1
0
mirror of https://github.com/moparisthebest/curl synced 2024-12-22 16:18:48 -05:00
curl/lib/http.c

577 lines
17 KiB
C
Raw Normal View History

1999-12-29 09:20:26 -05:00
/*****************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
* The contents of this file are subject to the Mozilla Public License
* Version 1.0 (the "License"); you may not use this file except in
* compliance with the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS"
* basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the
* License for the specific language governing rights and limitations
* under the License.
*
* The Original Code is Curl.
*
* The Initial Developer of the Original Code is Daniel Stenberg.
*
* Portions created by the Initial Developer are Copyright (C) 1998.
* All Rights Reserved.
*
* ------------------------------------------------------------
* Main author:
2000-06-20 11:31:26 -04:00
* - Daniel Stenberg <daniel@haxx.se>
1999-12-29 09:20:26 -05:00
*
2000-06-20 11:31:26 -04:00
* http://curl.haxx.se
1999-12-29 09:20:26 -05:00
*
* $Source$
* $Revision$
* $Date$
* $Author$
* $State$
* $Locker$
*
* ------------------------------------------------------------
****************************************************************************/
#include "setup.h"
1999-12-29 09:20:26 -05:00
/* -- WIN32 approved -- */
#include <stdio.h>
#include <string.h>
#include <stdarg.h>
#include <stdlib.h>
#include <ctype.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <errno.h>
2000-08-24 08:33:16 -04:00
#ifdef NEED_REENTRANT
#define _REENTRANT /* Necessary to use in Solaris, since the silly guys at Sun
made the localtime_r() prototype dependent on it (or
_POSIX_C_SOURCE or _POSIX_PTHREAD_SEMANTICS). */
#endif
1999-12-29 09:20:26 -05:00
#if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__)
#include <winsock.h>
#include <time.h>
#include <io.h>
#else
#ifdef HAVE_SYS_SOCKET_H
#include <sys/socket.h>
#endif
2000-08-23 03:23:42 -04:00
#ifdef HAVE_NETINET_IN_H
1999-12-29 09:20:26 -05:00
#include <netinet/in.h>
2000-08-23 03:23:42 -04:00
#endif
1999-12-29 09:20:26 -05:00
#include <sys/time.h>
2000-07-29 18:21:10 -04:00
2000-07-31 18:42:34 -04:00
#ifdef HAVE_TIME_H
#ifdef TIME_WITH_SYS_TIME
#include <time.h>
#endif
#endif
1999-12-29 09:20:26 -05:00
#include <sys/resource.h>
#ifdef HAVE_UNISTD_H
#include <unistd.h>
#endif
#include <netdb.h>
#ifdef HAVE_ARPA_INET_H
#include <arpa/inet.h>
#endif
#ifdef HAVE_NET_IF_H
#include <net/if.h>
#endif
#include <sys/ioctl.h>
#include <signal.h>
#ifdef HAVE_SYS_PARAM_H
#include <sys/param.h>
#endif
#ifdef HAVE_SYS_SELECT_H
#include <sys/select.h>
#endif
#endif
#include "urldata.h"
#include <curl/curl.h>
#include "download.h"
#include "sendf.h"
#include "formdata.h"
#include "progress.h"
#include "base64.h"
#include "cookie.h"
2000-05-22 10:12:12 -04:00
#include "strequal.h"
#include "url.h"
#include "ssluse.h"
1999-12-29 09:20:26 -05:00
#define _MPRINTF_REPLACE /* use our functions only */
#include <curl/mprintf.h>
2000-10-09 07:12:34 -04:00
/* The last #include file should be: */
#ifdef MALLOCDEBUG
#include "memdebug.h"
#endif
1999-12-29 09:20:26 -05:00
/*
* This function checks the linked list of custom HTTP headers for a particular
* header (prefix).
*/
bool static checkheaders(struct UrlData *data, char *thisheader)
{
struct curl_slist *head;
1999-12-29 09:20:26 -05:00
size_t thislen = strlen(thisheader);
for(head = data->headers; head; head=head->next) {
if(strnequal(head->data, thisheader, thislen)) {
1999-12-29 09:20:26 -05:00
return TRUE;
}
}
return FALSE;
}
/*
* GetHTTPProxyTunnel() requires that we're connected to a HTTP proxy. This
* function will issue the necessary commands to get a seamless tunnel through
* this proxy. After that, the socket can be used just as a normal socket.
