hush: fix a bug in argv restoration after sourcing a file
[oweals/busybox.git] / networking / wget.c
index 29f5d45c39cca03f1653466a0ee765122575ceba..b082a0f591103dc8d16715bac53364dd732f05b3 100644 (file)
  * wget - retrieve a file using HTTP or FTP
  *
  * Chip Rosenthal Covad Communications <chip@laserlink.net>
+ * Licensed under GPLv2, see file LICENSE in this source tree.
  *
+ * Copyright (C) 2010 Bradley M. Kuhn <bkuhn@ebb.org>
+ * Kuhn's copyrights are licensed GPLv2-or-later.  File as a whole remains GPLv2.
  */
 
-#include <stdio.h>
-#include <errno.h>
-#include <stdlib.h>
-#include <unistd.h>
-#include <ctype.h>
-#include <string.h>
-#include <unistd.h>
-#include <signal.h>
-#include <sys/ioctl.h>
+//config:config WGET
+//config:      bool "wget"
+//config:      default y
+//config:      help
+//config:        wget is a utility for non-interactive download of files from HTTP
+//config:        and FTP servers.
+//config:
+//config:config FEATURE_WGET_STATUSBAR
+//config:      bool "Enable a nifty process meter (+2k)"
+//config:      default y
+//config:      depends on WGET
+//config:      help
+//config:        Enable the transfer progress bar for wget transfers.
+//config:
+//config:config FEATURE_WGET_AUTHENTICATION
+//config:      bool "Enable HTTP authentication"
+//config:      default y
+//config:      depends on WGET
+//config:      help
+//config:        Support authenticated HTTP transfers.
+//config:
+//config:config FEATURE_WGET_LONG_OPTIONS
+//config:      bool "Enable long options"
+//config:      default y
+//config:      depends on WGET && LONG_OPTS
+//config:      help
+//config:        Support long options for the wget applet.
+//config:
+//config:config FEATURE_WGET_TIMEOUT
+//config:      bool "Enable timeout option -T SEC"
+//config:      default y
+//config:      depends on WGET
+//config:      help
+//config:        Supports network read and connect timeouts for wget,
+//config:        so that wget will give up and timeout, through the -T
+//config:        command line option.
+//config:
+//config:        Currently only connect and network data read timeout are
+//config:        supported (i.e., timeout is not applied to the DNS query). When
+//config:        FEATURE_WGET_LONG_OPTIONS is also enabled, the --timeout option
+//config:        will work in addition to -T.
+//config:
+//config:config FEATURE_WGET_OPENSSL
+//config:      bool "Try to connect to HTTPS using openssl"
+//config:      default y
+//config:      depends on WGET
+//config:      help
+//config:        Choose how wget establishes SSL connection for https:// URLs.
+//config:
+//config:        Busybox itself contains no SSL code. wget will spawn
+//config:        a helper program to talk over HTTPS.
+//config:
+//config:        OpenSSL has a simple SSL client for debug purposes.
+//config:        If you select "openssl" helper, wget will effectively run:
+//config:        "openssl s_client -quiet -connect hostname:443
+//config:        -servername hostname 2>/dev/null" and pipe its data
+//config:        through it. -servername is not used if hostname is numeric.
+//config:        Note inconvenient API: host resolution is done twice,
+//config:        and there is no guarantee openssl's idea of IPv6 address
+//config:        format is the same as ours.
+//config:        Another problem is that s_client prints debug information
+//config:        to stderr, and it needs to be suppressed. This means
+//config:        all error messages get suppressed too.
+//config:        openssl is also a big binary, often dynamically linked
+//config:        against ~15 libraries.
+//config:
+//config:config FEATURE_WGET_SSL_HELPER
+//config:      bool "Try to connect to HTTPS using ssl_helper"
+//config:      default y
+//config:      depends on WGET
+//config:      help
+//config:        Choose how wget establishes SSL connection for https:// URLs.
+//config:
+//config:        Busybox itself contains no SSL code. wget will spawn
+//config:        a helper program to talk over HTTPS.
+//config:
+//config:        ssl_helper is a tool which can be built statically
+//config:        from busybox sources against a small embedded SSL library.
+//config:        Please see networking/ssl_helper/README.
+//config:        It does not require double host resolution and emits
+//config:        error messages to stderr.
+//config:
+//config:        Precompiled static binary may be available at
+//config:        http://busybox.net/downloads/binaries/
+
+//applet:IF_WGET(APPLET(wget, BB_DIR_USR_BIN, BB_SUID_DROP))
+
+//kbuild:lib-$(CONFIG_WGET) += wget.o
+
+//usage:#define wget_trivial_usage
+//usage:       IF_FEATURE_WGET_LONG_OPTIONS(
+//usage:       "[-c|--continue] [--spider] [-q|--quiet] [-O|--output-document FILE]\n"
+//usage:       "       [--header 'header: value'] [-Y|--proxy on/off] [-P DIR]\n"
+/* Since we ignore these opts, we don't show them in --help */
+/* //usage:    "       [--no-check-certificate] [--no-cache] [--passive-ftp] [-t TRIES]" */
+/* //usage:    "       [-nv] [-nc] [-nH] [-np]" */
+//usage:       "       [-U|--user-agent AGENT]" IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
+//usage:       )
+//usage:       IF_NOT_FEATURE_WGET_LONG_OPTIONS(
+//usage:       "[-cq] [-O FILE] [-Y on/off] [-P DIR] [-U AGENT]"
+//usage:                       IF_FEATURE_WGET_TIMEOUT(" [-T SEC]") " URL..."
+//usage:       )
+//usage:#define wget_full_usage "\n\n"
+//usage:       "Retrieve files via HTTP or FTP\n"
+//usage:       IF_FEATURE_WGET_LONG_OPTIONS(
+//usage:     "\n       --spider        Spider mode - only check file existence"
+//usage:       )
+//usage:     "\n       -c              Continue retrieval of aborted transfer"
+//usage:     "\n       -q              Quiet"
+//usage:     "\n       -P DIR          Save to DIR (default .)"
+//usage:       IF_FEATURE_WGET_TIMEOUT(
+//usage:     "\n       -T SEC          Network read timeout is SEC seconds"
+//usage:       )
+//usage:     "\n       -O FILE         Save to FILE ('-' for stdout)"
+//usage:     "\n       -U STR          Use STR for User-Agent header"
+//usage:     "\n       -Y on/off       Use proxy"
+
+#include "libbb.h"
+
+#if 0
+# define log_io(...) bb_error_msg(__VA_ARGS__)
+# define SENDFMT(fp, fmt, ...) \
+       do { \
+               log_io("> " fmt, ##__VA_ARGS__); \
+               fprintf(fp, fmt, ##__VA_ARGS__); \
+       } while (0);
+#else
+# define log_io(...) ((void)0)
+# define SENDFMT(fp, fmt, ...) fprintf(fp, fmt, ##__VA_ARGS__)
+#endif
 
-#include <sys/time.h>
-#include <sys/types.h>
-#include <sys/stat.h>
-#include <sys/socket.h>
-#include <netinet/in.h>
-#include <arpa/inet.h>
-#include <netdb.h>
 
-#include <getopt.h>
+struct host_info {
+       char *allocated;
+       const char *path;
+       char       *user;
+       const char *protocol;
+       char       *host;
+       int         port;
+};
+static const char P_FTP[] ALIGN1 = "ftp";
+static const char P_HTTP[] ALIGN1 = "http";
+#if ENABLE_FEATURE_WGET_OPENSSL || ENABLE_FEATURE_WGET_SSL_HELPER
+static const char P_HTTPS[] ALIGN1 = "https";
+#endif
 
-#include "busybox.h"
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+/* User-specified headers prevent using our corresponding built-in headers.  */
+enum {
+       HDR_HOST          = (1<<0),
+       HDR_USER_AGENT    = (1<<1),
+       HDR_RANGE         = (1<<2),
+       HDR_AUTH          = (1<<3) * ENABLE_FEATURE_WGET_AUTHENTICATION,
+       HDR_PROXY_AUTH    = (1<<4) * ENABLE_FEATURE_WGET_AUTHENTICATION,
+};
+static const char wget_user_headers[] ALIGN1 =
+       "Host:\0"
+       "User-Agent:\0"
+       "Range:\0"
+# if ENABLE_FEATURE_WGET_AUTHENTICATION
+       "Authorization:\0"
+       "Proxy-Authorization:\0"
+# endif
+       ;
+# define USR_HEADER_HOST       (G.user_headers & HDR_HOST)
+# define USR_HEADER_USER_AGENT (G.user_headers & HDR_USER_AGENT)
+# define USR_HEADER_RANGE      (G.user_headers & HDR_RANGE)
+# define USR_HEADER_AUTH       (G.user_headers & HDR_AUTH)
+# define USR_HEADER_PROXY_AUTH (G.user_headers & HDR_PROXY_AUTH)
+#else /* No long options, no user-headers :( */
+# define USR_HEADER_HOST       0
+# define USR_HEADER_USER_AGENT 0
+# define USR_HEADER_RANGE      0
+# define USR_HEADER_AUTH       0
+# define USR_HEADER_PROXY_AUTH 0
+#endif
 
