source: MondoRescue/branches/3.3/mindi-busybox/networking/wget.c@ 3621

Last change on this file since 3621 was 3621, checked in by Bruno Cornec, 7 years ago

New 3?3 banch for incorporation of latest busybox 1.25. Changing minor version to handle potential incompatibilities.

File size: 37.5 KB
Line 
1/* vi: set sw=4 ts=4: */
2/*
3 * wget - retrieve a file using HTTP or FTP
4 *
5 * Chip Rosenthal Covad Communications <chip@laserlink.net>
6 * Licensed under GPLv2, see file LICENSE in this source tree.
7 *
8 * Copyright (C) 2010 Bradley M. Kuhn <bkuhn@ebb.org>
9 * Kuhn's copyrights are licensed GPLv2-or-later. File as a whole remains GPLv2.
10 */
11
12//config:config WGET
13//config: bool "wget"
14//config: default y
15//config: help
16//config: wget is a utility for non-interactive download of files from HTTP
17//config: and FTP servers.
18//config:
19//config:config FEATURE_WGET_STATUSBAR
20//config: bool "Enable a nifty process meter (+2k)"
21//config: default y
22//config: depends on WGET
23//config: help
24//config: Enable the transfer progress bar for wget transfers.
25//config:
26//config:config FEATURE_WGET_AUTHENTICATION
27//config: bool "Enable HTTP authentication"
28//config: default y
29//config: depends on WGET
30//config: help
31//config: Support authenticated HTTP transfers.
32//config:
33//config:config FEATURE_WGET_LONG_OPTIONS
34//config: bool "Enable long options"
35//config: default y
36//config: depends on WGET && LONG_OPTS
37//config: help
38//config: Support long options for the wget applet.
39//config:
40//config:config FEATURE_WGET_TIMEOUT
41//config: bool "Enable timeout option -T SEC"
42//config: default y
43//config: depends on WGET
44//config: help
45//config: Supports network read and connect timeouts for wget,
46//config: so that wget will give up and timeout, through the -T
47//config: command line option.
48//config:
49//config: Currently only connect and network data read timeout are
50//config: supported (i.e., timeout is not applied to the DNS query). When
51//config: FEATURE_WGET_LONG_OPTIONS is also enabled, the --timeout option
52//config: will work in addition to -T.
53//config:
54//config:config FEATURE_WGET_OPENSSL
55//config: bool "Try to connect to HTTPS using openssl"
56//config: default y
57//config: depends on WGET
58//config: help
59//config: Choose how wget establishes SSL connection for https:// URLs.
60//config:
61//config: Busybox itself contains no SSL code. wget will spawn
62//config: a helper program to talk over HTTPS.
63//config:
64//config: OpenSSL has a simple SSL client for debug purposes.
65//config: If you select "openssl" helper, wget will effectively call
66//config: "openssl s_client -quiet -connect IP:443 2>/dev/null"
67//config: and pipe its data through it.
68//config: Note inconvenient API: host resolution is done twice,
69//config: and there is no guarantee openssl's idea of IPv6 address
70//config: format is the same as ours.
71//config: Another problem is that s_client prints debug information
72//config: to stderr, and it needs to be suppressed. This means
73//config: all error messages get suppressed too.
74//config: openssl is also a big binary, often dynamically linked
75//config: against ~15 libraries.
76//config:
77//config:config FEATURE_WGET_SSL_HELPER
78//config: bool "Try to connect to HTTPS using ssl_helper"
79//config: default y
80//config: depends on WGET
81//config: help
82//config: Choose how wget establishes SSL connection for https:// URLs.
83//config:
84//config: Busybox itself contains no SSL code. wget will spawn
85//config: a helper program to talk over HTTPS.
86//config:
87//config: ssl_helper is a tool which can be built statically
88//config: from busybox sources against a small embedded SSL library.
89//config: Please see networking/ssl_helper/README.
90//config: It does not require double host resolution and emits
91//config: error messages to stderr.
92//config:
93//config: Precompiled static binary may be available at
94//config: http://busybox.net/downloads/binaries/
95
96//applet:IF_WGET(APPLET(wget, BB_DIR_USR_BIN, BB_SUID_DROP))
97
98//kbuild:lib-$(CONFIG_WGET) += wget.o
99
100//usage:#define wget_trivial_usage
101//usage: IF_FEATURE_WGET_LONG_OPTIONS(
102//usage: "[-c|--continue] [-s|--spider] [-q|--quiet] [-O|--output-document FILE]\n"
103//usage: " [--header 'header: value'] [-Y|--proxy on/off] [-P DIR]\n"
104/* Since we ignore these opts, we don't show them in --help */
105/* //usage: " [--no-check-certificate] [--no-cache] [--passive-ftp] [-t TRIES]" */
106/* //usage: " [-nv] [-nc] [-nH] [-np]" */
107//usage: " [-U|--user-agent AGENT]" IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
108//usage: )
109//usage: IF_NOT_FEATURE_WGET_LONG_OPTIONS(
110//usage: "[-csq] [-O FILE] [-Y on/off] [-P DIR] [-U AGENT]"
111//usage: IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
112//usage: )
113//usage:#define wget_full_usage "\n\n"
114//usage: "Retrieve files via HTTP or FTP\n"
115//usage: "\n -s Spider mode - only check file existence"
116//usage: "\n -c Continue retrieval of aborted transfer"
117//usage: "\n -q Quiet"
118//usage: "\n -P DIR Save to DIR (default .)"
