| /***************************************************************************** |
| * _ _ ____ _ |
| * Project ___| | | | _ \| | |
| * / __| | | | |_) | | |
| * | (__| |_| | _ <| |___ |
| * \___|\___/|_| \_\_____| |
| * |
| * The contents of this file are subject to the Mozilla Public License |
| * Version 1.0 (the "License"); you may not use this file except in |
| * compliance with the License. You may obtain a copy of the License at |
| * http://www.mozilla.org/MPL/ |
| * |
| * Software distributed under the License is distributed on an "AS IS" |
| * basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the |
| * License for the specific language governing rights and limitations |
| * under the License. |
| * |
| * The Original Code is Curl. |
| * |
| * The Initial Developer of the Original Code is Daniel Stenberg. |
| * |
| * Portions created by the Initial Developer are Copyright (C) 1998. |
| * All Rights Reserved. |
| * |
| * ------------------------------------------------------------ |
| * Main author: |
| * - Daniel Stenberg <Daniel.Stenberg@haxx.nu> |
| * |
| * http://curl.haxx.nu |
| * |
| * $Source$ |
| * $Revision$ |
| * $Date$ |
| * $Author$ |
| * $State$ |
| * $Locker$ |
| * |
| * ------------------------------------------------------------ |
| ****************************************************************************/ |
| |
| /* -- WIN32 approved -- */ |
| #include <stdio.h> |
| #include <string.h> |
| #include <stdarg.h> |
| #include <stdlib.h> |
| #include <ctype.h> |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| |
| #include <errno.h> |
| |
| #include "setup.h" |
| |
| #if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__) |
| #include <winsock.h> |
| #include <time.h> |
| #include <io.h> |
| #else |
| #ifdef HAVE_SYS_SOCKET_H |
| #include <sys/socket.h> |
| #endif |
| #include <netinet/in.h> |
| #include <sys/time.h> |
| #include <sys/resource.h> |
| #ifdef HAVE_UNISTD_H |
| #include <unistd.h> |
| #endif |
| #include <netdb.h> |
| #ifdef HAVE_ARPA_INET_H |
| #include <arpa/inet.h> |
| #endif |
| #ifdef HAVE_NET_IF_H |
| #include <net/if.h> |
| #endif |
| #include <sys/ioctl.h> |
| #include <signal.h> |
| |
| #ifdef HAVE_SYS_PARAM_H |
| #include <sys/param.h> |
| #endif |
| |
| #ifdef HAVE_SYS_SELECT_H |
| #include <sys/select.h> |
| #endif |
| |
| |
| #endif |
| |
| #include "urldata.h" |
| #include <curl/curl.h> |
| #include "download.h" |
| #include "sendf.h" |
| #include "formdata.h" |
| #include "progress.h" |
| #include "base64.h" |
| #include "cookie.h" |
| #include "strequal.h" |
| #include "url.h" |
| #include "ssluse.h" |
| |
| #define _MPRINTF_REPLACE /* use our functions only */ |
| #include <curl/mprintf.h> |
| |
| /* |
| * This function checks the linked list of custom HTTP headers for a particular |
| * header (prefix). |
| */ |
| bool static checkheaders(struct UrlData *data, char *thisheader) |
| { |
| struct HttpHeader *head; |
| size_t thislen = strlen(thisheader); |
| |
| for(head = data->headers; head; head=head->next) { |
| if(strnequal(head->header, thisheader, thislen)) { |
| return TRUE; |
| } |
| } |
| return FALSE; |
| } |
| |
| CURLcode http_connect(struct connectdata *conn) |
| { |
