2011-10-04 18:03:20 -04:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2015-01-16 16:33:49 -05:00
|
|
|
* Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
|
2011-10-04 18:03:20 -04:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
***************************************************************************/
|
2012-04-06 17:35:15 -04:00
|
|
|
#include "tool_setup.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "rawstr.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
#define ENABLE_CURLX_PRINTF
|
|
|
|
/* use our own printf() functions */
|
|
|
|
#include "curlx.h"
|
|
|
|
|
|
|
|
#include "tool_binmode.h"
|
|
|
|
#include "tool_cfgable.h"
|
|
|
|
#include "tool_cb_prg.h"
|
|
|
|
#include "tool_formparse.h"
|
|
|
|
#include "tool_getparam.h"
|
|
|
|
#include "tool_helpers.h"
|
|
|
|
#include "tool_libinfo.h"
|
2012-06-08 08:21:29 -04:00
|
|
|
#include "tool_metalink.h"
|
2011-10-04 18:03:20 -04:00
|
|
|
#include "tool_msgs.h"
|
|
|
|
#include "tool_paramhlp.h"
|
|
|
|
#include "tool_parsecfg.h"
|
2012-04-26 09:59:52 -04:00
|
|
|
|
2013-01-03 20:50:28 -05:00
|
|
|
#include "memdebug.h" /* keep this as LAST include */
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
#ifdef MSDOS
|
|
|
|
# define USE_WATT32
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#define GetStr(str,val) do { \
|
|
|
|
if(*(str)) { \
|
|
|
|
free(*(str)); \
|
|
|
|
*(str) = NULL; \
|
|
|
|
} \
|
2012-07-13 17:39:25 -04:00
|
|
|
if((val)) { \
|
2011-10-04 18:03:20 -04:00
|
|
|
*(str) = strdup((val)); \
|
2012-07-13 17:39:25 -04:00
|
|
|
if(!(*(str))) \
|
|
|
|
return PARAM_NO_MEM; \
|
|
|
|
} \
|
2011-10-04 18:03:20 -04:00
|
|
|
} WHILE_FALSE
|
|
|
|
|
|
|
|
struct LongShort {
|
|
|
|
const char *letter; /* short name option */
|
|
|
|
const char *lname; /* long name option */
|
|
|
|
bool extraparam; /* whether it takes an additional argument */
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct LongShort aliases[]= {
|
|
|
|
/* all these ones, starting with "*" or "$" as a short-option have *no*
|
|
|
|
short option to mention. */
|
|
|
|
{"*", "url", TRUE},
|
2013-02-09 16:18:02 -05:00
|
|
|
{"*4", "dns-ipv4-addr", TRUE},
|
|
|
|
{"*6", "dns-ipv6-addr", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*a", "random-file", TRUE},
|
|
|
|
{"*b", "egd-file", TRUE},
|
2013-10-12 17:26:38 -04:00
|
|
|
{"*B", "oauth2-bearer", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*c", "connect-timeout", TRUE},
|
|
|
|
{"*d", "ciphers", TRUE},
|
2013-09-13 13:50:11 -04:00
|
|
|
{"*D", "dns-interface", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*e", "disable-epsv", FALSE},
|
|
|
|
{"*E", "epsv", FALSE},
|
|
|
|
/* 'epsv' made like this to make --no-epsv and --epsv to work
|
|
|
|
although --disable-epsv is the documented option */
|
|
|
|
#ifdef USE_ENVIRONMENT
|
|
|
|
{"*f", "environment", FALSE},
|
|
|
|
#endif
|
2013-02-09 16:18:02 -05:00
|
|
|
{"*F", "dns-servers", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*g", "trace", TRUE},
|
2014-02-10 02:38:55 -05:00
|
|
|
{"*G", "npn", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*h", "trace-ascii", TRUE},
|
2014-02-10 02:38:55 -05:00
|
|
|
{"*H", "alpn", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"*i", "limit-rate", TRUE},
|
|
|
|
{"*j", "compressed", FALSE},
|
|
|
|
{"*J", "tr-encoding", FALSE},
|
|
|
|
{"*k", "digest", FALSE},
|
|
|
|
{"*l", "negotiate", FALSE},
|
|
|
|
{"*m", "ntlm", FALSE},
|
|
|
|
{"*M", "ntlm-wb", FALSE},
|
|
|
|
{"*n", "basic", FALSE},
|
|
|
|
{"*o", "anyauth", FALSE},
|
|
|
|
#ifdef USE_WATT32
|
|
|
|
{"*p", "wdebug", FALSE},
|
|
|
|
#endif
|
|
|
|
{"*q", "ftp-create-dirs", FALSE},
|
|
|
|
{"*r", "create-dirs", FALSE},
|
|
|
|
{"*s", "max-redirs", TRUE},
|
|
|
|
{"*t", "proxy-ntlm", FALSE},
|
|
|
|
{"*u", "crlf", FALSE},
|
|
|
|
{"*v", "stderr", TRUE},
|
|
|
|
{"*w", "interface", TRUE},
|
|
|
|
{"*x", "krb" , TRUE},
|
|
|
|
{"*x", "krb4" , TRUE},
|
|
|
|
/* 'krb4' is the previous name */
|
|
|
|
{"*y", "max-filesize", TRUE},
|
|
|
|
{"*z", "disable-eprt", FALSE},
|
|
|
|
{"*Z", "eprt", FALSE},
|
|
|
|
/* 'eprt' made like this to make --no-eprt and --eprt to work
|
|
|
|
although --disable-eprt is the documented option */
|
|
|
|
{"$a", "ftp-ssl", FALSE},
|
|
|
|
/* 'ftp-ssl' deprecated name since 7.20.0 */
|
|
|
|
{"$a", "ssl", FALSE},
|
|
|
|
/* 'ssl' new option name in 7.20.0, previously this was ftp-ssl */
|
|
|
|
{"$b", "ftp-pasv", FALSE},
|
|
|
|
{"$c", "socks5", TRUE},
|
|
|
|
{"$c", "socks", TRUE},
|
|
|
|
/* 'socks' is how the option once was documented but we prefer
|
|
|
|
the --socks5 version for explicit version */
|
|
|
|
{"$d", "tcp-nodelay", FALSE},
|
|
|
|
{"$e", "proxy-digest", FALSE},
|
|
|
|
{"$f", "proxy-basic", FALSE},
|
|
|
|
{"$g", "retry", TRUE},
|
|
|
|
{"$h", "retry-delay", TRUE},
|
|
|
|
{"$i", "retry-max-time", TRUE},
|
|
|
|
{"$k", "proxy-negotiate", FALSE},
|
|
|
|
{"$m", "ftp-account", TRUE},
|
|
|
|
{"$n", "proxy-anyauth", FALSE},
|
|
|
|
{"$o", "trace-time", FALSE},
|
|
|
|
{"$p", "ignore-content-length", FALSE},
|
|
|
|
{"$q", "ftp-skip-pasv-ip", FALSE},
|
|
|
|
{"$r", "ftp-method", TRUE},
|
|
|
|
{"$s", "local-port", TRUE},
|
|
|
|
{"$t", "socks4", TRUE},
|
|
|
|
{"$T", "socks4a", TRUE},
|
|
|
|
{"$u", "ftp-alternative-to-user", TRUE},
|
|
|
|
{"$v", "ftp-ssl-reqd", FALSE},
|
|
|
|
/* 'ftp-ssl-reqd' deprecated name since 7.20.0 */
|
|
|
|
{"$v", "ssl-reqd", FALSE},
|
|
|
|
/* 'ssl-reqd' new in 7.20.0, previously this was ftp-ssl-reqd */
|
|
|
|
{"$w", "sessionid", FALSE},
|
2015-04-22 18:09:49 -04:00
|
|
|
/* 'sessionid' listed as --no-sessionid in the help */
|
2011-10-04 18:03:20 -04:00
|
|
|
{"$x", "ftp-ssl-control", FALSE},
|
|
|
|
{"$y", "ftp-ssl-ccc", FALSE},
|
|
|
|
{"$j", "ftp-ssl-ccc-mode", TRUE},
|
|
|
|
{"$z", "libcurl", TRUE},
|
|
|
|
{"$#", "raw", FALSE},
|
|
|
|
{"$0", "post301", FALSE},
|
|
|
|
{"$1", "keepalive", FALSE},
|
|
|
|
/* 'keepalive' listed as --no-keepalive in the help */
|
|
|
|
{"$2", "socks5-hostname", TRUE},
|
|
|
|
{"$3", "keepalive-time", TRUE},
|
|
|
|
{"$4", "post302", FALSE},
|
|
|
|
{"$5", "noproxy", TRUE},
|
|
|
|
#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
|
|
|
|
{"$6", "socks5-gssapi-service", TRUE},
|
|
|
|
{"$7", "socks5-gssapi-nec", FALSE},
|
2015-03-29 08:52:31 -04:00
|
|
|
{"$O", "proxy-service-name", TRUE},
|
|
|
|
{"$P", "service-name", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
#endif
|
|
|
|
{"$8", "proxy1.0", TRUE},
|
|
|
|
{"$9", "tftp-blksize", TRUE},
|
|
|
|
{"$A", "mail-from", TRUE},
|
|
|
|
{"$B", "mail-rcpt", TRUE},
|
|
|
|
{"$C", "ftp-pret", FALSE},
|
|
|
|
{"$D", "proto", TRUE},
|
|
|
|
{"$E", "proto-redir", TRUE},
|
|
|
|
{"$F", "resolve", TRUE},
|
|
|
|
{"$G", "delegation", TRUE},
|
2012-02-16 07:19:47 -05:00
|
|
|
{"$H", "mail-auth", TRUE},
|
2012-04-05 17:34:12 -04:00
|
|
|
{"$I", "post303", FALSE},
|
2012-06-20 11:51:06 -04:00
|
|
|
{"$J", "metalink", FALSE},
|
2013-04-27 04:54:14 -04:00
|
|
|
{"$K", "sasl-ir", FALSE},
|
2013-08-10 16:55:59 -04:00
|
|
|
{"$L", "test-event", FALSE},
|
2014-11-27 17:59:26 -05:00
|
|
|
{"$M", "unix-socket", TRUE},
|
2015-03-23 05:51:49 -04:00
|
|
|
{"$N", "path-as-is", FALSE},
|
2013-09-05 03:56:05 -04:00
|
|
|
{"0", "http1.0", FALSE},
|
2013-09-04 16:28:16 -04:00
|
|
|
{"01", "http1.1", FALSE},
|
2014-01-30 10:32:03 -05:00
|
|
|
{"02", "http2", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"1", "tlsv1", FALSE},
|
2013-09-19 09:17:13 -04:00
|
|
|
{"10", "tlsv1.0", FALSE},
|
|
|
|
{"11", "tlsv1.1", FALSE},
|
|
|
|
{"12", "tlsv1.2", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"2", "sslv2", FALSE},
|
|
|
|
{"3", "sslv3", FALSE},
|
|
|
|
{"4", "ipv4", FALSE},
|
|
|
|
{"6", "ipv6", FALSE},
|
|
|
|
{"a", "append", FALSE},
|
|
|
|
{"A", "user-agent", TRUE},
|
|
|
|
{"b", "cookie", TRUE},
|
|
|
|
{"B", "use-ascii", FALSE},
|
|
|
|
{"c", "cookie-jar", TRUE},
|
|
|
|
{"C", "continue-at", TRUE},
|
|
|
|
{"d", "data", TRUE},
|
2015-04-25 14:49:39 -04:00
|
|
|
{"dr", "data-raw", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"da", "data-ascii", TRUE},
|
|
|
|
{"db", "data-binary", TRUE},
|
|
|
|
{"de", "data-urlencode", TRUE},
|
|
|
|
{"D", "dump-header", TRUE},
|
|
|
|
{"e", "referer", TRUE},
|
|
|
|
{"E", "cert", TRUE},