119//usage: IF_FEATURE_WGET_TIMEOUT(
120//usage: "\n -T SEC Network read timeout is SEC seconds"
121//usage: )
122//usage: "\n -O FILE Save to FILE ('-' for stdout)"
123//usage: "\n -U STR Use STR for User-Agent header"
124//usage: "\n -Y Use proxy ('on' or 'off')"
125
126#include "libbb.h"
127
128#if 0
129# define log_io(...) bb_error_msg(__VA_ARGS__)
130# define SENDFMT(fp, fmt, ...) \
131 do { \
132 log_io("> " fmt, ##__VA_ARGS__); \
133 fprintf(fp, fmt, ##__VA_ARGS__); \
134 } while (0);
135#else
136# define log_io(...) ((void)0)
137# define SENDFMT(fp, fmt, ...) fprintf(fp, fmt, ##__VA_ARGS__)
138#endif
139
140
141struct host_info {
142 char *allocated;
143 const char *path;
144 char *user;
145 const char *protocol;
146 char *host;
147 int port;
148};
149static const char P_FTP[] ALIGN1 = "ftp";
150static const char P_HTTP[] ALIGN1 = "http";
151#if ENABLE_FEATURE_WGET_OPENSSL || ENABLE_FEATURE_WGET_SSL_HELPER
152static const char P_HTTPS[] ALIGN1 = "https";
153#endif
154
155#if ENABLE_FEATURE_WGET_LONG_OPTIONS
156/* User-specified headers prevent using our corresponding built-in headers. */
157enum {
158 HDR_HOST = (1<<0),
159 HDR_USER_AGENT = (1<<1),
160 HDR_RANGE = (1<<2),
161 HDR_AUTH = (1<<3) * ENABLE_FEATURE_WGET_AUTHENTICATION,
162 HDR_PROXY_AUTH = (1<<4) * ENABLE_FEATURE_WGET_AUTHENTICATION,
163};
164static const char wget_user_headers[] ALIGN1 =
165 "Host:\0"
166 "User-Agent:\0"
167 "Range:\0"
168# if ENABLE_FEATURE_WGET_AUTHENTICATION
169 "Authorization:\0"
170 "Proxy-Authorization:\0"
171# endif
172 ;
173# define USR_HEADER_HOST (G.user_headers & HDR_HOST)
174# define USR_HEADER_USER_AGENT (G.user_headers & HDR_USER_AGENT)
175# define USR_HEADER_RANGE (G.user_headers & HDR_RANGE)
176# define USR_HEADER_AUTH (G.user_headers & HDR_AUTH)
177# define USR_HEADER_PROXY_AUTH (G.user_headers & HDR_PROXY_AUTH)
178#else /* No long options, no user-headers :( */
179# define USR_HEADER_HOST 0
180# define USR_HEADER_USER_AGENT 0
181# define USR_HEADER_RANGE 0
182# define USR_HEADER_AUTH 0
183# define USR_HEADER_PROXY_AUTH 0
184#endif
185
186/* Globals */
187struct globals {
188 off_t content_len; /* Content-length of the file */
189 off_t beg_range; /* Range at which continue begins */
190#if ENABLE_FEATURE_WGET_STATUSBAR
191 off_t transferred; /* Number of bytes transferred so far */
192 const char *curfile; /* Name of current file being transferred */
193 bb_progress_t pmt;
194#endif
195 char *dir_prefix;
196#if ENABLE_FEATURE_WGET_LONG_OPTIONS
197 char *post_data;
198 char *extra_headers;
199 unsigned char user_headers; /* Headers mentioned by the user */
200#endif
201 char *fname_out; /* where to direct output (-O) */
202 const char *proxy_flag; /* Use proxies if env vars are set */
203 const char *user_agent; /* "User-Agent" header field */
204#if ENABLE_FEATURE_WGET_TIMEOUT
205 unsigned timeout_seconds;
206 bool die_if_timed_out;
207#endif
208 int output_fd;
209 int o_flags;
210 smallint chunked; /* chunked transfer encoding */
211 smallint got_clen; /* got content-length: from server */
212 /* Local downloads do benefit from big buffer.
213 * With 512 byte buffer, it was measured to be
214 * an order of magnitude slower than with big one.
215 */
216 uint64_t just_to_align_next_member;
217 char wget_buf[CONFIG_FEATURE_COPYBUF_KB*1024];
218} FIX_ALIASING;
219#define G (*ptr_to_globals)
220#define INIT_G() do { \
221 SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
222} while (0)
223#define FINI_G() do { \
224 FREE_PTR_TO_GLOBALS(); \
225} while (0)
226
227
228/* Must match option string! */
229enum {
230 WGET_OPT_CONTINUE = (1 << 0),
231 WGET_OPT_SPIDER = (1 << 1),
232 WGET_OPT_QUIET = (1 << 2),
233 WGET_OPT_OUTNAME = (1 << 3),
234 WGET_OPT_PREFIX = (1 << 4),
235 WGET_OPT_PROXY = (1 << 5),
236 WGET_OPT_USER_AGENT = (1 << 6),
237 WGET_OPT_NETWORK_READ_TIMEOUT = (1 << 7),
238 WGET_OPT_RETRIES = (1 << 8),
239 WGET_OPT_PASSIVE = (1 << 9),
240 WGET_OPT_HEADER = (1 << 10) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
241 WGET_OPT_POST_DATA = (1 << 11) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
242};
243
244enum {
245 PROGRESS_START = -1,
246 PROGRESS_END = 0,
247 PROGRESS_BUMP = 1,
248};
249#if ENABLE_FEATURE_WGET_STATUSBAR
250static void progress_meter(int flag)
251{
252 if (option_mask32 & WGET_OPT_QUIET)
253 return;
254
255 if (flag == PROGRESS_START)
256 bb_progress_init(&G.pmt, G.curfile);
257
258 bb_progress_update(&G.pmt,
259 G.beg_range,
260 G.transferred,
261 (G.chunked || !G.got_clen) ? 0 : G.beg_range + G.transferred + G.content_len
262 );
263
264 if (flag == PROGRESS_END) {
265 bb_progress_free(&G.pmt);
266 bb_putchar_stderr('\n');
267 G.transferred = 0;
268 }
269}
270#else
271static ALWAYS_INLINE void progress_meter(int flag UNUSED_PARAM) { }
272#endif
273
274
275/* IPv6 knows scoped address types i.e. link and site local addresses. Link
276 * local addresses can have a scope identifier to specify the
277 * interface/link an address is valid on (e.g. fe80::1%eth0). This scope
278 * identifier is only valid on a single node.
279 *
280 * RFC 4007 says that the scope identifier MUST NOT be sent across the wire,
281 * unless all nodes agree on the semantic. Apache e.g. regards zone identifiers
282 * in the Host header as invalid requests, see
283 * https://issues.apache.org/bugzilla/show_bug.cgi?id=35122
284 */
285static void strip_ipv6_scope_id(char *host)
286{
287 char *scope, *cp;
288
289 /* bbox wget actually handles IPv6 addresses without [], like
290 * wget "http://::1/xxx", but this is not standard.