| struct UrlData *data; |
| |
| data=conn->data; |
| |
| /* If we are not using a proxy and we want a secure connection, |
| * perform SSL initialization & connection now. |
| * If using a proxy with https, then we must tell the proxy to CONNECT |
| * us to the host we want to talk to. Only after the connect |
| * has occured, can we start talking SSL |
| */ |
| if (conn->protocol & PROT_HTTPS) { |
| if (data->bits.httpproxy) { |
| |
| /* OK, now send the connect statment */ |
| sendf(data->firstsocket, data, |
| "CONNECT %s:%d HTTP/1.0\015\012" |
| "%s" |
| "%s" |
| "\r\n", |
| data->hostname, data->remote_port, |
| (data->bits.proxy_user_passwd)?data->ptr_proxyuserpwd:"", |
| (data->useragent?data->ptr_uagent:"") |
| ); |
| |
| /* wait for the proxy to send us a HTTP/1.0 200 OK header */ |
| /* Daniel rewrote this part Nov 5 1998 to make it more obvious */ |
| { |
| int httperror=0; |
| int subversion=0; |
| while(GetLine(data->firstsocket, data->buffer, data)) { |
| if('\r' == data->buffer[0]) |
| break; /* end of headers */ |
| if(2 == sscanf(data->buffer, "HTTP/1.%d %d", |
| &subversion, |
| &httperror)) { |
| ; |
| } |
| } |
| if(200 != httperror) { |
| if(407 == httperror) |
| /* Added Nov 6 1998 */ |
| failf(data, "Proxy requires authorization!"); |
| else |
| failf(data, "Received error code %d from proxy", httperror); |
| return CURLE_READ_ERROR; |
| } |
| } |
| infof (data, "Proxy has replied to CONNECT request\n"); |
| } |
| |
| /* now, perform the SSL initialization for this socket */ |
| if(UrgSSLConnect (data)) { |
| return CURLE_SSL_CONNECT_ERROR; |
| } |
| } |
| |
| return CURLE_OK; |
| } |
| CURLcode http_done(struct connectdata *conn) |
| { |
| struct UrlData *data; |
| long *bytecount = &conn->bytecount; |
| struct HTTP *http; |
| |
| data=conn->data; |
| http=data->proto.http; |
| |
| if(data->bits.http_formpost) { |
| *bytecount = http->readbytecount + http->writebytecount; |
| |
| FormFree(http->sendit); /* Now free that whole lot */ |
| |
| data->fread = http->storefread; /* restore */ |
| data->in = http->in; /* restore */ |
| } |
| else if(data->bits.http_put) { |
| *bytecount = http->readbytecount + http->writebytecount; |
| } |
| |
| /* TBD: the HTTP struct remains allocated here */ |
| |
| return CURLE_OK; |
| } |
| |
| |
| CURLcode http(struct connectdata *conn) |
| { |
| struct UrlData *data=conn->data; |
| char *buf = data->buffer; /* this is a short cut to the buffer */ |
| CURLcode result; |
| struct HTTP *http; |
| struct Cookie *co=NULL; /* no cookies from start */ |
| char *ppath = conn->ppath; /* three previous function arguments */ |
| char *host = conn->name; |
| long *bytecount = &conn->bytecount; |
| |
| http = (struct HTTP *)malloc(sizeof(struct HTTP)); |
| if(!http) |
| return CURLE_OUT_OF_MEMORY; |
| memset(http, 0, sizeof(struct HTTP)); |
| data->proto.http = http; |
| |
| if ( (conn->protocol&(PROT_HTTP|PROT_FTP)) && |
| data->bits.upload) { |
| data->bits.http_put=1; |
| } |
| |
| /* The User-Agent string has been built in url.c already, because it might |
| have been used in the proxy connect, but if we have got a header with |
| the user-agent string specified, we erase the previously made string |
