2001-01-03 10:29:33 +01:00
|
|
|
|
/*****************************************************************************
|
|
|
|
|
* _ _ ____ _
|
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Copyright (C) 2001, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2001-01-03 10:29:33 +01:00
|
|
|
|
*
|
|
|
|
|
* In order to be useful for every potential user, curl and libcurl are
|
|
|
|
|
* dual-licensed under the MPL and the MIT/X-derivate licenses.
|
|
|
|
|
*
|
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
|
* furnished to do so, under the terms of the MPL or the MIT/X-derivate
|
|
|
|
|
* licenses. You may pick one of these licenses.
|
|
|
|
|
*
|
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
|
* KIND, either express or implied.
|
|
|
|
|
*
|
|
|
|
|
* $Id$
|
|
|
|
|
*****************************************************************************/
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
/***
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
RECEIVING COOKIE INFORMATION
|
|
|
|
|
============================
|
|
|
|
|
|
|
|
|
|
struct CookieInfo *cookie_init(char *file);
|
|
|
|
|
|
|
|
|
|
Inits a cookie struct to store data in a local file. This is always
|
|
|
|
|
called before any cookies are set.
|
|
|
|
|
|
|
|
|
|
int cookies_set(struct CookieInfo *cookie, char *cookie_line);
|
|
|
|
|
|
|
|
|
|
The 'cookie_line' parameter is a full "Set-cookie:" line as
|
|
|
|
|
received from a server.
|
|
|
|
|
|
|
|
|
|
The function need to replace previously stored lines that this new
|
|
|
|
|
line superceeds.
|
|
|
|
|
|
|
|
|
|
It may remove lines that are expired.
|
|
|
|
|
|
|
|
|
|
It should return an indication of success/error.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SENDING COOKIE INFORMATION
|
|
|
|
|
==========================
|
|
|
|
|
|
|
|
|
|
struct Cookies *cookie_getlist(struct CookieInfo *cookie,
|
|
|
|
|
char *host, char *path, bool secure);
|
|
|
|
|
|
|
|
|
|
For a given host and path, return a linked list of cookies that
|
|
|
|
|
the client should send to the server if used now. The secure
|
|
|
|
|
boolean informs the cookie if a secure connection is achieved or
|
|
|
|
|
not.
|
|
|
|
|
|
|
|
|
|
It shall only return cookies that haven't expired.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Example set of cookies:
|
|
|
|
|
|
|
|
|
|
Set-cookie: PRODUCTINFO=webxpress; domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: PERSONALIZE=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/ftgw; secure
|
|
|
|
|
Set-cookie: FidHist=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: FidOrder=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: DisPend=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie: FidDis=none;expires=Monday, 13-Jun-1988 03:04:55 GMT;
|
|
|
|
|
domain=.fidelity.com; path=/; secure
|
|
|
|
|
Set-cookie:
|
|
|
|
|
Session_Key@6791a9e0-901a-11d0-a1c8-9b012c88aa77=none;expires=Monday,
|
|
|
|
|
13-Jun-1988 03:04:55 GMT; domain=.fidelity.com; path=/; secure
|
|
|
|
|
****/
|
|
|
|
|
|
2000-08-24 16:26:33 +02:00
|
|
|
|
#include "setup.h"
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
#include <string.h>
|
|
|
|
|
#include <ctype.h>
|
|
|
|
|
|
|
|
|
|
#include "cookie.h"
|
|
|
|
|
#include "getdate.h"
|
2000-05-22 16:12:12 +02:00
|
|
|
|
#include "strequal.h"
|
2001-05-30 13:06:56 +02:00
|
|
|
|
#include "strtok.h"
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2000-10-09 13:12:34 +02:00
|
|
|
|
/* The last #include file should be: */
|
|
|
|
|
#ifdef MALLOCDEBUG
|
|
|
|
|
#include "memdebug.h"
|
|
|
|
|
#endif
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_add()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Add a single cookie line to the cookie keeping object.