-struct host_info {
-       char *host;
-       int port;
-       char *path;
-       int is_ftp;
-       char *user;
+/* Globals */
+struct globals {
+       off_t content_len;        /* Content-length of the file */
+       off_t beg_range;          /* Range at which continue begins */
+#if ENABLE_FEATURE_WGET_STATUSBAR
+       off_t transferred;        /* Number of bytes transferred so far */
+       const char *curfile;      /* Name of current file being transferred */
+       bb_progress_t pmt;
+#endif
+       char *dir_prefix;
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+       char *post_data;
+       char *extra_headers;
+       unsigned char user_headers; /* Headers mentioned by the user */
+#endif
+       char *fname_out;        /* where to direct output (-O) */
+       const char *proxy_flag; /* Use proxies if env vars are set */
+       const char *user_agent; /* "User-Agent" header field */
+#if ENABLE_FEATURE_WGET_TIMEOUT
+       unsigned timeout_seconds;
+       bool die_if_timed_out;
+#endif
+       int output_fd;
+       int o_flags;
+       smallint chunked;         /* chunked transfer encoding */
+       smallint got_clen;        /* got content-length: from server  */
+       /* Local downloads do benefit from big buffer.
+        * With 512 byte buffer, it was measured to be
+        * an order of magnitude slower than with big one.
+        */
+       uint64_t just_to_align_next_member;
+       char wget_buf[CONFIG_FEATURE_COPYBUF_KB*1024];
+} FIX_ALIASING;
+#define G (*ptr_to_globals)
+#define INIT_G() do { \
+       SET_PTR_TO_GLOBALS(xzalloc(sizeof(G))); \
+} while (0)
+#define FINI_G() do { \
+       FREE_PTR_TO_GLOBALS(); \
+} while (0)
+
+
+/* Must match option string! */
+enum {
+       WGET_OPT_CONTINUE   = (1 << 0),
+       WGET_OPT_QUIET      = (1 << 1),
+       WGET_OPT_OUTNAME    = (1 << 2),
+       WGET_OPT_PREFIX     = (1 << 3),
+       WGET_OPT_PROXY      = (1 << 4),
+       WGET_OPT_USER_AGENT = (1 << 5),
+       WGET_OPT_NETWORK_READ_TIMEOUT = (1 << 6),
+       WGET_OPT_RETRIES    = (1 << 7),
+       WGET_OPT_nsomething = (1 << 8),
+       WGET_OPT_HEADER     = (1 << 9) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
+       WGET_OPT_POST_DATA  = (1 << 10) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
+       WGET_OPT_SPIDER     = (1 << 11) * ENABLE_FEATURE_WGET_LONG_OPTIONS,
 };
 
-static void parse_url(char *url, struct host_info *h);
-static FILE *open_socket(struct sockaddr_in *s_in);
-static char *gethdr(char *buf, size_t bufsiz, FILE *fp, int *istrunc);
-static int ftpcmd(char *s1, char *s2, FILE *fp, char *buf);
-
-/* Globals (can be accessed from signal handlers */
-static off_t filesize = 0;             /* content-length of the file */
-static int chunked = 0;                        /* chunked transfer encoding */
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-static void progressmeter(int flag);
-static char *curfile;                  /* Name of current file being transferred. */
-static struct timeval start;   /* Time a transfer started. */
-static volatile unsigned long statbytes = 0; /* Number of bytes transferred so far. */
-/* For progressmeter() -- number of seconds before xfer considered "stalled" */
-static const int STALLTIME = 5;
+enum {
+       PROGRESS_START = -1,
+       PROGRESS_END   = 0,
+       PROGRESS_BUMP  = 1,
+};
+#if ENABLE_FEATURE_WGET_STATUSBAR
+static void progress_meter(int flag)
+{
+       if (option_mask32 & WGET_OPT_QUIET)
+               return;
+
+       if (flag == PROGRESS_START)
+               bb_progress_init(&G.pmt, G.curfile);
+
+       bb_progress_update(&G.pmt,
+                       G.beg_range,
+                       G.transferred,
+                       (G.chunked || !G.got_clen) ? 0 : G.beg_range + G.transferred + G.content_len
+       );
+
+       if (flag == PROGRESS_END) {
+               bb_progress_free(&G.pmt);
+               bb_putchar_stderr('\n');
+               G.transferred = 0;
+       }
+}
+#else
+static ALWAYS_INLINE void progress_meter(int flag UNUSED_PARAM) { }
 #endif
 
-static void close_and_delete_outfile(FILE* output, char *fname_out, int do_continue)
+
+/* IPv6 knows scoped address types i.e. link and site local addresses. Link
+ * local addresses can have a scope identifier to specify the
+ * interface/link an address is valid on (e.g. fe80::1%eth0). This scope
+ * identifier is only valid on a single node.
+ *
+ * RFC 4007 says that the scope identifier MUST NOT be sent across the wire,
+ * unless all nodes agree on the semantic. Apache e.g. regards zone identifiers
+ * in the Host header as invalid requests, see
+ * https://issues.apache.org/bugzilla/show_bug.cgi?id=35122
+ */
+static void strip_ipv6_scope_id(char *host)
 {
-       if (output != stdout && do_continue==0) {
-               fclose(output);
-               unlink(fname_out);
+       char *scope, *cp;
+
+       /* bbox wget actually handles IPv6 addresses without [], like
+        * wget "http://::1/xxx", but this is not standard.
+        * To save code, _here_ we do not support it. */
+
+       if (host[0] != '[')
+               return; /* not IPv6 */
+
+       scope = strchr(host, '%');
+       if (!scope)
+               return;
+
+       /* Remove the IPv6 zone identifier from the host address */
+       cp = strchr(host, ']');
+       if (!cp || (cp[1] != ':' && cp[1] != '\0')) {
+               /* malformed address (not "[xx]:nn" or "[xx]") */
+               return;
        }
+
+       /* cp points to "]...", scope points to "%eth0]..." */
+       overlapping_strcpy(scope, cp);
 }
 
-/* Read NMEMB elements of SIZE bytes into PTR from STREAM.  Returns the
- * number of elements read, and a short count if an eof or non-interrupt
- * error is encountered.  */
-static size_t safe_fread(void *ptr, size_t size, size_t nmemb, FILE *stream)
+#if ENABLE_FEATURE_WGET_AUTHENTICATION
+/* Base64-encode character string. */
+static char *base64enc(const char *str)
 {
-       size_t ret = 0;
+       unsigned len = strlen(str);
+       if (len > sizeof(G.wget_buf)/4*3 - 10) /* paranoia */
+               len = sizeof(G.wget_buf)/4*3 - 10;
+       bb_uuencode(G.wget_buf, str, len, bb_uuenc_tbl_base64);
+       return G.wget_buf;
+}
+#endif
 
-       do {
-               clearerr(stream);
-               ret += fread((char *)ptr + (ret * size), size, nmemb - ret, stream);
-       } while (ret < nmemb && ferror(stream) && errno == EINTR);
+static char* sanitize_string(char *s)
+{
+       unsigned char *p = (void *) s;
+       while (*p >= ' ')
+               p++;
+       *p = '\0';
+       return s;
+}
 
-       return ret;
+#if ENABLE_FEATURE_WGET_TIMEOUT
+static void alarm_handler(int sig UNUSED_PARAM)
+{
+       /* This is theoretically unsafe (uses stdio and malloc in signal handler) */
+       if (G.die_if_timed_out)
+               bb_error_msg_and_die("download timed out");
+}
+static void set_alarm(void)
+{
+       if (G.timeout_seconds) {
+               alarm(G.timeout_seconds);
+               G.die_if_timed_out = 1;
+       }
 }
+# define clear_alarm() ((void)(G.die_if_timed_out = 0))
+#else
+# define set_alarm()   ((void)0)
+# define clear_alarm() ((void)0)
+#endif
 
-/* Write NMEMB elements of SIZE bytes from PTR to STREAM.  Returns the
- * number of elements written, and a short count if an eof or non-interrupt
- * error is encountered.  */
-static size_t safe_fwrite(void *ptr, size_t size, size_t nmemb, FILE *stream)
+#if ENABLE_FEATURE_WGET_OPENSSL
+/*
+ * is_ip_address() attempts to verify whether or not a string
+ * contains an IPv4 or IPv6 address (vs. an FQDN).  The result
+ * of inet_pton() can be used to determine this.
+ *
+ * TODO add proper error checking when inet_pton() returns -1
+ * (some form of system error has occurred, and errno is set)
+ */
+static int is_ip_address(const char *string)
 {
-       size_t ret = 0;
+       struct sockaddr_in sa;
 
-       do {
-               clearerr(stream);
-               ret += fwrite((char *)ptr + (ret * size), size, nmemb - ret, stream);
-       } while (ret < nmemb && ferror(stream) && errno == EINTR);
+       int result = inet_pton(AF_INET, string, &(sa.sin_addr));
+# if ENABLE_FEATURE_IPV6
+       if (result == 0) {
+               struct sockaddr_in6 sa6;
+               result = inet_pton(AF_INET6, string, &(sa6.sin6_addr));
+       }
+# endif
+       return (result == 1);
+}
+#endif
 
-       return ret;
+static FILE *open_socket(len_and_sockaddr *lsa)
+{
+       int fd;
+       FILE *fp;
+
+       set_alarm();
+       fd = xconnect_stream(lsa);
+       clear_alarm();
+
+       /* glibc 2.4 seems to try seeking on it - ??! */
+       /* hopefully it understands what ESPIPE means... */
+       fp = fdopen(fd, "r+");
+       if (!fp)
+               bb_perror_msg_and_die(bb_msg_memory_exhausted);
+
+       return fp;
 }
 
-/* Read a line or SIZE - 1 bytes into S, whichever is less, from STREAM.
- * Returns S, or NULL if an eof or non-interrupt error is encountered.  */
-static char *safe_fgets(char *s, int size, FILE *stream)
+/* Returns '\n' if it was seen, else '\0'. Trims at first '\r' or '\n' */
+static char fgets_and_trim(FILE *fp)
 {
-       char *ret;
+       char c;
+       char *buf_ptr;
 
-       do {
-               clearerr(stream);
-               ret = fgets(s, size, stream);
-       } while (ret == NULL && ferror(stream) && errno == EINTR);
+       set_alarm();
+       if (fgets(G.wget_buf, sizeof(G.wget_buf) - 1, fp) == NULL)
+               bb_perror_msg_and_die("error getting response");
+       clear_alarm();
+
+       buf_ptr = strchrnul(G.wget_buf, '\n');
+       c = *buf_ptr;
+       *buf_ptr = '\0';
+       buf_ptr = strchrnul(G.wget_buf, '\r');
+       *buf_ptr = '\0';
+
+       log_io("< %s", G.wget_buf);
 
-       return ret;
+       return c;
 }
 
-#define close_delete_and_die(s...) { \
-       close_and_delete_outfile(output, fname_out, do_continue); \
-       bb_error_msg_and_die(s); }
+static int ftpcmd(const char *s1, const char *s2, FILE *fp)
+{
+       int result;
+       if (s1) {
+               if (!s2)
+                       s2 = "";
+               fprintf(fp, "%s%s\r\n", s1, s2);
+               fflush(fp);
+               log_io("> %s%s", s1, s2);
+       }
 