|
|
|
|
{"Ea", "cacert", TRUE},
|
|
|
|
{"Eb", "cert-type", TRUE},
|
|
|
|
{"Ec", "key", TRUE},
|
|
|
|
{"Ed", "key-type", TRUE},
|
|
|
|
{"Ee", "pass", TRUE},
|
|
|
|
{"Ef", "engine", TRUE},
|
|
|
|
{"Eg", "capath ", TRUE},
|
|
|
|
{"Eh", "pubkey", TRUE},
|
|
|
|
{"Ei", "hostpubmd5", TRUE},
|
|
|
|
{"Ej", "crlfile", TRUE},
|
|
|
|
{"Ek", "tlsuser", TRUE},
|
|
|
|
{"El", "tlspassword", TRUE},
|
|
|
|
{"Em", "tlsauthtype", TRUE},
|
2012-02-08 07:36:36 -05:00
|
|
|
{"En", "ssl-allow-beast", FALSE},
|
2013-12-14 16:39:27 -05:00
|
|
|
{"Eo", "login-options", TRUE},
|
2014-09-30 22:31:17 -04:00
|
|
|
{"Ep", "pinnedpubkey", TRUE},
|
2014-06-16 14:47:26 -04:00
|
|
|
{"Eq", "cert-status", FALSE},
|
2015-02-14 12:17:04 -05:00
|
|
|
{"Er", "false-start", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"f", "fail", FALSE},
|
|
|
|
{"F", "form", TRUE},
|
|
|
|
{"Fs", "form-string", TRUE},
|
|
|
|
{"g", "globoff", FALSE},
|
|
|
|
{"G", "get", FALSE},
|
|
|
|
{"h", "help", FALSE},
|
|
|
|
{"H", "header", TRUE},
|
2014-02-04 17:48:16 -05:00
|
|
|
{"Hp", "proxy-header", TRUE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"i", "include", FALSE},
|
|
|
|
{"I", "head", FALSE},
|
|
|
|
{"j", "junk-session-cookies", FALSE},
|
|
|
|
{"J", "remote-header-name", FALSE},
|
|
|
|
{"k", "insecure", FALSE},
|
|
|
|
{"K", "config", TRUE},
|
|
|
|
{"l", "list-only", FALSE},
|
|
|
|
{"L", "location", FALSE},
|
|
|
|
{"Lt", "location-trusted", FALSE},
|
|
|
|
{"m", "max-time", TRUE},
|
|
|
|
{"M", "manual", FALSE},
|
|
|
|
{"n", "netrc", FALSE},
|
|
|
|
{"no", "netrc-optional", FALSE},
|
|
|
|
{"ne", "netrc-file", TRUE},
|
|
|
|
{"N", "buffer", FALSE},
|
|
|
|
/* 'buffer' listed as --no-buffer in the help */
|
|
|
|
{"o", "output", TRUE},
|
|
|
|
{"O", "remote-name", FALSE},
|
|
|
|
{"Oa", "remote-name-all", FALSE},
|
|
|
|
{"p", "proxytunnel", FALSE},
|
|
|
|
{"P", "ftpport", TRUE},
|
|
|
|
/* 'ftpport' old version */
|
|
|
|
{"P", "ftp-port", TRUE},
|
|
|
|
{"q", "disable", FALSE},
|
|
|
|
{"Q", "quote", TRUE},
|
|
|
|
{"r", "range", TRUE},
|
|
|
|
{"R", "remote-time", FALSE},
|
|
|
|
{"s", "silent", FALSE},
|
|
|
|
{"S", "show-error", FALSE},
|
|
|
|
{"t", "telnet-options", TRUE},
|
|
|
|
/* 'telnet-options' documented as telnet-option */
|
|
|
|
{"T", "upload-file", TRUE},
|
|
|
|
{"u", "user", TRUE},
|
|
|
|
{"U", "proxy-user", TRUE},
|
|
|
|
{"v", "verbose", FALSE},
|
|
|
|
{"V", "version", FALSE},
|
|
|
|
{"w", "write-out", TRUE},
|
|
|
|
{"x", "proxy", TRUE},
|
|
|
|
{"X", "request", TRUE},
|
|
|
|
{"X", "http-request", TRUE},
|
|
|
|
/* 'http-request' OBSOLETE VERSION */
|
|
|
|
{"Y", "speed-limit", TRUE},
|
|
|
|
{"y", "speed-time", TRUE},
|
|
|
|
{"z", "time-cond", TRUE},
|
|
|
|
{"#", "progress-bar", FALSE},
|
2014-02-23 12:19:45 -05:00
|
|
|
{":", "next", FALSE},
|
2011-10-04 18:03:20 -04:00
|
|
|
{"~", "xattr", FALSE},
|
|
|
|
};
|
|
|
|
|
2013-04-05 10:10:46 -04:00
|
|
|
/* Split the argument of -E to 'certname' and 'passphrase' separated by colon.
|
|
|
|
* We allow ':' and '\' to be escaped by '\' so that we can use certificate
|
|
|
|
* nicknames containing ':'. See <https://sourceforge.net/p/curl/bugs/1196/>
|
|
|
|
* for details. */
|
2013-05-03 07:26:25 -04:00
|
|
|
#ifndef UNITTESTS
|
|
|
|
static
|
|
|
|
#endif
|
|
|
|
void parse_cert_parameter(const char *cert_parameter,
|
|
|
|
char **certname,
|
|
|
|
char **passphrase)
|
2013-04-05 10:01:31 -04:00
|
|
|
{
|
|
|
|
size_t param_length = strlen(cert_parameter);
|
|
|
|
size_t span;
|
|
|
|
const char *param_place = NULL;
|
|
|
|
char *certname_place = NULL;
|
2013-05-03 16:57:18 -04:00
|
|
|
*certname = NULL;
|
2013-04-05 10:10:46 -04:00
|
|
|
*passphrase = NULL;
|
|
|
|
|
2013-04-05 10:01:31 -04:00
|
|
|
/* most trivial assumption: cert_parameter is empty */
|
2013-05-03 16:57:18 -04:00
|
|
|
if(param_length == 0)
|
2013-04-05 10:01:31 -04:00
|
|
|
return;
|
2013-05-03 16:57:18 -04:00
|
|
|
|
2013-04-05 10:01:31 -04:00
|
|
|
/* next less trivial: cert_parameter contains no colon nor backslash; this
|
|
|
|
* means no passphrase was given and no characters escaped */
|
|
|
|
if(!strpbrk(cert_parameter, ":\\")) {
|
|
|
|
*certname = strdup(cert_parameter);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* deal with escaped chars; find unescaped colon if it exists */
|
2013-05-03 16:57:18 -04:00
|
|
|
certname_place = malloc(param_length + 1);
|
|
|
|
if(!certname_place)
|
|
|
|
return;
|
|
|
|
|
|
|
|
*certname = certname_place;
|
2013-04-05 10:01:31 -04:00
|
|
|
param_place = cert_parameter;
|
|
|
|
while(*param_place) {
|
|
|
|
span = strcspn(param_place, ":\\");
|
|
|
|
strncpy(certname_place, param_place, span);
|
|
|
|
param_place += span;
|
|
|
|
certname_place += span;
|
|
|
|
/* we just ate all the non-special chars. now we're on either a special
|
|
|
|
* char or the end of the string. */
|
|
|
|
switch(*param_place) {
|
|
|
|
case '\0':
|
|
|
|
break;
|
|
|
|
case '\\':
|
|
|
|
param_place++;
|
|
|
|
switch(*param_place) {
|
|
|
|
case '\0':
|
|
|
|
*certname_place++ = '\\';
|
|
|
|
break;
|
|
|
|
case '\\':
|
|
|
|
*certname_place++ = '\\';
|
|
|
|
param_place++;
|
|
|
|
break;
|
|
|
|
case ':':
|
|
|
|
*certname_place++ = ':';
|
|
|
|
param_place++;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
*certname_place++ = '\\';
|
|
|
|
*certname_place++ = *param_place;
|
|
|
|
param_place++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ':':
|
|
|
|
/* Since we live in a world of weirdness and confusion, the win32
|
|
|
|
dudes can use : when using drive letters and thus c:\file:password
|
|
|
|
needs to work. In order not to break compatibility, we still use : as
|
|
|
|
separator, but we try to detect when it is used for a file name! On
|
|
|
|
windows. */
|
|
|
|
#ifdef WIN32
|
|
|
|
if(param_place &&
|
|
|
|
(param_place == &cert_parameter[1]) &&
|
|
|
|
(cert_parameter[2] == '\\' || cert_parameter[2] == '/') &&
|
|
|
|
(ISALPHA(cert_parameter[0])) ) {
|
|
|
|
/* colon in the second column, followed by a backslash, and the
|
|
|
|
first character is an alphabetic letter:
|
|
|
|
|
|
|
|
this is a drive letter colon */
|
|
|
|
*certname_place++ = ':';
|
|
|
|
param_place++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
/* escaped colons and Windows drive letter colons were handled
|
|
|
|
* above; if we're still here, this is a separating colon */
|
|
|
|
param_place++;
|
|
|
|
if(strlen(param_place) > 0) {
|
|
|
|
*passphrase = strdup(param_place);
|
|
|
|
}
|
2013-05-03 16:57:18 -04:00
|
|
|
goto done;
|
2013-04-05 10:01:31 -04:00
|
|
|
}
|
|
|
|
}
|
2013-05-03 16:57:18 -04:00
|
|
|
done:
|
|
|
|
*certname_place = '\0';
|
2013-04-05 10:01:31 -04:00
|
|
|
}
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
ParameterError getparameter(char *flag, /* f or -long-flag */
|
|
|
|
char *nextarg, /* NULL if unset */
|
|
|
|
bool *usedarg, /* set to TRUE if the arg
|
|
|
|
has been used */
|
2014-02-23 11:04:39 -05:00
|
|
|
struct GlobalConfig *global,
|
2014-02-23 07:59:59 -05:00
|
|
|
struct OperationConfig *config)
|
2011-10-04 18:03:20 -04:00
|
|
|
{
|
|
|
|
char letter;
|
|
|
|
char subletter = '\0'; /* subletters can only occur on long options */
|
|
|
|
int rc;
|
|
|
|
const char *parse = NULL;
|
|
|
|
unsigned int j;
|
|
|
|
time_t now;
|
|
|
|
int hit = -1;
|
|
|
|
bool longopt = FALSE;
|
|
|
|
bool singleopt = FALSE; /* when true means '-o foo' used '-ofoo' */
|
|
|
|
ParameterError err;
|
|
|
|
bool toggle = TRUE; /* how to switch boolean options, on or off. Controlled
|
|
|
|
by using --OPTION or --no-OPTION */
|
|
|
|
|
|
|
|
|
|
|
|
if(('-' != flag[0]) ||
|
|
|
|
(('-' == flag[0]) && ('-' == flag[1]))) {
|
|
|
|
/* this should be a long name */
|
|
|
|
char *word = ('-' == flag[0]) ? flag+2 : flag;
|
|
|
|
size_t fnam = strlen(word);
|
|
|
|
int numhits = 0;
|
|
|
|
|
|
|
|
if(!strncmp(word, "no-", 3)) {
|
|
|
|
/* disable this option but ignore the "no-" part when looking for it */
|
|
|
|
word += 3;
|
|
|
|
toggle = FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
for(j = 0; j < sizeof(aliases)/sizeof(aliases[0]); j++) {
|
|
|
|
if(curlx_strnequal(aliases[j].lname, word, fnam)) {
|
|
|
|
longopt = TRUE;
|
|
|
|
numhits++;
|
|
|
|
if(curlx_raw_equal(aliases[j].lname, word)) {