|
|
|
|
|
*
|
|
|
|
|
***************************************************************************/
|
|
|
|
|
|
2001-01-05 11:11:41 +01:00
|
|
|
|
struct Cookie *
|
|
|
|
|
Curl_cookie_add(struct CookieInfo *c,
|
|
|
|
|
bool httpheader, /* TRUE if HTTP header-style line */
|
|
|
|
|
char *lineptr) /* first non-space of the line */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *clist;
|
|
|
|
|
char what[MAX_COOKIE_LINE];
|
|
|
|
|
char name[MAX_NAME];
|
|
|
|
|
char *ptr;
|
|
|
|
|
char *semiptr;
|
|
|
|
|
struct Cookie *co;
|
2001-08-23 16:05:25 +02:00
|
|
|
|
struct Cookie *lastc=NULL;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
time_t now = time(NULL);
|
|
|
|
|
bool replace_old = FALSE;
|
|
|
|
|
|
|
|
|
|
/* First, alloc and init a new struct for it */
|
|
|
|
|
co = (struct Cookie *)malloc(sizeof(struct Cookie));
|
|
|
|
|
if(!co)
|
|
|
|
|
return NULL; /* bail out if we're this low on memory */
|
|
|
|
|
|
|
|
|
|
/* clear the whole struct first */
|
|
|
|
|
memset(co, 0, sizeof(struct Cookie));
|
|
|
|
|
|
|
|
|
|
if(httpheader) {
|
|
|
|
|
/* This line was read off a HTTP-header */
|
|
|
|
|
|
|
|
|
|
semiptr=strchr(lineptr, ';'); /* first, find a semicolon */
|
|
|
|
|
ptr = lineptr;
|
2000-09-26 00:14:42 +02:00
|
|
|
|
do {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* we have a <what>=<this> pair or a 'secure' word here */
|
|
|
|
|
if(strchr(ptr, '=')) {
|
2000-02-02 00:54:51 +01:00
|
|
|
|
name[0]=what[0]=0; /* init the buffers */
|
2000-02-11 00:14:53 +01:00
|
|
|
|
if(1 <= sscanf(ptr, "%" MAX_NAME_TXT "[^=]=%"
|
2001-08-23 16:05:25 +02:00
|
|
|
|
MAX_COOKIE_LINE_TXT "[^;\r\n]",
|
1999-12-29 15:20:26 +01:00
|
|
|
|
name, what)) {
|
|
|
|
|
/* this is a legal <what>=<this> pair */
|
|
|
|
|
if(strequal("path", name)) {
|
|
|
|
|
co->path=strdup(what);
|
|
|
|
|
}
|
|
|
|
|
else if(strequal("domain", name)) {
|
|
|
|
|
co->domain=strdup(what);
|
|
|
|
|
}
|
2000-02-02 00:54:51 +01:00
|
|
|
|
else if(strequal("version", name)) {
|
|
|
|
|
co->version=strdup(what);
|
|
|
|
|
}
|
|
|
|
|
else if(strequal("max-age", name)) {
|
|
|
|
|
/* Defined in RFC2109:
|
|
|
|
|
|
|
|
|
|
Optional. The Max-Age attribute defines the lifetime of the
|
|
|
|
|
cookie, in seconds. The delta-seconds value is a decimal non-
|
|
|
|
|
negative integer. After delta-seconds seconds elapse, the
|
|
|
|
|
client should discard the cookie. A value of zero means the
|
|
|
|
|
cookie should be discarded immediately.