291 * To save code, _here_ we do not support it. */
292
293 if (host[0] != '[')
294 return; /* not IPv6 */
295
296 scope = strchr(host, '%');
297 if (!scope)
298 return;
299
300 /* Remove the IPv6 zone identifier from the host address */
301 cp = strchr(host, ']');
302 if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
303 /* malformed address (not "[xx]:nn" or "[xx]") */
304 return;
305 }
306
307 /* cp points to "]...", scope points to "%eth0]..." */
308 overlapping_strcpy(scope, cp);
309}
310
311#if ENABLE_FEATURE_WGET_AUTHENTICATION
312/* Base64-encode character string. */
313static char *base64enc(const char *str)
314{
315 unsigned len = strlen(str);
316 if (len > sizeof(G.wget_buf)/4*3 - 10) /* paranoia */
317 len = sizeof(G.wget_buf)/4*3 - 10;
318 bb_uuencode(G.wget_buf, str, len, bb_uuenc_tbl_base64);
319 return G.wget_buf;
320}
321#endif
322
323static char* sanitize_string(char *s)
324{
325 unsigned char *p = (void *) s;
326 while (*p >= ' ')
327 p++;
328 *p = '\0';
329 return s;
330}
331
332#if ENABLE_FEATURE_WGET_TIMEOUT
333static void alarm_handler(int sig UNUSED_PARAM)
334{
335 /* This is theoretically unsafe (uses stdio and malloc in signal handler) */
336 if (G.die_if_timed_out)
337 bb_error_msg_and_die("download timed out");
338}
339static void set_alarm(void)
340{
341 if (G.timeout_seconds) {
342 alarm(G.timeout_seconds);
343 G.die_if_timed_out = 1;
344 }
345}
346# define clear_alarm() ((void)(G.die_if_timed_out = 0))
347#else
348# define set_alarm() ((void)0)
349# define clear_alarm() ((void)0)
350#endif
351
352static FILE *open_socket(len_and_sockaddr *lsa)
353{
354 int fd;
355 FILE *fp;
356
357 set_alarm();
358 fd = xconnect_stream(lsa);
359 clear_alarm();
360
361 /* glibc 2.4 seems to try seeking on it - ??! */
362 /* hopefully it understands what ESPIPE means... */
363 fp = fdopen(fd, "r+");
364 if (!fp)
365 bb_perror_msg_and_die(bb_msg_memory_exhausted);
366
367 return fp;
368}
369
370/* Returns '\n' if it was seen, else '\0'. Trims at first '\r' or '\n' */
371static char fgets_and_trim(FILE *fp)
372{
373 char c;
374 char *buf_ptr;
375
376 set_alarm();
377 if (fgets(G.wget_buf, sizeof(G.wget_buf) - 1, fp) == NULL)
378 bb_perror_msg_and_die("error getting response");
379 clear_alarm();
380
381 buf_ptr = strchrnul(G.wget_buf, '\n');
382 c = *buf_ptr;
383 *buf_ptr = '\0';
384 buf_ptr = strchrnul(G.wget_buf, '\r');
385 *buf_ptr = '\0';
386
387 log_io("< %s", G.wget_buf);
388
389 return c;
390}
391
392static int ftpcmd(const char *s1, const char *s2, FILE *fp)
393{
394 int result;
395 if (s1) {
396 if (!s2)
397 s2 = "";
398 fprintf(fp, "%s%s\r\n", s1, s2);
399 fflush(fp);
400 log_io("> %s%s", s1, s2);
401 }
402
403 do {
404 fgets_and_trim(fp);
405 } while (!isdigit(G.wget_buf[0]) || G.wget_buf[3] != ' ');
406
407 G.wget_buf[3] = '\0';
408 result = xatoi_positive(G.wget_buf);
409 G.wget_buf[3] = ' ';
410 return result;
411}
412
413static void parse_url(const char *src_url, struct host_info *h)
414{
415 char *url, *p, *sp;
416
417 free(h->allocated);
418 h->allocated = url = xstrdup(src_url);
419
420 h->protocol = P_FTP;
421 p = strstr(url, "://");
422 if (p) {
423 *p = '\0';
424 h->host = p + 3;
425 if (strcmp(url, P_FTP) == 0) {
426 h->port = bb_lookup_port(P_FTP, "tcp", 21);
427 } else
428#if ENABLE_FEATURE_WGET_OPENSSL || ENABLE_FEATURE_WGET_SSL_HELPER
429 if (strcmp(url, P_HTTPS) == 0) {
430 h->port = bb_lookup_port(P_HTTPS, "tcp", 443);
431 h->protocol = P_HTTPS;
432 } else
433#endif
434 if (strcmp(url, P_HTTP) == 0) {
435 http:
436 h->port = bb_lookup_port(P_HTTP, "tcp", 80);
437 h->protocol = P_HTTP;
438 } else {
439 *p = ':';
440 bb_error_msg_and_die("not an http or ftp url: %s", sanitize_string(url));
441 }
442 } else {
443 // GNU wget is user-friendly and falls back to http://
444 h->host = url;
445 goto http;
446 }
447
448 // FYI:
449 // "Real" wget 'http://busybox.net?var=a/b' sends this request:
450 // 'GET /?var=a/b HTTP 1.0'
451 // and saves 'index.html?var=a%2Fb' (we save 'b')
452 // wget 'http://busybox.net?login=john@doe':
453 // request: 'GET /?login=john@doe HTTP/1.0'
454 // saves: 'index.html?login=john@doe' (we save '?login=john@doe')
455 // wget 'http://busybox.net#test/test':
456 // request: 'GET / HTTP/1.0'
457 // saves: 'index.html' (we save 'test')
458 //
459 // We also don't add unique .N suffix if file exists...
460 sp = strchr(h->host, '/');
461 p = strchr(h->host, '?'); if (!sp || (p && sp > p)) sp = p;
462 p = strchr(h->host, '#'); if (!sp || (p && sp > p)) sp = p;
463 if (!sp) {
464 h->path = "";
465 } else if (*sp == '/') {
466 *sp = '\0';
467 h->path = sp + 1;
468 } else { // '#' or '?'
469 // http://busybox.net?login=john@doe is a valid URL
470 // memmove converts to:
471 // http:/busybox.nett?login=john@doe...
472 memmove(h->host - 1, h->host, sp - h->host);
473 h->host--;
474 sp[-1] = '\0';
475 h->path = sp;
476 }
477
478 sp = strrchr(h->host, '@');
479 if (sp != NULL) {
480 // URL-decode "user:password" string before base64-encoding:
481 // wget http://test:my%20pass@example.com should send
482 // Authorization: Basic dGVzdDpteSBwYXNz
483 // which decodes to "test:my pass".
484 // Standard wget and curl do this too.
