1
0
mirror of https://github.com/moparisthebest/curl synced 2024-11-14 13:35:03 -05:00
curl/packages/OS400/ccsidcurl.c

1476 lines
32 KiB
C
Raw Normal View History

2007-08-23 10:30:24 -04:00
/***************************************************************************
* _ _ ____ _
* Project ___| | | | _ \| |
* / __| | | | |_) | |
* | (__| |_| | _ <| |___
* \___|\___/|_| \_\_____|
*
* Copyright (C) 1998 - 2020, Daniel Stenberg, <daniel@haxx.se>, et al.
2007-08-23 10:30:24 -04:00
*
* This software is licensed as described in the file COPYING, which
* you should have received as part of this distribution. The terms
* are also available at https://curl.haxx.se/docs/copyright.html.
2007-08-23 10:30:24 -04:00
*
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
* copies of the Software, and permit persons to whom the Software is
* furnished to do so, under the terms of the COPYING file.
*
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
* KIND, either express or implied.
*
*
***************************************************************************/
/* CCSID API wrappers for OS/400. */
#include <iconv.h>
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <stdarg.h>
#pragma enum(int)
#include "curl.h"
#include "mprintf.h"
#include "slist.h"
#include "urldata.h"
#include "url.h"
#include "setopt.h"
#include "getinfo.h"
2007-08-23 10:30:24 -04:00
#include "ccsidcurl.h"
#include "os400sys.h"
#ifndef SIZE_MAX
#define SIZE_MAX ((size_t) ~0) /* Is unsigned on OS/400. */
#endif
2007-08-23 10:30:24 -04:00
#define ASCII_CCSID 819 /* Use ISO-8859-1 as ASCII. */
#define NOCONV_CCSID 65535 /* No conversion. */
2007-08-23 10:30:24 -04:00
#define ICONV_ID_SIZE 32 /* Size of iconv_open() code identifier. */
#define ICONV_OPEN_ERROR(t) ((t).return_value == -1)
#define ALLOC_GRANULE 8 /* Alloc. granule for curl_formadd_ccsid(). */
static void
makeOS400IconvCode(char buf[ICONV_ID_SIZE], unsigned int ccsid)
{
/**
*** Convert a CCSID to the corresponding IBM iconv_open() character
*** code identifier.
*** This code is specific to the OS400 implementation of the iconv library.
*** CCSID 65535 (no conversion) is replaced by the ASCII CCSID.
*** CCSID 0 is interpreted by the OS400 as the job's CCSID.
**/
ccsid &= 0xFFFF;
if(ccsid == NOCONV_CCSID)
2007-08-23 10:30:24 -04:00
ccsid = ASCII_CCSID;
memset(buf, 0, ICONV_ID_SIZE);
curl_msprintf(buf, "IBMCCSID%05u0000000", ccsid);
}
static iconv_t
2013-10-28 07:00:22 -04:00
iconv_open_CCSID(unsigned int ccsidout, unsigned int ccsidin,
unsigned int cstr)
2007-08-23 10:30:24 -04:00
{
char fromcode[ICONV_ID_SIZE];
char tocode[ICONV_ID_SIZE];
/**
*** Like iconv_open(), but character codes are given as CCSIDs.
*** If `cstr' is non-zero, conversion is set up to stop whenever a
*** null character is encountered.
*** See iconv_open() IBM description in "National Language Support API".
**/
makeOS400IconvCode(fromcode, ccsidin);
makeOS400IconvCode(tocode, ccsidout);
2019-05-03 17:18:58 -04:00
memset(tocode + 13, 0, sizeof(tocode) - 13); /* Dest. code id format. */
2007-08-23 10:30:24 -04:00
if(cstr)
2007-08-23 10:30:24 -04:00
fromcode[18] = '1'; /* Set null-terminator flag. */
return iconv_open(tocode, fromcode);
}
static int
2019-05-03 17:18:58 -04:00
convert(char *d, size_t dlen, int dccsid,
const char *s, int slen, int sccsid)
2007-08-23 10:30:24 -04:00
{
int i;
iconv_t cd;
size_t lslen;