|
|
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
co->maxage = strdup(what);
|
|
|
|
|
co->expires =
|
|
|
|
|
atoi((*co->maxage=='\"')?&co->maxage[1]:&co->maxage[0]);
|
|
|
|
|
}
|
1999-12-29 15:20:26 +01:00
|
|
|
|
else if(strequal("expires", name)) {
|
|
|
|
|
co->expirestr=strdup(what);
|
2000-05-22 16:12:12 +02:00
|
|
|
|
co->expires = curl_getdate(what, &now);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else if(!co->name) {
|
|
|
|
|
co->name = strdup(name);
|
|
|
|
|
co->value = strdup(what);
|
|
|
|
|
}
|
2001-08-14 10:17:29 +02:00
|
|
|
|
/*
|
|
|
|
|
else this is the second (or more) name we don't know
|
|
|
|
|
about! */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* this is an "illegal" <what>=<this> pair */
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
else {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(sscanf(ptr, "%" MAX_COOKIE_LINE_TXT "[^;\r\n]",
|
1999-12-29 15:20:26 +01:00
|
|
|
|
what)) {
|
|
|
|
|
if(strequal("secure", what))
|
|
|
|
|
co->secure = TRUE;
|
2001-08-14 10:17:29 +02:00
|
|
|
|
/* else,
|
|
|
|
|
unsupported keyword without assign! */
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
2000-09-26 00:14:42 +02:00
|
|
|
|
if(!semiptr)
|
|
|
|
|
continue; /* we already know there are no more cookies */
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
ptr=semiptr+1;
|
|
|
|
|
while(ptr && *ptr && isspace((int)*ptr))
|
|
|
|
|
ptr++;
|
|
|
|
|
semiptr=strchr(ptr, ';'); /* now, find the next semicolon */
|
2000-09-26 00:14:42 +02:00
|
|
|
|
} while(semiptr);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* This line is NOT a HTTP header style line, we do offer support for
|
|
|
|
|
reading the odd netscape cookies-file format here */
|
|
|
|
|
char *firstptr;
|
2001-05-29 21:17:39 +02:00
|
|
|
|
char *tok_buf;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
int fields;
|
|
|
|
|
|
|
|
|
|
if(lineptr[0]=='#') {
|
|
|
|
|
/* don't even try the comments */
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
/* strip off the possible end-of-line characters */
|
2000-05-22 16:12:12 +02:00
|
|
|
|
ptr=strchr(lineptr, '\r');
|
|
|
|
|
if(ptr)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*ptr=0; /* clear it */
|
2000-05-22 16:12:12 +02:00
|
|
|
|
ptr=strchr(lineptr, '\n');
|
|
|
|
|
if(ptr)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*ptr=0; /* clear it */
|
|
|
|
|
|
2001-05-29 21:17:39 +02:00
|
|
|
|
firstptr=strtok_r(lineptr, "\t", &tok_buf); /* first tokenize it on the TAB */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
|
|
|
|
/* Here's a quick check to eliminate normal HTTP-headers from this */
|
|
|
|
|
if(!firstptr || strchr(firstptr, ':')) {
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/* Now loop through the fields and init the struct we already have
|
|
|
|
|
allocated */
|
2001-05-29 21:17:39 +02:00
|
|
|
|
for(ptr=firstptr, fields=0; ptr; ptr=strtok_r(NULL, "\t", &tok_buf), fields++) {
|
1999-12-29 15:20:26 +01:00
|
|
|
|
switch(fields) {
|
|
|
|
|
case 0:
|
|
|
|
|
co->domain = strdup(ptr);
|
|
|
|
|
break;
|
|
|
|
|
case 1:
|
2001-05-23 15:04:19 +02:00
|
|
|
|
/* This field got its explanation on the 23rd of May 2001 by
|
|
|
|
|
Andr<EFBFBD>s Garc<EFBFBD>a:
|
|
|
|
|
|
|
|
|
|
flag: A TRUE/FALSE value indicating if all machines within a given
|
|
|
|
|
domain can access the variable. This value is set automatically by
|
|
|
|
|
the browser, depending on the value you set for the domain.
|
|
|
|
|
|
|
|
|
|
As far as I can see, it is set to true when the cookie says
|
|
|
|
|
.domain.com and to false when the domain is complete www.domain.com
|
|
|
|
|
|
|
|
|
|
We don't currently take advantage of this knowledge.