485 *sp = '\0';
486 free(h->user);
487 h->user = xstrdup(percent_decode_in_place(h->host, /*strict:*/ 0));
488 h->host = sp + 1;
489 }
490 /* else: h->user remains NULL, or as set by original request
491 * before redirect (if we are here after a redirect).
492 */
493}
494
495static char *gethdr(FILE *fp)
496{
497 char *s, *hdrval;
498 int c;
499
500 /* retrieve header line */
501 c = fgets_and_trim(fp);
502
503 /* end of the headers? */
504 if (G.wget_buf[0] == '\0')
505 return NULL;
506
507 /* convert the header name to lower case */
508 for (s = G.wget_buf; isalnum(*s) || *s == '-' || *s == '.' || *s == '_'; ++s) {
509 /*
510 * No-op for 20-3f and 60-7f. "0-9a-z-." are in these ranges.
511 * 40-5f range ("@A-Z[\]^_") maps to 60-7f.
512 * "A-Z" maps to "a-z".
513 * "@[\]" can't occur in header names.
514 * "^_" maps to "~,DEL" (which is wrong).
515 * "^" was never seen yet, "_" was seen from web.archive.org
516 * (x-archive-orig-x_commoncrawl_Signature: HEXSTRING).
517 */
518 *s |= 0x20;
519 }
520
521 /* verify we are at the end of the header name */
522 if (*s != ':')
523 bb_error_msg_and_die("bad header line: %s", sanitize_string(G.wget_buf));
524
525 /* locate the start of the header value */
526 *s++ = '\0';
527 hdrval = skip_whitespace(s);
528
529 if (c != '\n') {
530 /* Rats! The buffer isn't big enough to hold the entire header value */
531 while (c = getc(fp), c != EOF && c != '\n')
532 continue;
533 }
534
535 return hdrval;
536}
537
538static void reset_beg_range_to_zero(void)
539{
540 bb_error_msg("restart failed");
541 G.beg_range = 0;
542 xlseek(G.output_fd, 0, SEEK_SET);
543 /* Done at the end instead: */
544 /* ftruncate(G.output_fd, 0); */
545}
546
547static FILE* prepare_ftp_session(FILE **dfpp, struct host_info *target, len_and_sockaddr *lsa)
548{
549 FILE *sfp;
550 char *str;
551 int port;
552
553 if (!target->user)
554 target->user = xstrdup("anonymous:busybox@");
555
556 sfp = open_socket(lsa);
557 if (ftpcmd(NULL, NULL, sfp) != 220)
558 bb_error_msg_and_die("%s", sanitize_string(G.wget_buf + 4));
559
560 /*
561 * Splitting username:password pair,
562 * trying to log in
563 */
564 str = strchr(target->user, ':');
565 if (str)
566 *str++ = '\0';
567 switch (ftpcmd("USER ", target->user, sfp)) {
568 case 230:
569 break;
570 case 331:
571 if (ftpcmd("PASS ", str, sfp) == 230)
572 break;
573 /* fall through (failed login) */
574 default:
575 bb_error_msg_and_die("ftp login: %s", sanitize_string(G.wget_buf + 4));
576 }
577
578 ftpcmd("TYPE I", NULL, sfp);
579
580 /*
581 * Querying file size
582 */
583 if (ftpcmd("SIZE ", target->path, sfp) == 213) {
584 G.content_len = BB_STRTOOFF(G.wget_buf + 4, NULL, 10);
585 if (G.content_len < 0 || errno) {
586 bb_error_msg_and_die("SIZE value is garbage");
587 }
588 G.got_clen = 1;
589 }
590
591 /*
592 * Entering passive mode
593 */
594 if (ftpcmd("PASV", NULL, sfp) != 227) {
595 pasv_error:
596 bb_error_msg_and_die("bad response to %s: %s", "PASV", sanitize_string(G.wget_buf));
597 }
598 // Response is "227 garbageN1,N2,N3,N4,P1,P2[)garbage]
599 // Server's IP is N1.N2.N3.N4 (we ignore it)
600 // Server's port for data connection is P1*256+P2
601 str = strrchr(G.wget_buf, ')');
602 if (str) str[0] = '\0';
603 str = strrchr(G.wget_buf, ',');
604 if (!str) goto pasv_error;
605 port = xatou_range(str+1, 0, 255);
606 *str = '\0';
607 str = strrchr(G.wget_buf, ',');
608 if (!str) goto pasv_error;
609 port += xatou_range(str+1, 0, 255) * 256;
610 set_nport(&lsa->u.sa, htons(port));
611
612 *dfpp = open_socket(lsa);
613
614 if (G.beg_range != 0) {
615 sprintf(G.wget_buf, "REST %"OFF_FMT"u", G.beg_range);
616 if (ftpcmd(G.wget_buf, NULL, sfp) == 350)
617 G.content_len -= G.beg_range;
618 else
619 reset_beg_range_to_zero();
620 }
621
622 if (ftpcmd("RETR ", target->path, sfp) > 150)
623 bb_error_msg_and_die("bad response to %s: %s", "RETR", sanitize_string(G.wget_buf));
624
625 return sfp;
626}
627
628#if ENABLE_FEATURE_WGET_OPENSSL
629static int spawn_https_helper_openssl(const char *host, unsigned port)
630{
631 char *allocated = NULL;
632 int sp[2];
633 int pid;
634 IF_FEATURE_WGET_SSL_HELPER(volatile int child_failed = 0;)
635
636 if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
637 /* Kernel can have AF_UNIX support disabled */
638 bb_perror_msg_and_die("socketpair");
639
640 if (!strchr(host, ':'))
641 host = allocated = xasprintf("%s:%u", host, port);
642
643 fflush_all();
644 pid = xvfork();
645 if (pid == 0) {
646 /* Child */
647 char *argv[6];
648
649 close(sp[0]);
650 xmove_fd(sp[1], 0);
651 xdup2(0, 1);
652 /*
653 * openssl s_client -quiet -connect www.kernel.org:443 2>/dev/null
654 * It prints some debug stuff on stderr, don't know how to suppress it.