/**
*** Convert `sccsid'-coded `slen'-data bytes at `s' into `dccsid'-coded
*** data stored in the `dlen'-byte buffer at `d'.
*** If `slen' < 0, source string is null-terminated.
*** CCSID 65535 (no conversion) is replaced by the ASCII CCSID.
*** Return the converted destination byte count, or -1 if error.
**/
if(sccsid == 65535)
2007-08-23 10:30:24 -04:00
sccsid = ASCII_CCSID;
if(dccsid == 65535)
2007-08-23 10:30:24 -04:00
dccsid = ASCII_CCSID;
if(sccsid == dccsid) {
2007-08-23 10:30:24 -04:00
lslen = slen >= 0? slen: strlen(s) + 1;
i = lslen < dlen? lslen: dlen;
if(s != d && i > 0)
2007-08-23 10:30:24 -04:00
memcpy(d, s, i);
return i;
}
if(slen < 0) {
2007-08-23 10:30:24 -04:00
lslen = 0;
cd = iconv_open_CCSID(dccsid, sccsid, 1);
}
else {
lslen = (size_t) slen;
cd = iconv_open_CCSID(dccsid, sccsid, 0);
}
if(ICONV_OPEN_ERROR(cd))
2007-08-23 10:30:24 -04:00
return -1;
i = dlen;
if((int) iconv(cd, (char * *) &s, &lslen, &d, &dlen) < 0)
2007-08-23 10:30:24 -04:00
i = -1;
else
i -= dlen;
iconv_close(cd);
return i;
}
static char *
2019-05-03 17:18:58 -04:00
dynconvert(int dccsid, const char *s, int slen, int sccsid)
2007-08-23 10:30:24 -04:00
{
2019-05-03 17:18:58 -04:00
char *d;
char *cp;
2007-08-23 10:30:24 -04:00
size_t dlen;
int l;
static const char nullbyte = 0;
/* Like convert, but the destination is allocated and returned. */
dlen = (size_t) (slen < 0? strlen(s): slen) + 1;
dlen *= MAX_CONV_EXPANSION; /* Allow some expansion. */
d = malloc(dlen);
if(!d)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
l = convert(d, dlen, dccsid, s, slen, sccsid);
if(l < 0) {
2007-08-23 10:30:24 -04:00
free(d);
return (char *) NULL;
}
if(slen < 0) {
2007-08-23 10:30:24 -04:00
/* Need to null-terminate even when source length is given.
Since destination code size is unknown, use a conversion to generate
terminator. */
int l2 = convert(d + l, dlen - l, dccsid, &nullbyte, -1, ASCII_CCSID);
2007-08-23 10:30:24 -04:00
if(l2 < 0) {
2007-08-23 10:30:24 -04:00
free(d);
return (char *) NULL;
}
l += l2;
}
if((size_t) l < dlen) {
2007-08-23 10:30:24 -04:00
cp = realloc(d, l); /* Shorten to minimum needed. */
if(cp)
2007-08-23 10:30:24 -04:00
d = cp;
}
return d;
}
static struct curl_slist *
2019-05-03 17:18:58 -04:00
slist_convert(int dccsid, struct curl_slist *from, int sccsid)
{
2019-05-03 17:18:58 -04:00
struct curl_slist *to = (struct curl_slist *) NULL;
2013-10-28 07:00:22 -04:00
for(; from; from = from->next) {
struct curl_slist *nl;
2019-05-03 17:18:58 -04:00
char *cp = dynconvert(dccsid, from->data, -1, sccsid);
if(!cp) {
curl_slist_free_all(to);
return (struct curl_slist *) NULL;
}
nl = Curl_slist_append_nodup(to, cp);
if(!nl) {
curl_slist_free_all(to);
free(cp);
return NULL;
}
to = nl;
}
return to;
}
2007-08-23 10:30:24 -04:00
char *
curl_version_ccsid(unsigned int ccsid)
{
int i;
2019-05-03 17:18:58 -04:00
char *aversion;
char *eversion;
2007-08-23 10:30:24 -04:00
aversion = curl_version();
if(!aversion)
2007-08-23 10:30:24 -04:00
return aversion;