|
|
|
|
|
*/
|
2001-08-23 16:05:25 +02:00
|
|
|
|
co->field1=strequal(ptr, "TRUE")+1; /* store information */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
break;
|
|
|
|
|
case 2:
|
2001-05-23 11:26:45 +02:00
|
|
|
|
/* It turns out, that sometimes the file format allows the path
|
|
|
|
|
field to remain not filled in, we try to detect this and work
|
|
|
|
|
around it! Andr<EFBFBD>s Garc<EFBFBD>a made us aware of this... */
|
|
|
|
|
if (strcmp("TRUE", ptr) && strcmp("FALSE", ptr)) {
|
|
|
|
|
/* only if the path doesn't look like a boolean option! */
|
|
|
|
|
co->path = strdup(ptr);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
/* this doesn't look like a path, make one up! */
|
|
|
|
|
co->path = strdup("/");
|
|
|
|
|
fields++; /* add a field and fall down to secure */
|
|
|
|
|
/* FALLTHROUGH */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
case 3:
|
|
|
|
|
co->secure = strequal(ptr, "TRUE");
|
|
|
|
|
break;
|
|
|
|
|
case 4:
|
|
|
|
|
co->expires = atoi(ptr);
|
|
|
|
|
break;
|
|
|
|
|
case 5:
|
|
|
|
|
co->name = strdup(ptr);
|
|
|
|
|
break;
|
|
|
|
|
case 6:
|
|
|
|
|
co->value = strdup(ptr);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(7 != fields) {
|
|
|
|
|
/* we did not find the sufficient number of fields to recognize this
|
|
|
|
|
as a valid line, abort and go home */
|
|
|
|
|
|
|
|
|
|
if(co->domain)
|
|
|
|
|
free(co->domain);
|
|
|
|
|
if(co->path)
|
|
|
|
|
free(co->path);
|
|
|
|
|
if(co->name)
|
|
|
|
|
free(co->name);
|
|
|
|
|
if(co->value)
|
|
|
|
|
free(co->value);
|
|
|
|
|
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
co->livecookie = c->running;
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
/* now, we have parsed the incoming line, we must now check if this
|
|
|
|
|
superceeds an already existing cookie, which it may if the previous have
|
|
|
|
|
the same domain and path as this */
|
|
|
|
|
|
|
|
|
|
clist = c->cookies;
|
|
|
|
|
replace_old = FALSE;
|
|
|
|
|
while(clist) {
|
|
|
|
|
if(strequal(clist->name, co->name)) {
|
|
|
|
|
/* the names are identical */
|
|
|
|
|
|
|
|
|
|
if(clist->domain && co->domain) {
|
|
|
|
|
if(strequal(clist->domain, co->domain))
|
|
|
|
|
replace_old=TRUE;
|
|
|
|
|
}
|
|
|
|
|
else if(!clist->domain && !co->domain)
|
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
|
|
|
|
|
if(replace_old) {
|
|
|
|
|
/* the domains were identical */
|
|
|
|
|
|
|
|
|
|
if(clist->path && co->path) {
|
|
|
|
|
if(strequal(clist->path, co->path)) {
|
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
replace_old = FALSE;
|
|
|
|
|
}
|
|
|
|
|
else if(!clist->path && !co->path)
|
|
|
|
|
replace_old = TRUE;
|
|
|
|
|
else
|
|
|
|
|
replace_old = FALSE;
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(replace_old && !co->livecookie && clist->livecookie) {
|
|
|
|
|
/* Both cookies matched fine, except that the already present
|
|
|
|
|
cookie is "live", which means it was set from a header, while
|
|
|
|
|
the new one isn't "live" and thus only read from a file. We let
|
|
|
|
|
live cookies stay alive */
|
|
|
|
|
|
|
|
|
|
/* Free the newcomer and get out of here! */
|
|
|
|
|
if(co->domain)
|
|
|
|
|
free(co->domain);
|
|
|
|
|
if(co->path)
|
|
|
|
|
free(co->path);
|
|
|
|
|
if(co->name)
|
|
|
|
|
free(co->name);
|
|
|
|
|
if(co->value)
|
|
|
|
|
free(co->value);
|
|
|
|
|
|
|
|
|
|
free(co);
|
|
|
|
|
return NULL;
|
|
|
|
|
}
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(replace_old) {
|
|
|
|
|
co->next = clist->next; /* get the next-pointer first */
|
|
|
|
|
|
|
|
|
|
/* then free all the old pointers */
|
|
|
|
|
if(clist->name)
|
|
|
|
|
free(clist->name);
|
|
|
|
|
if(clist->value)
|
|
|
|
|
free(clist->value);
|
|
|
|
|
if(clist->domain)
|
|
|
|
|
free(clist->domain);
|
|
|
|
|
if(clist->path)
|
|
|
|
|
free(clist->path);
|
|
|
|
|
if(clist->expirestr)
|
|
|
|
|
free(clist->expirestr);
|
|
|
|
|
|
2000-02-02 00:54:51 +01:00
|
|
|
|
if(clist->version)
|
|
|
|
|
free(clist->version);
|
|
|
|
|
if(clist->maxage)
|
|
|
|
|
free(clist->maxage);
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*clist = *co; /* then store all the new data */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
2001-08-23 16:05:25 +02:00
|
|
|
|
lastc = clist;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
clist = clist->next;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if(!replace_old) {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
/* then make the last item point on this new one */
|
|
|
|
|
if(lastc)
|
|
|
|
|
lastc->next = co;
|
|
|
|
|
else
|
|
|
|
|
c->cookies = co;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2001-08-23 16:05:25 +02:00
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
return co;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_init()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Inits a cookie struct to read data from a local file. This is always
|
|
|
|
|
* called before any cookies are set. File may be NULL.
