author | Michael Krelin <hacker@klever.net> | 2007-11-23 22:18:54 (UTC) |
---|---|---|
committer | Michael Krelin <hacker@klever.net> | 2007-11-24 07:09:40 (UTC) |
commit | 70f85314fcd188a182aae3a4291c0cd95ba16ee2 (patch) (unidiff) | |
tree | cad4bf188542d4319280a3c30757e72ec2d20bf6 | |
parent | 2589c69c4a909563098365fba141082db4657353 (diff) | |
download | libopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.zip libopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.tar.gz libopkele-70f85314fcd188a182aae3a4291c0cd95ba16ee2.tar.bz2 |
added URI normalization procedure to opkele::util
as specified in RFC3896, section 6
Signed-off-by: Michael Krelin <hacker@klever.net>
-rw-r--r-- | include/opkele/util.h | 10 | ||||
-rw-r--r-- | lib/util.cc | 131 | ||||
-rw-r--r-- | test/test.cc | 67 |
3 files changed, 208 insertions, 0 deletions
diff --git a/include/opkele/util.h b/include/opkele/util.h index edc1859..085c9e6 100644 --- a/include/opkele/util.h +++ b/include/opkele/util.h | |||
@@ -1,133 +1,143 @@ | |||
1 | #ifndef __OPKELE_UTIL_H | 1 | #ifndef __OPKELE_UTIL_H |
2 | #define __OPKELE_UTIL_H | 2 | #define __OPKELE_UTIL_H |
3 | 3 | ||
4 | #include <time.h> | 4 | #include <time.h> |
5 | #include <string> | 5 | #include <string> |
6 | #include <vector> | 6 | #include <vector> |
7 | #include <openssl/bn.h> | 7 | #include <openssl/bn.h> |
8 | #include <openssl/dh.h> | 8 | #include <openssl/dh.h> |
9 | 9 | ||
10 | namespace opkele { | 10 | namespace opkele { |
11 | using std::string; | 11 | using std::string; |
12 | using std::vector; | 12 | using std::vector; |
13 | 13 | ||
14 | /** | 14 | /** |
15 | * @brief opkele utils namespace | 15 | * @brief opkele utils namespace |
16 | */ | 16 | */ |
17 | namespace util { | 17 | namespace util { |
18 | 18 | ||
19 | /** | 19 | /** |
20 | * Convenience class encapsulating SSL BIGNUM object for the purpose of | 20 | * Convenience class encapsulating SSL BIGNUM object for the purpose of |
21 | * automatical freeing. | 21 | * automatical freeing. |
22 | */ | 22 | */ |
23 | class bignum_t { | 23 | class bignum_t { |
24 | public: | 24 | public: |
25 | BIGNUM *_bn; | 25 | BIGNUM *_bn; |
26 | 26 | ||
27 | bignum_t() : _bn(0) { } | 27 | bignum_t() : _bn(0) { } |
28 | bignum_t(BIGNUM *bn) : _bn(bn) { } | 28 | bignum_t(BIGNUM *bn) : _bn(bn) { } |
29 | ~bignum_t() throw() { if(_bn) BN_free(_bn); } | 29 | ~bignum_t() throw() { if(_bn) BN_free(_bn); } |
30 | 30 | ||
31 | bignum_t& operator=(BIGNUM *bn) { if(_bn) BN_free(_bn); _bn = bn; return *this; } | 31 | bignum_t& operator=(BIGNUM *bn) { if(_bn) BN_free(_bn); _bn = bn; return *this; } |
32 | 32 | ||
33 | operator const BIGNUM*(void) const { return _bn; } | 33 | operator const BIGNUM*(void) const { return _bn; } |
34 | operator BIGNUM*(void) { return _bn; } | 34 | operator BIGNUM*(void) { return _bn; } |
35 | }; | 35 | }; |
36 | /** | 36 | /** |
37 | * Convenience clas encapsulating SSL DH object for the purpose of | 37 | * Convenience clas encapsulating SSL DH object for the purpose of |
38 | * automatic freeing. | 38 | * automatic freeing. |
39 | */ | 39 | */ |
40 | class dh_t { | 40 | class dh_t { |
41 | public: | 41 | public: |
42 | DH *_dh; | 42 | DH *_dh; |
43 | 43 | ||
44 | dh_t() : _dh(0) { } | 44 | dh_t() : _dh(0) { } |
45 | dh_t(DH *dh) : _dh(dh) { } | 45 | dh_t(DH *dh) : _dh(dh) { } |
46 | ~dh_t() throw() { if(_dh) DH_free(_dh); } | 46 | ~dh_t() throw() { if(_dh) DH_free(_dh); } |
47 | 47 | ||
48 | dh_t& operator=(DH *dh) { if(_dh) DH_free(_dh); _dh = dh; return *this; } | 48 | dh_t& operator=(DH *dh) { if(_dh) DH_free(_dh); _dh = dh; return *this; } |
49 | 49 | ||
50 | operator const DH*(void) const { return _dh; } | 50 | operator const DH*(void) const { return _dh; } |
51 | operator DH*(void) { return _dh; } | 51 | operator DH*(void) { return _dh; } |
52 | 52 | ||
53 | DH* operator->() { return _dh; } | 53 | DH* operator->() { return _dh; } |
54 | const DH* operator->() const { return _dh; } | 54 | const DH* operator->() const { return _dh; } |
55 | }; | 55 | }; |
56 | 56 | ||
57 | /** | 57 | /** |
58 | * Convert base64-encoded SSL BIGNUM to internal representation. | 58 | * Convert base64-encoded SSL BIGNUM to internal representation. |