655 * Work around by dev-nulling stderr. We lose all error messages :(
656 */
657 xmove_fd(2, 3);
658 xopen("/dev/null", O_RDWR);
659 argv[0] = (char*)"openssl";
660 argv[1] = (char*)"s_client";
661 argv[2] = (char*)"-quiet";
662 argv[3] = (char*)"-connect";
663 argv[4] = (char*)host;
664 argv[5] = NULL;
665 BB_EXECVP(argv[0], argv);
666 xmove_fd(3, 2);
667# if ENABLE_FEATURE_WGET_SSL_HELPER
668 child_failed = 1;
669 xfunc_die();
670# else
671 bb_perror_msg_and_die("can't execute '%s'", argv[0]);
672# endif
673 /* notreached */
674 }
675
676 /* Parent */
677 free(allocated);
678 close(sp[1]);
679# if ENABLE_FEATURE_WGET_SSL_HELPER
680 if (child_failed) {
681 close(sp[0]);
682 return -1;
683 }
684# endif
685 return sp[0];
686}
687#endif
688
689/* See networking/ssl_helper/README how to build one */
690#if ENABLE_FEATURE_WGET_SSL_HELPER
691static void spawn_https_helper_small(int network_fd)
692{
693 int sp[2];
694 int pid;
695
696 if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
697 /* Kernel can have AF_UNIX support disabled */
698 bb_perror_msg_and_die("socketpair");
699
700 pid = BB_MMU ? xfork() : xvfork();
701 if (pid == 0) {
702 /* Child */
703 char *argv[3];
704
705 close(sp[0]);
706 xmove_fd(sp[1], 0);
707 xdup2(0, 1);
708 xmove_fd(network_fd, 3);
709 /*
710 * A simple ssl/tls helper
711 */
712 argv[0] = (char*)"ssl_helper";
713 argv[1] = (char*)"-d3";
714 argv[2] = NULL;
715 BB_EXECVP(argv[0], argv);
716 bb_perror_msg_and_die("can't execute '%s'", argv[0]);
717 /* notreached */
718 }
719
720 /* Parent */
721 close(sp[1]);
722 xmove_fd(sp[0], network_fd);
723}
724#endif
725
726static void NOINLINE retrieve_file_data(FILE *dfp)
727{
728#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
729# if ENABLE_FEATURE_WGET_TIMEOUT
730 unsigned second_cnt = G.timeout_seconds;
731# endif
732 struct pollfd polldata;
733
734 polldata.fd = fileno(dfp);
735 polldata.events = POLLIN | POLLPRI;
736#endif
737 progress_meter(PROGRESS_START);
738
739 if (G.chunked)
740 goto get_clen;
741
742 /* Loops only if chunked */
743 while (1) {
744
745#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
746 /* Must use nonblocking I/O, otherwise fread will loop
747 * and *block* until it reads full buffer,
748 * which messes up progress bar and/or timeout logic.
749 * Because of nonblocking I/O, we need to dance
750 * very carefully around EAGAIN. See explanation at
751 * clearerr() calls.
752 */
753 ndelay_on(polldata.fd);
754#endif
755 while (1) {
756 int n;
757 unsigned rdsz;
758
759#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
760 /* fread internally uses read loop, which in our case
761 * is usually exited when we get EAGAIN.
762 * In this case, libc sets error marker on the stream.
763 * Need to clear it before next fread to avoid possible
764 * rare false positive ferror below. Rare because usually
765 * fread gets more than zero bytes, and we don't fall
766 * into if (n <= 0) ...
767 */
768 clearerr(dfp);
769#endif
770 errno = 0;
771 rdsz = sizeof(G.wget_buf);
772 if (G.got_clen) {
773 if (G.content_len < (off_t)sizeof(G.wget_buf)) {
774 if ((int)G.content_len <= 0)
775 break;
776 rdsz = (unsigned)G.content_len;
777 }
778 }
779 n = fread(G.wget_buf, 1, rdsz, dfp);
780
781 if (n > 0) {
782 xwrite(G.output_fd, G.wget_buf, n);
783#if ENABLE_FEATURE_WGET_STATUSBAR
784 G.transferred += n;
785#endif
786 if (G.got_clen) {
787 G.content_len -= n;
788 if (G.content_len == 0)
789 break;
790 }
791#if ENABLE_FEATURE_WGET_TIMEOUT
792 second_cnt = G.timeout_seconds;
793#endif
794 goto bump;
795 }
796
797 /* n <= 0.
798 * man fread:
799 * If error occurs, or EOF is reached, the return value
800 * is a short item count (or zero).
801 * fread does not distinguish between EOF and error.
802 */
803 if (errno != EAGAIN) {
804 if (ferror(dfp)) {
805 progress_meter(PROGRESS_END);
806 bb_perror_msg_and_die(bb_msg_read_error);
807 }
808 break; /* EOF, not error */
809 }
810
811#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
812 /* It was EAGAIN. There is no data. Wait up to one second
813 * then abort if timed out, or update the bar and try reading again.
814 */
815 if (safe_poll(&polldata, 1, 1000) == 0) {
816# if ENABLE_FEATURE_WGET_TIMEOUT
817 if (second_cnt != 0 && --second_cnt == 0) {
818 progress_meter(PROGRESS_END);
819 bb_error_msg_and_die("download timed out");
820 }
821# endif
822 /* We used to loop back to poll here,
823 * but there is no great harm in letting fread
824 * to try reading anyway.
825 */
826 }
827#endif
828 bump:
829 /* Need to do it _every_ second for "stalled" indicator
830 * to be shown properly.
831 */
832 progress_meter(PROGRESS_BUMP);
833 } /* while (reading data) */
834
835#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
836 clearerr(dfp);
837 ndelay_off(polldata.fd); /* else fgets can get very unhappy */
838#endif
839 if (!G.chunked)
840 break;
841
842 fgets_and_trim(dfp); /* Eat empty line */
843 get_clen:
844 fgets_and_trim(dfp);
845 G.content_len = STRTOOFF(G.wget_buf, NULL, 16);
846 /* FIXME: error check? */
847 if (G.content_len == 0)
848 break; /* all done! */
849 G.got_clen = 1;
850 /*
851 * Note that fgets may result in some data being buffered in dfp.
852 * We loop back to fread, which will retrieve this data.
853 * Also note that code has to be arranged so that fread
854 * is done _before_ one-second poll wait - poll doesn't know
855 * about stdio buffering and can result in spurious one second waits!
856 */
857 }
858
859 /* If -c failed, we restart from the beginning,
860 * but we do not truncate file then, we do it only now, at the end.
861 * This lets user to ^C if his 99% complete 10 GB file download
862 * failed to restart *without* losing the almost complete file.