*/
CURLcode GetHTTPProxyTunnel(struct UrlData *data, int tunnelsocket,
char *hostname, int remote_port)
{
int httperror=0;
int subversion=0;
2000-09-15 08:55:38 -04:00
infof(data, "Establish HTTP proxy tunnel to %s:%d\n", hostname, remote_port);
/* OK, now send the connect statment */
sendf(tunnelsocket, data,
"CONNECT %s:%d HTTP/1.0\015\012"
"%s"
"%s"
"\r\n",
hostname, remote_port,
(data->bits.proxy_user_passwd)?data->ptr_proxyuserpwd:"",
(data->useragent?data->ptr_uagent:"")
);
/* wait for the proxy to send us a HTTP/1.0 200 OK header */
while(GetLine(tunnelsocket, data->buffer, data)) {
if('\r' == data->buffer[0])
break; /* end of headers */
if(2 == sscanf(data->buffer, "HTTP/1.%d %d",
&subversion,
&httperror)) {
;
}
}
if(200 != httperror) {
if(407 == httperror)
/* Added Nov 6 1998 */
failf(data, "Proxy requires authorization!");
else
failf(data, "Received error code %d from proxy", httperror);
return CURLE_READ_ERROR;
}
infof (data, "Proxy replied to CONNECT request\n");
return CURLE_OK;
}
2000-05-22 10:12:12 -04:00
CURLcode http_connect(struct connectdata *conn)
1999-12-29 09:20:26 -05:00
{
2000-05-22 10:12:12 -04:00
struct UrlData *data;
CURLcode result;
2000-05-22 10:12:12 -04:00
data=conn->data;
/* If we are not using a proxy and we want a secure connection,
* perform SSL initialization & connection now.
* If using a proxy with https, then we must tell the proxy to CONNECT
* us to the host we want to talk to. Only after the connect
* has occured, can we start talking SSL
*/
if (conn->protocol & PROT_HTTPS) {
if (data->bits.httpproxy) {
/* HTTPS through a proxy can only be done with a tunnel */
result = GetHTTPProxyTunnel(data, data->firstsocket,
data->hostname, data->remote_port);
if(CURLE_OK != result)
return result;
}
/* now, perform the SSL initialization for this socket */
if(UrgSSLConnect (data)) {
return CURLE_SSL_CONNECT_ERROR;
}
2000-05-22 10:12:12 -04:00
}
if(data->bits.user_passwd && !data->bits.this_is_a_follow) {
/* Authorization: is requested, this is not a followed location, get the
original host name */
data->auth_host = strdup(data->hostname);
}
return CURLE_OK;
2000-05-22 10:12:12 -04:00
}
/* called from curl_close() when this struct is about to get wasted, free
protocol-specific resources */
CURLcode http_close(struct connectdata *conn)
{
if(conn->data->auth_host)
free(conn->data->auth_host);
return CURLE_OK;
}
2000-05-22 10:12:12 -04:00
CURLcode http_done(struct connectdata *conn)
{
struct UrlData *data;
long *bytecount = &conn->bytecount;
struct HTTP *http;
data=conn->data;
http=data->proto.http;
if(data->bits.http_formpost) {
*bytecount = http->readbytecount + http->writebytecount;
FormFree(http->sendit); /* Now free that whole lot */
data->fread = http->storefread; /* restore */
data->in = http->in; /* restore */
1999-12-29 09:20:26 -05:00
}
2000-05-22 10:12:12 -04:00
else if(data->bits.http_put) {
*bytecount = http->readbytecount + http->writebytecount;
}
2000-10-11 06:29:25 -04:00
free(http);
data->proto.http=NULL; /* it is gone */
2000-05-22 10:12:12 -04:00
return CURLE_OK;
}
CURLcode http(struct connectdata *conn)
{
struct UrlData *data=conn->data;
char *buf = data->buffer; /* this is a short cut to the buffer */
CURLcode result=CURLE_OK;
2000-05-22 10:12:12 -04:00
struct HTTP *http;