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
2001-08-23 16:05:25 +02:00
|
|
|
|
struct CookieInfo *Curl_cookie_init(char *file, struct CookieInfo *inc)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
char line[MAX_COOKIE_LINE];
|
|
|
|
|
struct CookieInfo *c;
|
|
|
|
|
FILE *fp;
|
2000-02-11 00:14:53 +01:00
|
|
|
|
bool fromfile=TRUE;
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
if(NULL == inc) {
|
|
|
|
|
/* we didn't get a struct, create one */
|
|
|
|
|
c = (struct CookieInfo *)malloc(sizeof(struct CookieInfo));
|
|
|
|
|
if(!c)
|
|
|
|
|
return NULL; /* failed to get memory */
|
|
|
|
|
memset(c, 0, sizeof(struct CookieInfo));
|
|
|
|
|
c->filename = strdup(file?file:"none"); /* copy the name just in case */
|
|
|
|
|
}
|
|
|
|
|
else {
|
|
|
|
|
/* we got an already existing one, use that */
|
|
|
|
|
c = inc;
|
|
|
|
|
}
|
|
|
|
|
c->running = FALSE; /* this is not running, this is init */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
|
2000-02-11 00:14:53 +01:00
|
|
|
|
if(strequal(file, "-")) {
|
|
|
|
|
fp = stdin;
|
|
|
|
|
fromfile=FALSE;
|
|
|
|
|
}
|
|
|
|
|
else
|
|
|
|
|
fp = file?fopen(file, "r"):NULL;
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
if(fp) {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
char *lineptr;
|
|
|
|
|
bool headerline;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
while(fgets(line, MAX_COOKIE_LINE, fp)) {
|
|
|
|
|
if(strnequal("Set-Cookie:", line, 11)) {
|
|
|
|
|
/* This is a cookie line, get it! */
|
2001-08-23 16:05:25 +02:00
|
|
|
|
lineptr=&line[11];
|
|
|
|
|
headerline=TRUE;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
else {
|
2001-08-23 16:05:25 +02:00
|
|
|
|
lineptr=line;
|
|
|
|
|
headerline=FALSE;
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2001-08-23 16:05:25 +02:00
|
|
|
|
while(*lineptr && isspace((int)*lineptr))
|
|
|
|
|
lineptr++;
|
|
|
|
|
|
|
|
|
|
Curl_cookie_add(c, headerline, lineptr);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
2000-02-11 00:14:53 +01:00
|
|
|
|
if(fromfile)
|
|
|
|
|
fclose(fp);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
c->running = TRUE; /* now, we're running */
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
return c;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_getlist()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* For a given host and path, return a linked list of cookies that the
|
|
|
|
|
* client should send to the server if used now. The secure boolean informs
|
|
|
|
|
* the cookie if a secure connection is achieved or not.
|
|
|
|
|
*
|
|
|
|
|
* It shall only return cookies that haven't expired.