863 */
864 {
865 off_t pos = lseek(G.output_fd, 0, SEEK_CUR);
866 if (pos != (off_t)-1)
867 ftruncate(G.output_fd, pos);
868 }
869
870 /* Draw full bar and free its resources */
871 G.chunked = 0; /* makes it show 100% even for chunked download */
872 G.got_clen = 1; /* makes it show 100% even for download of (formerly) unknown size */
873 progress_meter(PROGRESS_END);
874}
875
876static void download_one_url(const char *url)
877{
878 bool use_proxy; /* Use proxies if env vars are set */
879 int redir_limit;
880 len_and_sockaddr *lsa;
881 FILE *sfp; /* socket to web/ftp server */
882 FILE *dfp; /* socket to ftp server (data) */
883 char *proxy = NULL;
884 char *fname_out_alloc;
885 char *redirected_path = NULL;
886 struct host_info server;
887 struct host_info target;
888
889 server.allocated = NULL;
890 target.allocated = NULL;
891 server.user = NULL;
892 target.user = NULL;
893
894 parse_url(url, &target);
895
896 /* Use the proxy if necessary */
897 use_proxy = (strcmp(G.proxy_flag, "off") != 0);
898 if (use_proxy) {
899 proxy = getenv(target.protocol == P_FTP ? "ftp_proxy" : "http_proxy");
900//FIXME: what if protocol is https? Ok to use http_proxy?
901 use_proxy = (proxy && proxy[0]);
902 if (use_proxy)
903 parse_url(proxy, &server);
904 }
905 if (!use_proxy) {
906 server.port = target.port;
907 if (ENABLE_FEATURE_IPV6) {
908 //free(server.allocated); - can't be non-NULL
909 server.host = server.allocated = xstrdup(target.host);
910 } else {
911 server.host = target.host;
912 }
913 }
914
915 if (ENABLE_FEATURE_IPV6)
916 strip_ipv6_scope_id(target.host);
917
918 /* If there was no -O FILE, guess output filename */
919 fname_out_alloc = NULL;
920 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
921 G.fname_out = bb_get_last_path_component_nostrip(target.path);
922 /* handle "wget http://kernel.org//" */
923 if (G.fname_out[0] == '/' || !G.fname_out[0])
924 G.fname_out = (char*)"index.html";
925 /* -P DIR is considered only if there was no -O FILE */
926 if (G.dir_prefix)
927 G.fname_out = fname_out_alloc = concat_path_file(G.dir_prefix, G.fname_out);
928 else {
929 /* redirects may free target.path later, need to make a copy */
930 G.fname_out = fname_out_alloc = xstrdup(G.fname_out);
931 }
932 }
933#if ENABLE_FEATURE_WGET_STATUSBAR
934 G.curfile = bb_get_last_path_component_nostrip(G.fname_out);
935#endif
936
937 /* Determine where to start transfer */
938 G.beg_range = 0;
939 if (option_mask32 & WGET_OPT_CONTINUE) {
940 G.output_fd = open(G.fname_out, O_WRONLY);
941 if (G.output_fd >= 0) {
942 G.beg_range = xlseek(G.output_fd, 0, SEEK_END);
943 }
944 /* File doesn't exist. We do not create file here yet.
945 * We are not sure it exists on remote side */
946 }
947
948 redir_limit = 5;
949 resolve_lsa:
950 lsa = xhost2sockaddr(server.host, server.port);
951 if (!(option_mask32 & WGET_OPT_QUIET)) {
952 char *s = xmalloc_sockaddr2dotted(&lsa->u.sa);
953 fprintf(stderr, "Connecting to %s (%s)\n", server.host, s);
954 free(s);
955 }
956 establish_session:
957 /*G.content_len = 0; - redundant, got_clen = 0 is enough */
958 G.got_clen = 0;
959 G.chunked = 0;
960 if (use_proxy || target.protocol != P_FTP) {
961 /*
962 * HTTP session
963 */
964 char *str;
965 int status;
966
967 /* Open socket to http(s) server */
968#if ENABLE_FEATURE_WGET_OPENSSL
969 /* openssl (and maybe ssl_helper) support is configured */
970 if (target.protocol == P_HTTPS) {
971 /* openssl-based helper
972 * Inconvenient API since we can't give it an open fd
973 */
974 int fd = spawn_https_helper_openssl(server.host, server.port);
975# if ENABLE_FEATURE_WGET_SSL_HELPER
976 if (fd < 0) { /* no openssl? try ssl_helper */
977 sfp = open_socket(lsa);
978 spawn_https_helper_small(fileno(sfp));
979 goto socket_opened;
980 }
981# else
982 /* We don't check for exec("openssl") failure in this case */
983# endif
984 sfp = fdopen(fd, "r+");
985 if (!sfp)
986 bb_perror_msg_and_die(bb_msg_memory_exhausted);
987 goto socket_opened;
988 }
989 sfp = open_socket(lsa);
990 socket_opened:
991#elif ENABLE_FEATURE_WGET_SSL_HELPER
992 /* Only ssl_helper support is configured */
993 sfp = open_socket(lsa);
994 if (target.protocol == P_HTTPS)
995 spawn_https_helper_small(fileno(sfp));
996#else
997 /* ssl (https) support is not configured */
998 sfp = open_socket(lsa);
999#endif
1000 /* Send HTTP request */
1001 if (use_proxy) {
1002 SENDFMT(sfp, "GET %s://%s/%s HTTP/1.1\r\n",
1003 target.protocol, target.host,
1004 target.path);
1005 } else {
1006 SENDFMT(sfp, "%s /%s HTTP/1.1\r\n",
1007 (option_mask32 & WGET_OPT_POST_DATA) ? "POST" : "GET",
1008 target.path);
1009 }
1010 if (!USR_HEADER_HOST)
1011 SENDFMT(sfp, "Host: %s\r\n", target.host);
1012 if (!USR_HEADER_USER_AGENT)
1013 SENDFMT(sfp, "User-Agent: %s\r\n", G.user_agent);
1014
1015 /* Ask server to close the connection as soon as we are done
1016 * (IOW: we do not intend to send more requests)
1017 */
1018 SENDFMT(sfp, "Connection: close\r\n");
1019
1020#if ENABLE_FEATURE_WGET_AUTHENTICATION
1021 if (target.user && !USR_HEADER_AUTH) {
1022 SENDFMT(sfp, "Proxy-Authorization: Basic %s\r\n"+6,
1023 base64enc(target.user));
1024 }
1025 if (use_proxy && server.user && !USR_HEADER_PROXY_AUTH) {
1026 SENDFMT(sfp, "Proxy-Authorization: Basic %s\r\n",
1027 base64enc(server.user));
1028 }
1029#endif
1030
1031 if (G.beg_range != 0 && !USR_HEADER_RANGE)
1032 SENDFMT(sfp, "Range: bytes=%"OFF_FMT"u-\r\n", G.beg_range);
1033
1034#if ENABLE_FEATURE_WGET_LONG_OPTIONS
1035 if (G.extra_headers) {
1036 log_io(G.extra_headers);
1037 fputs(G.extra_headers, sfp);
1038 }
1039
1040 if (option_mask32 & WGET_OPT_POST_DATA) {
1041 SENDFMT(sfp,
1042 "Content-Type: application/x-www-form-urlencoded\r\n"
1043 "Content-Length: %u\r\n"
1044 "\r\n"
1045 "%s",
1046 (int) strlen(G.post_data), G.post_data
1047 );
1048 } else
1049#endif
1050 {
1051 SENDFMT(sfp, "\r\n");
1052 }
1053
1054 fflush(sfp);
1055
1056 /*
1057 * Retrieve HTTP response line and check for "200" status code.