struct Cookie *co=NULL; /* no cookies from start */
char *ppath = conn->ppath; /* three previous function arguments */
char *host = conn->name;
long *bytecount = &conn->bytecount;
http = (struct HTTP *)malloc(sizeof(struct HTTP));
if(!http)
return CURLE_OUT_OF_MEMORY;
memset(http, 0, sizeof(struct HTTP));
data->proto.http = http;
if ( (conn->protocol&(PROT_HTTP|PROT_FTP)) &&
data->bits.upload) {
data->bits.http_put=1;
1999-12-29 09:20:26 -05:00
}
/* The User-Agent string has been built in url.c already, because it might
have been used in the proxy connect, but if we have got a header with
the user-agent string specified, we erase the previously made string
1999-12-29 09:20:26 -05:00
here. */
if(checkheaders(data, "User-Agent:") && data->ptr_uagent) {
free(data->ptr_uagent);
data->ptr_uagent=NULL;
}
2000-05-22 10:12:12 -04:00
if((data->bits.user_passwd) && !checkheaders(data, "Authorization:")) {
char *authorization;
/* To prevent the user+password to get sent to other than the original
host due to a location-follow, we do some weirdo checks here */
if(!data->bits.this_is_a_follow ||
!data->auth_host ||
strequal(data->auth_host, data->hostname)) {
sprintf(data->buffer, "%s:%s", data->user, data->passwd);
2000-09-28 06:26:44 -04:00
if(base64_encode(data->buffer, strlen(data->buffer),
&authorization) >= 0) {
data->ptr_userpwd = maprintf( "Authorization: Basic %s\015\012",
authorization);
free(authorization);
}
}
1999-12-29 09:20:26 -05:00
}
2000-05-22 10:12:12 -04:00
if((data->bits.set_range) && !checkheaders(data, "Range:")) {
1999-12-29 09:20:26 -05:00
data->ptr_rangeline = maprintf("Range: bytes=%s\015\012", data->range);
}
2000-05-22 10:12:12 -04:00
if((data->bits.http_set_referer) && !checkheaders(data, "Referer:")) {
1999-12-29 09:20:26 -05:00
data->ptr_ref = maprintf("Referer: %s\015\012", data->referer);
}
if(data->cookie && !checkheaders(data, "Cookie:")) {
data->ptr_cookie = maprintf("Cookie: %s\015\012", data->cookie);
}
if(data->cookies) {
co = cookie_getlist(data->cookies,
host,
ppath,
2000-05-22 10:12:12 -04:00
conn->protocol&PROT_HTTPS?TRUE:FALSE);
1999-12-29 09:20:26 -05:00
}
2000-05-22 10:12:12 -04:00
if ((data->bits.httpproxy) && !(conn->protocol&PROT_HTTPS)) {
1999-12-29 09:20:26 -05:00
/* The path sent to the proxy is in fact the entire URL */
strncpy(ppath, data->url, URL_MAX_LENGTH-1);
}
2000-05-22 10:12:12 -04:00
if(data->bits.http_formpost) {
1999-12-29 09:20:26 -05:00
/* we must build the whole darned post sequence first, so that we have
a size of the whole shebang before we start to send it */
2000-05-22 10:12:12 -04:00
http->sendit = getFormData(data->httppost, &http->postsize);
1999-12-29 09:20:26 -05:00
}
if(!checkheaders(data, "Host:")) {
if(((conn->protocol&PROT_HTTPS) && (data->remote_port == PORT_HTTPS)) ||
(!(conn->protocol&PROT_HTTPS) && (data->remote_port == PORT_HTTP)) )
/* If (HTTPS on port 443) OR (non-HTTPS on port 80) then don't include
the port number in the host string */
data->ptr_host = maprintf("Host: %s\r\n", host);
else
data->ptr_host = maprintf("Host: %s:%d\r\n", host, data->remote_port);
}
1999-12-29 09:20:26 -05:00
if(!checkheaders(data, "Pragma:"))
2000-05-22 10:12:12 -04:00
http->p_pragma = "Pragma: no-cache\r\n";
1999-12-29 09:20:26 -05:00
if(!checkheaders(data, "Accept:"))
2000-05-22 10:12:12 -04:00