|
|
|
|
parse = aliases[j].letter;
|
|
|
|
hit = j;
|
|
|
|
numhits = 1; /* a single unique hit */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
parse = aliases[j].letter;
|
|
|
|
hit = j;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(numhits > 1) {
|
|
|
|
/* this is at least the second match! */
|
|
|
|
return PARAM_OPTION_AMBIGUOUS;
|
|
|
|
}
|
|
|
|
if(hit < 0) {
|
|
|
|
return PARAM_OPTION_UNKNOWN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
flag++; /* prefixed with one dash, pass it */
|
|
|
|
hit = -1;
|
|
|
|
parse = flag;
|
|
|
|
}
|
|
|
|
|
|
|
|
do {
|
|
|
|
/* we can loop here if we have multiple single-letters */
|
|
|
|
|
|
|
|
if(!longopt) {
|
2014-10-04 10:14:39 -04:00
|
|
|
letter = (char)*parse;
|
2011-10-04 18:03:20 -04:00
|
|
|
subletter='\0';
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
letter = parse[0];
|
|
|
|
subletter = parse[1];
|
|
|
|
}
|
|
|
|
*usedarg = FALSE; /* default is that we don't use the arg */
|
|
|
|
|
|
|
|
if(hit < 0) {
|
|
|
|
for(j = 0; j < sizeof(aliases)/sizeof(aliases[0]); j++) {
|
|
|
|
if(letter == aliases[j].letter[0]) {
|
|
|
|
hit = j;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(hit < 0) {
|
|
|
|
return PARAM_OPTION_UNKNOWN;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if(aliases[hit].extraparam) {
|
|
|
|
/* this option requires an extra parameter */
|
|
|
|
if(!longopt && parse[1]) {
|
|
|
|
nextarg = (char *)&parse[1]; /* this is the actual extra parameter */
|
|
|
|
singleopt = TRUE; /* don't loop anymore after this */
|
|
|
|
}
|
|
|
|
else if(!nextarg)
|
|
|
|
return PARAM_REQUIRES_PARAMETER;
|
|
|
|
else
|
|
|
|
*usedarg = TRUE; /* mark it as used */
|
|
|
|
}
|
|
|
|
|
|
|
|
switch(letter) {
|
|
|
|
case '*': /* options without a short option */
|
|
|
|
switch(subletter) {
|
2013-02-09 16:18:02 -05:00
|
|
|
case '4': /* --dns-ipv4-addr */
|
|
|
|
/* addr in dot notation */
|
|
|
|
GetStr(&config->dns_ipv4_addr, nextarg);
|
|
|
|
break;
|
|
|
|
case '6': /* --dns-ipv6-addr */
|
|
|
|
/* addr in dot notation */
|
|
|
|
GetStr(&config->dns_ipv6_addr, nextarg);
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'a': /* random-file */
|
|
|
|
GetStr(&config->random_file, nextarg);
|
|
|
|
break;
|
|
|
|
case 'b': /* egd-file */
|
|
|
|
GetStr(&config->egd_file, nextarg);
|
|
|
|
break;
|
2013-08-25 13:18:59 -04:00
|
|
|
case 'B': /* XOAUTH2 Bearer */
|
|
|
|
GetStr(&config->xoauth2_bearer, nextarg);
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'c': /* connect-timeout */
|
2013-04-30 10:23:39 -04:00
|
|
|
err = str2udouble(&config->connecttimeout, nextarg);
|
2012-11-26 10:23:02 -05:00
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'd': /* ciphers */
|
|
|
|
GetStr(&config->cipher_list, nextarg);
|
|
|
|
break;
|
2013-02-09 16:18:02 -05:00
|
|
|
case 'D': /* --dns-interface */
|
|
|
|
/* interface name */
|
|
|
|
GetStr(&config->dns_interface, nextarg);
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'e': /* --disable-epsv */
|
|
|
|
config->disable_epsv = toggle;
|
|
|
|
break;
|
|
|
|
case 'E': /* --epsv */
|
|
|
|
config->disable_epsv = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
|
|
|
#ifdef USE_ENVIRONMENT
|
|
|
|
case 'f':
|
|
|
|
config->writeenv = toggle;
|
|
|
|
break;
|
|
|
|
#endif
|
2013-02-09 16:18:02 -05:00
|
|
|
case 'F': /* --dns-servers */
|
|
|
|
/* IP addrs of DNS servers */
|
|
|
|
GetStr(&config->dns_servers, nextarg);
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'g': /* --trace */
|
2014-02-27 15:51:49 -05:00
|
|
|
GetStr(&global->trace_dump, nextarg);
|
|
|
|
if(global->tracetype && (global->tracetype != TRACE_BIN))
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "--trace overrides an earlier trace/verbose option\n");
|
2014-02-27 15:51:49 -05:00
|
|
|
global->tracetype = TRACE_BIN;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2014-02-10 02:38:55 -05:00
|
|
|
case 'G': /* --npn */
|
|
|
|
config->nonpn = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'h': /* --trace-ascii */
|
2014-02-27 15:51:49 -05:00
|
|
|
GetStr(&global->trace_dump, nextarg);
|
|
|
|
if(global->tracetype && (global->tracetype != TRACE_ASCII))
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"--trace-ascii overrides an earlier trace/verbose option\n");
|
2014-02-27 15:51:49 -05:00
|
|
|
global->tracetype = TRACE_ASCII;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2014-02-10 02:38:55 -05:00
|
|
|
case 'H': /* --alpn */
|
|
|
|
config->noalpn = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'i': /* --limit-rate */
|
|
|
|
{
|
|
|
|
/* We support G, M, K too */
|
|
|
|
char *unit;
|
|
|
|
curl_off_t value = curlx_strtoofft(nextarg, &unit, 0);
|
|
|
|
|
|
|
|
if(!*unit)
|
|
|
|
unit = (char *)"b";
|
|
|
|
else if(strlen(unit) > 1)
|
|
|
|
unit = (char *)"w"; /* unsupported */
|
|
|
|
|
|
|
|
switch(*unit) {
|
|
|
|
case 'G':
|
|
|
|
case 'g':
|
|
|
|
value *= 1024*1024*1024;
|
|
|
|
break;
|
|
|
|
case 'M':
|
|
|
|
case 'm':
|
|
|
|
value *= 1024*1024;
|
|
|
|
break;
|
|
|
|
case 'K':
|
|
|
|
case 'k':
|
|
|
|
value *= 1024;
|
|
|
|
break;
|
|
|
|
case 'b':
|
|
|
|
case 'B':
|
|
|
|
/* for plain bytes, leave as-is */
|
|
|
|
break;
|
|
|
|
default:
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "unsupported rate unit. Use G, M, K or B!\n");
|
2011-10-04 18:03:20 -04:00
|
|
|
return PARAM_BAD_USE;
|
|
|
|
}
|
|
|
|
config->recvpersecond = value;
|
|
|
|
config->sendpersecond = value;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'j': /* --compressed */
|
|
|
|
if(toggle && !(curlinfo->features & CURL_VERSION_LIBZ))
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
config->encoding = toggle;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'J': /* --tr-encoding */
|
|
|
|
config->tr_encoding = toggle;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'k': /* --digest */
|
|
|
|
if(toggle)
|
|
|
|
config->authtype |= CURLAUTH_DIGEST;
|
|
|
|
else
|
|
|
|
config->authtype &= ~CURLAUTH_DIGEST;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'l': /* --negotiate */
|
|
|
|
if(toggle) {
|
2014-07-21 03:53:46 -04:00
|
|
|
if(curlinfo->features & CURL_VERSION_SPNEGO)
|
|
|
|
config->authtype |= CURLAUTH_NEGOTIATE;
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
}
|
|
|
|
else
|
2014-07-21 03:53:46 -04:00
|
|
|
config->authtype &= ~CURLAUTH_NEGOTIATE;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'm': /* --ntlm */
|
|
|
|
if(toggle) {
|
|
|
|
if(curlinfo->features & CURL_VERSION_NTLM)
|
|
|
|
config->authtype |= CURLAUTH_NTLM;
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
config->authtype &= ~CURLAUTH_NTLM;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'M': /* --ntlm-wb */
|
|
|
|
if(toggle) {
|
|
|
|
if(curlinfo->features & CURL_VERSION_NTLM_WB)
|
|
|
|
config->authtype |= CURLAUTH_NTLM_WB;
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
config->authtype &= ~CURLAUTH_NTLM_WB;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'n': /* --basic for completeness */
|
|
|
|
if(toggle)
|
|
|
|
config->authtype |= CURLAUTH_BASIC;
|
|
|
|
else
|
|
|
|
config->authtype &= ~CURLAUTH_BASIC;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'o': /* --anyauth, let libcurl pick it */
|
|
|
|
if(toggle)
|
|
|
|
config->authtype = CURLAUTH_ANY;
|
|
|
|
/* --no-anyauth simply doesn't touch it */
|
|
|
|
break;
|
|
|
|
|
|
|
|
#ifdef USE_WATT32
|
|
|
|
case 'p': /* --wdebug */
|
|
|
|
dbug_init();
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
case 'q': /* --ftp-create-dirs */
|
|
|
|
config->ftp_create_dirs = toggle;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'r': /* --create-dirs */
|
2013-08-14 05:35:42 -04:00
|
|
|
config->create_dirs = toggle;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 's': /* --max-redirs */
|
2012-07-10 17:11:30 -04:00
|
|
|
/* specified max no of redirects (http(s)), this accepts -1 as a
|
|
|
|
special condition */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2num(&config->maxredirs, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2012-07-10 17:11:30 -04:00
|
|
|
if(config->maxredirs < -1)
|
2011-10-04 18:03:20 -04:00
|
|
|
return PARAM_BAD_NUMERIC;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 't': /* --proxy-ntlm */