+       do {
+               fgets_and_trim(fp);
+       } while (!isdigit(G.wget_buf[0]) || G.wget_buf[3] != ' ');
 
-#ifdef CONFIG_FEATURE_WGET_AUTHENTICATION
-/*
- *  Base64-encode character string
- *  oops... isn't something similar in uuencode.c?
- *  XXX: It would be better to use already existing code
- */
-static char *base64enc(unsigned char *p, char *buf, int len) {
-
-        char al[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz"
-                    "0123456789+/";
-               char *s = buf;
-
-        while(*p) {
-                               if (s >= buf+len-4)
-                                       bb_error_msg_and_die("buffer overflow");
-                *(s++) = al[(*p >> 2) & 0x3F];
-                *(s++) = al[((*p << 4) & 0x30) | ((*(p+1) >> 4) & 0x0F)];
-                *s = *(s+1) = '=';
-                *(s+2) = 0;
-                if (! *(++p)) break;
-                *(s++) = al[((*p << 2) & 0x3C) | ((*(p+1) >> 6) & 0x03)];
-                if (! *(++p)) break;
-                *(s++) = al[*(p++) & 0x3F];
-        }
-
-               return buf;
+       G.wget_buf[3] = '\0';
+       result = xatoi_positive(G.wget_buf);
+       G.wget_buf[3] = ' ';
+       return result;
 }
+
+static void parse_url(const char *src_url, struct host_info *h)
+{
+       char *url, *p, *sp;
+
+       free(h->allocated);
+       h->allocated = url = xstrdup(src_url);
+
+       h->protocol = P_FTP;
+       p = strstr(url, "://");
+       if (p) {
+               *p = '\0';
+               h->host = p + 3;
+               if (strcmp(url, P_FTP) == 0) {
+                       h->port = bb_lookup_port(P_FTP, "tcp", 21);
+               } else
+#if ENABLE_FEATURE_WGET_OPENSSL || ENABLE_FEATURE_WGET_SSL_HELPER
+               if (strcmp(url, P_HTTPS) == 0) {
+                       h->port = bb_lookup_port(P_HTTPS, "tcp", 443);
+                       h->protocol = P_HTTPS;
+               } else
 #endif
+               if (strcmp(url, P_HTTP) == 0) {
+ http:
+                       h->port = bb_lookup_port(P_HTTP, "tcp", 80);
+                       h->protocol = P_HTTP;
+               } else {
+                       *p = ':';
+                       bb_error_msg_and_die("not an http or ftp url: %s", sanitize_string(url));
+               }
+       } else {
+               // GNU wget is user-friendly and falls back to http://
+               h->host = url;
+               goto http;
+       }
 
-#define WGET_OPT_CONTINUE      1
-#define WGET_OPT_QUIET 2
-#define WGET_OPT_PASSIVE       4
-#define WGET_OPT_OUTNAME       8
-#define WGET_OPT_HEADER        16
-#define WGET_OPT_PREFIX        32
-#define WGET_OPT_PROXY 64
-
-static const struct option wget_long_options[] = {
-       { "continue",        0, NULL, 'c' },
-       { "quiet",           0, NULL, 'q' },
-       { "passive-ftp",     0, NULL, 139 },
-       { "output-document", 1, NULL, 'O' },
-       { "header",              1, NULL, 131 },
-       { "directory-prefix",1, NULL, 'P' },
-       { "proxy",           1, NULL, 'Y' },
-       { 0,                 0, 0, 0 }
-};
+       // FYI:
+       // "Real" wget 'http://busybox.net?var=a/b' sends this request:
+       //   'GET /?var=a/b HTTP 1.0'
+       //   and saves 'index.html?var=a%2Fb' (we save 'b')
+       // wget 'http://busybox.net?login=john@doe':
+       //   request: 'GET /?login=john@doe HTTP/1.0'
+       //   saves: 'index.html?login=john@doe' (we save '?login=john@doe')
+       // wget 'http://busybox.net#test/test':
+       //   request: 'GET / HTTP/1.0'
+       //   saves: 'index.html' (we save 'test')
+       //
+       // We also don't add unique .N suffix if file exists...
+       sp = strchr(h->host, '/');
+       p = strchr(h->host, '?'); if (!sp || (p && sp > p)) sp = p;
+       p = strchr(h->host, '#'); if (!sp || (p && sp > p)) sp = p;
+       if (!sp) {
+               h->path = "";
+       } else if (*sp == '/') {
+               *sp = '\0';
+               h->path = sp + 1;
+       } else { // '#' or '?'
+               // http://busybox.net?login=john@doe is a valid URL
+               // memmove converts to:
+               // http:/busybox.nett?login=john@doe...
+               memmove(h->host - 1, h->host, sp - h->host);
+               h->host--;
+               sp[-1] = '\0';
+               h->path = sp;
+       }
+
+       sp = strrchr(h->host, '@');
+       if (sp != NULL) {
+               // URL-decode "user:password" string before base64-encoding:
+               // wget http://test:my%20pass@example.com should send
+               // Authorization: Basic dGVzdDpteSBwYXNz
+               // which decodes to "test:my pass".
+               // Standard wget and curl do this too.
+               *sp = '\0';
+               free(h->user);
+               h->user = xstrdup(percent_decode_in_place(h->host, /*strict:*/ 0));
+               h->host = sp + 1;
+       }
+       /* else: h->user remains NULL, or as set by original request
+        * before redirect (if we are here after a redirect).
+        */
+}
 
-int wget_main(int argc, char **argv)
+static char *gethdr(FILE *fp)
 {
-       int n, try=5, status;
-       unsigned long opt;
-       int port;
-       char *proxy = 0;
-       char *dir_prefix=NULL;
-       char *s, buf[512];
-       struct stat sbuf;
-       char extra_headers[1024];
-       char *extra_headers_ptr = extra_headers;
-       int extra_headers_left = sizeof(extra_headers);
-       struct host_info server, target;
-       struct sockaddr_in s_in;
-       llist_t *headers_llist = NULL;
+       char *s, *hdrval;
+       int c;
 
-       FILE *sfp = NULL;               /* socket to web/ftp server         */
-       FILE *dfp = NULL;               /* socket to ftp server (data)      */
-       char *fname_out = NULL;         /* where to direct output (-O)      */
-       int do_continue = 0;            /* continue a prev transfer (-c)    */
-       long beg_range = 0L;            /*   range at which continue begins */
-       int got_clen = 0;               /* got content-length: from server  */
-       FILE *output;                   /* socket to web server             */
-       int quiet_flag = FALSE;         /* Be verry, verry quiet...         */
-       int use_proxy = 1;              /* Use proxies if env vars are set  */
-       char *proxy_flag = "on";        /* Use proxies if env vars are set  */
+       /* retrieve header line */
+       c = fgets_and_trim(fp);
 
-       /*
-        * Crack command line.
-        */
-       bb_opt_complementally = "-1:\203::";
-       bb_applet_long_options = wget_long_options;
-       opt = bb_getopt_ulflags(argc, argv, "cq\213O:\203:P:Y:", 
-                                       &fname_out, &headers_llist, 
-                                       &dir_prefix, &proxy_flag);
-       if (opt & WGET_OPT_CONTINUE) {
-               ++do_continue;
-       }
-       if (opt & WGET_OPT_QUIET) {
-               quiet_flag = TRUE;
-       }
-       if (strcmp(proxy_flag, "off") == 0) {
-               /* Use the proxy if necessary. */
-               use_proxy = 0;
+       /* end of the headers? */
+       if (G.wget_buf[0] == '\0')
+               return NULL;
+
+       /* convert the header name to lower case */
+       for (s = G.wget_buf; isalnum(*s) || *s == '-' || *s == '.' || *s == '_'; ++s) {
+               /*
+                * No-op for 20-3f and 60-7f. "0-9a-z-." are in these ranges.
+                * 40-5f range ("@A-Z[\]^_") maps to 60-7f.
+                * "A-Z" maps to "a-z".
+                * "@[\]" can't occur in header names.
+                * "^_" maps to "~,DEL" (which is wrong).
+                * "^" was never seen yet, "_" was seen from web.archive.org
+                * (x-archive-orig-x_commoncrawl_Signature: HEXSTRING).
+                */
+               *s |= 0x20;
        }
-       if (opt & WGET_OPT_HEADER) {
-               while (headers_llist) {
-                       int arglen = strlen(headers_llist->data);
-                       if (extra_headers_left - arglen - 2 <= 0)
-                               bb_error_msg_and_die("extra_headers buffer too small(need %i)", extra_headers_left - arglen);
-                       strcpy(extra_headers_ptr, headers_llist->data);
-                       extra_headers_ptr += arglen;
-                       extra_headers_left -= ( arglen + 2 );
-                       *extra_headers_ptr++ = '\r';
-                       *extra_headers_ptr++ = '\n';
-                       *(extra_headers_ptr + 1) = 0;
-                       headers_llist = headers_llist->link;
-               }
+
+       /* verify we are at the end of the header name */
+       if (*s != ':')
+               bb_error_msg_and_die("bad header line: %s", sanitize_string(G.wget_buf));
+
+       /* locate the start of the header value */
+       *s++ = '\0';
+       hdrval = skip_whitespace(s);
+
+       if (c != '\n') {
+               /* Rats! The buffer isn't big enough to hold the entire header value */
+               while (c = getc(fp), c != EOF && c != '\n')
+                       continue;
        }
-       
-       parse_url(argv[optind], &target);
-       server.host = target.host;
-       server.port = target.port;
+
+       return hdrval;
+}
+
+static void reset_beg_range_to_zero(void)
+{
+       bb_error_msg("restart failed");
+       G.beg_range = 0;
+       xlseek(G.output_fd, 0, SEEK_SET);
+       /* Done at the end instead: */
+       /* ftruncate(G.output_fd, 0); */
+}
+
+static FILE* prepare_ftp_session(FILE **dfpp, struct host_info *target, len_and_sockaddr *lsa)
+{
+       FILE *sfp;
+       char *str;
+       int port;
+
+       if (!target->user)
+               target->user = xstrdup("anonymous:busybox@");
+
+       sfp = open_socket(lsa);
+       if (ftpcmd(NULL, NULL, sfp) != 220)
+               bb_error_msg_and_die("%s", sanitize_string(G.wget_buf + 4));
 