59 | * @param b64 base64-encoded number | 59 | * @param b64 base64-encoded number |
60 | * @return SSL BIGNUM | 60 | * @return SSL BIGNUM |
61 | * @throw failed_conversion in case of error | 61 | * @throw failed_conversion in case of error |
62 | */ | 62 | */ |
63 | BIGNUM *base64_to_bignum(const string& b64); | 63 | BIGNUM *base64_to_bignum(const string& b64); |
64 | /** | 64 | /** |
65 | * Convert decimal representation to SSL BIGNUM. | 65 | * Convert decimal representation to SSL BIGNUM. |
66 | * @param dec decimal representation | 66 | * @param dec decimal representation |
67 | * @return resulting BIGNUM | 67 | * @return resulting BIGNUM |
68 | * @throw failed_conversion in case of error | 68 | * @throw failed_conversion in case of error |
69 | */ | 69 | */ |
70 | BIGNUM *dec_to_bignum(const string& dec); | 70 | BIGNUM *dec_to_bignum(const string& dec); |
71 | /** | 71 | /** |
72 | * Convert SSL BIGNUM data to base64 encoded string. | 72 | * Convert SSL BIGNUM data to base64 encoded string. |
73 | * @param bn BIGNUM | 73 | * @param bn BIGNUM |
74 | * @return base64encoded string | 74 | * @return base64encoded string |
75 | */ | 75 | */ |
76 | string bignum_to_base64(const BIGNUM *bn); | 76 | string bignum_to_base64(const BIGNUM *bn); |
77 | 77 | ||
78 | /** | 78 | /** |
79 | * Convert internal time representation to w3c format | 79 | * Convert internal time representation to w3c format |
80 | * @param t internal representation | 80 | * @param t internal representation |
81 | * @return w3c time | 81 | * @return w3c time |
82 | * @throw failed_conversion in case of error | 82 | * @throw failed_conversion in case of error |
83 | */ | 83 | */ |
84 | string time_to_w3c(time_t t); | 84 | string time_to_w3c(time_t t); |
85 | /** | 85 | /** |
86 | * Convert W3C time representation to internal time_t | 86 | * Convert W3C time representation to internal time_t |
87 | * @param w w3c representation | 87 | * @param w w3c representation |
88 | * @return converted time | 88 | * @return converted time |
89 | * @throw failed_conversion in case of error | 89 | * @throw failed_conversion in case of error |
90 | */ | 90 | */ |
91 | time_t w3c_to_time(const string& w); | 91 | time_t w3c_to_time(const string& w); |
92 | 92 | ||
93 | /** | 93 | /** |
94 | * Encode string to the representation suitable for using in URL. | 94 | * Encode string to the representation suitable for using in URL. |
95 | * @param str string to encode | 95 | * @param str string to encode |
96 | * @return encoded string | 96 | * @return encoded string |
97 | * @throw failed_conversion in case of failure | 97 | * @throw failed_conversion in case of failure |
98 | */ | 98 | */ |
99 | string url_encode(const string& str); | 99 | string url_encode(const string& str); |
100 | 100 | ||
101 | /** | 101 | /** |
102 | * Convert number to string | 102 | * Convert number to string |
103 | * @param l number | 103 | * @param l number |
104 | * @return string representation | 104 | * @return string representation |
105 | * @throw failed_conversion in case of failure | 105 | * @throw failed_conversion in case of failure |
106 | */ | 106 | */ |
107 | string long_to_string(long l); | 107 | string long_to_string(long l); |
108 | /** | 108 | /** |
109 | * Convert string to number | 109 | * Convert string to number |
110 | * @param s string, containing the number | 110 | * @param s string, containing the number |
111 | * @return the number | 111 | * @return the number |
112 | * @throw failed_conversion in case of failure | 112 | * @throw failed_conversion in case of failure |
113 | */ | 113 | */ |
114 | long string_to_long(const string& s); | 114 | long string_to_long(const string& s); |
115 | 115 | ||
116 | /** | 116 | /** |
117 | * Encode binary data using base64. | 117 | * Encode binary data using base64. |
118 | * @param data pointer to binary data | 118 | * @param data pointer to binary data |
119 | * @param length length of data | 119 | * @param length length of data |
120 | * @return encoded data | 120 | * @return encoded data |
121 | */ | 121 | */ |
122 | string encode_base64(const void *data,size_t length); | 122 | string encode_base64(const void *data,size_t length); |