i = strlen(aversion) + 1;
i *= MAX_CONV_EXPANSION;
2019-05-03 17:18:58 -04:00
eversion = Curl_thread_buffer(LK_CURL_VERSION, i);
if(!eversion)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
if(convert(eversion, i, ccsid, aversion, -1, ASCII_CCSID) < 0)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
return eversion;
}
char *
2019-05-03 17:18:58 -04:00
curl_easy_escape_ccsid(CURL *handle, const char *string, int length,
2007-08-23 10:30:24 -04:00
unsigned int sccsid, unsigned int dccsid)
{
2019-05-03 17:18:58 -04:00
char *s;
char *d;
2007-08-23 10:30:24 -04:00
if(!string) {
2007-08-23 10:30:24 -04:00
errno = EINVAL;
return (char *) NULL;
}
s = dynconvert(ASCII_CCSID, string, length? length: -1, sccsid);
2007-08-23 10:30:24 -04:00
if(!s)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
d = curl_easy_escape(handle, s, 0);
free(s);
if(!d)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
s = dynconvert(dccsid, d, -1, ASCII_CCSID);
free(d);
return s;
}
char *
2019-05-03 17:18:58 -04:00
curl_easy_unescape_ccsid(CURL *handle, const char *string, int length,
int *outlength,
2007-08-23 10:30:24 -04:00
unsigned int sccsid, unsigned int dccsid)
{
2019-05-03 17:18:58 -04:00
char *s;
char *d;
2007-08-23 10:30:24 -04:00
if(!string) {
2007-08-23 10:30:24 -04:00
errno = EINVAL;
return (char *) NULL;
}
s = dynconvert(ASCII_CCSID, string, length? length: -1, sccsid);
2007-08-23 10:30:24 -04:00
if(!s)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
d = curl_easy_unescape(handle, s, 0, outlength);
free(s);
if(!d)
2007-08-23 10:30:24 -04:00
return (char *) NULL;
s = dynconvert(dccsid, d, -1, ASCII_CCSID);
free(d);
if(s && outlength)
2007-08-23 10:30:24 -04:00
*outlength = strlen(s);
return s;
}
struct curl_slist *
2019-05-03 17:18:58 -04:00
curl_slist_append_ccsid(struct curl_slist *list,
const char *data, unsigned int ccsid)
2007-08-23 10:30:24 -04:00
{
2019-05-03 17:18:58 -04:00
char *s;
2007-08-23 10:30:24 -04:00
s = (char *) NULL;
if(!data)
2007-08-23 10:30:24 -04:00
return curl_slist_append(list, data);
s = dynconvert(ASCII_CCSID, data, -1, ccsid);
if(!s)
2007-08-23 10:30:24 -04:00
return (struct curl_slist *) NULL;
list = curl_slist_append(list, s);
free(s);
return list;
}
time_t
2019-05-03 17:18:58 -04:00
curl_getdate_ccsid(const char *p, const time_t * unused, unsigned int ccsid)
2007-08-23 10:30:24 -04:00
{
2019-05-03 17:18:58 -04:00
char *s;
2007-08-23 10:30:24 -04:00
time_t t;
if(!p)
2007-08-23 10:30:24 -04:00
return curl_getdate(p, unused);
s = dynconvert(ASCII_CCSID, p, -1, ccsid);
if(!s)
2007-08-23 10:30:24 -04:00
return (time_t) -1;
t = curl_getdate(s, unused);
free(s);
return t;
}
static int
convert_version_info_string(const char * * stringp,
2019-05-03 17:18:58 -04:00
char * * bufp, int *left, unsigned int ccsid)
2007-08-23 10:30:24 -04:00
{
/* Helper for curl_version_info_ccsid(): convert a string if defined.
Result is stored in the `*left'-byte buffer at `*bufp'.
`*bufp' and `*left' are updated accordingly.