        /*
-        * Use the proxy if necessary.
+        * Splitting username:password pair,
+        * trying to log in
         */
-       if (use_proxy) {
-               proxy = getenv(target.is_ftp ? "ftp_proxy" : "http_proxy");
-               if (proxy && *proxy) {
-                       parse_url(bb_xstrdup(proxy), &server);
-               } else {
-                       use_proxy = 0;
-               }
-       }
-
-       /* Guess an output filename */
-       if (!fname_out) {
-               // Dirty hack. Needed because bb_get_last_path_component
-               // will destroy trailing / by storing '\0' in last byte!
-               if(target.path[strlen(target.path)-1]!='/') {
-                       fname_out =
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-                               curfile =
-#endif
-                               bb_get_last_path_component(target.path);
-               }
-               if (fname_out==NULL || strlen(fname_out)<1) {
-                       fname_out =
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-                               curfile =
-#endif
-                               "index.html";
-               }
-               if (dir_prefix != NULL)
-                       fname_out = concat_path_file(dir_prefix, fname_out);
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-       } else {
-               curfile = bb_get_last_path_component(fname_out);
-#endif
+       str = strchr(target->user, ':');
+       if (str)
+               *str++ = '\0';
+       switch (ftpcmd("USER ", target->user, sfp)) {
+       case 230:
+               break;
+       case 331:
+               if (ftpcmd("PASS ", str, sfp) == 230)
+                       break;
+               /* fall through (failed login) */
+       default:
+               bb_error_msg_and_die("ftp login: %s", sanitize_string(G.wget_buf + 4));
        }
-       if (do_continue && !fname_out)
-               bb_error_msg_and_die("cannot specify continue (-c) without a filename (-O)");
 
+       ftpcmd("TYPE I", NULL, sfp);
 
        /*
-        * Open the output file stream.
+        * Querying file size
         */
-       if (strcmp(fname_out, "-") == 0) {
-               output = stdout;
-               quiet_flag = TRUE;
-       } else {
-               output = bb_xfopen(fname_out, (do_continue ? "a" : "w"));
+       if (ftpcmd("SIZE ", target->path, sfp) == 213) {
+               G.content_len = BB_STRTOOFF(G.wget_buf + 4, NULL, 10);
+               if (G.content_len < 0 || errno) {
+                       bb_error_msg_and_die("SIZE value is garbage");
+               }
+               G.got_clen = 1;
        }
 
        /*
-        * Determine where to start transfer.
+        * Entering passive mode
         */
-       if (do_continue) {
-               if (fstat(fileno(output), &sbuf) < 0)
-                       bb_perror_msg_and_die("fstat()");
-               if (sbuf.st_size > 0)
-                       beg_range = sbuf.st_size;
+       if (ftpcmd("PASV", NULL, sfp) != 227) {
+ pasv_error:
+               bb_error_msg_and_die("bad response to %s: %s", "PASV", sanitize_string(G.wget_buf));
+       }
+       // Response is "227 garbageN1,N2,N3,N4,P1,P2[)garbage]
+       // Server's IP is N1.N2.N3.N4 (we ignore it)
+       // Server's port for data connection is P1*256+P2
+       str = strrchr(G.wget_buf, ')');
+       if (str) str[0] = '\0';
+       str = strrchr(G.wget_buf, ',');
+       if (!str) goto pasv_error;
+       port = xatou_range(str+1, 0, 255);
+       *str = '\0';
+       str = strrchr(G.wget_buf, ',');
+       if (!str) goto pasv_error;
+       port += xatou_range(str+1, 0, 255) * 256;
+       set_nport(&lsa->u.sa, htons(port));
+
+       *dfpp = open_socket(lsa);
+
+       if (G.beg_range != 0) {
+               sprintf(G.wget_buf, "REST %"OFF_FMT"u", G.beg_range);
+               if (ftpcmd(G.wget_buf, NULL, sfp) == 350)
+                       G.content_len -= G.beg_range;
                else
-                       do_continue = 0;
+                       reset_beg_range_to_zero();
        }
 
-       /* We want to do exactly _one_ DNS lookup, since some
-        * sites (i.e. ftp.us.debian.org) use round-robin DNS
-        * and we want to connect to only one IP... */
-       bb_lookup_host(&s_in, server.host);
-       s_in.sin_port = server.port;
-       if (quiet_flag==FALSE) {
-               fprintf(stdout, "Connecting to %s[%s]:%d\n",
-                               server.host, inet_ntoa(s_in.sin_addr), ntohs(server.port));
+       if (ftpcmd("RETR ", target->path, sfp) > 150)
+               bb_error_msg_and_die("bad response to %s: %s", "RETR", sanitize_string(G.wget_buf));
+
+       return sfp;
+}
+
+#if ENABLE_FEATURE_WGET_OPENSSL
+static int spawn_https_helper_openssl(const char *host, unsigned port)
+{
+       char *allocated = NULL;
+       char *servername;
+       int sp[2];
+       int pid;
+       IF_FEATURE_WGET_SSL_HELPER(volatile int child_failed = 0;)
+
+       if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
+               /* Kernel can have AF_UNIX support disabled */
+               bb_perror_msg_and_die("socketpair");
+
+       if (!strchr(host, ':'))
+               host = allocated = xasprintf("%s:%u", host, port);
+       servername = xstrdup(host);
+       strrchr(servername, ':')[0] = '\0';
+
+       fflush_all();
+       pid = xvfork();
+       if (pid == 0) {
+               /* Child */
+               char *argv[8];
+
+               close(sp[0]);
+               xmove_fd(sp[1], 0);
+               xdup2(0, 1);
+               /*
+                * openssl s_client -quiet -connect www.kernel.org:443 2>/dev/null
+                * It prints some debug stuff on stderr, don't know how to suppress it.
+                * Work around by dev-nulling stderr. We lose all error messages :(
+                */
+               xmove_fd(2, 3);
+               xopen("/dev/null", O_RDWR);
+               memset(&argv, 0, sizeof(argv));
+               argv[0] = (char*)"openssl";
+               argv[1] = (char*)"s_client";
+               argv[2] = (char*)"-quiet";
+               argv[3] = (char*)"-connect";
+               argv[4] = (char*)host;
+               /*
+                * Per RFC 6066 Section 3, the only permitted values in the
+                * TLS server_name (SNI) field are FQDNs (DNS hostnames).
+                * IPv4 and IPv6 addresses, port numbers are not allowed.
+                */
+               if (!is_ip_address(servername)) {
+                       argv[5] = (char*)"-servername";
+                       argv[6] = (char*)servername;
+               }
+
+               BB_EXECVP(argv[0], argv);
+               xmove_fd(3, 2);
+# if ENABLE_FEATURE_WGET_SSL_HELPER
+               child_failed = 1;
+               xfunc_die();
+# else
+               bb_perror_msg_and_die("can't execute '%s'", argv[0]);
+# endif
+               /* notreached */
+       }
+
+       /* Parent */
+       free(servername);
+       free(allocated);
+       close(sp[1]);
+# if ENABLE_FEATURE_WGET_SSL_HELPER
+       if (child_failed) {
+               close(sp[0]);
+               return -1;
        }
+# endif
+       return sp[0];
+}
+#endif
 
-       if (use_proxy || !target.is_ftp) {
+/* See networking/ssl_helper/README how to build one */
+#if ENABLE_FEATURE_WGET_SSL_HELPER
+static void spawn_https_helper_small(int network_fd)
+{
+       int sp[2];
+       int pid;
+
+       if (socketpair(AF_UNIX, SOCK_STREAM, 0, sp) != 0)
+               /* Kernel can have AF_UNIX support disabled */
+               bb_perror_msg_and_die("socketpair");
+
+       pid = BB_MMU ? xfork() : xvfork();
+       if (pid == 0) {
+               /* Child */
+               char *argv[3];
+
+               close(sp[0]);
+               xmove_fd(sp[1], 0);
+               xdup2(0, 1);
+               xmove_fd(network_fd, 3);
                /*
-                *  HTTP session
+                * A simple ssl/tls helper
                 */
-               do {
-                       got_clen = chunked = 0;
+               argv[0] = (char*)"ssl_helper";
+               argv[1] = (char*)"-d3";
+               argv[2] = NULL;
+               BB_EXECVP(argv[0], argv);
+               bb_perror_msg_and_die("can't execute '%s'", argv[0]);
+               /* notreached */
+       }
+
+       /* Parent */
+       close(sp[1]);
+       xmove_fd(sp[0], network_fd);
+}
+#endif
 
-                       if (! --try)
-                               close_delete_and_die("too many redirections");
+static void NOINLINE retrieve_file_data(FILE *dfp)
+{
+#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
+# if ENABLE_FEATURE_WGET_TIMEOUT
+       unsigned second_cnt = G.timeout_seconds;
+# endif
+       struct pollfd polldata;
+
+       polldata.fd = fileno(dfp);
+       polldata.events = POLLIN | POLLPRI;
+#endif
+       progress_meter(PROGRESS_START);
 
-                       /*
-                        * Open socket to http server
-                        */
-                       if (sfp) fclose(sfp);
-                       sfp = open_socket(&s_in);
+       if (G.chunked)
+               goto get_clen;
+
+       /* Loops only if chunked */
+       while (1) {
 