123 | /** | 123 | /** |
124 | * Decode binary data from base64 representation. | 124 | * Decode binary data from base64 representation. |
125 | * @param data base64-encoded data | 125 | * @param data base64-encoded data |
126 | * @param rv container for decoded binary | 126 | * @param rv container for decoded binary |
127 | */ | 127 | */ |
128 | void decode_base64(const string& data,vector<unsigned char>& rv); | 128 | void decode_base64(const string& data,vector<unsigned char>& rv); |
129 | |||
130 | /** | ||
131 | * Normalize http(s) URI according to RFC3986, section 6. URI is | ||
132 | * expected to have scheme: in front of it. | ||
133 | * @param uri URI | ||
134 | * @return normalized URI | ||
135 | * @throw not_implemented in case of non-httpi(s) URI | ||
136 | * @throw bad_input in case of malformed URI | ||
137 | */ | ||
138 | string rfc_3986_normalize_uri(const string& uri); | ||
129 | } | 139 | } |
130 | 140 | ||
131 | } | 141 | } |
132 | 142 | ||
133 | #endif /* __OPKELE_UTIL_H */ | 143 | #endif /* __OPKELE_UTIL_H */ |
diff --git a/lib/util.cc b/lib/util.cc index 26be66a..eacf6d7 100644 --- a/lib/util.cc +++ b/lib/util.cc | |||
@@ -1,164 +1,295 @@ | |||
1 | #include <errno.h> | 1 | #include <errno.h> |
2 | #include <cassert> | 2 | #include <cassert> |
3 | #include <cctype> | ||
3 | #include <cstring> | 4 | #include <cstring> |
4 | #include <vector> | 5 | #include <vector> |
5 | #include <string> | 6 | #include <string> |
7 | #include <stack> | ||
6 | #include <openssl/bio.h> | 8 | #include <openssl/bio.h> |
7 | #include <openssl/evp.h> | 9 | #include <openssl/evp.h> |
8 | #include <curl/curl.h> | 10 | #include <curl/curl.h> |
9 | #include "opkele/util.h" | 11 | #include "opkele/util.h" |
10 | #include "opkele/exception.h" | 12 | #include "opkele/exception.h" |
11 | 13 | ||
12 | namespace opkele { | 14 | namespace opkele { |
13 | using namespace std; | 15 | using namespace std; |
14 | 16 | ||
15 | namespace util { | 17 | namespace util { |
16 | 18 | ||
17 | /* | 19 | /* |
18 | * base64 | 20 | * base64 |
19 | */ | 21 | */ |
20 | string encode_base64(const void *data,size_t length) { | 22 | string encode_base64(const void *data,size_t length) { |
21 | BIO *b64 = 0, *bmem = 0; | 23 | BIO *b64 = 0, *bmem = 0; |
22 | try { | 24 | try { |
23 | b64 = BIO_new(BIO_f_base64()); | 25 | b64 = BIO_new(BIO_f_base64()); |
24 | if(!b64) | 26 | if(!b64) |
25 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); | 27 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 encoder"); |
26 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 28 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
27 | bmem = BIO_new(BIO_s_mem()); | 29 | bmem = BIO_new(BIO_s_mem()); |
28 | BIO_set_flags(b64,BIO_CLOSE); | 30 | BIO_set_flags(b64,BIO_CLOSE); |
29 | if(!bmem) | 31 | if(!bmem) |
30 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); | 32 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() memory buffer"); |
31 | BIO_push(b64,bmem); | 33 | BIO_push(b64,bmem); |
32 | if(((size_t)BIO_write(b64,data,length))!=length) | 34 | if(((size_t)BIO_write(b64,data,length))!=length) |
33 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); | 35 | throw exception_openssl(OPKELE_CP_ "failed to BIO_write()"); |
34 | if(BIO_flush(b64)!=1) | 36 | if(BIO_flush(b64)!=1) |
35 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); | 37 | throw exception_openssl(OPKELE_CP_ "failed to BIO_flush()"); |
36 | char *rvd; | 38 | char *rvd; |
37 | long rvl = BIO_get_mem_data(bmem,&rvd); | 39 | long rvl = BIO_get_mem_data(bmem,&rvd); |
38 | string rv(rvd,rvl); | 40 | string rv(rvd,rvl); |
39 | BIO_free_all(b64); | 41 | BIO_free_all(b64); |
40 | return rv; | 42 | return rv; |
41 | }catch(...) { | 43 | }catch(...) { |
42 | if(b64) BIO_free_all(b64); | 44 | if(b64) BIO_free_all(b64); |
43 | throw; | 45 | throw; |
44 | } | 46 | } |
45 | } | 47 | } |
46 | 48 | ||
47 | void decode_base64(const string& data,vector<unsigned char>& rv) { | 49 | void decode_base64(const string& data,vector<unsigned char>& rv) { |
48 | BIO *b64 = 0, *bmem = 0; | 50 | BIO *b64 = 0, *bmem = 0; |
49 | rv.clear(); | 51 | rv.clear(); |