Return 0 if ok, else -1. */
if(*stringp) {
int l = convert(*bufp, *left, ccsid, *stringp, -1, ASCII_CCSID);
2007-08-23 10:30:24 -04:00
if(l <= 0)
2007-08-23 10:30:24 -04:00
return -1;
*stringp = *bufp;
*bufp += l;
*left -= l;
}
return 0;
}
curl_version_info_data *
curl_version_info_ccsid(CURLversion stamp, unsigned int ccsid)
{
curl_version_info_data * p;
2019-05-03 17:18:58 -04:00
char *cp;
2007-08-23 10:30:24 -04:00
int n;
int nproto;
curl_version_info_data * id;
/* The assertion below is possible, because although the second operand
is an enum member, the first is a #define. In that case, the OS/400 C
compiler seems to compare string values after substitution. */
#if CURLVERSION_NOW != CURLVERSION_FOURTH
2013-10-28 07:00:22 -04:00
#error curl_version_info_data structure has changed: upgrade this procedure.
2007-08-23 10:30:24 -04:00
#endif
/* If caller has been compiled with a new version, error. */
if(stamp > CURLVERSION_NOW)
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
p = curl_version_info(stamp);
if(!p)
2007-08-23 10:30:24 -04:00
return p;
/* Measure thread space needed. */
n = 0;
nproto = 0;
if(p->protocols) {
2013-10-28 07:00:22 -04:00
while(p->protocols[nproto])
2007-08-23 10:30:24 -04:00
n += strlen(p->protocols[nproto++]);
n += nproto++;
}
if(p->version)
2007-08-23 10:30:24 -04:00
n += strlen(p->version) + 1;
if(p->host)
2007-08-23 10:30:24 -04:00
n += strlen(p->host) + 1;
if(p->ssl_version)
2007-08-23 10:30:24 -04:00
n += strlen(p->ssl_version) + 1;
if(p->libz_version)
2007-08-23 10:30:24 -04:00
n += strlen(p->libz_version) + 1;
if(p->ares)
2007-08-23 10:30:24 -04:00
n += strlen(p->ares) + 1;
if(p->libidn)
2007-08-23 10:30:24 -04:00
n += strlen(p->libidn) + 1;
if(p->libssh_version)
2007-08-23 10:30:24 -04:00
n += strlen(p->libssh_version) + 1;
/* Allocate thread space. */
n *= MAX_CONV_EXPANSION;
if(nproto)
2007-08-23 10:30:24 -04:00
n += nproto * sizeof(const char *);
cp = Curl_thread_buffer(LK_VERSION_INFO_DATA, n);
id = (curl_version_info_data *) Curl_thread_buffer(LK_VERSION_INFO,
2019-05-03 17:18:58 -04:00
sizeof(*id));
2007-08-23 10:30:24 -04:00
if(!id || !cp)
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
/* Copy data and convert strings. */
2019-05-03 17:18:58 -04:00
memcpy((char *) id, (char *) p, sizeof(*p));
2007-08-23 10:30:24 -04:00
if(id->protocols) {
2019-05-03 17:18:58 -04:00
int i = nproto * sizeof(id->protocols[0]);
2007-08-23 10:30:24 -04:00
id->protocols = (const char * const *) cp;
memcpy(cp, (char *) p->protocols, i);
cp += i;
n -= i;
2013-10-28 07:00:22 -04:00
for(i = 0; id->protocols[i]; i++)
if(convert_version_info_string(((const char * *) id->protocols) + i,
2007-08-23 10:30:24 -04:00
&cp, &n, ccsid))
return (curl_version_info_data *) NULL;
}
if(convert_version_info_string(&id->version, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->host, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->ssl_version, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->libz_version, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->ares, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->libidn, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
if(convert_version_info_string(&id->libssh_version, &cp, &n, ccsid))