-                       /*
-                        * Send HTTP request.
+#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
+               /* Must use nonblocking I/O, otherwise fread will loop
+                * and *block* until it reads full buffer,
+                * which messes up progress bar and/or timeout logic.
+                * Because of nonblocking I/O, we need to dance
+                * very carefully around EAGAIN. See explanation at
+                * clearerr() calls.
+                */
+               ndelay_on(polldata.fd);
+#endif
+               while (1) {
+                       int n;
+                       unsigned rdsz;
+
+#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
+                       /* fread internally uses read loop, which in our case
+                        * is usually exited when we get EAGAIN.
+                        * In this case, libc sets error marker on the stream.
+                        * Need to clear it before next fread to avoid possible
+                        * rare false positive ferror below. Rare because usually
+                        * fread gets more than zero bytes, and we don't fall
+                        * into if (n <= 0) ...
                         */
-                       if (use_proxy) {
-                               const char *format = "GET %stp://%s:%d/%s HTTP/1.1\r\n";
-#ifdef CONFIG_FEATURE_WGET_IP6_LITERAL
-                               if (strchr (target.host, ':'))
-                                       format = "GET %stp://[%s]:%d/%s HTTP/1.1\r\n";
+                       clearerr(dfp);
 #endif
-                               fprintf(sfp, format,
-                                       target.is_ftp ? "f" : "ht", target.host,
-                                       ntohs(target.port), target.path);
-                       } else {
-                               fprintf(sfp, "GET /%s HTTP/1.1\r\n", target.path);
+                       errno = 0;
+                       rdsz = sizeof(G.wget_buf);
+                       if (G.got_clen) {
+                               if (G.content_len < (off_t)sizeof(G.wget_buf)) {
+                                       if ((int)G.content_len <= 0)
+                                               break;
+                                       rdsz = (unsigned)G.content_len;
+                               }
                        }
+                       n = fread(G.wget_buf, 1, rdsz, dfp);
 
-                       fprintf(sfp, "Host: %s\r\nUser-Agent: Wget\r\n", target.host);
-
-#ifdef CONFIG_FEATURE_WGET_AUTHENTICATION
-                       if (target.user) {
-                               fprintf(sfp, "Authorization: Basic %s\r\n",
-                                       base64enc(target.user, buf, sizeof(buf)));
-                       }
-                       if (use_proxy && server.user) {
-                               fprintf(sfp, "Proxy-Authorization: Basic %s\r\n",
-                                       base64enc(server.user, buf, sizeof(buf)));
-                       }
+                       if (n > 0) {
+                               xwrite(G.output_fd, G.wget_buf, n);
+#if ENABLE_FEATURE_WGET_STATUSBAR
+                               G.transferred += n;
 #endif
-
-                       if (do_continue)
-                               fprintf(sfp, "Range: bytes=%ld-\r\n", beg_range);
-                       if(extra_headers_left < sizeof(extra_headers))
-                               fputs(extra_headers,sfp);
-                       fprintf(sfp,"Connection: close\r\n\r\n");
-
-                       /*
-                       * Retrieve HTTP response line and check for "200" status code.
-                       */
-read_response:
-                       if (fgets(buf, sizeof(buf), sfp) == NULL)
-                               close_delete_and_die("no response from server");
-
-                       for (s = buf ; *s != '\0' && !isspace(*s) ; ++s)
-                       ;
-                       for ( ; isspace(*s) ; ++s)
-                       ;
-                       switch (status = atoi(s)) {
-                               case 0:
-                               case 100:
-                                       while (gethdr(buf, sizeof(buf), sfp, &n) != NULL);
-                                       goto read_response;
-                               case 200:
-                                       if (do_continue && output != stdout)
-                                               output = freopen(fname_out, "w", output);
-                                       do_continue = 0;
-                                       break;
-                               case 300:       /* redirection */
-                               case 301:
-                               case 302:
-                               case 303:
-                                       break;
-                               case 206:
-                                       if (do_continue)
+                               if (G.got_clen) {
+                                       G.content_len -= n;
+                                       if (G.content_len == 0)
                                                break;
-                                       /*FALLTHRU*/
-                               default:
-                                       chomp(buf);
-                                       close_delete_and_die("server returned error %d: %s", atoi(s), buf);
+                               }
+#if ENABLE_FEATURE_WGET_TIMEOUT
+                               second_cnt = G.timeout_seconds;
+#endif
+                               goto bump;
                        }
 
-                       /*
-                        * Retrieve HTTP headers.
+                       /* n <= 0.
+                        * man fread:
+                        * If error occurs, or EOF is reached, the return value
+                        * is a short item count (or zero).
+                        * fread does not distinguish between EOF and error.
                         */
-                       while ((s = gethdr(buf, sizeof(buf), sfp, &n)) != NULL) {
-                               if (strcasecmp(buf, "content-length") == 0) {
-                                       unsigned long value;
-                                       if (safe_strtoul(s, &value)) {
-                                               close_delete_and_die("content-length %s is garbage", s);
-                                       }
-                                       filesize = value;
-                                       got_clen = 1;
-                                       continue;
-                               }
-                               if (strcasecmp(buf, "transfer-encoding") == 0) {
-                                       if (strcasecmp(s, "chunked") == 0) {
-                                               chunked = got_clen = 1;
-                                       } else {
-                                       close_delete_and_die("server wants to do %s transfer encoding", s);
-                                       }
+                       if (errno != EAGAIN) {
+                               if (ferror(dfp)) {
+                                       progress_meter(PROGRESS_END);
+                                       bb_perror_msg_and_die(bb_msg_read_error);
                                }
-                               if (strcasecmp(buf, "location") == 0) {
-                                       if (s[0] == '/')
-                                               target.path = bb_xstrdup(s+1);
-                                       else {
-                                               parse_url(bb_xstrdup(s), &target);
-                                               if (use_proxy == 0) {
-                                                       server.host = target.host;
-                                                       server.port = target.port;
-                                               }
-                                               bb_lookup_host(&s_in, server.host);
-                                               s_in.sin_port = server.port;
-                                               break;
-                                       }
+                               break; /* EOF, not error */
+                       }
+
+#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
+                       /* It was EAGAIN. There is no data. Wait up to one second
+                        * then abort if timed out, or update the bar and try reading again.
+                        */
+                       if (safe_poll(&polldata, 1, 1000) == 0) {
+# if ENABLE_FEATURE_WGET_TIMEOUT
+                               if (second_cnt != 0 && --second_cnt == 0) {
+                                       progress_meter(PROGRESS_END);
+                                       bb_error_msg_and_die("download timed out");
                                }
+# endif
+                               /* We used to loop back to poll here,
+                                * but there is no great harm in letting fread
+                                * to try reading anyway.
+                                */
                        }
-               } while(status >= 300);
+#endif
+ bump:
+                       /* Need to do it _every_ second for "stalled" indicator
+                        * to be shown properly.
+                        */
+                       progress_meter(PROGRESS_BUMP);
+               } /* while (reading data) */
 
-               dfp = sfp;
-       }
-       else
-       {
+#if ENABLE_FEATURE_WGET_STATUSBAR || ENABLE_FEATURE_WGET_TIMEOUT
+               clearerr(dfp);
+               ndelay_off(polldata.fd); /* else fgets can get very unhappy */
+#endif
+               if (!G.chunked)
+                       break;
+
+               fgets_and_trim(dfp); /* Eat empty line */
+ get_clen:
+               fgets_and_trim(dfp);
+               G.content_len = STRTOOFF(G.wget_buf, NULL, 16);
+               /* FIXME: error check? */
+               if (G.content_len == 0)
+                       break; /* all done! */
+               G.got_clen = 1;
                /*
-                *  FTP session
+                * Note that fgets may result in some data being buffered in dfp.
+                * We loop back to fread, which will retrieve this data.
+                * Also note that code has to be arranged so that fread
+                * is done _before_ one-second poll wait - poll doesn't know
+                * about stdio buffering and can result in spurious one second waits!
                 */
-               if (! target.user)
-                       target.user = bb_xstrdup("anonymous:busybox@");
+       }
 
-               sfp = open_socket(&s_in);
-               if (ftpcmd(NULL, NULL, sfp, buf) != 220)
-                       close_delete_and_die("%s", buf+4);
+       /* If -c failed, we restart from the beginning,
+        * but we do not truncate file then, we do it only now, at the end.
+        * This lets user to ^C if his 99% complete 10 GB file download
+        * failed to restart *without* losing the almost complete file.
+        */
+       {
+               off_t pos = lseek(G.output_fd, 0, SEEK_CUR);
+               if (pos != (off_t)-1)
+                       ftruncate(G.output_fd, pos);
+       }
 
-               /*
-                * Splitting username:password pair,
-                * trying to log in
-                */
-               s = strchr(target.user, ':');
-               if (s)
-                       *(s++) = '\0';
-               switch(ftpcmd("USER ", target.user, sfp, buf)) {
-                       case 230:
-                               break;
-                       case 331:
-                               if (ftpcmd("PASS ", s, sfp, buf) == 230)
-                                       break;
-                               /* FALLTHRU (failed login) */
-                       default:
-                               close_delete_and_die("ftp login: %s", buf+4);
+       /* Draw full bar and free its resources */
+       G.chunked = 0;  /* makes it show 100% even for chunked download */
+       G.got_clen = 1; /* makes it show 100% even for download of (formerly) unknown size */
+       progress_meter(PROGRESS_END);
+}
+
+static void download_one_url(const char *url)
+{
+       bool use_proxy;                 /* Use proxies if env vars are set  */
+       int redir_limit;
+       len_and_sockaddr *lsa;
+       FILE *sfp;                      /* socket to web/ftp server         */
+       FILE *dfp;                      /* socket to ftp server (data)      */
+       char *proxy = NULL;
+       char *fname_out_alloc;
+       char *redirected_path = NULL;
+       struct host_info server;
+       struct host_info target;
+
+       server.allocated = NULL;
+       target.allocated = NULL;
+       server.user = NULL;
+       target.user = NULL;
+
+       parse_url(url, &target);
+
+       /* Use the proxy if necessary */
+       use_proxy = (strcmp(G.proxy_flag, "off") != 0);
+       if (use_proxy) {
+               proxy = getenv(target.protocol == P_FTP ? "ftp_proxy" : "http_proxy");
+//FIXME: what if protocol is https? Ok to use http_proxy?
+               use_proxy = (proxy && proxy[0]);
+               if (use_proxy)
+                       parse_url(proxy, &server);
+       }
+       if (!use_proxy) {
+               server.port = target.port;
+               if (ENABLE_FEATURE_IPV6) {
+                       //free(server.allocated); - can't be non-NULL
+                       server.host = server.allocated = xstrdup(target.host);
+               } else {
+                       server.host = target.host;
                }
+       }
 