|
|
|
|
if(curlinfo->features & CURL_VERSION_NTLM)
|
|
|
|
config->proxyntlm = toggle;
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'u': /* --crlf */
|
|
|
|
/* LF -> CRLF conversion? */
|
2013-08-14 05:35:42 -04:00
|
|
|
config->crlf = toggle;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'v': /* --stderr */
|
|
|
|
if(strcmp(nextarg, "-")) {
|
2015-06-01 03:20:18 -04:00
|
|
|
FILE *newfile = fopen(nextarg, FOPEN_WRITETEXT);
|
2011-10-04 18:03:20 -04:00
|
|
|
if(!newfile)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "Failed to open %s!\n", nextarg);
|
2011-10-04 18:03:20 -04:00
|
|
|
else {
|
2014-03-01 08:00:31 -05:00
|
|
|
if(global->errors_fopened)
|
|
|
|
fclose(global->errors);
|
|
|
|
global->errors = newfile;
|
|
|
|
global->errors_fopened = TRUE;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
2014-03-01 08:00:31 -05:00
|
|
|
global->errors = stdout;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'w': /* --interface */
|
|
|
|
/* interface */
|
|
|
|
GetStr(&config->iface, nextarg);
|
|
|
|
break;
|
|
|
|
case 'x': /* --krb */
|
|
|
|
/* kerberos level string */
|
2014-07-21 03:53:46 -04:00
|
|
|
if(curlinfo->features & CURL_VERSION_KERBEROS4)
|
2011-10-04 18:03:20 -04:00
|
|
|
GetStr(&config->krblevel, nextarg);
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
|
|
|
case 'y': /* --max-filesize */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2offset(&config->max_filesize, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'z': /* --disable-eprt */
|
|
|
|
config->disable_eprt = toggle;
|
|
|
|
break;
|
|
|
|
case 'Z': /* --eprt */
|
|
|
|
config->disable_eprt = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default: /* the URL! */
|
|
|
|
{
|
|
|
|
struct getout *url;
|
|
|
|
if(config->url_get || ((config->url_get = config->url_list) != NULL)) {
|
|
|
|
/* there's a node here, if it already is filled-in continue to find
|
|
|
|
an "empty" node */
|
2011-10-05 09:06:26 -04:00
|
|
|
while(config->url_get && (config->url_get->flags & GETOUT_URL))
|
2011-10-04 18:03:20 -04:00
|
|
|
config->url_get = config->url_get->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* now there might or might not be an available node to fill in! */
|
|
|
|
|
|
|
|
if(config->url_get)
|
|
|
|
/* existing node */
|
|
|
|
url = config->url_get;
|
|
|
|
else
|
|
|
|
/* there was no free node, create one! */
|
|
|
|
url = new_getout(config);
|
|
|
|
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!url)
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
else {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* fill in the URL */
|
|
|
|
GetStr(&url->url, nextarg);
|
|
|
|
url->flags |= GETOUT_URL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case '$': /* more options without a short option */
|
|
|
|
switch(subletter) {
|
|
|
|
case 'a': /* --ftp-ssl */
|
|
|
|
if(toggle && !(curlinfo->features & CURL_VERSION_SSL))
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
config->ftp_ssl = toggle;
|
|
|
|
break;
|
|
|
|
case 'b': /* --ftp-pasv */
|
|
|
|
Curl_safefree(config->ftpport);
|
|
|
|
break;
|
|
|
|
case 'c': /* --socks5 specifies a socks5 proxy to use, and resolves
|
|
|
|
the name locally and passes on the resolved address */
|
|
|
|
GetStr(&config->socksproxy, nextarg);
|
|
|
|
config->socksver = CURLPROXY_SOCKS5;
|
|
|
|
break;
|
|
|
|
case 't': /* --socks4 specifies a socks4 proxy to use */
|
|
|
|
GetStr(&config->socksproxy, nextarg);
|
|
|
|
config->socksver = CURLPROXY_SOCKS4;
|
|
|
|
break;
|
|
|
|
case 'T': /* --socks4a specifies a socks4a proxy to use */
|
|
|
|
GetStr(&config->socksproxy, nextarg);
|
|
|
|
config->socksver = CURLPROXY_SOCKS4A;
|
|
|
|
break;
|
|
|
|
case '2': /* --socks5-hostname specifies a socks5 proxy and enables name
|
|
|
|
resolving with the proxy */
|
|
|
|
GetStr(&config->socksproxy, nextarg);
|
|
|
|
config->socksver = CURLPROXY_SOCKS5_HOSTNAME;
|
|
|
|
break;
|
|
|
|
case 'd': /* --tcp-nodelay option */
|
|
|
|
config->tcp_nodelay = toggle;
|
|
|
|
break;
|
|
|
|
case 'e': /* --proxy-digest */
|
|
|
|
config->proxydigest = toggle;
|
|
|
|
break;
|
|
|
|
case 'f': /* --proxy-basic */
|
|
|
|
config->proxybasic = toggle;
|
|
|
|
break;
|
|
|
|
case 'g': /* --retry */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->req_retry, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'h': /* --retry-delay */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->retry_delay, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'i': /* --retry-max-time */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->retry_maxtime, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case 'k': /* --proxy-negotiate */
|
2014-07-21 03:53:46 -04:00
|
|
|
if(curlinfo->features & CURL_VERSION_SPNEGO)
|
2011-10-04 18:03:20 -04:00
|
|
|
config->proxynegotiate = toggle;
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
2014-07-21 03:53:46 -04:00
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'm': /* --ftp-account */
|
|
|
|
GetStr(&config->ftp_account, nextarg);
|
|
|
|
break;
|
|
|
|
case 'n': /* --proxy-anyauth */
|
|
|
|
config->proxyanyauth = toggle;
|
|
|
|
break;
|
|
|
|
case 'o': /* --trace-time */
|
2014-02-27 15:51:49 -05:00
|
|
|
global->tracetime = toggle;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'p': /* --ignore-content-length */
|
|
|
|
config->ignorecl = toggle;
|
|
|
|
break;
|
|
|
|
case 'q': /* --ftp-skip-pasv-ip */
|
|
|
|
config->ftp_skip_ip = toggle;
|
|
|
|
break;
|
|
|
|
case 'r': /* --ftp-method (undocumented at this point) */
|
|
|
|
config->ftp_filemethod = ftpfilemethod(config, nextarg);
|
|
|
|
break;
|
|
|
|
case 's': /* --local-port */
|
|
|
|
rc = sscanf(nextarg, "%d - %d",
|
|
|
|
&config->localport,
|
|
|
|
&config->localportrange);
|
|
|
|
if(!rc)
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
else if(rc == 1)
|
|
|
|
config->localportrange = 1; /* default number of ports to try */
|
|
|
|
else {
|
|
|
|
config->localportrange -= config->localport;
|
|
|
|
if(config->localportrange < 1) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "bad range input\n");
|
2011-10-04 18:03:20 -04:00
|
|
|
return PARAM_BAD_USE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'u': /* --ftp-alternative-to-user */
|
|
|
|
GetStr(&config->ftp_alternative_to_user, nextarg);
|
|
|
|
break;
|
|
|
|
case 'v': /* --ftp-ssl-reqd */
|
|
|
|
if(toggle && !(curlinfo->features & CURL_VERSION_SSL))
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
config->ftp_ssl_reqd = toggle;
|
|
|
|
break;
|
|
|
|
case 'w': /* --no-sessionid */
|
|
|
|
config->disable_sessionid = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
|
|
|
case 'x': /* --ftp-ssl-control */
|
|
|
|
if(toggle && !(curlinfo->features & CURL_VERSION_SSL))
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
config->ftp_ssl_control = toggle;
|
|
|
|
break;
|
|
|
|
case 'y': /* --ftp-ssl-ccc */
|
|
|
|
config->ftp_ssl_ccc = toggle;
|
|
|
|
if(!config->ftp_ssl_ccc_mode)
|
|
|
|
config->ftp_ssl_ccc_mode = CURLFTPSSL_CCC_PASSIVE;
|
|
|
|
break;
|
|
|
|
case 'j': /* --ftp-ssl-ccc-mode */
|
|
|
|
config->ftp_ssl_ccc = TRUE;
|
|
|
|
config->ftp_ssl_ccc_mode = ftpcccmethod(config, nextarg);
|
|
|
|
break;
|
|
|
|
case 'z': /* --libcurl */
|
2012-02-05 12:44:22 -05:00
|
|
|
#ifdef CURL_DISABLE_LIBCURL_OPTION
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2012-02-05 12:44:22 -05:00
|
|
|
"--libcurl option was disabled at build-time!\n");
|
|
|
|
return PARAM_OPTION_UNKNOWN;
|
|
|
|
#else
|
2014-03-01 08:38:00 -05:00
|
|
|
GetStr(&global->libcurl, nextarg);
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2012-02-05 12:44:22 -05:00
|
|
|
#endif
|
2011-10-04 18:03:20 -04:00
|
|
|
case '#': /* --raw */
|
|
|
|
config->raw = toggle;
|
|
|
|
break;
|
|
|
|
case '0': /* --post301 */
|
|
|
|
config->post301 = toggle;
|
|
|
|
break;
|
|
|
|
case '1': /* --no-keepalive */
|
|
|
|
config->nokeepalive = (!toggle)?TRUE:FALSE;
|
|
|
|
break;
|
|
|
|
case '3': /* --keepalive-time */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->alivetime, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case '4': /* --post302 */
|
|
|
|
config->post302 = toggle;
|
|
|
|
break;
|
2012-04-05 17:34:12 -04:00