1058 */
1059 read_response:
1060 fgets_and_trim(sfp);
1061
1062 str = G.wget_buf;
1063 str = skip_non_whitespace(str);
1064 str = skip_whitespace(str);
1065 // FIXME: no error check
1066 // xatou wouldn't work: "200 OK"
1067 status = atoi(str);
1068 switch (status) {
1069 case 0:
1070 case 100:
1071 while (gethdr(sfp) != NULL)
1072 /* eat all remaining headers */;
1073 goto read_response;
1074 case 200:
1075/*
1076Response 204 doesn't say "null file", it says "metadata
1077has changed but data didn't":
1078
1079"10.2.5 204 No Content
1080The server has fulfilled the request but does not need to return
1081an entity-body, and might want to return updated metainformation.
1082The response MAY include new or updated metainformation in the form
1083of entity-headers, which if present SHOULD be associated with
1084the requested variant.
1085
1086If the client is a user agent, it SHOULD NOT change its document
1087view from that which caused the request to be sent. This response
1088is primarily intended to allow input for actions to take place
1089without causing a change to the user agent's active document view,
1090although any new or updated metainformation SHOULD be applied
1091to the document currently in the user agent's active view.
1092
1093The 204 response MUST NOT include a message-body, and thus
1094is always terminated by the first empty line after the header fields."
1095
1096However, in real world it was observed that some web servers
1097(e.g. Boa/0.94.14rc21) simply use code 204 when file size is zero.
1098*/
1099 case 204:
1100 if (G.beg_range != 0) {
1101 /* "Range:..." was not honored by the server.
1102 * Restart download from the beginning.
1103 */
1104 reset_beg_range_to_zero();
1105 }
1106 break;
1107 case 300: /* redirection */
1108 case 301:
1109 case 302:
1110 case 303:
1111 break;
1112 case 206: /* Partial Content */
1113 if (G.beg_range != 0)
1114 /* "Range:..." worked. Good. */
1115 break;
1116 /* Partial Content even though we did not ask for it??? */
1117 /* fall through */
1118 default:
1119 bb_error_msg_and_die("server returned error: %s", sanitize_string(G.wget_buf));
1120 }
1121
1122 /*
1123 * Retrieve HTTP headers.
1124 */
1125 while ((str = gethdr(sfp)) != NULL) {
1126 static const char keywords[] ALIGN1 =
1127 "content-length\0""transfer-encoding\0""location\0";
1128 enum {
1129 KEY_content_length = 1, KEY_transfer_encoding, KEY_location
1130 };
1131 smalluint key;
1132
1133 /* gethdr converted "FOO:" string to lowercase */
1134
1135 /* strip trailing whitespace */
1136 char *s = strchrnul(str, '\0') - 1;
1137 while (s >= str && (*s == ' ' || *s == '\t')) {
1138 *s = '\0';
1139 s--;
1140 }
1141 key = index_in_strings(keywords, G.wget_buf) + 1;
1142 if (key == KEY_content_length) {
1143 G.content_len = BB_STRTOOFF(str, NULL, 10);
1144 if (G.content_len < 0 || errno) {
1145 bb_error_msg_and_die("content-length %s is garbage", sanitize_string(str));
1146 }
1147 G.got_clen = 1;
1148 continue;
1149 }
1150 if (key == KEY_transfer_encoding) {
1151 if (strcmp(str_tolower(str), "chunked") != 0)
1152 bb_error_msg_and_die("transfer encoding '%s' is not supported", sanitize_string(str));
1153 G.chunked = 1;
1154 }
1155 if (key == KEY_location && status >= 300) {
1156 if (--redir_limit == 0)
1157 bb_error_msg_and_die("too many redirections");
1158 fclose(sfp);
1159 if (str[0] == '/') {
1160 free(redirected_path);
1161 target.path = redirected_path = xstrdup(str+1);
1162 /* lsa stays the same: it's on the same server */
1163 } else {
1164 parse_url(str, &target);
1165 if (!use_proxy) {
1166 /* server.user remains untouched */
1167 free(server.allocated);
1168 server.allocated = NULL;
1169 server.host = target.host;
1170 /* strip_ipv6_scope_id(target.host); - no! */
1171 /* we assume remote never gives us IPv6 addr with scope id */
1172 server.port = target.port;
1173 free(lsa);
1174 goto resolve_lsa;
1175 } /* else: lsa stays the same: we use proxy */
1176 }
1177 goto establish_session;
1178 }
1179 }
1180// if (status >= 300)
1181// bb_error_msg_and_die("bad redirection (no Location: header from server)");
1182
1183 /* For HTTP, data is pumped over the same connection */
1184 dfp = sfp;
1185 } else {
1186 /*
1187 * FTP session
1188 */
1189 sfp = prepare_ftp_session(&dfp, &target, lsa);
1190 }
1191
1192 free(lsa);
1193
1194 if (!(option_mask32 & WGET_OPT_SPIDER)) {
1195 if (G.output_fd < 0)
1196 G.output_fd = xopen(G.fname_out, G.o_flags);
1197 retrieve_file_data(dfp);
1198 if (!(option_mask32 & WGET_OPT_OUTNAME)) {
1199 xclose(G.output_fd);
1200 G.output_fd = -1;
1201 }
1202 }
1203
1204 if (dfp != sfp) {
1205 /* It's ftp. Close data connection properly */
1206 fclose(dfp);
1207 if (ftpcmd(NULL, NULL, sfp) != 226)
1208 bb_error_msg_and_die("ftp error: %s", sanitize_string(G.wget_buf + 4));
1209 /* ftpcmd("QUIT", NULL, sfp); - why bother? */
1210 }
1211 fclose(sfp);
1212
1213 free(server.allocated);
1214 free(target.allocated);
1215 free(server.user);
1216 free(target.user);
1217 free(fname_out_alloc);
1218 free(redirected_path);
1219}
1220
1221int wget_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
1222int wget_main(int argc UNUSED_PARAM, char **argv)
1223{
1224#if ENABLE_FEATURE_WGET_LONG_OPTIONS
1225 static const char wget_longopts[] ALIGN1 =
1226 /* name, has_arg, val */
1227 "continue\0" No_argument "c"
1228//FIXME: -s isn't --spider, it's --save-headers!