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
2001-01-05 11:11:41 +01:00
|
|
|
|
struct Cookie *Curl_cookie_getlist(struct CookieInfo *c,
|
|
|
|
|
char *host, char *path, bool secure)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *newco;
|
|
|
|
|
struct Cookie *co;
|
|
|
|
|
time_t now = time(NULL);
|
|
|
|
|
int hostlen=strlen(host);
|
|
|
|
|
int domlen;
|
|
|
|
|
|
|
|
|
|
struct Cookie *mainco=NULL;
|
|
|
|
|
|
|
|
|
|
if(!c || !c->cookies)
|
|
|
|
|
return NULL; /* no cookie struct or no cookies in the struct */
|
|
|
|
|
|
|
|
|
|
co = c->cookies;
|
|
|
|
|
|
|
|
|
|
while(co) {
|
|
|
|
|
/* only process this cookie if it is not expired or had no expire
|
|
|
|
|
date AND that if the cookie requires we're secure we must only
|
|
|
|
|
continue if we are! */
|
|
|
|
|
if( (co->expires<=0 || (co->expires> now)) &&
|
|
|
|
|
(co->secure?secure:TRUE) ) {
|
|
|
|
|
|
|
|
|
|
/* now check if the domain is correct */
|
|
|
|
|
domlen=co->domain?strlen(co->domain):0;
|
|
|
|
|
if(!co->domain ||
|
2000-11-10 09:10:04 +01:00
|
|
|
|
((domlen<=hostlen) &&
|
1999-12-29 15:20:26 +01:00
|
|
|
|
strequal(host+(hostlen-domlen), co->domain)) ) {
|
|
|
|
|
/* the right part of the host matches the domain stuff in the
|
|
|
|
|
cookie data */
|
|
|
|
|
|
|
|
|
|
/* now check the left part of the path with the cookies path
|
|
|
|
|
requirement */
|
|
|
|
|
if(!co->path ||
|
|
|
|
|
strnequal(path, co->path, strlen(co->path))) {
|
|
|
|
|
|
|
|
|
|
/* and now, we know this is a match and we should create an
|
|
|
|
|
entry for the return-linked-list */
|
|
|
|
|
|
|
|
|
|
newco = (struct Cookie *)malloc(sizeof(struct Cookie));
|
|
|
|
|
if(newco) {
|
|
|
|
|
/* first, copy the whole source cookie: */
|
|
|
|
|
memcpy(newco, co, sizeof(struct Cookie));
|
|
|
|
|
|
|
|
|
|
/* then modify our next */
|
|
|
|
|
newco->next = mainco;
|
|
|
|
|
|
|
|
|
|
/* point the main to us */
|
|
|
|
|
mainco = newco;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
co = co->next;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return mainco; /* return the new list */
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_freelist()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Free a list of cookies previously returned by Curl_cookie_getlist();
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
|
|
|
|
|
2001-01-05 11:11:41 +01:00
|
|
|
|
void Curl_cookie_freelist(struct Cookie *co)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *next;
|
|
|
|
|
if(co) {
|
|
|
|
|
while(co) {
|
|
|
|
|
next = co->next;
|
|
|
|
|
free(co); /* we only free the struct since the "members" are all
|
|
|
|
|
just copied! */
|
|
|
|
|
co = next;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/*****************************************************************************
|
|
|
|
|
*
|
2001-08-23 16:05:25 +02:00
|
|
|
|
* Curl_cookie_cleanup()
|
1999-12-29 15:20:26 +01:00
|
|
|
|
*
|
|
|
|
|
* Free a "cookie object" previous created with cookie_init().