|
|
|
case 'I': /* --post303 */
|
|
|
|
config->post303 = toggle;
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
case '5': /* --noproxy */
|
|
|
|
/* This specifies the noproxy list */
|
|
|
|
GetStr(&config->noproxy, nextarg);
|
|
|
|
break;
|
|
|
|
#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
|
|
|
|
case '6': /* --socks5-gssapi-service */
|
|
|
|
GetStr(&config->socks5_gssapi_service, nextarg);
|
|
|
|
break;
|
|
|
|
case '7': /* --socks5-gssapi-nec*/
|
2013-08-14 05:35:42 -04:00
|
|
|
config->socks5_gssapi_nec = toggle;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2015-03-29 08:52:31 -04:00
|
|
|
case 'O': /* --proxy-service-name */
|
|
|
|
GetStr(&config->proxy_service_name, nextarg);
|
|
|
|
break;
|
|
|
|
case 'P': /* --service-name */
|
|
|
|
GetStr(&config->service_name, nextarg);
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
#endif
|
|
|
|
case '8': /* --proxy1.0 */
|
|
|
|
/* http 1.0 proxy */
|
|
|
|
GetStr(&config->proxy, nextarg);
|
|
|
|
config->proxyver = CURLPROXY_HTTP_1_0;
|
|
|
|
break;
|
|
|
|
case '9': /* --tftp-blksize */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->tftp_blksize, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'A': /* --mail-from */
|
|
|
|
GetStr(&config->mail_from, nextarg);
|
|
|
|
break;
|
|
|
|
case 'B': /* --mail-rcpt */
|
|
|
|
/* append receiver to a list */
|
|
|
|
err = add2list(&config->mail_rcpt, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
case 'C': /* --ftp-pret */
|
|
|
|
config->ftp_pret = toggle;
|
|
|
|
break;
|
|
|
|
case 'D': /* --proto */
|
|
|
|
config->proto_present = TRUE;
|
|
|
|
if(proto2num(config, &config->proto, nextarg))
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
break;
|
|
|
|
case 'E': /* --proto-redir */
|
|
|
|
config->proto_redir_present = TRUE;
|
|
|
|
if(proto2num(config, &config->proto_redir, nextarg))
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
break;
|
|
|
|
case 'F': /* --resolve */
|
|
|
|
err = add2list(&config->resolve, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
case 'G': /* --delegation LEVEL */
|
|
|
|
config->gssapi_delegation = delegation(config, nextarg);
|
|
|
|
break;
|
2012-02-16 07:19:47 -05:00
|
|
|
case 'H': /* --mail-auth */
|
|
|
|
GetStr(&config->mail_auth, nextarg);
|
|
|
|
break;
|
2012-04-26 09:59:52 -04:00
|
|
|
case 'J': /* --metalink */
|
|
|
|
{
|
2012-06-07 17:49:27 -04:00
|
|
|
#ifdef USE_METALINK
|
2012-07-04 06:54:21 -04:00
|
|
|
int mlmaj, mlmin, mlpatch;
|
|
|
|
metalink_get_version(&mlmaj, &mlmin, &mlpatch);
|
|
|
|
if((mlmaj*10000)+(mlmin*100)+mlpatch < CURL_REQ_LIBMETALINK_VERS) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2012-06-30 08:17:44 -04:00
|
|
|
"--metalink option cannot be used because the version of "
|
|
|
|
"the linked libmetalink library is too old. "
|
|
|
|
"Required: %d.%d.%d, found %d.%d.%d\n",
|
|
|
|
CURL_REQ_LIBMETALINK_MAJOR,
|
|
|
|
CURL_REQ_LIBMETALINK_MINOR,
|
|
|
|
CURL_REQ_LIBMETALINK_PATCH,
|
2012-07-04 06:54:21 -04:00
|
|
|
mlmaj, mlmin, mlpatch);
|
2012-06-30 08:17:44 -04:00
|
|
|
return PARAM_BAD_USE;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
config->use_metalink = toggle;
|
2012-04-28 08:48:56 -04:00
|
|
|
#else
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "--metalink option is ignored because the binary is "
|
2012-04-28 08:48:56 -04:00
|
|
|
"built without the Metalink support.\n");
|
|
|
|
#endif
|
2012-04-26 09:59:52 -04:00
|
|
|
break;
|
|
|
|
}
|
2013-04-27 04:54:14 -04:00
|
|
|
case 'K': /* --sasl-ir */
|
2013-08-14 05:35:42 -04:00
|
|
|
config->sasl_ir = toggle;
|
2013-04-27 04:54:14 -04:00
|
|
|
break;
|
2013-08-10 16:55:59 -04:00
|
|
|
case 'L': /* --test-event */
|
|
|
|
#ifdef CURLDEBUG
|
|
|
|
config->test_event_based = toggle;
|
|
|
|
#else
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "--test-event is ignored unless a debug build!\n");
|
2013-08-10 16:55:59 -04:00
|
|
|
#endif
|
|
|
|
break;
|
2014-11-27 17:59:26 -05:00
|
|
|
case 'M': /* --unix-socket */
|
|
|
|
GetStr(&config->unix_socket_path, nextarg);
|
|
|
|
break;
|
2015-03-23 05:51:49 -04:00
|
|
|
case 'N': /* --path-as-is */
|
|
|
|
config->path_as_is = toggle;
|
|
|
|
break;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case '#': /* --progress-bar */
|
|
|
|
if(toggle)
|
2014-03-01 08:20:20 -05:00
|
|
|
global->progressmode = CURL_PROGRESS_BAR;
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
2014-03-01 08:20:20 -05:00
|
|
|
global->progressmode = CURL_PROGRESS_STATS;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2014-02-23 12:19:45 -05:00
|
|
|
case ':': /* --next */
|
|
|
|
return PARAM_NEXT_OPERATION;
|
2011-10-04 18:03:20 -04:00
|
|
|
case '~': /* --xattr */
|
|
|
|
config->xattr = toggle;
|
|
|
|
break;
|
2013-09-04 16:28:16 -04:00
|
|
|
case '0': /* --http* options */
|
|
|
|
switch(subletter) {
|
2013-09-05 03:56:05 -04:00
|
|
|
case '\0':
|
2013-09-04 16:28:16 -04:00
|
|
|
/* HTTP version 1.0 */
|
|
|
|
config->httpversion = CURL_HTTP_VERSION_1_0;
|
|
|
|
break;
|
|
|
|
case '1':
|
|
|
|
/* HTTP version 1.1 */
|
|
|
|
config->httpversion = CURL_HTTP_VERSION_1_1;
|
|
|
|
break;
|
|
|
|
case '2':
|
|
|
|
/* HTTP version 2.0 */
|
|
|
|
config->httpversion = CURL_HTTP_VERSION_2_0;
|
|
|
|
break;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
2013-09-19 09:17:13 -04:00
|
|
|
case '1': /* --tlsv1* options */
|
|
|
|
switch(subletter) {
|
|
|
|
case '\0':
|
|
|
|
/* TLS version 1.x */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_TLSv1;
|
|
|
|
break;
|
|
|
|
case '0':
|
|
|
|
/* TLS version 1.0 */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_TLSv1_0;
|
|
|
|
break;
|
|
|
|
case '1':
|
|
|
|
/* TLS version 1.1 */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_TLSv1_1;
|
|
|
|
break;
|
|
|
|
case '2':
|
|
|
|
/* TLS version 1.2 */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_TLSv1_2;
|
|
|
|
break;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case '2':
|
|
|
|
/* SSL version 2 */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_SSLv2;
|
|
|
|
break;
|
|
|
|
case '3':
|
|
|
|
/* SSL version 3 */
|
|
|
|
config->ssl_version = CURL_SSLVERSION_SSLv3;
|
|
|
|
break;
|
|
|
|
case '4':
|
|
|
|
/* IPv4 */
|
|
|
|
config->ip_version = 4;
|
|
|
|
break;
|
|
|
|
case '6':
|
|
|
|
/* IPv6 */
|
|
|
|
config->ip_version = 6;
|
|
|
|
break;
|
|
|
|
case 'a':
|
|
|
|
/* This makes the FTP sessions use APPE instead of STOR */
|
|
|
|
config->ftp_append = toggle;
|
|
|
|
break;
|
|
|
|
case 'A':
|
|
|
|
/* This specifies the User-Agent name */
|
|
|
|
GetStr(&config->useragent, nextarg);
|
|
|
|
break;
|
|
|
|
case 'b': /* cookie string coming up: */
|
|
|
|
if(nextarg[0] == '@') {
|
|
|
|
nextarg++;
|
|
|
|
}
|
|
|
|
else if(strchr(nextarg, '=')) {
|
|
|
|
/* A cookie string must have a =-letter */
|
|
|
|
GetStr(&config->cookie, nextarg);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* We have a cookie file to read from! */
|
|
|
|
GetStr(&config->cookiefile, nextarg);
|
|
|
|
break;
|
|
|
|
case 'B':
|
|
|
|
/* use ASCII/text when transferring */
|
|
|
|
config->use_ascii = toggle;
|
|
|
|
break;
|
|
|
|
case 'c':
|
|
|
|
/* get the file name to dump all cookies in */
|
|
|
|
GetStr(&config->cookiejar, nextarg);
|
|
|
|
break;
|
|
|
|
case 'C':
|
|
|
|
/* This makes us continue an ftp transfer at given position */
|
|
|
|
if(!curlx_strequal(nextarg, "-")) {
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2offset(&config->resume_from, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
config->resume_from_current = FALSE;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
config->resume_from_current = TRUE;
|
|
|
|
config->resume_from = 0;
|
|
|
|
}
|
|
|
|
config->use_resume=TRUE;
|
|
|
|
break;
|
|
|
|
case 'd':
|
|
|
|
/* postfield data */
|
|
|
|
{
|
|
|
|
char *postdata = NULL;
|
|
|
|
FILE *file;
|
|
|
|
size_t size = 0;
|
2015-04-25 14:49:39 -04:00
|
|
|
bool raw_mode = (subletter == 'r');
|
2011-10-04 18:03:20 -04:00
|
|
|
|
|
|
|
if(subletter == 'e') { /* --data-urlencode*/
|
|
|
|
/* [name]=[content], we encode the content part only
|
|
|
|
* [name]@[file name]
|
|
|
|
*
|
|
|
|
* Case 2: we first load the file using that name and then encode
|
|
|
|
* the content.