http->p_accept = "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*\r\n";
1999-12-29 09:20:26 -05:00
do {
send_buffer *req_buffer;
struct curl_slist *headers=data->headers;
/* initialize a dynamic send-buffer */
req_buffer = add_buffer_init();
/* add the main request stuff */
add_bufferf(req_buffer,
"%s " /* GET/HEAD/POST/PUT */
"%s HTTP/1.0\r\n" /* path */
"%s" /* proxyuserpwd */
"%s" /* userpwd */
"%s" /* range */
"%s" /* user agent */
"%s" /* cookie */
"%s" /* host */
"%s" /* pragma */
"%s" /* accept */
"%s", /* referer */
data->customrequest?data->customrequest:
(data->bits.no_body?"HEAD":
(data->bits.http_post || data->bits.http_formpost)?"POST":
(data->bits.http_put)?"PUT":"GET"),
ppath,
(data->bits.proxy_user_passwd && data->ptr_proxyuserpwd)?data->ptr_proxyuserpwd:"",
(data->bits.user_passwd && data->ptr_userpwd)?data->ptr_userpwd:"",
(data->bits.set_range && data->ptr_rangeline)?data->ptr_rangeline:"",
(data->useragent && *data->useragent && data->ptr_uagent)?data->ptr_uagent:"",
(data->ptr_cookie?data->ptr_cookie:""), /* Cookie: <data> */
(data->ptr_host?data->ptr_host:""), /* Host: host */
http->p_pragma?http->p_pragma:"",
http->p_accept?http->p_accept:"",
(data->bits.http_set_referer && data->ptr_ref)?data->ptr_ref:"" /* Referer: <data> <CRLF> */
);
1999-12-29 09:20:26 -05:00
if(co) {
int count=0;
/* now loop through all cookies that matched */
while(co) {
if(co->value && strlen(co->value)) {
if(0 == count) {
add_bufferf(req_buffer, "Cookie: ");
}
add_bufferf(req_buffer,
"%s%s=%s", count?"; ":"", co->name, co->value);
2000-05-22 10:12:12 -04:00
count++;
1999-12-29 09:20:26 -05:00
}
co = co->next; /* next cookie please */
}
if(count) {
add_buffer(req_buffer, "\r\n", 2);
1999-12-29 09:20:26 -05:00
}
cookie_freelist(co); /* free the cookie list */
co=NULL;
}
if(data->timecondition) {
struct tm *thistime;
2000-07-29 18:21:10 -04:00
#ifdef HAVE_LOCALTIME_R
/* thread-safe version */
struct tm keeptime;
2000-08-24 08:33:16 -04:00
thistime = (struct tm *)localtime_r(&data->timevalue, &keeptime);
2000-07-29 18:21:10 -04:00
#else
1999-12-29 09:20:26 -05:00
thistime = localtime(&data->timevalue);
2000-07-29 18:21:10 -04:00
#endif
if(NULL == thistime) {
failf(data, "localtime() failed!");
return CURLE_OUT_OF_MEMORY;
}
1999-12-29 09:20:26 -05:00
2000-03-16 06:40:48 -05:00
#ifdef HAVE_STRFTIME
1999-12-29 09:20:26 -05:00
/* format: "Tue, 15 Nov 1994 12:45:26 GMT" */
strftime(buf, BUFSIZE-1, "%a, %d %b %Y %H:%M:%S %Z", thistime);
#else
2000-01-16 13:52:24 -05:00
/* TODO: Right, we *could* write a replacement here */
1999-12-29 09:20:26 -05:00
strcpy(buf, "no strftime() support");
#endif
switch(data->timecondition) {
case TIMECOND_IFMODSINCE:
default:
add_bufferf(req_buffer,
"If-Modified-Since: %s\r\n", buf);
1999-12-29 09:20:26 -05:00
break;
case TIMECOND_IFUNMODSINCE:
add_bufferf(req_buffer,
"If-Unmodified-Since: %s\r\n", buf);
1999-12-29 09:20:26 -05:00
break;
case TIMECOND_LASTMOD:
add_bufferf(req_buffer,
"Last-Modified: %s\r\n", buf);
1999-12-29 09:20:26 -05:00
break;
}
}
while(headers) {
char *ptr = strchr(headers->data, ':');
if(ptr) {
/* we require a colon for this to be a true header */
ptr++; /* pass the colon */
while(*ptr && isspace(*ptr))
ptr++;
if(*ptr) {
/* only send this if the contents was non-blank */
add_bufferf(req_buffer, "%s\r\n", headers->data);