50 | try { | 52 | try { |
51 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); | 53 | bmem = BIO_new_mem_buf((void*)data.data(),data.size()); |
52 | if(!bmem) | 54 | if(!bmem) |
53 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); | 55 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new_mem_buf()"); |
54 | b64 = BIO_new(BIO_f_base64()); | 56 | b64 = BIO_new(BIO_f_base64()); |
55 | if(!b64) | 57 | if(!b64) |
56 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); | 58 | throw exception_openssl(OPKELE_CP_ "failed to BIO_new() base64 decoder"); |
57 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); | 59 | BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL); |
58 | BIO_push(b64,bmem); | 60 | BIO_push(b64,bmem); |
59 | unsigned char tmp[512]; | 61 | unsigned char tmp[512]; |
60 | size_t rb = 0; | 62 | size_t rb = 0; |
61 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) | 63 | while((rb=BIO_read(b64,tmp,sizeof(tmp)))>0) |
62 | rv.insert(rv.end(),tmp,&tmp[rb]); | 64 | rv.insert(rv.end(),tmp,&tmp[rb]); |
63 | BIO_free_all(b64); | 65 | BIO_free_all(b64); |
64 | }catch(...) { | 66 | }catch(...) { |
65 | if(b64) BIO_free_all(b64); | 67 | if(b64) BIO_free_all(b64); |
66 | throw; | 68 | throw; |
67 | } | 69 | } |
68 | } | 70 | } |
69 | 71 | ||
70 | /* | 72 | /* |
71 | * big numerics | 73 | * big numerics |
72 | */ | 74 | */ |
73 | 75 | ||
74 | BIGNUM *base64_to_bignum(const string& b64) { | 76 | BIGNUM *base64_to_bignum(const string& b64) { |
75 | vector<unsigned char> bin; | 77 | vector<unsigned char> bin; |
76 | decode_base64(b64,bin); | 78 | decode_base64(b64,bin); |
77 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); | 79 | BIGNUM *rv = BN_bin2bn(&(bin.front()),bin.size(),0); |
78 | if(!rv) | 80 | if(!rv) |
79 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); | 81 | throw failed_conversion(OPKELE_CP_ "failed to BN_bin2bn()"); |
80 | return rv; | 82 | return rv; |
81 | } | 83 | } |
82 | 84 | ||
83 | BIGNUM *dec_to_bignum(const string& dec) { | 85 | BIGNUM *dec_to_bignum(const string& dec) { |
84 | BIGNUM *rv = 0; | 86 | BIGNUM *rv = 0; |
85 | if(!BN_dec2bn(&rv,dec.c_str())) | 87 | if(!BN_dec2bn(&rv,dec.c_str())) |
86 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); | 88 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); |
87 | return rv; | 89 | return rv; |
88 | } | 90 | } |
89 | 91 | ||
90 | string bignum_to_base64(const BIGNUM *bn) { | 92 | string bignum_to_base64(const BIGNUM *bn) { |
91 | vector<unsigned char> bin(BN_num_bytes(bn)+1); | 93 | vector<unsigned char> bin(BN_num_bytes(bn)+1); |
92 | unsigned char *binptr = &(bin.front())+1; | 94 | unsigned char *binptr = &(bin.front())+1; |
93 | int l = BN_bn2bin(bn,binptr); | 95 | int l = BN_bn2bin(bn,binptr); |
94 | if(l && (*binptr)&0x80){ | 96 | if(l && (*binptr)&0x80){ |
95 | (*(--binptr)) = 0; ++l; | 97 | (*(--binptr)) = 0; ++l; |
96 | } | 98 | } |
97 | return encode_base64(binptr,l); | 99 | return encode_base64(binptr,l); |
98 | } | 100 | } |
99 | 101 | ||
100 | /* | 102 | /* |
101 | * w3c times | 103 | * w3c times |
102 | */ | 104 | */ |
103 | 105 | ||
104 | string time_to_w3c(time_t t) { | 106 | string time_to_w3c(time_t t) { |
105 | struct tm tm_t; | 107 | struct tm tm_t; |
106 | if(!gmtime_r(&t,&tm_t)) | 108 | if(!gmtime_r(&t,&tm_t)) |
107 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); | 109 | throw failed_conversion(OPKELE_CP_ "failed to BN_dec2bn()"); |
108 | char rv[25]; | 110 | char rv[25]; |
109 | if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t)) | 111 | if(!strftime(rv,sizeof(rv)-1,"%Y-%m-%dT%H:%M:%SZ",&tm_t)) |
110 | throw failed_conversion(OPKELE_CP_ "failed to strftime()"); | 112 | throw failed_conversion(OPKELE_CP_ "failed to strftime()"); |
111 | return rv; | 113 | return rv; |
112 | } | 114 | } |
113 | 115 | ||
114 | time_t w3c_to_time(const string& w) { | 116 | time_t w3c_to_time(const string& w) { |
115 | struct tm tm_t; | 117 | struct tm tm_t; |
116 | memset(&tm_t,0,sizeof(tm_t)); | 118 | memset(&tm_t,0,sizeof(tm_t)); |
117 | if( | 119 | if( |
118 | sscanf( | 120 | sscanf( |
119 | w.c_str(), | 121 | w.c_str(), |
120 | "%04d-%02d-%02dT%02d:%02d:%02dZ", | 122 | "%04d-%02d-%02dT%02d:%02d:%02dZ", |