|
|
|
|
*/
|
|
|
|
const char *p = strchr(nextarg, '=');
|
|
|
|
size_t nlen;
|
|
|
|
char is_file;
|
|
|
|
if(!p)
|
|
|
|
/* there was no '=' letter, check for a '@' instead */
|
|
|
|
p = strchr(nextarg, '@');
|
|
|
|
if(p) {
|
|
|
|
nlen = p - nextarg; /* length of the name part */
|
|
|
|
is_file = *p++; /* pass the separator */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* neither @ nor =, so no name and it isn't a file */
|
|
|
|
nlen = is_file = 0;
|
|
|
|
p = nextarg;
|
|
|
|
}
|
|
|
|
if('@' == is_file) {
|
|
|
|
/* a '@' letter, it means that a file name or - (stdin) follows */
|
|
|
|
if(curlx_strequal("-", p)) {
|
|
|
|
file = stdin;
|
|
|
|
set_binmode(stdin);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
file = fopen(p, "rb");
|
|
|
|
if(!file)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"Couldn't read data from file \"%s\", this makes "
|
|
|
|
"an empty POST.\n", nextarg);
|
|
|
|
}
|
|
|
|
|
|
|
|
err = file2memory(&postdata, &size, file);
|
|
|
|
|
|
|
|
if(file && (file != stdin))
|
|
|
|
fclose(file);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
GetStr(&postdata, p);
|
2011-10-05 10:41:04 -04:00
|
|
|
if(postdata)
|
|
|
|
size = strlen(postdata);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if(!postdata) {
|
|
|
|
/* no data from the file, point to a zero byte string to make this
|
|
|
|
get sent as a POST anyway */
|
|
|
|
postdata = strdup("");
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!postdata)
|
|
|
|
return PARAM_NO_MEM;
|
2011-10-04 18:03:20 -04:00
|
|
|
size = 0;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
char *enc = curl_easy_escape(config->easy, postdata, (int)size);
|
|
|
|
Curl_safefree(postdata); /* no matter if it worked or not */
|
|
|
|
if(enc) {
|
|
|
|
/* now make a string with the name from above and append the
|
|
|
|
encoded string */
|
|
|
|
size_t outlen = nlen + strlen(enc) + 2;
|
|
|
|
char *n = malloc(outlen);
|
|
|
|
if(!n) {
|
|
|
|
curl_free(enc);
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
}
|
|
|
|
if(nlen > 0) { /* only append '=' if we have a name */
|
|
|
|
snprintf(n, outlen, "%.*s=%s", nlen, nextarg, enc);
|
|
|
|
size = outlen-1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
strcpy(n, enc);
|
|
|
|
size = outlen-2; /* since no '=' was inserted */
|
|
|
|
}
|
|
|
|
curl_free(enc);
|
|
|
|
postdata = n;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
}
|
|
|
|
}
|
2015-04-25 14:49:39 -04:00
|
|
|
else if('@' == *nextarg && !raw_mode) {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* the data begins with a '@' letter, it means that a file name
|
|
|
|
or - (stdin) follows */
|
|
|
|
nextarg++; /* pass the @ */
|
|
|
|
|
|
|
|
if(curlx_strequal("-", nextarg)) {
|
|
|
|
file = stdin;
|
|
|
|
if(subletter == 'b') /* forced data-binary */
|
|
|
|
set_binmode(stdin);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
file = fopen(nextarg, "rb");
|
|
|
|
if(!file)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "Couldn't read data from file \"%s\", this makes "
|
2011-10-04 18:03:20 -04:00
|
|
|
"an empty POST.\n", nextarg);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(subletter == 'b')
|
|
|
|
/* forced binary */
|
|
|
|
err = file2memory(&postdata, &size, file);
|
|
|
|
else {
|
|
|
|
err = file2string(&postdata, file);
|
|
|
|
if(postdata)
|
|
|
|
size = strlen(postdata);
|
|
|
|
}
|
|
|
|
|
|
|
|
if(file && (file != stdin))
|
|
|
|
fclose(file);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
if(!postdata) {
|
|
|
|
/* no data from the file, point to a zero byte string to make this
|
|
|
|
get sent as a POST anyway */
|
2011-10-05 09:06:26 -04:00
|
|
|
postdata = strdup("");
|
|
|
|
if(!postdata)
|
|
|
|
return PARAM_NO_MEM;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
GetStr(&postdata, nextarg);
|
2011-10-05 13:33:46 -04:00
|
|
|
if(postdata)
|
|
|
|
size = strlen(postdata);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CURL_DOES_CONVERSIONS
|
2011-10-05 10:41:04 -04:00
|
|
|
if(subletter != 'b') {
|
|
|
|
/* NOT forced binary, convert to ASCII */
|
|
|
|
if(convert_to_network(postdata, strlen(postdata))) {
|
|
|
|
Curl_safefree(postdata);
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if(config->postfields) {
|
|
|
|
/* we already have a string, we append this one with a separating
|
|
|
|
&-letter */
|
|
|
|
char *oldpost = config->postfields;
|
|
|
|
curl_off_t oldlen = config->postfieldsize;
|
2014-03-23 08:46:54 -04:00
|
|
|
curl_off_t newlen = oldlen + curlx_uztoso(size) + 2;
|
2011-10-04 18:03:20 -04:00
|
|
|
config->postfields = malloc((size_t)newlen);
|
|
|
|
if(!config->postfields) {
|
2011-10-05 10:41:04 -04:00
|
|
|
Curl_safefree(oldpost);
|
2011-10-04 18:03:20 -04:00
|
|
|
Curl_safefree(postdata);
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
}
|
|
|
|
memcpy(config->postfields, oldpost, (size_t)oldlen);
|
|
|
|
/* use byte value 0x26 for '&' to accommodate non-ASCII platforms */
|
|
|
|
config->postfields[oldlen] = '\x26';
|
|
|
|
memcpy(&config->postfields[oldlen+1], postdata, size);
|
|
|
|
config->postfields[oldlen+1+size] = '\0';
|
|
|
|
Curl_safefree(oldpost);
|
|
|
|
Curl_safefree(postdata);
|
|
|
|
config->postfieldsize += size+1;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
config->postfields = postdata;
|
2014-03-23 08:46:54 -04:00
|
|
|
config->postfieldsize = curlx_uztoso(size);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
We can't set the request type here, as this data might be used in
|
|
|
|
a simple GET if -G is used. Already or soon.
|
|
|
|
|
2011-10-05 10:41:04 -04:00
|
|
|
if(SetHTTPrequest(HTTPREQ_SIMPLEPOST, &config->httpreq)) {
|
|
|
|
Curl_safefree(postdata);
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
}
|
2011-10-04 18:03:20 -04:00
|
|
|
*/
|
|
|
|
break;
|
|
|
|
case 'D':
|
|
|
|
/* dump-header to given file name */
|
|
|
|
GetStr(&config->headerfile, nextarg);
|
|
|
|
break;
|
|
|
|
case 'e':
|
|
|
|
{
|
|
|
|
char *ptr = strstr(nextarg, ";auto");
|
|
|
|
if(ptr) {
|
|
|
|
/* Automatic referer requested, this may be combined with a
|
|
|
|
set initial one */
|
|
|
|
config->autoreferer = TRUE;
|
|
|
|
*ptr = 0; /* zero terminate here */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
config->autoreferer = FALSE;
|
|
|
|
GetStr(&config->referer, nextarg);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'E':
|
|
|
|
switch(subletter) {
|
|
|
|
case 'a': /* CA info PEM file */
|
|
|
|
/* CA info PEM file */
|
|
|
|
GetStr(&config->cacert, nextarg);
|
|
|
|
break;
|
|
|
|
case 'b': /* cert file type */
|
|
|
|
GetStr(&config->cert_type, nextarg);
|
|
|
|
break;
|
|
|
|
case 'c': /* private key file */
|
|
|
|
GetStr(&config->key, nextarg);
|
|
|
|
break;
|
|
|
|
case 'd': /* private key file type */
|
|
|
|
GetStr(&config->key_type, nextarg);
|
|
|
|
break;
|
|
|
|
case 'e': /* private key passphrase */
|
|
|
|
GetStr(&config->key_passwd, nextarg);
|
|
|
|
cleanarg(nextarg);
|
|
|
|
break;
|
|
|
|
case 'f': /* crypto engine */
|
|
|
|
GetStr(&config->engine, nextarg);
|
2015-03-17 08:41:49 -04:00
|
|
|
if(config->engine && curlx_raw_equal(config->engine, "list"))
|
2014-02-22 15:58:43 -05:00
|
|
|
return PARAM_ENGINES_REQUESTED;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'g': /* CA info PEM file */
|
|
|
|
/* CA cert directory */
|
|
|
|
GetStr(&config->capath, nextarg);
|
|
|
|
break;
|
|
|
|
case 'h': /* --pubkey public key file */
|
|
|
|
GetStr(&config->pubkey, nextarg);
|
|
|
|
break;
|
|
|
|
case 'i': /* --hostpubmd5 md5 of the host public key */
|
|
|
|
GetStr(&config->hostpubmd5, nextarg);
|
|
|
|
if(!config->hostpubmd5 || strlen(config->hostpubmd5) != 32)
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
break;
|
|
|
|
case 'j': /* CRL info PEM file */
|
|
|
|
/* CRL file */
|
|
|
|
GetStr(&config->crlfile, nextarg);
|
|
|
|
break;
|
|
|
|
case 'k': /* TLS username */
|
|
|
|
if(curlinfo->features & CURL_VERSION_TLSAUTH_SRP)
|
|
|
|
GetStr(&config->tls_username, nextarg);
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
|
|
|
case 'l': /* TLS password */
|
|
|
|
if(curlinfo->features & CURL_VERSION_TLSAUTH_SRP)
|
|
|
|
GetStr(&config->tls_password, nextarg);
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
|
|
|
case 'm': /* TLS authentication type */
|
|
|
|
if(curlinfo->features & CURL_VERSION_TLSAUTH_SRP) {
|
|
|
|
GetStr(&config->tls_authtype, nextarg);
|
|
|
|
if(!strequal(config->tls_authtype, "SRP"))
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT; /* only support TLS-SRP */
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return PARAM_LIBCURL_DOESNT_SUPPORT;
|
|
|
|
break;
|
2013-12-14 16:39:27 -05:00
|
|
|
case 'n': /* no empty SSL fragments, --ssl-allow-beast */
|
2012-02-06 16:25:04 -05:00
|
|
|
if(curlinfo->features & CURL_VERSION_SSL)
|
|
|
|
config->ssl_allow_beast = toggle;
|
|
|
|
break;
|
2013-12-14 16:39:27 -05:00
|
|
|
|
|
|
|
case 'o': /* --login-options */
|
|
|
|
GetStr(&config->login_options, nextarg);
|
|
|
|
break;
|
|
|
|
|
2014-09-30 22:31:17 -04:00
|
|
|
case 'p': /* Pinned public key DER file */
|
|
|
|
/* Pinned public key DER file */
|
|
|
|
GetStr(&config->pinnedpubkey, nextarg);
|
|
|
|
break;
|
|
|
|
|
2014-06-16 14:47:26 -04:00
|
|
|
case 'q': /* --cert-status */
|
|
|
|
config->verifystatus = TRUE;
|
|
|
|
break;
|
|
|
|
|
2015-02-14 12:17:04 -05:00
|
|
|
case 'r': /* --false-start */
|
|
|
|
config->falsestart = TRUE;
|
|
|
|
break;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
default: /* certificate file */
|
|
|
|
{
|
2013-04-05 10:01:31 -04:00
|
|
|
char *certname, *passphrase;
|
|
|
|
parse_cert_parameter(nextarg, &certname, &passphrase);
|
2013-05-03 16:16:46 -04:00
|
|
|
Curl_safefree(config->cert);
|
|
|
|
config->cert = certname;
|
2013-04-05 10:01:31 -04:00