}
}
headers = headers->next;
1999-12-29 09:20:26 -05:00
}
if(data->bits.http_formpost) {
if(FormInit(&http->form, http->sendit)) {
failf(data, "Internal HTTP POST error!\n");
return CURLE_HTTP_POST_ERROR;
1999-12-29 09:20:26 -05:00
}
http->storefread = data->fread; /* backup */
http->in = data->in; /* backup */
1999-12-29 09:20:26 -05:00
data->fread =
(size_t (*)(char *, size_t, size_t, FILE *))
FormReader; /* set the read function to read from the
generated form data */
data->in = (FILE *)&http->form;
1999-12-29 09:20:26 -05:00
add_bufferf(req_buffer,
"Content-Length: %d\r\n", http->postsize-2);
/* set upload size to the progress meter */
pgrsSetUploadSize(data, http->postsize);
1999-12-29 09:20:26 -05:00
2000-10-04 09:07:43 -04:00
data->request_size =
add_buffer_send(data->firstsocket, conn, req_buffer);
result = Transfer(conn, data->firstsocket, -1, TRUE,
&http->readbytecount,
2000-05-22 10:12:12 -04:00
data->firstsocket,
&http->writebytecount);
if(result) {
FormFree(http->sendit); /* free that whole lot */
return result;
1999-12-29 09:20:26 -05:00
}
}
2000-05-22 10:12:12 -04:00
else if(data->bits.http_put) {
1999-12-29 09:20:26 -05:00
/* Let's PUT the data to the server! */
if(data->infilesize>0) {
add_bufferf(req_buffer,
"Content-Length: %d\r\n\r\n", /* file size */
data->infilesize );
1999-12-29 09:20:26 -05:00
}
else
add_bufferf(req_buffer, "\015\012");
/* set the upload size to the progress meter */
pgrsSetUploadSize(data, data->infilesize);
1999-12-29 09:20:26 -05:00
/* this sends the buffer and frees all the buffer resources */
2000-10-04 09:07:43 -04:00
data->request_size =
add_buffer_send(data->firstsocket, conn, req_buffer);
/* prepare for transfer */
2000-05-22 10:12:12 -04:00
result = Transfer(conn, data->firstsocket, -1, TRUE,
&http->readbytecount,
data->firstsocket,
&http->writebytecount);
1999-12-29 09:20:26 -05:00
if(result)
return result;
1999-12-29 09:20:26 -05:00
}
else {
if(data->bits.http_post) {
/* this is the simple POST, using x-www-form-urlencoded style */
if(!checkheaders(data, "Content-Length:"))
/* we allow replacing this header, although it isn't very wise to
actually set your own */
add_bufferf(req_buffer,
"Content-Length: %d\r\n",
(data->postfieldsize?data->postfieldsize:
strlen(data->postfields)) );
if(!checkheaders(data, "Content-Type:"))
add_bufferf(req_buffer,
"Content-Type: application/x-www-form-urlencoded\r\n");
/* and here comes the actual data */
2000-08-24 08:33:16 -04:00
if(data->postfieldsize) {
add_buffer(req_buffer, "\r\n", 2);
add_buffer(req_buffer, data->postfields,
data->postfieldsize);
add_buffer(req_buffer, "\r\n", 2);
}
else {
add_bufferf(req_buffer,
"\r\n"
"%s\r\n",
data->postfields );
2000-08-24 08:33:16 -04:00
}
}
else
add_buffer(req_buffer, "\r\n", 2);
2000-05-22 10:12:12 -04:00
2000-10-04 09:07:43 -04:00
/* issue the request */
data->request_size =
add_buffer_send(data->firstsocket, conn, req_buffer);
/* HTTP GET/HEAD download: */
2000-05-22 10:12:12 -04:00
result = Transfer(conn, data->firstsocket, -1, TRUE, bytecount,
-1, NULL); /* nothing to upload */
}
1999-12-29 09:20:26 -05:00
if(result)
return result;
} while (0); /* this is just a left-over from the multiple document download
attempts */
2000-05-22 10:12:12 -04:00
return CURLE_OK;
1999-12-29 09:20:26 -05:00
}