-               ftpcmd("CDUP", NULL, sfp, buf);
-               ftpcmd("TYPE I", NULL, sfp, buf);
+       if (ENABLE_FEATURE_IPV6)
+               strip_ipv6_scope_id(target.host);
+
+       /* If there was no -O FILE, guess output filename */
+       fname_out_alloc = NULL;
+       if (!(option_mask32 & WGET_OPT_OUTNAME)) {
+               G.fname_out = bb_get_last_path_component_nostrip(target.path);
+               /* handle "wget http://kernel.org//" */
+               if (G.fname_out[0] == '/' || !G.fname_out[0])
+                       G.fname_out = (char*)"index.html";
+               /* -P DIR is considered only if there was no -O FILE */
+               if (G.dir_prefix)
+                       G.fname_out = fname_out_alloc = concat_path_file(G.dir_prefix, G.fname_out);
+               else {
+                       /* redirects may free target.path later, need to make a copy */
+                       G.fname_out = fname_out_alloc = xstrdup(G.fname_out);
+               }
+       }
+#if ENABLE_FEATURE_WGET_STATUSBAR
+       G.curfile = bb_get_last_path_component_nostrip(G.fname_out);
+#endif
 
+       /* Determine where to start transfer */
+       G.beg_range = 0;
+       if (option_mask32 & WGET_OPT_CONTINUE) {
+               G.output_fd = open(G.fname_out, O_WRONLY);
+               if (G.output_fd >= 0) {
+                       G.beg_range = xlseek(G.output_fd, 0, SEEK_END);
+               }
+               /* File doesn't exist. We do not create file here yet.
+                * We are not sure it exists on remote side */
+       }
+
+       redir_limit = 5;
+ resolve_lsa:
+       lsa = xhost2sockaddr(server.host, server.port);
+       if (!(option_mask32 & WGET_OPT_QUIET)) {
+               char *s = xmalloc_sockaddr2dotted(&lsa->u.sa);
+               fprintf(stderr, "Connecting to %s (%s)\n", server.host, s);
+               free(s);
+       }
+ establish_session:
+       /*G.content_len = 0; - redundant, got_clen = 0 is enough */
+       G.got_clen = 0;
+       G.chunked = 0;
+       if (use_proxy || target.protocol != P_FTP) {
                /*
-                * Querying file size
+                *  HTTP session
                 */
-               if (ftpcmd("SIZE /", target.path, sfp, buf) == 213) {
-                       unsigned long value;
-                       if (safe_strtoul(buf+4, &value)) {
-                               close_delete_and_die("SIZE value is garbage");
+               char *str;
+               int status;
+
+               /* Open socket to http(s) server */
+#if ENABLE_FEATURE_WGET_OPENSSL
+               /* openssl (and maybe ssl_helper) support is configured */
+               if (target.protocol == P_HTTPS) {
+                       /* openssl-based helper
+                        * Inconvenient API since we can't give it an open fd
+                        */
+                       int fd = spawn_https_helper_openssl(server.host, server.port);
+# if ENABLE_FEATURE_WGET_SSL_HELPER
+                       if (fd < 0) { /* no openssl? try ssl_helper */
+                               sfp = open_socket(lsa);
+                               spawn_https_helper_small(fileno(sfp));
+                               goto socket_opened;
                        }
-                       filesize = value;
-                       got_clen = 1;
+# else
+                       /* We don't check for exec("openssl") failure in this case */
+# endif
+                       sfp = fdopen(fd, "r+");
+                       if (!sfp)
+                               bb_perror_msg_and_die(bb_msg_memory_exhausted);
+                       goto socket_opened;
+               }
+               sfp = open_socket(lsa);
+ socket_opened:
+#elif ENABLE_FEATURE_WGET_SSL_HELPER
+               /* Only ssl_helper support is configured */
+               sfp = open_socket(lsa);
+               if (target.protocol == P_HTTPS)
+                       spawn_https_helper_small(fileno(sfp));
+#else
+               /* ssl (https) support is not configured */
+               sfp = open_socket(lsa);
+#endif
+               /* Send HTTP request */
+               if (use_proxy) {
+                       SENDFMT(sfp, "GET %s://%s/%s HTTP/1.1\r\n",
+                               target.protocol, target.host,
+                               target.path);
+               } else {
+                       SENDFMT(sfp, "%s /%s HTTP/1.1\r\n",
+                               (option_mask32 & WGET_OPT_POST_DATA) ? "POST" : "GET",
+                               target.path);
                }
+               if (!USR_HEADER_HOST)
+                       SENDFMT(sfp, "Host: %s\r\n", target.host);
+               if (!USR_HEADER_USER_AGENT)
+                       SENDFMT(sfp, "User-Agent: %s\r\n", G.user_agent);
 
-               /*
-                * Entering passive mode
+               /* Ask server to close the connection as soon as we are done
+                * (IOW: we do not intend to send more requests)
                 */
-               if (ftpcmd("PASV", NULL, sfp, buf) !=  227)
-                       close_delete_and_die("PASV: %s", buf+4);
-               s = strrchr(buf, ',');
-               *s = 0;
-               port = atoi(s+1);
-               s = strrchr(buf, ',');
-               port += atoi(s+1) * 256;
-               s_in.sin_port = htons(port);
-               dfp = open_socket(&s_in);
-
-               if (do_continue) {
-                       sprintf(buf, "REST %ld", beg_range);
-                       if (ftpcmd(buf, NULL, sfp, buf) != 350) {
-                               if (output != stdout)
-                                       output = freopen(fname_out, "w", output);
-                               do_continue = 0;
-                       } else
-                               filesize -= beg_range;
-               }
+               SENDFMT(sfp, "Connection: close\r\n");
 
-               if (ftpcmd("RETR /", target.path, sfp, buf) > 150)
-                       close_delete_and_die("RETR: %s", buf+4);
+#if ENABLE_FEATURE_WGET_AUTHENTICATION
+               if (target.user && !USR_HEADER_AUTH) {
+                       SENDFMT(sfp, "Proxy-Authorization: Basic %s\r\n"+6,
+                               base64enc(target.user));
+               }
+               if (use_proxy && server.user && !USR_HEADER_PROXY_AUTH) {
+                       SENDFMT(sfp, "Proxy-Authorization: Basic %s\r\n",
+                               base64enc(server.user));
+               }
+#endif
 
-       }
+               if (G.beg_range != 0 && !USR_HEADER_RANGE)
+                       SENDFMT(sfp, "Range: bytes=%"OFF_FMT"u-\r\n", G.beg_range);
 
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+               if (G.extra_headers) {
+                       log_io(G.extra_headers);
+                       fputs(G.extra_headers, sfp);
+               }
 
-       /*
-        * Retrieve file
-        */
-       if (chunked) {
-               fgets(buf, sizeof(buf), dfp);
-               filesize = strtol(buf, (char **) NULL, 16);
-       }
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-       if (quiet_flag==FALSE)
-               progressmeter(-1);
+               if (option_mask32 & WGET_OPT_POST_DATA) {
+                       SENDFMT(sfp,
+                               "Content-Type: application/x-www-form-urlencoded\r\n"
+                               "Content-Length: %u\r\n"
+                               "\r\n"
+                               "%s",
+                               (int) strlen(G.post_data), G.post_data
+                       );
+               } else
 #endif
-       do {
-               while ((filesize > 0 || !got_clen) && (n = safe_fread(buf, 1, ((chunked || got_clen) && (filesize < sizeof(buf)) ? filesize : sizeof(buf)), dfp)) > 0) {
-                       if (safe_fwrite(buf, 1, n, output) != n) {
-                               bb_perror_msg_and_die("write error");
-                       }
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-                       statbytes+=n;
-#endif
-                       if (got_clen) {
-                               filesize -= n;
-                       }
+               {
+                       SENDFMT(sfp, "\r\n");
                }
 
-               if (chunked) {
-                       safe_fgets(buf, sizeof(buf), dfp); /* This is a newline */
-                       safe_fgets(buf, sizeof(buf), dfp);
-                       filesize = strtol(buf, (char **) NULL, 16);
-                       if (filesize==0) {
-                               chunked = 0; /* all done! */
+               fflush(sfp);
+               /* If we use SSL helper, keeping our end of the socket open for writing
+                * makes our end (i.e. the same fd!) readable (EAGAIN instead of EOF)
+                * even after child closes its copy of the fd.
+                * This helps:
+                */
+               shutdown(fileno(sfp), SHUT_WR);
+
+               /*
+                * Retrieve HTTP response line and check for "200" status code.
+                */
+ read_response:
+               fgets_and_trim(sfp);
+
+               str = G.wget_buf;
+               str = skip_non_whitespace(str);
+               str = skip_whitespace(str);
+               // FIXME: no error check
+               // xatou wouldn't work: "200 OK"
+               status = atoi(str);
+               switch (status) {
+               case 0:
+               case 100:
+                       while (gethdr(sfp) != NULL)
+                               /* eat all remaining headers */;
+                       goto read_response;
+
+               /* Success responses */
+               case 200:
+                       /* fall through */
+               case 201: /* 201 Created */
+/* "The request has been fulfilled and resulted in a new resource being created" */
+                       /* Standard wget is reported to treat this as success */
+                       /* fall through */
+               case 202: /* 202 Accepted */
+/* "The request has been accepted for processing, but the processing has not been completed" */
+                       /* Treat as success: fall through */
+               case 203: /* 203 Non-Authoritative Information */
+/* "Use of this response code is not required and is only appropriate when the response would otherwise be 200 (OK)" */
+                       /* fall through */
+               case 204: /* 204 No Content */
+/*
+Response 204 doesn't say "null file", it says "metadata
+has changed but data didn't":
+
+"10.2.5 204 No Content
+The server has fulfilled the request but does not need to return
+an entity-body, and might want to return updated metainformation.
+The response MAY include new or updated metainformation in the form
+of entity-headers, which if present SHOULD be associated with
+the requested variant.
+
+If the client is a user agent, it SHOULD NOT change its document
+view from that which caused the request to be sent. This response
+is primarily intended to allow input for actions to take place
+without causing a change to the user agent's active document view,
+although any new or updated metainformation SHOULD be applied
+to the document currently in the user agent's active view.
+
+The 204 response MUST NOT include a message-body, and thus
+is always terminated by the first empty line after the header fields."
+
+However, in real world it was observed that some web servers
+(e.g. Boa/0.94.14rc21) simply use code 204 when file size is zero.
+*/
+                       if (G.beg_range != 0) {
+                               /* "Range:..." was not honored by the server.
+                                * Restart download from the beginning.
+                                */
+                               reset_beg_range_to_zero();
                        }
+                       break;
+               /* 205 Reset Content ?? what to do on this ??   */
+
+               case 300:  /* redirection */
+               case 301:
+               case 302:
+               case 303:
+                       break;
+
+               case 206: /* Partial Content */
+                       if (G.beg_range != 0)
+                               /* "Range:..." worked. Good. */
+                               break;
+                       /* Partial Content even though we did not ask for it??? */
+                       /* fall through */
+               default:
+                       bb_error_msg_and_die("server returned error: %s", sanitize_string(G.wget_buf));
                }
 