|
|
|
if(passphrase) {
|
2013-05-03 16:16:46 -04:00
|
|
|
Curl_safefree(config->key_passwd);
|
|
|
|
config->key_passwd = passphrase;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
cleanarg(nextarg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'f':
|
|
|
|
/* fail hard on errors */
|
|
|
|
config->failonerror = toggle;
|
|
|
|
break;
|
|
|
|
case 'F':
|
|
|
|
/* "form data" simulation, this is a little advanced so lets do our best
|
|
|
|
to sort this out slowly and carefully */
|
|
|
|
if(formparse(config,
|
|
|
|
nextarg,
|
|
|
|
&config->httppost,
|
|
|
|
&config->last_post,
|
|
|
|
(subletter=='s')?TRUE:FALSE)) /* 's' means literal string */
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
if(SetHTTPrequest(config, HTTPREQ_POST, &config->httpreq))
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'g': /* g disables URLglobbing */
|
|
|
|
config->globoff = toggle;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'G': /* HTTP GET */
|
|
|
|
config->use_httpget = TRUE;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'h': /* h for help */
|
|
|
|
if(toggle) {
|
|
|
|
return PARAM_HELP_REQUESTED;
|
|
|
|
}
|
|
|
|
/* we now actually support --no-help too! */
|
|
|
|
break;
|
|
|
|
case 'H':
|
|
|
|
/* A custom header to append to a list */
|
2014-02-04 17:48:16 -05:00
|
|
|
if(subletter == 'p') /* --proxy-header */
|
|
|
|
err = add2list(&config->proxyheaders, nextarg);
|
|
|
|
else
|
|
|
|
err = add2list(&config->headers, nextarg);
|
2011-10-04 18:03:20 -04:00
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
case 'i':
|
|
|
|
config->include_headers = toggle; /* include the headers as well in the
|
|
|
|
general output stream */
|
|
|
|
break;
|
|
|
|
case 'j':
|
|
|
|
config->cookiesession = toggle;
|
|
|
|
break;
|
|
|
|
case 'I':
|
|
|
|
/*
|
|
|
|
* no_body will imply include_headers later on
|
|
|
|
*/
|
|
|
|
config->no_body = toggle;
|
|
|
|
if(SetHTTPrequest(config,
|
|
|
|
(config->no_body)?HTTPREQ_HEAD:HTTPREQ_GET,
|
|
|
|
&config->httpreq))
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
break;
|
|
|
|
case 'J': /* --remote-header-name */
|
|
|
|
if(config->include_headers) {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"--include and --remote-header-name cannot be combined.\n");
|
|
|
|
return PARAM_BAD_USE;
|
|
|
|
}
|
|
|
|
config->content_disposition = toggle;
|
|
|
|
break;
|
|
|
|
case 'k': /* allow insecure SSL connects */
|
|
|
|
config->insecure_ok = toggle;
|
|
|
|
break;
|
|
|
|
case 'K': /* parse config file */
|
2014-02-23 11:04:39 -05:00
|
|
|
if(parseconfig(nextarg, global))
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "error trying read config from the '%s' file\n",
|
2011-10-04 18:03:20 -04:00
|
|
|
nextarg);
|
|
|
|
break;
|
|
|
|
case 'l':
|
|
|
|
config->dirlistonly = toggle; /* only list the names of the FTP dir */
|
|
|
|
break;
|
|
|
|
case 'L':
|
|
|
|
config->followlocation = toggle; /* Follow Location: HTTP headers */
|
|
|
|
switch (subletter) {
|
|
|
|
case 't':
|
|
|
|
/* Continue to send authentication (user+password) when following
|
|
|
|
* locations, even when hostname changed */
|
|
|
|
config->unrestricted_auth = toggle;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'm':
|
|
|
|
/* specified max time */
|
2013-04-30 10:23:39 -04:00
|
|
|
err = str2udouble(&config->timeout, nextarg);
|
2012-11-26 10:23:02 -05:00
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'M': /* M for manual, huge help */
|
|
|
|
if(toggle) { /* --no-manual shows no manual... */
|
|
|
|
#ifdef USE_MANUAL
|
2014-02-23 05:37:44 -05:00
|
|
|
return PARAM_MANUAL_REQUESTED;
|
2011-10-04 18:03:20 -04:00
|
|
|
#else
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"built-in manual was disabled at build-time!\n");
|
|
|
|
return PARAM_OPTION_UNKNOWN;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'n':
|
|
|
|
switch(subletter) {
|
|
|
|
case 'o': /* CA info PEM file */
|
|
|
|
/* use .netrc or URL */
|
|
|
|
config->netrc_opt = toggle;
|
|
|
|
break;
|
|
|
|
case 'e': /* netrc-file */
|
|
|
|
GetStr(&config->netrc_file, nextarg);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* pick info from .netrc, if this is used for http, curl will
|
|
|
|
automatically enfore user+password with the request */
|
|
|
|
config->netrc = toggle;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'N':
|
|
|
|
/* disable the output I/O buffering. note that the option is called
|
|
|
|
--buffer but is mostly used in the negative form: --no-buffer */
|
|
|
|
if(longopt)
|
|
|
|
config->nobuffer = (!toggle)?TRUE:FALSE;
|
|
|
|
else
|
|
|
|
config->nobuffer = toggle;
|
|
|
|
break;
|
|
|
|
case 'O': /* --remote-name */
|
|
|
|
if(subletter == 'a') { /* --remote-name-all */
|
|
|
|
config->default_node_flags = toggle?GETOUT_USEREMOTE:0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* fall-through! */
|
|
|
|
case 'o': /* --output */
|
|
|
|
/* output file */
|
|
|
|
{
|
|
|
|
struct getout *url;
|
|
|
|
if(config->url_out || ((config->url_out = config->url_list) != NULL)) {
|
|
|
|
/* there's a node here, if it already is filled-in continue to find
|
|
|
|
an "empty" node */
|
2011-10-05 09:06:26 -04:00
|
|
|
while(config->url_out && (config->url_out->flags & GETOUT_OUTFILE))
|
2011-10-04 18:03:20 -04:00
|
|
|
config->url_out = config->url_out->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* now there might or might not be an available node to fill in! */
|
|
|
|
|
|
|
|
if(config->url_out)
|
|
|
|
/* existing node */
|
|
|
|
url = config->url_out;
|
|
|
|
else
|
|
|
|
/* there was no free node, create one! */
|
|
|
|
url = new_getout(config);
|
|
|
|
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!url)
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
else {
|
2011-10-04 18:03:20 -04:00
|
|
|
/* fill in the outfile */
|
|
|
|
if('o' == letter) {
|
|
|
|
GetStr(&url->outfile, nextarg);
|
|
|
|
url->flags &= ~GETOUT_USEREMOTE; /* switch off */
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
url->outfile = NULL; /* leave it */
|
|
|
|
if(toggle)
|
|
|
|
url->flags |= GETOUT_USEREMOTE; /* switch on */
|
|
|
|
else
|
|
|
|
url->flags &= ~GETOUT_USEREMOTE; /* switch off */
|
|
|
|
}
|
|
|
|
url->flags |= GETOUT_OUTFILE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'P':
|
|
|
|
/* This makes the FTP sessions use PORT instead of PASV */
|
|
|
|
/* use <eth0> or <192.168.10.10> style addresses. Anything except
|
|
|
|
this will make us try to get the "default" address.
|
|
|
|
NOTE: this is a changed behaviour since the released 4.1!
|
|
|
|
*/
|
|
|
|
GetStr(&config->ftpport, nextarg);
|
|
|
|
break;
|
|
|
|
case 'p':
|
|
|
|
/* proxy tunnel for non-http protocols */
|
|
|
|
config->proxytunnel = toggle;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 'q': /* if used first, already taken care of, we do it like
|
|
|
|
this so we don't cause an error! */
|
|
|
|
break;
|
|
|
|
case 'Q':
|
|
|
|
/* QUOTE command to send to FTP server */
|
|
|
|
switch(nextarg[0]) {
|
|
|
|
case '-':
|
|
|
|
/* prefixed with a dash makes it a POST TRANSFER one */
|
|
|
|
nextarg++;
|
|
|
|
err = add2list(&config->postquote, nextarg);
|
|
|
|
break;
|
|
|
|
case '+':
|
|
|
|
/* prefixed with a plus makes it a just-before-transfer one */
|
|
|
|
nextarg++;
|
|
|
|
err = add2list(&config->prequote, nextarg);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
err = add2list(&config->quote, nextarg);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
case 'r':
|
|
|
|
/* Specifying a range WITHOUT A DASH will create an illegal HTTP range
|
|
|
|
(and won't actually be range by definition). The man page previously
|
|
|
|
claimed that to be a good way, why this code is added to work-around
|
|
|
|
it. */
|
|
|
|
if(ISDIGIT(*nextarg) && !strchr(nextarg, '-')) {
|
|
|
|
char buffer[32];
|
|
|
|
curl_off_t off;
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"A specified range MUST include at least one dash (-). "
|
|
|
|
"Appending one for you!\n");
|
|
|
|
off = curlx_strtoofft(nextarg, NULL, 10);
|
|
|
|
snprintf(buffer, sizeof(buffer), "%" CURL_FORMAT_CURL_OFF_T "-", off);
|
|
|
|
Curl_safefree(config->range);
|
|
|
|
config->range = strdup(buffer);
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!config->range)
|
|
|
|
return PARAM_NO_MEM;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
{
|
|
|
|
/* byte range requested */
|
|
|
|
char *tmp_range;
|
|
|
|
tmp_range = nextarg;
|
|
|
|
while(*tmp_range != '\0') {
|
|
|
|
if(!ISDIGIT(*tmp_range) && *tmp_range != '-' && *tmp_range != ',') {
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "Invalid character is found in given range. "
|
2011-10-04 18:03:20 -04:00
|
|
|
"A specified range MUST have only digits in "
|
|
|
|
"\'start\'-\'stop\'. The server's response to this "
|
|
|
|
"request is uncertain.\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
tmp_range++;
|
|
|
|
}
|
|
|
|
/* byte range requested */
|
|
|
|
GetStr(&config->range, nextarg);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'R':
|
|
|
|
/* use remote file's time */
|
|
|
|
config->remote_time = toggle;
|
|
|
|
break;
|
|
|
|
case 's':
|
|
|
|
/* don't show progress meter, don't show errors : */
|
|
|
|
if(toggle)
|
2014-03-01 08:20:20 -05:00
|
|
|
global->mute = global->noprogress = TRUE;
|
2011-10-04 18:03:20 -04:00
|
|
|
else
|
2014-03-01 08:20:20 -05:00
|
|
|
global->mute = global->noprogress = FALSE;
|
2014-02-23 11:37:28 -05:00
|
|
|
if(global->showerror < 0)
|
2011-10-16 17:39:59 -04:00
|
|
|
/* if still on the default value, set showerror to the reverse of
|
|
|
|
toggle. This is to allow -S and -s to be used in an independent
|
|
|
|
order but still have the same effect. */
|
2014-02-23 11:37:28 -05:00
|
|
|
global->showerror = (!toggle)?TRUE:FALSE; /* toggle off */
