
|
|
|
co->domain, co->path, co->expires);
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(!replace_old) {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
/* then make the last item point on this new one */
|
|
|
|
|
if(lastc)
|
|
|
|
|
lastc->next = co;
|
|
|
|
|
else
|
|
|
|
|
c->cookies = co;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2001-08-23 16:05:25 +02:00
|
|
|
|
|
2001-08-29 11:32:18 +02:00
|
|
|
|
c->numcookies++; /* one more cookie in the jar */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
return co;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_init()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Inits a cookie struct to read data from a local file. This is always
|
|
|
|
|
* called before any cookies are set. File may be NULL.
|
|
|
|
|
*
|
2002-05-07 11:58:13 +02:00
|
|
|
|
* If 'newsession' is TRUE, discard all "session cookies" on read from file.
|
|
|
|
|
*
|
1999-12-29 15:20:26 +01:00
|
|
|
|
****************************************************************************/
|
2003-08-11 11:55:11 +02:00
|
|
|
|
struct CookieInfo *Curl_cookie_init(struct SessionHandle *data,
|
2007-08-29 07:36:53 +02:00
|
|
|
|
const char *file,
|
2002-05-07 11:58:13 +02:00
|
|
|
|
struct CookieInfo *inc,
|
|
|
|
|
bool newsession)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct CookieInfo *c;
|
|
|
|
|
FILE *fp;
|
2000-02-11 00:14:53 +01:00
|
|
|
|
bool fromfile=TRUE;
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(NULL == inc) {
|
|
|
|
|
/* we didn't get a struct, create one */
|
2008-09-06 06:47:14 +02:00
|
|
|
|
c = calloc(1, sizeof(struct CookieInfo));
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(!c)
|
|
|
|
|
return NULL; /* failed to get memory */
|
|
|
|
|
c->filename = strdup(file?file:"none"); /* copy the name just in case */
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* we got an already existing one, use that */
|
|
|
|
|
c = inc;
|
|
|
|
|
}
|
|
|
|
|
c->running = FALSE; /* this is not running, this is init */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2001-10-10 14:48:32 +02:00
|
|
|
|
if(file && strequal(file, "-")) {
|
2000-02-11 00:14:53 +01:00
|
|
|
|
fp = stdin;
|
|
|
|
|
fromfile=FALSE;
|
|
|
|
|
}
|
2005-03-04 01:26:50 +01:00
|
|
|
|
else if(file && !*file) {
|
|
|
|
|
/* points to a "" string */
|
|
|
|
|
fp = NULL;
|
|
|
|
|
}
|
2000-02-11 00:14:53 +01:00
|
|
|
|
else
|
|
|
|
|
fp = file?fopen(file, "r"):NULL;
|
|
|
|
|
|
2002-05-07 11:58:13 +02:00
|
|
|
|
c->newsession = newsession; /* new session? */
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(fp) {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
char *lineptr;
|
|
|
|
|
bool headerline;
|
|
|
|
|
|
2008-09-06 07:29:05 +02:00
|
|
|
|
char *line = malloc(MAX_COOKIE_LINE);
|
2004-06-30 14:05:07 +02:00
|
|
|
|
if(line) {
|
|
|
|
|
while(fgets(line, MAX_COOKIE_LINE, fp)) {
|
|
|
|
|
if(checkprefix("Set-Cookie:", line)) {
|
|
|
|
|
/* This is a cookie line, get it! */
|
|
|
|
|
lineptr=&line[11];
|
|
|
|
|
headerline=TRUE;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
lineptr=line;
|
|
|
|
|
headerline=FALSE;
|
|
|
|
|
}
|
2007-02-13 18:47:27 +01:00
|
|
|
|
while(*lineptr && ISBLANK(*lineptr))
|
2004-06-30 14:05:07 +02:00
|
|
|
|
lineptr++;
|
|
|
|
|
|
|
|
|
|
Curl_cookie_add(data, c, headerline, lineptr, NULL, NULL);
|
|
|
|
|
}
|
|
|
|
|
free(line); /* free the line buffer */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2000-02-11 00:14:53 +01:00
|
|
|
|
if(fromfile)
|
|
|
|
|
fclose(fp);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2002-05-07 11:58:13 +02:00
|
|
|
|
c->running = TRUE; /* now, we're running */
|
2001-08-23 16:05:25 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_getlist()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* For a given host and path, return a linked list of cookies that the
|
|
|
|
|
* client should send to the server if used now. The secure boolean informs
|
|
|
|
|
* the cookie if a secure connection is achieved or not.
|
|
|
|
|
*
|
|
|
|
|
* It shall only return cookies that haven't expired.