121 | &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday, | 123 | &tm_t.tm_year,&tm_t.tm_mon,&tm_t.tm_mday, |
122 | &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec | 124 | &tm_t.tm_hour,&tm_t.tm_min,&tm_t.tm_sec |
123 | ) != 6 ) | 125 | ) != 6 ) |
124 | throw failed_conversion(OPKELE_CP_ "failed to sscanf()"); | 126 | throw failed_conversion(OPKELE_CP_ "failed to sscanf()"); |
125 | tm_t.tm_mon--; | 127 | tm_t.tm_mon--; |
126 | tm_t.tm_year-=1900; | 128 | tm_t.tm_year-=1900; |
127 | time_t rv = mktime(&tm_t); | 129 | time_t rv = mktime(&tm_t); |
128 | if(rv==(time_t)-1) | 130 | if(rv==(time_t)-1) |
129 | throw failed_conversion(OPKELE_CP_ "failed to mktime()"); | 131 | throw failed_conversion(OPKELE_CP_ "failed to mktime()"); |
130 | return rv; | 132 | return rv; |
131 | } | 133 | } |
132 | 134 | ||
133 | /* | 135 | /* |
134 | * | 136 | * |
135 | */ | 137 | */ |
136 | 138 | ||
137 | string url_encode(const string& str) { | 139 | string url_encode(const string& str) { |
138 | char * t = curl_escape(str.c_str(),str.length()); | 140 | char * t = curl_escape(str.c_str(),str.length()); |
139 | if(!t) | 141 | if(!t) |
140 | throw failed_conversion(OPKELE_CP_ "failed to curl_escape()"); | 142 | throw failed_conversion(OPKELE_CP_ "failed to curl_escape()"); |
141 | string rv(t); | 143 | string rv(t); |
142 | curl_free(t); | 144 | curl_free(t); |
143 | return rv; | 145 | return rv; |
144 | } | 146 | } |
145 | 147 | ||
146 | string long_to_string(long l) { | 148 | string long_to_string(long l) { |
147 | char rv[32]; | 149 | char rv[32]; |
148 | int r=snprintf(rv,sizeof(rv),"%ld",l); | 150 | int r=snprintf(rv,sizeof(rv),"%ld",l); |
149 | if(r<0 || r>=(int)sizeof(rv)) | 151 | if(r<0 || r>=(int)sizeof(rv)) |
150 | throw failed_conversion(OPKELE_CP_ "failed to snprintf()"); | 152 | throw failed_conversion(OPKELE_CP_ "failed to snprintf()"); |
151 | return rv; | 153 | return rv; |
152 | } | 154 | } |
153 | 155 | ||
154 | long string_to_long(const string& s) { | 156 | long string_to_long(const string& s) { |
155 | char *endptr = 0; | 157 | char *endptr = 0; |
156 | long rv = strtol(s.c_str(),&endptr,10); | 158 | long rv = strtol(s.c_str(),&endptr,10); |
157 | if((!endptr) || endptr==s.c_str()) | 159 | if((!endptr) || endptr==s.c_str()) |
158 | throw failed_conversion(OPKELE_CP_ "failed to strtol()"); | 160 | throw failed_conversion(OPKELE_CP_ "failed to strtol()"); |
159 | return rv; | 161 | return rv; |
160 | } | 162 | } |
161 | 163 | ||
164 | /* | ||
165 | * Normalize URL according to the rules, described in rfc 3986, section 6 | ||
166 | * | ||
167 | * - uppercase hext triplets (e.g. %ab -> %AB) | ||
168 | * - lowercase scheme and host | ||
169 | * - decode %-encoded characters, specified as unreserved in rfc 3986, section 2.3, | ||
170 | * that is - [:alpha:][:digit:]._~- | ||
171 | * - remove dot segments | ||
172 | * - remove empty and default ports | ||
173 | * - if there's no path component, add '/' | ||
174 | */ | ||
175 | string rfc_3986_normalize_uri(const string& uri) { | ||
176 | string rv; | ||
177 | string::size_type colon = uri.find(':'); | ||
178 | if(colon==string::npos) | ||
179 | throw bad_input(OPKELE_CP_ "No scheme specified in URI"); | ||
180 | transform( | ||
181 | uri.begin(), uri.begin()+colon+1, | ||
182 | back_inserter(rv), ::tolower ); | ||
183 | bool s; | ||
184 | if(rv=="http:") | ||
185 | s = false; | ||
186 | else if(rv=="https:") | ||
187 | s = true; | ||
188 | else | ||
189 | throw not_implemented(OPKELE_CP_ "Only http(s) URIs can be normalized here"); | ||
190 | string::size_type ul = uri.length(); | ||
191 | if(ul <= (colon+3)) | ||
192 | throw bad_input(OPKELE_CP_ "Unexpected end of URI being normalized encountered"); | ||
193 | if(uri[colon+1]!='/' || uri[colon+2]!='/') | ||
194 | throw bad_input(OPKELE_CP_ "Unexpected input in URI being normalized after scheme component"); | ||
195 | rv += "//"; | ||
196 | string::size_type interesting = uri.find_first_of(":/#?",colon+3); | ||
197 | if(interesting==string::npos) { | ||
198 | transform( | ||
199 | uri.begin()+colon+3,uri.end(), | ||
200 | back_inserter(rv), ::tolower ); | ||
201 | rv += '/'; return rv; | ||