-               if (n == 0 && ferror(dfp)) {
-                       bb_perror_msg_and_die("network read error");
+               /*
+                * Retrieve HTTP headers.
+                */
+               while ((str = gethdr(sfp)) != NULL) {
+                       static const char keywords[] ALIGN1 =
+                               "content-length\0""transfer-encoding\0""location\0";
+                       enum {
+                               KEY_content_length = 1, KEY_transfer_encoding, KEY_location
+                       };
+                       smalluint key;
+
+                       /* gethdr converted "FOO:" string to lowercase */
+
+                       /* strip trailing whitespace */
+                       char *s = strchrnul(str, '\0') - 1;
+                       while (s >= str && (*s == ' ' || *s == '\t')) {
+                               *s = '\0';
+                               s--;
+                       }
+                       key = index_in_strings(keywords, G.wget_buf) + 1;
+                       if (key == KEY_content_length) {
+                               G.content_len = BB_STRTOOFF(str, NULL, 10);
+                               if (G.content_len < 0 || errno) {
+                                       bb_error_msg_and_die("content-length %s is garbage", sanitize_string(str));
+                               }
+                               G.got_clen = 1;
+                               continue;
+                       }
+                       if (key == KEY_transfer_encoding) {
+                               if (strcmp(str_tolower(str), "chunked") != 0)
+                                       bb_error_msg_and_die("transfer encoding '%s' is not supported", sanitize_string(str));
+                               G.chunked = 1;
+                       }
+                       if (key == KEY_location && status >= 300) {
+                               if (--redir_limit == 0)
+                                       bb_error_msg_and_die("too many redirections");
+                               fclose(sfp);
+                               if (str[0] == '/') {
+                                       free(redirected_path);
+                                       target.path = redirected_path = xstrdup(str+1);
+                                       /* lsa stays the same: it's on the same server */
+                               } else {
+                                       parse_url(str, &target);
+                                       if (!use_proxy) {
+                                               /* server.user remains untouched */
+                                               free(server.allocated);
+                                               server.allocated = NULL;
+                                               server.host = target.host;
+                                               /* strip_ipv6_scope_id(target.host); - no! */
+                                               /* we assume remote never gives us IPv6 addr with scope id */
+                                               server.port = target.port;
+                                               free(lsa);
+                                               goto resolve_lsa;
+                                       } /* else: lsa stays the same: we use proxy */
+                               }
+                               goto establish_session;
+                       }
                }
-       } while (chunked);
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-       if (quiet_flag==FALSE)
-               progressmeter(1);
-#endif
-       if ((use_proxy == 0) && target.is_ftp) {
-               fclose(dfp);
-               if (ftpcmd(NULL, NULL, sfp, buf) != 226)
-                       bb_error_msg_and_die("ftp error: %s", buf+4);
-               ftpcmd("QUIT", NULL, sfp, buf);
-       }
-       exit(EXIT_SUCCESS);
-}
+//             if (status >= 300)
+//                     bb_error_msg_and_die("bad redirection (no Location: header from server)");
 
+               /* For HTTP, data is pumped over the same connection */
+               dfp = sfp;
+       } else {
+               /*
+                *  FTP session
+                */
+               sfp = prepare_ftp_session(&dfp, &target, lsa);
+       }
 
-void parse_url(char *url, struct host_info *h)
-{
-       char *cp, *sp, *up, *pp;
-
-       if (strncmp(url, "http://", 7) == 0) {
-               h->port = bb_lookup_port("http", "tcp", 80);
-               h->host = url + 7;
-               h->is_ftp = 0;
-       } else if (strncmp(url, "ftp://", 6) == 0) {
-               h->port = bb_lookup_port("ftp", "tfp", 21);
-               h->host = url + 6;
-               h->is_ftp = 1;
-       } else
-               bb_error_msg_and_die("not an http or ftp url: %s", url);
+       free(lsa);
 
-       sp = strchr(h->host, '/');
-       if (sp) {
-               *sp++ = '\0';
-               h->path = sp;
-       } else
-               h->path = bb_xstrdup("");
-
-       up = strrchr(h->host, '@');
-       if (up != NULL) {
-               h->user = h->host;
-               *up++ = '\0';
-               h->host = up;
-       } else
-               h->user = NULL;
-
-       pp = h->host;
-
-#ifdef CONFIG_FEATURE_WGET_IP6_LITERAL
-       if (h->host[0] == '[') {
-               char *ep;
-
-               ep = h->host + 1;
-               while (*ep == ':' || isxdigit (*ep))
-                       ep++;
-               if (*ep == ']') {
-                       h->host++;
-                       *ep = '\0';
-                       pp = ep + 1;
+       if (!(option_mask32 & WGET_OPT_SPIDER)) {
+               if (G.output_fd < 0)
+                       G.output_fd = xopen(G.fname_out, G.o_flags);
+               retrieve_file_data(dfp);
+               if (!(option_mask32 & WGET_OPT_OUTNAME)) {
+                       xclose(G.output_fd);
+                       G.output_fd = -1;
                }
        }
-#endif
 
-       cp = strchr(pp, ':');
-       if (cp != NULL) {
-               *cp++ = '\0';
-               h->port = htons(atoi(cp));
+       if (dfp != sfp) {
+               /* It's ftp. Close data connection properly */
+               fclose(dfp);
+               if (ftpcmd(NULL, NULL, sfp) != 226)
+                       bb_error_msg_and_die("ftp error: %s", sanitize_string(G.wget_buf + 4));
+               /* ftpcmd("QUIT", NULL, sfp); - why bother? */
        }
+       fclose(sfp);
+
+       free(server.allocated);
+       free(target.allocated);
+       free(server.user);
+       free(target.user);
+       free(fname_out_alloc);
+       free(redirected_path);
 }
 
-
-FILE *open_socket(struct sockaddr_in *s_in)
+int wget_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
+int wget_main(int argc UNUSED_PARAM, char **argv)
 {
-       FILE *fp;
-
-       fp = fdopen(xconnect(s_in), "r+");
-       if (fp == NULL)
-               bb_perror_msg_and_die("fdopen()");
-
-       return fp;
-}
-
-
-char *gethdr(char *buf, size_t bufsiz, FILE *fp, int *istrunc)
-{
-       char *s, *hdrval;
-       int c;
-
-       *istrunc = 0;
-
-       /* retrieve header line */
-       if (fgets(buf, bufsiz, fp) == NULL)
-               return NULL;
-
-       /* see if we are at the end of the headers */
-       for (s = buf ; *s == '\r' ; ++s)
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+       static const char wget_longopts[] ALIGN1 =
+               /* name, has_arg, val */
+               "continue\0"         No_argument       "c"
+               "quiet\0"            No_argument       "q"
+               "output-document\0"  Required_argument "O"
+               "directory-prefix\0" Required_argument "P"
+               "proxy\0"            Required_argument "Y"
+               "user-agent\0"       Required_argument "U"
+IF_FEATURE_WGET_TIMEOUT(
+               "timeout\0"          Required_argument "T")
+               /* Ignored: */
+IF_DESKTOP(    "tries\0"            Required_argument "t")
+               "header\0"           Required_argument "\xff"
+               "post-data\0"        Required_argument "\xfe"
+               "spider\0"           No_argument       "\xfd"
+               /* Ignored (we always use PASV): */
+IF_DESKTOP(    "passive-ftp\0"      No_argument       "\xf0")
+               /* Ignored (we don't do ssl) */
+IF_DESKTOP(    "no-check-certificate\0" No_argument   "\xf0")
+               /* Ignored (we don't support caching) */
+IF_DESKTOP(    "no-cache\0"         No_argument       "\xf0")
+IF_DESKTOP(    "no-verbose\0"       No_argument       "\xf0")
+IF_DESKTOP(    "no-clobber\0"       No_argument       "\xf0")
+IF_DESKTOP(    "no-host-directories\0" No_argument    "\xf0")
+IF_DESKTOP(    "no-parent\0"        No_argument       "\xf0")
                ;
-       if (s[0] == '\n')
-               return NULL;
-
-       /* convert the header name to lower case */
-       for (s = buf ; isalnum(*s) || *s == '-' ; ++s)
-               *s = tolower(*s);
-
-       /* verify we are at the end of the header name */
-       if (*s != ':')
-               bb_error_msg_and_die("bad header line: %s", buf);
-
-       /* locate the start of the header value */
-       for (*s++ = '\0' ; *s == ' ' || *s == '\t' ; ++s)
-               ;
-       hdrval = s;
-
-       /* locate the end of header */
-       while (*s != '\0' && *s != '\r' && *s != '\n')
-               ++s;
-
-       /* end of header found */
-       if (*s != '\0') {
-               *s = '\0';
-               return hdrval;
-       }
+#endif
 
-       /* Rats!  The buffer isn't big enough to hold the entire header value. */
-       while (c = getc(fp), c != EOF && c != '\n')
-               ;
-       *istrunc = 1;
-       return hdrval;
-}
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+       llist_t *headers_llist = NULL;
+#endif
 