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
2001-01-05 11:11:41 +01:00
|
|
|
|
struct Cookie *Curl_cookie_getlist(struct CookieInfo *c,
|
2007-08-29 07:36:53 +02:00
|
|
|
|
const char *host, const char *path,
|
2008-09-08 13:36:19 +02:00
|
|
|
|
bool secure)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
2006-05-25 00:46:38 +02:00
|
|
|
|
struct Cookie *newco;
|
|
|
|
|
struct Cookie *co;
|
|
|
|
|
time_t now = time(NULL);
|
|
|
|
|
struct Cookie *mainco=NULL;
|
|
|
|
|
|
|
|
|
|
if(!c || !c->cookies)
|
|
|
|
|
return NULL; /* no cookie struct or no cookies in the struct */
|
|
|
|
|
|
|
|
|
|
co = c->cookies;
|
|
|
|
|
|
|
|
|
|
while(co) {
|
|
|
|
|
/* only process this cookie if it is not expired or had no expire
|
|
|
|
|
date AND that if the cookie requires we're secure we must only
|
|
|
|
|
continue if we are! */
|
2008-09-08 13:36:19 +02:00
|
|
|
|
if( (!co->expires || (co->expires > now)) &&
|
2006-05-25 00:46:38 +02:00
|
|
|
|
(co->secure?secure:TRUE) ) {
|
|
|
|
|
|
|
|
|
|
/* now check if the domain is correct */
|
|
|
|
|
if(!co->domain ||
|
|
|
|
|
(co->tailmatch && tailmatch(co->domain, host)) ||
|
2008-10-16 10:23:48 +02:00
|
|
|
|
(!co->tailmatch && Curl_raw_equal(host, co->domain)) ) {
|
2006-05-25 00:46:38 +02:00
|
|
|
|
/* the right part of the host matches the domain stuff in the
|
|
|
|
|
cookie data */
|
|
|
|
|
|
|
|
|
|
/* now check the left part of the path with the cookies path
|
|
|
|
|
requirement */
|
|
|
|
|
if(!co->path ||
|
2006-07-08 20:52:08 +02:00
|
|
|
|
/* not using checkprefix() because matching should be
|
|
|
|
|
case-sensitive */
|
|
|
|
|
!strncmp(co->path, path, strlen(co->path)) ) {
|
2006-05-25 00:46:38 +02:00
|
|
|
|
|
|
|
|
|
/* and now, we know this is a match and we should create an
|
|
|
|
|
entry for the return-linked-list */
|
|
|
|
|
|
2008-09-06 07:29:05 +02:00
|
|
|
|
newco = malloc(sizeof(struct Cookie));
|
2006-05-25 00:46:38 +02:00
|
|
|
|
if(newco) {
|
|
|
|
|
/* first, copy the whole source cookie: */
|
|
|
|
|
memcpy(newco, co, sizeof(struct Cookie));
|
|
|
|
|
|
|
|
|
|
/* then modify our next */
|
|
|
|
|
newco->next = mainco;
|
|
|
|
|
|
|
|
|
|
/* point the main to us */
|
|
|
|
|
mainco = newco;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* failure, clear up the allocated chain and return NULL */
|
|
|
|
|
while(mainco) {
|
|
|
|
|
co = mainco->next;
|
|
|
|
|
free(mainco);
|
|
|
|
|
mainco = co;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
co = co->next;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return mainco; /* return the new list */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2006-05-25 00:46:38 +02:00
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
|
|
|
|
* Curl_cookie_clearall()
|
|
|
|
|
*
|
|
|
|
|
* Clear all existing cookies and reset the counter.