| here. */ |
| if(checkheaders(data, "User-Agent:") && data->ptr_uagent) { |
| free(data->ptr_uagent); |
| data->ptr_uagent=NULL; |
| } |
| |
| if((data->bits.user_passwd) && !checkheaders(data, "Authorization:")) { |
| char authorization[512]; |
| sprintf(data->buffer, "%s:%s", data->user, data->passwd); |
| base64Encode(data->buffer, authorization); |
| data->ptr_userpwd = maprintf( "Authorization: Basic %s\015\012", |
| authorization); |
| } |
| if((data->bits.set_range) && !checkheaders(data, "Range:")) { |
| data->ptr_rangeline = maprintf("Range: bytes=%s\015\012", data->range); |
| } |
| if((data->bits.http_set_referer) && !checkheaders(data, "Referer:")) { |
| data->ptr_ref = maprintf("Referer: %s\015\012", data->referer); |
| } |
| if(data->cookie && !checkheaders(data, "Cookie:")) { |
| data->ptr_cookie = maprintf("Cookie: %s\015\012", data->cookie); |
| } |
| |
| if(data->cookies) { |
| co = cookie_getlist(data->cookies, |
| host, |
| ppath, |
| conn->protocol&PROT_HTTPS?TRUE:FALSE); |
| } |
| if ((data->bits.httpproxy) && !(conn->protocol&PROT_HTTPS)) { |
| /* The path sent to the proxy is in fact the entire URL */ |
| strncpy(ppath, data->url, URL_MAX_LENGTH-1); |
| } |
| if(data->bits.http_formpost) { |
| /* we must build the whole darned post sequence first, so that we have |
| a size of the whole shebang before we start to send it */ |
| http->sendit = getFormData(data->httppost, &http->postsize); |
| } |
| |
| if(!checkheaders(data, "Host:")) |
| data->ptr_host = maprintf("Host: %s\r\n", host); |
| |
| |
| if(!checkheaders(data, "Pragma:")) |
| http->p_pragma = "Pragma: no-cache\r\n"; |
| |
| if(!checkheaders(data, "Accept:")) |
| http->p_accept = "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*\r\n"; |
| |
| do { |
| sendf(data->firstsocket, data, |
| "%s " /* GET/HEAD/POST/PUT */ |
| "%s HTTP/1.0\r\n" /* path */ |
| "%s" /* proxyuserpwd */ |
| "%s" /* userpwd */ |
| "%s" /* range */ |
| "%s" /* user agent */ |
| "%s" /* cookie */ |
| "%s" /* host */ |
| "%s" /* pragma */ |
| "%s" /* accept */ |
| "%s", /* referer */ |
| |
| data->customrequest?data->customrequest: |
| (data->bits.no_body?"HEAD": |
| (data->bits.http_post || data->bits.http_formpost)?"POST": |
| (data->bits.http_put)?"PUT":"GET"), |
| ppath, |
| (data->bits.proxy_user_passwd && data->ptr_proxyuserpwd)?data->ptr_proxyuserpwd:"", |
| (data->bits.user_passwd && data->ptr_userpwd)?data->ptr_userpwd:"", |
| (data->bits.set_range && data->ptr_rangeline)?data->ptr_rangeline:"", |
| (data->useragent && *data->useragent && data->ptr_uagent)?data->ptr_uagent:"", |
| (data->ptr_cookie?data->ptr_cookie:""), /* Cookie: <data> */ |
| (data->ptr_host?data->ptr_host:""), /* Host: host */ |
| http->p_pragma?http->p_pragma:"", |
| http->p_accept?http->p_accept:"", |
| (data->bits.http_set_referer && data->ptr_ref)?data->ptr_ref:"" /* Referer: <data> <CRLF> */ |
| ); |
| |
| if(co) { |
| int count=0; |
| /* now loop through all cookies that matched */ |
| while(co) { |
| if(co->value && strlen(co->value)) { |
| if(0 == count) { |
| sendf(data->firstsocket, data, |
| "Cookie:"); |
| } |
| sendf(data->firstsocket, data, |
| "%s%s=%s", count?"; ":"", co->name, |
| co->value); |
| count++; |