-static int ftpcmd(char *s1, char *s2, FILE *fp, char *buf)
-{
-       if (s1) {
-               if (!s2) s2="";
-               fprintf(fp, "%s%s\r\n", s1, s2);
-               fflush(fp);
-       }
+       INIT_G();
 
-       do {
-               char *buf_ptr;
+#if ENABLE_FEATURE_WGET_TIMEOUT
+       G.timeout_seconds = 900;
+       signal(SIGALRM, alarm_handler);
+#endif
+       G.proxy_flag = "on";   /* use proxies if env vars are set */
+       G.user_agent = "Wget"; /* "User-Agent" header field */
 
-               if (fgets(buf, 510, fp) == NULL) {
-                       bb_perror_msg_and_die("fgets()");
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+       applet_long_options = wget_longopts;
+#endif
+       opt_complementary = "-1" /* at least one URL */
+               IF_FEATURE_WGET_LONG_OPTIONS(":\xff::"); /* --header is a list */
+       getopt32(argv, "cqO:P:Y:U:T:+"
+               /*ignored:*/ "t:"
+               /*ignored:*/ "n::"
+               /* wget has exactly four -n<letter> opts, all of which we can ignore:
+                * -nv --no-verbose: be moderately quiet (-q is full quiet)
+                * -nc --no-clobber: abort if exists, neither download to FILE.n nor overwrite FILE
+                * -nH --no-host-directories: wget -r http://host/ won't create host/
+                * -np --no-parent
+                * "n::" above says that we accept -n[ARG].
+                * Specifying "n:" would be a bug: "-n ARG" would eat ARG!
+                */
+               , &G.fname_out, &G.dir_prefix,
+               &G.proxy_flag, &G.user_agent,
+               IF_FEATURE_WGET_TIMEOUT(&G.timeout_seconds) IF_NOT_FEATURE_WGET_TIMEOUT(NULL),
+               NULL, /* -t RETRIES */
+               NULL  /* -n[ARG] */
+               IF_FEATURE_WGET_LONG_OPTIONS(, &headers_llist)
+               IF_FEATURE_WGET_LONG_OPTIONS(, &G.post_data)
+       );
+#if 0 /* option bits debug */
+       if (option_mask32 & WGET_OPT_RETRIES) bb_error_msg("-t NUM");
+       if (option_mask32 & WGET_OPT_nsomething) bb_error_msg("-nsomething");
+       if (option_mask32 & WGET_OPT_HEADER) bb_error_msg("--header");
+       if (option_mask32 & WGET_OPT_POST_DATA) bb_error_msg("--post-data");
+       if (option_mask32 & WGET_OPT_SPIDER) bb_error_msg("--spider");
+       exit(0);
+#endif
+       argv += optind;
+
+#if ENABLE_FEATURE_WGET_LONG_OPTIONS
+       if (headers_llist) {
+               int size = 0;
+               char *hdr;
+               llist_t *ll = headers_llist;
+               while (ll) {
+                       size += strlen(ll->data) + 2;
+                       ll = ll->link;
                }
-               buf_ptr = strstr(buf, "\r\n");
-               if (buf_ptr) {
-                       *buf_ptr = '\0';
+               G.extra_headers = hdr = xmalloc(size + 1);
+               while (headers_llist) {
+                       int bit;
+                       const char *words;
+
+                       size = sprintf(hdr, "%s\r\n",
+                                       (char*)llist_pop(&headers_llist));
+                       /* a bit like index_in_substrings but don't match full key */
+                       bit = 1;
+                       words = wget_user_headers;
+                       while (*words) {
+                               if (strstr(hdr, words) == hdr) {
+                                       G.user_headers |= bit;
+                                       break;
+                               }
+                               bit <<= 1;
+                               words += strlen(words) + 1;
+                       }
+                       hdr += size;
                }
-       } while (! isdigit(buf[0]) || buf[3] != ' ');
-
-       return atoi(buf);
-}
-
-#ifdef CONFIG_FEATURE_WGET_STATUSBAR
-/* Stuff below is from BSD rcp util.c, as added to openshh.
- * Original copyright notice is retained at the end of this file.
- *
- */
-
-
-static int
-getttywidth(void)
-{
-       int width=0;
-       get_terminal_width_height(0, &width, NULL);
-       return (width);
-}
-
-static void
-updateprogressmeter(int ignore)
-{
-       int save_errno = errno;
-
-       progressmeter(0);
-       errno = save_errno;
-}
-
-static void
-alarmtimer(int wait)
-{
-       struct itimerval itv;
-
-       itv.it_value.tv_sec = wait;
-       itv.it_value.tv_usec = 0;
-       itv.it_interval = itv.it_value;
-       setitimer(ITIMER_REAL, &itv, NULL);
-}
-
-
-static void
-progressmeter(int flag)
-{
-       static const char prefixes[] = " KMGTP";
-       static struct timeval lastupdate;
-       static off_t lastsize, totalsize;
-       struct timeval now, td, wait;
-       off_t cursize, abbrevsize;
-       double elapsed;
-       int ratio, barlength, i, remaining;
-       char buf[256];
-
-       if (flag == -1) {
-               (void) gettimeofday(&start, (struct timezone *) 0);
-               lastupdate = start;
-               lastsize = 0;
-               totalsize = filesize; /* as filesize changes.. */
        }
+#endif
 
-       (void) gettimeofday(&now, (struct timezone *) 0);
-       cursize = statbytes;
-       if (totalsize != 0 && !chunked) {
-               ratio = 100.0 * cursize / totalsize;
-               ratio = MAX(ratio, 0);
-               ratio = MIN(ratio, 100);
-       } else
-               ratio = 100;
-
-       snprintf(buf, sizeof(buf), "\r%-20.20s %3d%% ", curfile, ratio);
-
-       barlength = getttywidth() - 51;
-       if (barlength > 0) {
-               i = barlength * ratio / 100;
-               snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                        "|%.*s%*s|", i,
-                        "*****************************************************************************"
-                        "*****************************************************************************",
-                        barlength - i, "");
-       }
-       i = 0;
-       abbrevsize = cursize;
-       while (abbrevsize >= 100000 && i < sizeof(prefixes)) {
-               i++;
-               abbrevsize >>= 10;
-       }
-       snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf), " %5d %c%c ",
-            (int) abbrevsize, prefixes[i], prefixes[i] == ' ' ? ' ' :
-                'B');
-
-       timersub(&now, &lastupdate, &wait);
-       if (cursize > lastsize) {
-               lastupdate = now;
-               lastsize = cursize;
-               if (wait.tv_sec >= STALLTIME) {
-                       start.tv_sec += wait.tv_sec;
-                       start.tv_usec += wait.tv_usec;
+       G.output_fd = -1;
+       G.o_flags = O_WRONLY | O_CREAT | O_TRUNC | O_EXCL;
+       if (G.fname_out) { /* -O FILE ? */
+               if (LONE_DASH(G.fname_out)) { /* -O - ? */
+                       G.output_fd = 1;
+                       option_mask32 &= ~WGET_OPT_CONTINUE;
                }
-               wait.tv_sec = 0;
-       }
-       timersub(&now, &start, &td);
-       elapsed = td.tv_sec + (td.tv_usec / 1000000.0);
-
-       if (wait.tv_sec >= STALLTIME) {
-               snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                        " - stalled -");
-       } else if (statbytes <= 0 || elapsed <= 0.0 || cursize > totalsize || chunked) {
-               snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                        "   --:-- ETA");
-       } else {
-               remaining = (int) (totalsize / (statbytes / elapsed) - elapsed);
-               i = remaining / 3600;
-               if (i)
-                       snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                                "%2d:", i);
-               else
-                       snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                                "   ");
-               i = remaining % 3600;
-               snprintf(buf + strlen(buf), sizeof(buf) - strlen(buf),
-                        "%02d:%02d ETA", i / 60, i % 60);
-       }
-       write(STDERR_FILENO, buf, strlen(buf));
-
-       if (flag == -1) {
-               struct sigaction sa;
-               sa.sa_handler = updateprogressmeter;
-               sigemptyset(&sa.sa_mask);
-               sa.sa_flags = SA_RESTART;
-               sigaction(SIGALRM, &sa, NULL);
-               alarmtimer(1);
-       } else if (flag == 1) {
-               alarmtimer(0);
-               statbytes = 0;
-               putc('\n', stderr);
+               /* compat with wget: -O FILE can overwrite */
+               G.o_flags = O_WRONLY | O_CREAT | O_TRUNC;
        }
-}
-#endif
-
-/* Original copyright notice which applies to the CONFIG_FEATURE_WGET_STATUSBAR stuff,
- * much of which was blatantly stolen from openssh.  */
 
-/*-
- * Copyright (c) 1992, 1993
- *     The Regents of the University of California.  All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- * 1. Redistributions of source code must retain the above copyright
- *    notice, this list of conditions and the following disclaimer.
- * 2. Redistributions in binary form must reproduce the above copyright
- *    notice, this list of conditions and the following disclaimer in the
- *    documentation and/or other materials provided with the distribution.
- *
- * 3. <BSD Advertising Clause omitted per the July 22, 1999 licensing change
- *             ftp://ftp.cs.berkeley.edu/pub/4bsd/README.Impt.License.Change>
- *
- * 4. Neither the name of the University nor the names of its contributors
- *    may be used to endorse or promote products derived from this software
- *    without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- *
- *     $Id: wget.c,v 1.75 2004/10/08 08:27:40 andersen Exp $
- */
+       while (*argv)
+               download_one_url(*argv++);
 
+       if (G.output_fd >= 0)
+               xclose(G.output_fd);
 
+#if ENABLE_FEATURE_CLEAN_UP && ENABLE_FEATURE_WGET_LONG_OPTIONS
+       free(G.extra_headers);
+#endif
+       FINI_G();
 
-/*
-Local Variables:
-c-file-style: "linux"
-c-basic-offset: 4
-tab-width: 4
-End:
-*/
+       return EXIT_SUCCESS;
+}