1229 "spider\0" No_argument "s"
1230 "quiet\0" No_argument "q"
1231 "output-document\0" Required_argument "O"
1232 "directory-prefix\0" Required_argument "P"
1233 "proxy\0" Required_argument "Y"
1234 "user-agent\0" Required_argument "U"
1235IF_FEATURE_WGET_TIMEOUT(
1236 "timeout\0" Required_argument "T")
1237 /* Ignored: */
1238IF_DESKTOP( "tries\0" Required_argument "t")
1239 "header\0" Required_argument "\xff"
1240 "post-data\0" Required_argument "\xfe"
1241 /* Ignored (we always use PASV): */
1242IF_DESKTOP( "passive-ftp\0" No_argument "\xf0")
1243 /* Ignored (we don't do ssl) */
1244IF_DESKTOP( "no-check-certificate\0" No_argument "\xf0")
1245 /* Ignored (we don't support caching) */
1246IF_DESKTOP( "no-cache\0" No_argument "\xf0")
1247IF_DESKTOP( "no-verbose\0" No_argument "\xf0")
1248IF_DESKTOP( "no-clobber\0" No_argument "\xf0")
1249IF_DESKTOP( "no-host-directories\0" No_argument "\xf0")
1250IF_DESKTOP( "no-parent\0" No_argument "\xf0")
1251 ;
1252#endif
1253
1254#if ENABLE_FEATURE_WGET_LONG_OPTIONS
1255 llist_t *headers_llist = NULL;
1256#endif
1257
1258 INIT_G();
1259
1260#if ENABLE_FEATURE_WGET_TIMEOUT
1261 G.timeout_seconds = 900;
1262 signal(SIGALRM, alarm_handler);
1263#endif
1264 G.proxy_flag = "on"; /* use proxies if env vars are set */
1265 G.user_agent = "Wget"; /* "User-Agent" header field */
1266
1267#if ENABLE_FEATURE_WGET_LONG_OPTIONS
1268 applet_long_options = wget_longopts;
1269#endif
1270 opt_complementary = "-1" /* at least one URL */
1271 IF_FEATURE_WGET_TIMEOUT(":T+") /* -T NUM */
1272 IF_FEATURE_WGET_LONG_OPTIONS(":\xff::"); /* --header is a list */
1273 getopt32(argv, "csqO:P:Y:U:T:"
1274 /*ignored:*/ "t:"
1275 /*ignored:*/ "n::"
1276 /* wget has exactly four -n<letter> opts, all of which we can ignore:
1277 * -nv --no-verbose: be moderately quiet (-q is full quiet)
1278 * -nc --no-clobber: abort if exists, neither download to FILE.n nor overwrite FILE
1279 * -nH --no-host-directories: wget -r http://host/ won't create host/
1280 * -np --no-parent
1281 * "n::" above says that we accept -n[ARG].
1282 * Specifying "n:" would be a bug: "-n ARG" would eat ARG!
1283 */
1284 , &G.fname_out, &G.dir_prefix,
1285 &G.proxy_flag, &G.user_agent,
1286 IF_FEATURE_WGET_TIMEOUT(&G.timeout_seconds) IF_NOT_FEATURE_WGET_TIMEOUT(NULL),
1287 NULL, /* -t RETRIES */
1288 NULL /* -n[ARG] */
1289 IF_FEATURE_WGET_LONG_OPTIONS(, &headers_llist)
1290 IF_FEATURE_WGET_LONG_OPTIONS(, &G.post_data)
1291 );
1292 argv += optind;
1293
1294#if ENABLE_FEATURE_WGET_LONG_OPTIONS
1295 if (headers_llist) {
1296 int size = 0;
1297 char *hdr;
1298 llist_t *ll = headers_llist;
1299 while (ll) {
1300 size += strlen(ll->data) + 2;
1301 ll = ll->link;
1302 }
1303 G.extra_headers = hdr = xmalloc(size + 1);
1304 while (headers_llist) {
1305 int bit;
1306 const char *words;
1307
1308 size = sprintf(hdr, "%s\r\n",
1309 (char*)llist_pop(&headers_llist));
1310 /* a bit like index_in_substrings but don't match full key */
1311 bit = 1;
1312 words = wget_user_headers;
1313 while (*words) {
1314 if (strstr(hdr, words) == hdr) {
1315 G.user_headers |= bit;
1316 break;
1317 }
1318 bit <<= 1;
1319 words += strlen(words) + 1;
1320 }
1321 hdr += size;
1322 }
1323 }
1324#endif
1325
1326 G.output_fd = -1;
1327 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC | O_EXCL;
1328 if (G.fname_out) { /* -O FILE ? */
1329 if (LONE_DASH(G.fname_out)) { /* -O - ? */
1330 G.output_fd = 1;
1331 option_mask32 &= ~WGET_OPT_CONTINUE;
1332 }
1333 /* compat with wget: -O FILE can overwrite */
1334 G.o_flags = O_WRONLY | O_CREAT | O_TRUNC;
1335 }
1336
1337 while (*argv)
1338 download_one_url(*argv++);
1339
1340 if (G.output_fd >= 0)
1341 xclose(G.output_fd);
1342
1343#if ENABLE_FEATURE_CLEAN_UP && ENABLE_FEATURE_WGET_LONG_OPTIONS
1344 free(G.extra_headers);
1345#endif
1346 FINI_G();
1347
1348 return EXIT_SUCCESS;
1349}
Note: See TracBrowser for help on using the repository browser.