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
void Curl_cookie_clearall(struct CookieInfo *cookies)
|
|
|
|
|
{
|
2007-01-14 00:32:14 +01:00
|
|
|
|
if(cookies) {
|
2008-01-23 23:22:12 +01:00
|
|
|
|
Curl_cookie_freelist(cookies->cookies, TRUE);
|
2007-01-14 00:32:14 +01:00
|
|
|
|
cookies->cookies = NULL;
|
|
|
|
|
cookies->numcookies = 0;
|
|
|
|
|
}
|
2006-05-25 00:46:38 +02:00
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_freelist()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Free a list of cookies previously returned by Curl_cookie_getlist();
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
2008-01-23 23:22:12 +01:00
|
|
|
|
* The 'cookiestoo' argument tells this function whether to just free the
|
|
|
|
|
* list or actually also free all cookies within the list as well.
|
|
|
|
|
*
|
1999-12-29 15:20:26 +01:00
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
2008-01-23 23:22:12 +01:00
|
|
|
|
void Curl_cookie_freelist(struct Cookie *co, bool cookiestoo)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
2006-05-25 00:46:38 +02:00
|
|
|
|
struct Cookie *next;
|
|
|
|
|
if(co) {
|
|
|
|
|
while(co) {
|
|
|
|
|
next = co->next;
|
2008-01-23 23:22:12 +01:00
|
|
|
|
if(cookiestoo)
|
|
|
|
|
freecookie(co);
|
|
|
|
|
else
|
|
|
|
|
free(co); /* we only free the struct since the "members" are all just
|
|
|
|
|
pointed out in the main cookie list! */
|
2006-05-25 00:46:38 +02:00
|
|
|
|
co = next;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
|
|
|
|
* Curl_cookie_clearsess()
|
|
|
|
|
*
|
|
|
|
|
* Free all session cookies in the cookies list.
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
void Curl_cookie_clearsess(struct CookieInfo *cookies)
|
|
|
|
|
{
|
|
|
|
|
struct Cookie *first, *curr, *next, *prev = NULL;
|
|
|
|
|
|
2009-01-13 23:21:14 +01:00
|
|
|
|
if(!cookies->cookies || !cookies->cookies)
|
2006-05-25 00:46:38 +02:00
|
|
|
|
return;
|
|
|
|
|
|
|
|
|
|
first = curr = prev = cookies->cookies;
|
|
|
|
|
|
|
|
|
|
for(; curr; curr = next) {
|
|
|
|
|
next = curr->next;
|
|
|
|
|
if(!curr->expires) {
|
|
|
|
|
if(first == curr)
|
|
|
|
|
first = next;
|
|
|
|
|
|
|
|
|
|
if(prev == curr)
|
|
|
|
|
prev = next;
|
|
|
|
|
else
|
|
|
|
|
prev->next = next;
|
|
|
|
|
|
2008-01-23 23:22:12 +01:00
|
|
|
|
freecookie(curr);
|
2006-05-25 00:46:38 +02:00
|
|
|
|
cookies->numcookies--;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
prev = curr;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
cookies->cookies = first;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2006-05-25 00:46:38 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_cleanup()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Free a "cookie object" previous created with cookie_init().
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
2001-01-05 11:11:41 +01:00
|
|
|
|
void Curl_cookie_cleanup(struct CookieInfo *c)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
2006-05-25 00:46:38 +02:00
|
|
|
|
struct Cookie *co;
|
|
|
|
|
struct Cookie *next;
|
|
|
|
|
if(c) {
|
|
|
|
|
if(c->filename)
|
|
|
|
|
free(c->filename);
|
|
|
|
|
co = c->cookies;
|
|
|
|
|
|
|
|
|
|
while(co) {
|
|
|
|
|
next = co->next;
|
|
|
|
|
freecookie(co);
|
|
|
|
|
co = next;
|
|
|
|
|
}
|
|
|
|
|
free(c); /* free the base struct as well */
|
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2005-07-28 00:17:14 +02:00
|
|
|
|
/* get_netscape_format()
|
|
|
|
|
*
|
|
|
|
|
* Formats a string for Netscape output file, w/o a newline at the end.