| } |
| co = co->next; /* next cookie please */ |
| } |
| if(count) { |
| sendf(data->firstsocket, data, |
| "\r\n"); |
| } |
| cookie_freelist(co); /* free the cookie list */ |
| co=NULL; |
| } |
| |
| if(data->timecondition) { |
| struct tm *thistime; |
| |
| thistime = localtime(&data->timevalue); |
| |
| #ifdef HAVE_STRFTIME |
| /* format: "Tue, 15 Nov 1994 12:45:26 GMT" */ |
| strftime(buf, BUFSIZE-1, "%a, %d %b %Y %H:%M:%S %Z", thistime); |
| #else |
| /* TODO: Right, we *could* write a replacement here */ |
| strcpy(buf, "no strftime() support"); |
| #endif |
| switch(data->timecondition) { |
| case TIMECOND_IFMODSINCE: |
| default: |
| sendf(data->firstsocket, data, |
| "If-Modified-Since: %s\r\n", buf); |
| break; |
| case TIMECOND_IFUNMODSINCE: |
| sendf(data->firstsocket, data, |
| "If-Unmodified-Since: %s\r\n", buf); |
| break; |
| case TIMECOND_LASTMOD: |
| sendf(data->firstsocket, data, |
| "Last-Modified: %s\r\n", buf); |
| break; |
| } |
| } |
| |
| while(data->headers) { |
| sendf(data->firstsocket, data, |
| "%s\015\012", |
| data->headers->header); |
| data->headers = data->headers->next; |
| } |
| |
| if(data->bits.http_post || data->bits.http_formpost) { |
| if(data->bits.http_post) { |
| /* this is the simple x-www-form-urlencoded style */ |
| sendf(data->firstsocket, data, |
| "Content-Length: %d\015\012" |
| "Content-Type: application/x-www-form-urlencoded\r\n\r\n" |
| "%s\015\012", |
| strlen(data->postfields), |
| data->postfields ); |
| } |
| else { |
| |
| if(FormInit(&http->form, http->sendit)) { |
| failf(data, "Internal HTTP POST error!\n"); |
| return CURLE_HTTP_POST_ERROR; |
| } |
| |
| http->storefread = data->fread; /* backup */ |
| http->in = data->in; /* backup */ |
| |
| data->fread = |
| (size_t (*)(char *, size_t, size_t, FILE *)) |
| FormReader; /* set the read function to read from the |
| generated form data */ |
| data->in = (FILE *)&http->form; |
| |
| sendf(data->firstsocket, data, |
| "Content-Length: %d\r\n", |
| http->postsize-2); |
| |
| pgrsSetUploadSize(data, http->postsize); |
| |
| result = Transfer(conn, data->firstsocket, -1, TRUE, |
| &http->readbytecount, |
| data->firstsocket, |
| &http->writebytecount); |
| if(result) { |
| FormFree(http->sendit); /* free that whole lot */ |
| return result; |
| } |
| } |
| } |
| else if(data->bits.http_put) { |
| /* Let's PUT the data to the server! */ |
| |
| if(data->infilesize>0) { |
| sendf(data->firstsocket, data, |
| "Content-Length: %d\r\n\r\n", /* file size */ |
| data->infilesize ); |
| } |
| else |
| sendf(data->firstsocket, data, |
| "\015\012"); |
| |
| pgrsSetUploadSize(data, data->infilesize); |
| |
| result = Transfer(conn, data->firstsocket, -1, TRUE, |
| &http->readbytecount, |
| data->firstsocket, |
| &http->writebytecount); |
| if(result) |
| return result; |
| |
| } |
| else { |
| sendf(data->firstsocket, data, "\r\n"); |
| |
| /* HTTP GET/HEAD download: */ |
| result = Transfer(conn, data->firstsocket, -1, TRUE, bytecount, |
| -1, NULL); /* nothing to upload */ |
| } |
| if(result) |
| return result; |
| } while (0); /* this is just a left-over from the multiple document download |
| attempts */ |
| |
| return CURLE_OK; |
| } |
| |