202 | } | ||
203 | transform( | ||
204 | uri.begin()+colon+3,uri.begin()+interesting, | ||
205 | back_inserter(rv), ::tolower ); | ||
206 | bool qf = false; | ||
207 | char ic = uri[interesting]; | ||
208 | if(ic==':') { | ||
209 | string::size_type ni = uri.find_first_of("/#?%",interesting+1); | ||
210 | const char *nptr = uri.data()+interesting+1; | ||
211 | char *eptr = 0; | ||
212 | long port = strtol(nptr,&eptr,10); | ||
213 | if( (port>0) && (port<65535) && port!=(s?443:80) ) { | ||
214 | char tmp[6]; | ||
215 | snprintf(tmp,sizeof(tmp),"%d",port); | ||
216 | rv += ':'; rv += tmp; | ||
217 | } | ||
218 | if(ni==string::npos) { | ||
219 | rv += '/'; return rv; | ||
220 | } | ||
221 | interesting = ni; | ||
222 | }else if(ic!='/') { | ||
223 | rv += '/'; rv += ic; | ||
224 | qf = true; | ||
225 | ++interesting; | ||
226 | } | ||
227 | string::size_type n = interesting; | ||
228 | char tmp[3] = { 0,0,0 }; | ||
229 | stack<string::size_type> psegs; psegs.push(rv.length()); | ||
230 | string pseg; | ||
231 | for(;n<ul;) { | ||
232 | string::size_type unsafe = uri.find_first_of(qf?"%":"%/?#",n); | ||
233 | if(unsafe==string::npos) { | ||
234 | pseg.append(uri,n,ul-n-1); n = ul-1; | ||
235 | }else{ | ||
236 | pseg.append(uri,n,unsafe-n); | ||
237 | n = unsafe; | ||
238 | } | ||
239 | char c = uri[n++]; | ||
240 | if(c=='%') { | ||
241 | if((n+1)>=ul) | ||
242 | throw bad_input(OPKELE_CP_ "Unexpected end of URI encountered while parsing percent-encoded character"); | ||
243 | tmp[0] = uri[n++]; | ||
244 | tmp[1] = uri[n++]; | ||
245 | if(!( isxdigit(tmp[0]) && isxdigit(tmp[1]) )) | ||
246 | throw bad_input(OPKELE_CP_ "Invalid percent-encoded character in URI being normalized"); | ||
247 | int cc = strtol(tmp,0,16); | ||
248 | if( isalpha(cc) || isdigit(cc) || strchr("._~-",cc) ) | ||
249 | pseg += cc; | ||
250 | else{ | ||
251 | pseg += '%'; | ||
252 | pseg += toupper(tmp[0]); pseg += toupper(tmp[1]); | ||
253 | } | ||
254 | }else if(qf) { | ||
255 | rv += pseg; rv += c; | ||
256 | pseg.clear(); | ||
257 | }else if(n>=ul || strchr("?/#",c)) { | ||
258 | if(pseg.empty() || pseg==".") { | ||
259 | }else if(pseg=="..") { | ||
260 | if(psegs.size()>1) { | ||
261 | rv.resize(psegs.top()); psegs.pop(); | ||
262 | } | ||
263 | }else{ | ||
264 | psegs.push(rv.length()); | ||
265 | if(c!='/') { | ||
266 | pseg += c; | ||
267 | qf = true; | ||
268 | } | ||
269 | rv += '/'; rv += pseg; | ||
270 | } | ||
271 | if(c=='/' && (n>=ul || strchr("?#",uri[n])) ) { | ||
272 | rv += '/'; | ||
273 | if(n<ul) | ||
274 | qf = true; | ||
275 | }else if(strchr("?#",c)) { | ||
276 | if(psegs.size()==1 && psegs.top()==rv.length()) | ||
277 | rv += '/'; | ||
278 | if(pseg.empty()) | ||
279 | rv += c; | ||
280 | qf = true; | ||
281 | } | ||
282 | pseg.clear(); | ||
283 | }else{ | ||
284 | pseg += c; | ||
285 | } | ||
286 | } | ||
287 | if(!pseg.empty()) { | ||
288 | rv += '/'; rv += pseg; | ||
289 | } | ||
290 | return rv; | ||
291 | } | ||
292 | |||
162 | } | 293 | } |
163 | 294 | ||
164 | } | 295 | } |
diff --git a/test/test.cc b/test/test.cc index f92284c..1a012b5 100644 --- a/test/test.cc +++ b/test/test.cc | |||
@@ -1,72 +1,139 @@ | |||
1 | #include <iostream> | 1 | #include <iostream> |
2 | #include <stdexcept> | 2 | #include <stdexcept> |
3 | using namespace std; | 3 | using namespace std; |
4 | #include <opkele/exception.h> | 4 | #include <opkele/exception.h> |
5 | #include <opkele/consumer.h> | 5 | #include <opkele/consumer.h> |
6 | #include <opkele/util.h> | ||
6 | 7 | ||
7 | #include "config.h" | 8 | #include "config.h" |
8 | 9 | ||
9 | class failed_test : public opkele::exception { | 10 | class failed_test : public opkele::exception { |
10 | public: | 11 | public: |
11 | failed_test(OPKELE_E_PARS) | 12 | failed_test(OPKELE_E_PARS) |
12 | : exception(OPKELE_E_CONS) { } | 13 | : exception(OPKELE_E_CONS) { } |
13 | }; | 14 | }; |
14 | 15 | ||
15 | class dummy_consumer_t : public opkele::consumer_t { | 16 | class dummy_consumer_t : public opkele::consumer_t { |
16 | public: | 17 | public: |