|
|
|
|
|
*
|
|
|
|
|
****************************************************************************/
|
2001-01-05 11:11:41 +01:00
|
|
|
|
void Curl_cookie_cleanup(struct CookieInfo *c)
|
1999-12-29 15:20:26 +01:00
|
|
|
|
{
|
|
|
|
|
struct Cookie *co;
|
|
|
|
|
struct Cookie *next;
|
|
|
|
|
if(c) {
|
|
|
|
|
if(c->filename)
|
|
|
|
|
free(c->filename);
|
|
|
|
|
co = c->cookies;
|
|
|
|
|
|
|
|
|
|
while(co) {
|
|
|
|
|
if(co->name)
|
|
|
|
|
free(co->name);
|
|
|
|
|
if(co->value)
|
|
|
|
|
free(co->value);
|
|
|
|
|
if(co->domain)
|
|
|
|
|
free(co->domain);
|
|
|
|
|
if(co->path)
|
|
|
|
|
free(co->path);
|
|
|
|
|
if(co->expirestr)
|
|
|
|
|
free(co->expirestr);
|
|
|
|
|
|
2000-02-02 00:54:51 +01:00
|
|
|
|
if(co->version)
|
|
|
|
|
free(co->version);
|
|
|
|
|
if(co->maxage)
|
|
|
|
|
free(co->maxage);
|
|
|
|
|
|
1999-12-29 15:20:26 +01:00
|
|
|
|
next = co->next;
|
|
|
|
|
free(co);
|
|
|
|
|
co = next;
|
|
|
|
|
}
|
2000-10-09 13:12:34 +02:00
|
|
|
|
free(c); /* free the base struct as well */
|
1999-12-29 15:20:26 +01:00
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2001-08-23 16:05:25 +02:00
|
|
|
|
#ifdef COOKIE /* experiemental functions for the upcoming cookie jar stuff */
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* On my Solaris box, this command line builds this test program:
|
|
|
|
|
*
|
|
|
|
|
* gcc -g -o cooktest -DCOOKIE=1 -DHAVE_CONFIG_H -I.. -I../include cookie.c strequal.o getdate.o memdebug.o mprintf.o strtok.o -lnsl -lsocket
|
|
|
|
|
*
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
void Curl_cookie_output(struct CookieInfo *c)
|
|
|
|
|
{
|
|
|
|
|
struct Cookie *co;
|
|
|
|
|
struct Cookie *next;
|
|
|
|
|
if(c) {
|
|
|
|
|
#if COOKIE > 1
|
|
|
|
|
if(c->filename)
|
|
|
|
|
printf("Got these cookies from: \"%s\"\n", c->filename);
|
|
|
|
|
#else
|
|
|
|
|
puts("# Netscape HTTP Cookie File\n"
|
|
|
|
|
"# http://www.netscape.com/newsref/std/cookie_spec.html\n"
|
|
|
|
|
"# This is generated by libcurl! Do not edit.\n");
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
co = c->cookies;
|
|
|
|
|
|
|
|
|
|
while(co) {
|
|
|
|
|
#if COOKIE > 1
|
|
|
|
|
printf("Name: %s\n", co->name?co->name:"");
|
|
|
|
|
printf(" Value: %s\n", co->value?co->value:"");
|
|
|
|
|
printf(" Domain: %s\n", co->domain?co->domain:"");
|
|
|
|
|
printf(" Path: %s\n", co->path?co->path:"");
|
|
|
|
|
printf(" Expire: %s\n", co->expirestr?co->expirestr:"");
|
|
|
|
|
printf(" Version: %s\n", co->version?co->version:"");
|
|
|
|
|
printf(" Max-Age: %s\n\n", co->maxage?co->maxage:"");
|
|
|
|
|
#endif
|
|
|
|
|
printf("%s\t" /* domain */
|
|
|
|
|
"%s\t" /* field1 */
|
|
|
|
|
"%s\t" /* path */
|
|
|
|
|
"%s\t" /* secure */
|
|
|
|
|
"%d\t" /* expires */
|
|
|
|
|
"%s\t" /* name */
|
|
|
|
|
"%s\n", /* value */
|
|
|
|
|
co->domain,
|
|
|
|
|
co->field1==2?"TRUE":"FALSE",
|
|
|
|
|
co->path,
|
|
|
|
|
co->secure?"TRUE":"FALSE",
|
|
|
|
|
co->expires,
|
|
|
|
|
co->name,
|
|
|
|
|
co->value);
|
|
|
|
|
|
|
|
|
|
co=co->next;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
|
{
|
|
|
|
|
struct CookieInfo *c=NULL;
|
|
|
|
|
if(argc>1) {
|
|
|
|
|
c = Curl_cookie_init(argv[1], c);
|
|
|
|
|
c = Curl_cookie_init(argv[1], c);
|
|
|
|
|
c = Curl_cookie_init(argv[1], c);
|
|
|
|
|
|
|
|
|
|
Curl_cookie_add(c, TRUE, "PERSONALIZE=none;expires=Monday, 13-Jun-1988 03:04:55 GMT; domain=.fidelity.com; path=/ftgw; secure");
|
|
|
|
|
|
|
|
|
|
Curl_cookie_output(c);
|
|
|
|
|
Curl_cookie_cleanup(c);
|
|
|
|
|
return 0;
|
|
|
|
|
}
|
|
|
|
|
return 1;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#endif
|