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'S':
|
|
|
|
/* show errors */
|
2014-02-23 11:37:28 -05:00
|
|
|
global->showerror = toggle?1:0; /* toggle on if used with -s */
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 't':
|
|
|
|
/* Telnet options */
|
|
|
|
err = add2list(&config->telnet_options, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
break;
|
|
|
|
case 'T':
|
|
|
|
/* we are uploading */
|
|
|
|
{
|
|
|
|
struct getout *url;
|
|
|
|
if(config->url_out || ((config->url_out = config->url_list) != NULL)) {
|
|
|
|
/* there's a node here, if it already is filled-in continue to find
|
|
|
|
an "empty" node */
|
2011-10-05 09:06:26 -04:00
|
|
|
while(config->url_out && (config->url_out->flags & GETOUT_UPLOAD))
|
2011-10-04 18:03:20 -04:00
|
|
|
config->url_out = config->url_out->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* now there might or might not be an available node to fill in! */
|
|
|
|
|
|
|
|
if(config->url_out)
|
|
|
|
/* existing node */
|
|
|
|
url = config->url_out;
|
|
|
|
else
|
|
|
|
/* there was no free node, create one! */
|
|
|
|
url = new_getout(config);
|
|
|
|
|
2011-10-05 09:06:26 -04:00
|
|
|
if(!url)
|
|
|
|
return PARAM_NO_MEM;
|
|
|
|
else {
|
2011-10-04 18:03:20 -04:00
|
|
|
url->flags |= GETOUT_UPLOAD; /* mark -T used */
|
|
|
|
if(!*nextarg)
|
|
|
|
url->flags |= GETOUT_NOUPLOAD;
|
|
|
|
else {
|
|
|
|
/* "-" equals stdin, but keep the string around for now */
|
|
|
|
GetStr(&url->infile, nextarg);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 'u':
|
2013-12-14 16:39:27 -05:00
|
|
|
/* user:password */
|
2011-10-04 18:03:20 -04:00
|
|
|
GetStr(&config->userpwd, nextarg);
|
|
|
|
cleanarg(nextarg);
|
|
|
|
break;
|
|
|
|
case 'U':
|
|
|
|
/* Proxy user:password */
|
|
|
|
GetStr(&config->proxyuserpwd, nextarg);
|
|
|
|
cleanarg(nextarg);
|
|
|
|
break;
|
|
|
|
case 'v':
|
|
|
|
if(toggle) {
|
|
|
|
/* the '%' thing here will cause the trace get sent to stderr */
|
2014-02-27 15:51:49 -05:00
|
|
|
Curl_safefree(global->trace_dump);
|
|
|
|
global->trace_dump = strdup("%");
|
|
|
|
if(!global->trace_dump)
|
2011-10-05 09:06:26 -04:00
|
|
|
return PARAM_NO_MEM;
|
2014-02-27 15:51:49 -05:00
|
|
|
if(global->tracetype && (global->tracetype != TRACE_PLAIN))
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"-v, --verbose overrides an earlier trace/verbose option\n");
|
2014-02-27 15:51:49 -05:00
|
|
|
global->tracetype = TRACE_PLAIN;
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
/* verbose is disabled here */
|
2014-02-27 15:51:49 -05:00
|
|
|
global->tracetype = TRACE_NONE;
|
2011-10-04 18:03:20 -04:00
|
|
|
break;
|
|
|
|
case 'V':
|
2014-02-23 05:16:36 -05:00
|
|
|
if(toggle) /* --no-version yields no output! */
|
|
|
|
return PARAM_VERSION_INFO_REQUESTED;
|
2014-02-22 12:45:38 -05:00
|
|
|
break;
|
|
|
|
|
2011-10-04 18:03:20 -04:00
|
|
|
case 'w':
|
|
|
|
/* get the output string */
|
|
|
|
if('@' == *nextarg) {
|
|
|
|
/* the data begins with a '@' letter, it means that a file name
|
|
|
|
or - (stdin) follows */
|
|
|
|
FILE *file;
|
|
|
|
const char *fname;
|
|
|
|
nextarg++; /* pass the @ */
|
|
|
|
if(curlx_strequal("-", nextarg)) {
|
|
|
|
fname = "<stdin>";
|
|
|
|
file = stdin;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
fname = nextarg;
|
2015-06-01 03:20:18 -04:00
|
|
|
file = fopen(nextarg, FOPEN_READTEXT);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
err = file2string(&config->writeout, file);
|
|
|
|
if(file && (file != stdin))
|
|
|
|
fclose(file);
|
|
|
|
if(err)
|
|
|
|
return err;
|
|
|
|
if(!config->writeout)
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global, "Failed to read %s", fname);
|
2011-10-04 18:03:20 -04:00
|
|
|
}
|
|
|
|
else
|
|
|
|
GetStr(&config->writeout, nextarg);
|
|
|
|
break;
|
|
|
|
case 'x':
|
|
|
|
/* proxy */
|
|
|
|
GetStr(&config->proxy, nextarg);
|
|
|
|
config->proxyver = CURLPROXY_HTTP;
|
|
|
|
break;
|
|
|
|
case 'X':
|
|
|
|
/* set custom request */
|
|
|
|
GetStr(&config->customrequest, nextarg);
|
|
|
|
break;
|
|
|
|
case 'y':
|
|
|
|
/* low speed time */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->low_speed_time, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
if(!config->low_speed_limit)
|
|
|
|
config->low_speed_limit = 1;
|
|
|
|
break;
|
|
|
|
case 'Y':
|
|
|
|
/* low speed limit */
|
2012-11-26 10:23:02 -05:00
|
|
|
err = str2unum(&config->low_speed_limit, nextarg);
|
|
|
|
if(err)
|
|
|
|
return err;
|
2011-10-04 18:03:20 -04:00
|
|
|
if(!config->low_speed_time)
|
|
|
|
config->low_speed_time = 30;
|
|
|
|
break;
|
|
|
|
case 'z': /* time condition coming up */
|
|
|
|
switch(*nextarg) {
|
|
|
|
case '+':
|
|
|
|
nextarg++;
|
2014-10-04 10:12:06 -04:00
|
|
|
/* FALLTHROUGH */
|
2011-10-04 18:03:20 -04:00
|
|
|
default:
|
|
|
|
/* If-Modified-Since: (section 14.28 in RFC2068) */
|
|
|
|
config->timecond = CURL_TIMECOND_IFMODSINCE;
|
|
|
|
break;
|
|
|
|
case '-':
|
|
|
|
/* If-Unmodified-Since: (section 14.24 in RFC2068) */
|
|
|
|
config->timecond = CURL_TIMECOND_IFUNMODSINCE;
|
|
|
|
nextarg++;
|
|
|
|
break;
|
|
|
|
case '=':
|
|
|
|
/* Last-Modified: (section 14.29 in RFC2068) */
|
|
|
|
config->timecond = CURL_TIMECOND_LASTMOD;
|
|
|
|
nextarg++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
now = time(NULL);
|
|
|
|
config->condtime=curl_getdate(nextarg, &now);
|
|
|
|
if(-1 == (int)config->condtime) {
|
|
|
|
/* now let's see if it is a file name to get the time from instead! */
|
|
|
|
struct_stat statbuf;
|
|
|
|
if(-1 == stat(nextarg, &statbuf)) {
|
|
|
|
/* failed, remove time condition */
|
|
|
|
config->timecond = CURL_TIMECOND_NONE;
|
2015-02-27 15:48:38 -05:00
|
|
|
warnf(global,
|
2011-10-04 18:03:20 -04:00
|
|
|
"Illegal date format for -z, --timecond (and not "
|
|
|
|
"a file name). Disabling time condition. "
|
|
|
|
"See curl_getdate(3) for valid date syntax.\n");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* pull the time out from the file */
|
|
|
|
config->condtime = statbuf.st_mtime;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default: /* unknown flag */
|
|
|
|
return PARAM_OPTION_UNKNOWN;
|
|
|
|
}
|
|
|
|
hit = -1;
|
|
|
|
|
|
|
|
} while(!longopt && !singleopt && *++parse && !*usedarg);
|
|
|
|
|
|
|
|
return PARAM_OK;
|
|
|
|
}
|
2014-02-02 09:58:25 -05:00
|
|
|
|
2014-02-23 09:32:22 -05:00
|
|
|
ParameterError parse_args(struct GlobalConfig *config, int argc,
|
2014-02-02 09:58:25 -05:00
|
|
|
argv_item_t argv[])
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
bool stillflags;
|
2014-08-08 07:03:34 -04:00
|
|
|
char *orig_opt = NULL;
|
2014-02-02 09:58:25 -05:00
|
|
|
ParameterError result = PARAM_OK;
|
2014-02-23 09:32:22 -05:00
|
|
|
struct OperationConfig *operation = config->first;
|
2014-02-02 09:58:25 -05:00
|
|
|
|
|
|
|
for(i = 1, stillflags = TRUE; i < argc && !result; i++) {
|
|
|
|
orig_opt = argv[i];
|
|
|
|
|
2014-02-23 12:32:19 -05:00
|
|
|
if(stillflags && ('-' == argv[i][0])) {
|
2014-02-02 09:58:25 -05:00
|
|
|
char *nextarg;
|
|
|
|
bool passarg;
|
|
|
|
char *flag = argv[i];
|
|
|
|
|
|
|
|
if(curlx_strequal("--", argv[i]))
|
|
|
|
/* This indicates the end of the flags and thus enables the
|
|
|
|
following (URL) argument to start with -. */
|
|
|
|
stillflags = FALSE;
|
|
|
|
else {
|
|
|
|
nextarg = (i < (argc - 1)) ? argv[i + 1] : NULL;
|
|
|
|
|
2014-02-23 11:04:39 -05:00
|
|
|
result = getparameter(flag, nextarg, &passarg, config, operation);
|
2014-02-23 12:32:19 -05:00
|
|
|
if(result == PARAM_NEXT_OPERATION) {
|
2014-03-22 12:31:13 -04:00
|
|
|
/* Reset result as PARAM_NEXT_OPERATION is only used here and not
|
|
|
|
returned from this function */
|
|
|
|
result = PARAM_OK;
|
|
|
|
|
2014-02-23 12:32:19 -05:00
|
|
|
if(operation->url_list && operation->url_list->url) {
|
|
|
|
/* Allocate the next config */
|
|
|
|
operation->next = malloc(sizeof(struct OperationConfig));
|
|
|
|
if(operation->next) {
|
|
|
|
/* Initialise the newly created config */
|
|
|
|
config_init(operation->next);
|
|
|
|
|
|
|
|
/* Copy the easy handle */
|
|
|
|
operation->next->easy = config->easy;
|
|
|
|
|
2014-02-26 16:02:53 -05:00
|
|
|
/* Set the global config pointer */
|
|
|
|
operation->next->global = config;
|
|
|
|
|
2014-02-23 12:32:19 -05:00
|
|
|
/* Update the last operation pointer */
|
|
|
|
config->last = operation->next;
|
|
|
|
|
|
|
|
/* Move onto the new config */
|
|
|
|
operation->next->prev = operation;
|
|
|
|
operation = operation->next;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
result = PARAM_NO_MEM;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if(!result && passarg)
|
2014-02-02 09:58:25 -05:00
|
|
|
i++; /* we're supposed to skip this */
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
bool used;
|
|
|
|
|
|
|
|
/* Just add the URL please */
|
2014-02-25 17:36:13 -05:00
|
|
|
result = getparameter((char *)"--url", argv[i], &used, config,
|
|
|
|
operation);
|
2014-02-02 09:58:25 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-02-22 15:58:43 -05:00
|
|
|
if(result && result != PARAM_HELP_REQUESTED &&
|
2014-02-23 05:37:44 -05:00
|
|
|
result != PARAM_MANUAL_REQUESTED &&
|
2014-02-23 05:16:36 -05:00
|
|
|
result != PARAM_VERSION_INFO_REQUESTED &&
|
2014-02-22 15:58:43 -05:00
|
|
|
result != PARAM_ENGINES_REQUESTED) {
|
2014-02-02 09:58:25 -05:00
|
|
|
const char *reason = param2text(result);
|
2014-02-07 16:14:43 -05:00
|
|
|
|
2014-08-08 07:03:34 -04:00
|
|
|
if(orig_opt && !curlx_strequal(":", orig_opt))
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(config->errors, "option %s: %s\n", orig_opt, reason);
|
2014-02-07 16:14:43 -05:00
|
|
|
else
|
2014-03-01 08:00:31 -05:00
|
|
|
helpf(config->errors, "%s\n", reason);
|
2014-02-02 09:58:25 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|