17 | virtual opkele::assoc_t store_assoc(const string& /* server */,const string& /* handle */,const opkele::secret_t& /* secret */,int /* expires_in */) { | 18 | virtual opkele::assoc_t store_assoc(const string& /* server */,const string& /* handle */,const opkele::secret_t& /* secret */,int /* expires_in */) { |
18 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); | 19 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); |
19 | } | 20 | } |
20 | virtual opkele::assoc_t retrieve_assoc(const string& /* server */ ,const string& /* handle */) { | 21 | virtual opkele::assoc_t retrieve_assoc(const string& /* server */ ,const string& /* handle */) { |
21 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); | 22 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); |
22 | } | 23 | } |
23 | virtual void invalidate_assoc(const string& /* server */,const string& /* handle */) { | 24 | virtual void invalidate_assoc(const string& /* server */,const string& /* handle */) { |
24 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); | 25 | throw opkele::not_implemented(OPKELE_CP_ "Not implemented"); |
25 | } | 26 | } |
26 | }; | 27 | }; |
27 | 28 | ||
28 | 29 | ||
29 | void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") { | 30 | void test_retrieve_links(const string& f,bool success,const string& s="",const string& d="") { |
30 | dummy_consumer_t dc; | 31 | dummy_consumer_t dc; |
31 | string server, delegate; | 32 | string server, delegate; |
32 | try { | 33 | try { |
33 | dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate); | 34 | dc.retrieve_links("file://" OPKELE_SRC_DIR "/test/html/"+f,server,delegate); |
34 | if(!success) | 35 | if(!success) |
35 | throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't"); | 36 | throw failed_test(OPKELE_CP_ "Retrieved links when it shouldn't"); |
36 | if(server!=s) | 37 | if(server!=s) |
37 | throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'"); | 38 | throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected server '"+s+"', got '"+server+"'"); |
38 | if(delegate!=d) | 39 | if(delegate!=d) |
39 | throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'"); | 40 | throw failed_test(OPKELE_CP_ "retrieve_links test failed, expected delegate '"+d+"', got '"+delegate+"'"); |
40 | }catch(opkele::bad_input& obi) { | 41 | }catch(opkele::bad_input& obi) { |
41 | if(success) | 42 | if(success) |
42 | throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]"); | 43 | throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'bad_input'["+obi.what()+"]"); |
43 | }catch(opkele::failed_assertion& ofa) { | 44 | }catch(opkele::failed_assertion& ofa) { |
44 | if(success) | 45 | if(success) |
45 | throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]"); | 46 | throw failed_test(OPKELE_CP_ "Test '"+f+"' failed due to 'failed_assertion'["+ofa.what()+"]"); |
46 | } | 47 | } |
47 | } | 48 | } |
48 | 49 | ||
49 | void test_retrieve_links() { | 50 | void test_retrieve_links() { |
50 | test_retrieve_links("empty.html",false); | 51 | test_retrieve_links("empty.html",false); |
51 | test_retrieve_links("in-body.html",false); | 52 | test_retrieve_links("in-body.html",false); |
52 | test_retrieve_links("head-in-body.html",false); | 53 | test_retrieve_links("head-in-body.html",false); |
53 | test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); | 54 | test_retrieve_links("hkn.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); |
54 | test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server"); | 55 | test_retrieve_links("hkn-server.html",true,"http://www.klever.net/openid.server"); |
55 | test_retrieve_links("hkn-delegate.html",false); | 56 | test_retrieve_links("hkn-delegate.html",false); |
56 | test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); | 57 | test_retrieve_links("unclosed-head.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); |
57 | test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); | 58 | test_retrieve_links("spaced-links.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); |
58 | test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); | 59 | test_retrieve_links("spaced-link-attrs.html",true,"http://www.klever.net/openid.server","http://hacker.klever.net/"); |