|
|
|
|
|
*
|
|
|
|
|
* Function returns a char * to a formatted line. Has to be free()d
|
|
|
|
|
*/
|
|
|
|
|
static char *get_netscape_format(const struct Cookie *co)
|
|
|
|
|
{
|
2006-05-25 00:46:38 +02:00
|
|
|
|
return aprintf(
|
2008-01-31 13:21:57 +01:00
|
|
|
|
"%s" /* httponly preamble */
|
2006-05-25 00:46:38 +02:00
|
|
|
|
"%s%s\t" /* domain */
|
|
|
|
|
"%s\t" /* tailmatch */
|
|
|
|
|
"%s\t" /* path */
|
|
|
|
|
"%s\t" /* secure */
|
2008-08-16 03:33:59 +02:00
|
|
|
|
"%" FORMAT_OFF_T "\t" /* expires */
|
2006-05-25 00:46:38 +02:00
|
|
|
|
"%s\t" /* name */
|
|
|
|
|
"%s", /* value */
|
2008-01-31 13:21:57 +01:00
|
|
|
|
co->httponly?"#HttpOnly_":"",
|
2006-05-25 00:46:38 +02:00
|
|
|
|
/* Make sure all domains are prefixed with a dot if they allow
|
|
|
|
|
tailmatching. This is Mozilla-style. */
|
|
|
|
|
(co->tailmatch && co->domain && co->domain[0] != '.')? ".":"",
|
|
|
|
|
co->domain?co->domain:"unknown",
|
|
|
|
|
co->tailmatch?"TRUE":"FALSE",
|
|
|
|
|
co->path?co->path:"/",
|
|
|
|
|
co->secure?"TRUE":"FALSE",
|
|
|
|
|
co->expires,
|
|
|
|
|
co->name,
|
|
|
|
|
co->value?co->value:"");
|
2005-07-28 00:17:14 +02:00
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
/*
|
2001-08-29 11:32:18 +02:00
|
|
|
|
* Curl_cookie_output()
|
2001-08-23 16:05:25 +02:00
|
|
|
|
*
|
2001-08-29 11:32:18 +02:00
|
|
|
|
* Writes all internally known cookies to the specified file. Specify
|
|
|
|
|
* "-" as file name to write to stdout.
|
2001-08-23 16:05:25 +02:00
|
|
|
|
*
|
2001-08-29 11:32:18 +02:00
|
|
|
|
* The function returns non-zero on write failure.
|
2001-08-23 16:05:25 +02:00
|
|
|
|
*/
|
2007-08-29 07:36:53 +02:00
|
|
|
|
int Curl_cookie_output(struct CookieInfo *c, const char *dumphere)
|
2001-08-23 16:05:25 +02:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *co;
|
2001-08-29 11:32:18 +02:00
|
|
|
|
FILE *out;
|
|
|
|
|
bool use_stdout=FALSE;
|
|
|
|
|
|
2001-09-10 09:43:08 +02:00
|
|
|
|
if((NULL == c) || (0 == c->numcookies))
|
2001-08-29 11:32:18 +02:00
|
|
|
|
/* If there are no known cookies, we don't write or even create any
|
|
|
|
|
destination file */
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
|
|
if(strequal("-", dumphere)) {
|
|
|
|
|
/* use stdout */
|
|
|
|
|
out = stdout;
|
|
|
|
|
use_stdout=TRUE;
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
out = fopen(dumphere, "w");
|
|
|
|
|
if(!out)
|
|
|
|
|
return 1; /* failure */
|
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(c) {
|
2005-07-28 00:17:14 +02:00
|
|
|
|
char *format_ptr;
|
|
|
|
|
|
2001-08-29 11:32:18 +02:00
|
|
|
|
fputs("# Netscape HTTP Cookie File\n"
|
2008-08-28 13:35:54 +02:00
|
|
|
|