59 | test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server"); | 60 | test_retrieve_links("2rels.html",true,"http://www.klever.net/openid.server","http://www.klever.net/openid.server"); |
60 | } | 61 | } |
61 | 62 | ||
63 | void test_rfc_3986_normalize_uri(const string &ouri,bool success,const string& nuri="") { | ||
64 | try { | ||
65 | string n = opkele::util::rfc_3986_normalize_uri(ouri); | ||
66 | if(!success) | ||
67 | throw failed_test(OPKELE_CP_ "Normalized URI when it shouldn't"); | ||
68 | if(n!=nuri) | ||
69 | throw failed_test(OPKELE_CP_ "rfc_3986_test_failed for '"+ouri+"' failed, expected '"+nuri+"', got '"+n+"'"); | ||
70 | }catch(opkele::bad_input& obi) { | ||
71 | if(success) | ||
72 | throw failed_test(OPKELE_CP_ "Test '"+ouri+"' failed due to 'bad_input'["+obi.what()+"]"); | ||
73 | }catch(opkele::not_implemented& oni) { | ||
74 | if(success) | ||
75 | throw failed_test(OPKELE_CP_ "Test '"+ouri+"' failed due to 'not_implemented'["+oni.what()+"]"); | ||
76 | } | ||
77 | } | ||
78 | |||
79 | void test_rfc_3986_normalize_uri() { | ||
80 | test_rfc_3986_normalize_uri( | ||
81 | "invalid", false ); | ||
82 | test_rfc_3986_normalize_uri( | ||
83 | "ftp://hacker.klever.net/", false ); | ||
84 | test_rfc_3986_normalize_uri( | ||
85 | "http://", false ); | ||
86 | test_rfc_3986_normalize_uri( | ||
87 | "http:/hacker.klever.net/", false ); | ||
88 | test_rfc_3986_normalize_uri( | ||
89 | "hTTp://hacker.klever.net#uh?oh", true, "http://hacker.klever.net/#uh?oh" ); | ||
90 | test_rfc_3986_normalize_uri( | ||
91 | "http://hacker.klever.net?uh#oh", true, "http://hacker.klever.net/?uh#oh" ); | ||
92 | test_rfc_3986_normalize_uri( | ||
93 | "http://hacker.klever.net:80/", true, "http://hacker.klever.net/" ); | ||
94 | test_rfc_3986_normalize_uri( | ||
95 | "http://hacker.klever.net:80?uh", true, "http://hacker.klever.net/?uh" ); | ||
96 | test_rfc_3986_normalize_uri( | ||
97 | "http://hacker.klever.net:80#uh", true, "http://hacker.klever.net/#uh" ); | ||
98 | test_rfc_3986_normalize_uri( | ||
99 | "https://hacker.klever.net:443", true, "https://hacker.klever.net/" ); | ||
100 | test_rfc_3986_normalize_uri( | ||
101 | "http://hacker.klever.net:?oh", true, "http://hacker.klever.net/?oh" ); | ||
102 | test_rfc_3986_normalize_uri( | ||
103 | "http://hacker.klever.net/ah%2E", true, "http://hacker.klever.net/ah." ); | ||
104 | test_rfc_3986_normalize_uri( | ||
105 | "http://hacker.klever.net/ah/%2E/", true, "http://hacker.klever.net/ah/" ); | ||
106 | test_rfc_3986_normalize_uri( | ||
107 | "http://hacker.klever.net/ah/%2b/", true, "http://hacker.klever.net/ah/%2B/" ); | ||
108 | test_rfc_3986_normalize_uri( | ||
109 | "http://hacker.klever.net/ah/./oh?eh", true, "http://hacker.klever.net/ah/oh?eh" ); | ||
110 | test_rfc_3986_normalize_uri( | ||
111 | "http://hacker.klever.net/ah/../oh?", true, "http://hacker.klever.net/oh?" ); | ||
112 | test_rfc_3986_normalize_uri( | ||
113 | "http://hacker.klever.net/ah//oh?", true, "http://hacker.klever.net/ah/oh?" ); | ||
114 | test_rfc_3986_normalize_uri( | ||
115 | "http://hacker.klever.net/ah/?", true, "http://hacker.klever.net/ah/?" ); | ||
116 | test_rfc_3986_normalize_uri( | ||
117 | "http://hacker.klever.net/ah/%", false ); | ||
118 | test_rfc_3986_normalize_uri( | ||
119 | "http://hacker.klever.net/ah/%a", false ); | ||
120 | test_rfc_3986_normalize_uri( | ||
121 | "http://hacker.klever.net/ah/%zx", false ); | ||
122 | test_rfc_3986_normalize_uri( | ||
123 | "http://hacker.klever.net/ah/%5x", false ); | ||
124 | test_rfc_3986_normalize_uri( | ||
125 | "Http://Hacker.Klever.Net:", true, "http://hacker.klever.net/" ); | ||
126 | } | ||
127 | |||
62 | int main() { | 128 | int main() { |
63 | try { | 129 | try { |
130 | test_rfc_3986_normalize_uri(); | ||
64 | test_retrieve_links(); | 131 | test_retrieve_links(); |
65 | }catch(failed_test& ft) { | 132 | }catch(failed_test& ft) { |
66 | cerr << "Test failed: " << ft.what() << endl; | 133 | cerr << "Test failed: " << ft.what() << endl; |
67 | }catch(exception& e) { | 134 | }catch(exception& e) { |
68 | cerr << "oops: " << e.what() << endl; | 135 | cerr << "oops: " << e.what() << endl; |
69 | _exit(1); | 136 | _exit(1); |
70 | } | 137 | } |
71 | _exit(0); | 138 | _exit(0); |
72 | } | 139 | } |