"# http://curl.haxx.se/rfc/cookie_spec.html\n"
|
2001-10-08 08:43:22 +02:00
|
|
|
|
"# This file was generated by libcurl! Edit at your own risk.\n\n",
|
2001-08-29 11:32:18 +02:00
|
|
|
|
out);
|
2001-08-23 16:05:25 +02:00
|
|
|
|
co = c->cookies;
|
2004-05-12 14:04:38 +02:00
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
while(co) {
|
2005-07-28 00:17:14 +02:00
|
|
|
|
format_ptr = get_netscape_format(co);
|
2007-11-07 10:21:35 +01:00
|
|
|
|
if(format_ptr == NULL) {
|
2005-07-28 00:17:14 +02:00
|
|
|
|
fprintf(out, "#\n# Fatal libcurl error\n");
|
2008-12-03 16:08:09 +01:00
|
|
|
|
if(!use_stdout)
|
|
|
|
|
fclose(out);
|
2005-07-28 00:17:14 +02:00
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
fprintf(out, "%s\n", format_ptr);
|
|
|
|
|
free(format_ptr);
|
2001-08-23 16:05:25 +02:00
|
|
|
|
co=co->next;
|
|
|
|
|
}
|
|
|
|
|
}
|
2001-08-29 11:32:18 +02:00
|
|
|
|
|
|
|
|
|
if(!use_stdout)
|
|
|
|
|
fclose(out);
|
|
|
|
|
|
|
|
|
|
return 0;
|
2001-08-23 16:05:25 +02:00
|
|
|
|
}
|
|
|
|
|
|
2005-07-28 00:17:14 +02:00
|
|
|
|
struct curl_slist *Curl_cookie_list(struct SessionHandle *data)
|
|
|
|
|
{
|
2005-07-28 23:49:58 +02:00
|
|
|
|
struct curl_slist *list = NULL;
|
|
|
|
|
struct curl_slist *beg;
|
|
|
|
|
struct Cookie *c;
|
|
|
|
|
char *line;
|
2005-07-28 00:17:14 +02:00
|
|
|
|
|
2007-11-07 10:21:35 +01:00
|
|
|
|
if((data->cookies == NULL) ||
|
2005-07-28 23:49:58 +02:00
|
|
|
|
(data->cookies->numcookies == 0))
|
|
|
|
|
return NULL;
|
2005-07-28 00:17:14 +02:00
|
|
|
|
|
2005-07-28 23:49:58 +02:00
|
|
|
|
c = data->cookies->cookies;
|
2005-07-28 00:17:14 +02:00
|
|
|
|
|
2005-07-28 23:49:58 +02:00
|
|
|
|
beg = list;
|
2007-11-07 10:21:35 +01:00
|
|
|
|
while(c) {
|
2005-07-28 23:49:58 +02:00
|
|
|
|
/* fill the list with _all_ the cookies we know */
|
|
|
|
|
line = get_netscape_format(c);
|
2007-11-07 10:21:35 +01:00
|
|
|
|
if(line == NULL) {
|
2007-04-07 06:51:35 +02:00
|
|
|
|
curl_slist_free_all(beg);
|
2005-07-28 23:49:58 +02:00
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
list = curl_slist_append(list, line);
|
|
|
|
|
free(line);
|
2007-11-07 10:21:35 +01:00
|
|
|
|
if(list == NULL) {
|
2007-04-07 06:51:35 +02:00
|
|
|
|
curl_slist_free_all(beg);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
2007-11-07 10:21:35 +01:00
|
|
|
|
else if(beg == NULL) {
|
2007-04-07 06:51:35 +02:00
|
|
|
|
beg = list;
|
|
|
|
|
}
|
2005-07-28 23:49:58 +02:00
|
|
|
|
c = c->next;
|
|
|
|
|
}
|
2005-07-28 00:17:14 +02:00
|
|
|
|
|
2005-07-28 23:49:58 +02:00
|
|
|
|
return list;
|
2005-07-28 00:17:14 +02:00
|
|
|
|
}
|
|
|
|
|
|
2004-12-06 00:59:32 +01:00
|
|
|
|
#endif /* CURL_DISABLE_HTTP || CURL_DISABLE_COOKIES */
|