2007-08-23 10:30:24 -04:00
return (curl_version_info_data *) NULL;
return id;
}
const char *
curl_easy_strerror_ccsid(CURLcode error, unsigned int ccsid)
{
int i;
2019-05-03 17:18:58 -04:00
const char *s;
char *buf;
2007-08-23 10:30:24 -04:00
s = curl_easy_strerror(error);
if(!s)
2007-08-23 10:30:24 -04:00
return s;
i = MAX_CONV_EXPANSION * (strlen(s) + 1);
2019-05-03 17:18:58 -04:00
buf = Curl_thread_buffer(LK_EASY_STRERROR, i);
if(!buf)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
if(convert(buf, i, ccsid, s, -1, ASCII_CCSID) < 0)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
return (const char *) buf;
}
const char *
curl_share_strerror_ccsid(CURLSHcode error, unsigned int ccsid)
{
int i;
2019-05-03 17:18:58 -04:00
const char *s;
char *buf;
2007-08-23 10:30:24 -04:00
s = curl_share_strerror(error);
if(!s)
2007-08-23 10:30:24 -04:00
return s;
i = MAX_CONV_EXPANSION * (strlen(s) + 1);
2019-05-03 17:18:58 -04:00
buf = Curl_thread_buffer(LK_SHARE_STRERROR, i);
if(!buf)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
if(convert(buf, i, ccsid, s, -1, ASCII_CCSID) < 0)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
return (const char *) buf;
}
const char *
curl_multi_strerror_ccsid(CURLMcode error, unsigned int ccsid)
{
int i;
2019-05-03 17:18:58 -04:00
const char *s;
char *buf;
2007-08-23 10:30:24 -04:00
s = curl_multi_strerror(error);
if(!s)
2007-08-23 10:30:24 -04:00
return s;
i = MAX_CONV_EXPANSION * (strlen(s) + 1);
2019-05-03 17:18:58 -04:00
buf = Curl_thread_buffer(LK_MULTI_STRERROR, i);
if(!buf)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
if(convert(buf, i, ccsid, s, -1, ASCII_CCSID) < 0)
2007-08-23 10:30:24 -04:00
return (const char *) NULL;
return (const char *) buf;
}
void
curl_certinfo_free_all(struct curl_certinfo *info)
{
/* Free all memory used by certificate info. */
if(info) {
if(info->certinfo) {
int i;
2013-10-28 07:00:22 -04:00
for(i = 0; i < info->num_of_certs; i++)
curl_slist_free_all(info->certinfo[i]);
free((char *) info->certinfo);
}
free((char *) info);
}
}
2007-08-23 10:30:24 -04:00
CURLcode
2019-05-03 17:18:58 -04:00
curl_easy_getinfo_ccsid(CURL *curl, CURLINFO info, ...)
2007-08-23 10:30:24 -04:00
{
va_list arg;
2019-05-03 17:18:58 -04:00
void *paramp;
2007-08-23 10:30:24 -04:00
CURLcode ret;
struct Curl_easy * data;
2007-08-23 10:30:24 -04:00
2016-11-24 21:25:21 -05:00
/* WARNING: unlike curl_easy_getinfo(), the strings returned by this
2007-08-23 10:30:24 -04:00
procedure have to be free'ed. */
data = (struct Curl_easy *) curl;
2007-08-23 10:30:24 -04:00
va_start(arg, info);
paramp = va_arg(arg, void *);
ret = Curl_getinfo(data, info, paramp);
if(ret == CURLE_OK) {
unsigned int ccsid;
char **cpp;
struct curl_slist **slp;
struct curl_certinfo *cipf;
struct curl_certinfo *cipt;
2019-05-03 17:18:58 -04:00
switch((int) info & CURLINFO_TYPEMASK) {
2007-08-23 10:30:24 -04:00
case CURLINFO_STRING:
ccsid = va_arg(arg, unsigned int);
cpp = (char * *) paramp;
if(*cpp) {
*cpp = dynconvert(ccsid, *cpp, -1, ASCII_CCSID);
2007-08-23 10:30:24 -04:00
if(!*cpp)
ret = CURLE_OUT_OF_MEMORY;
}
2007-08-23 10:30:24 -04:00
break;
2007-08-23 10:30:24 -04:00
case CURLINFO_SLIST:
ccsid = va_arg(arg, unsigned int);
2019-05-03 17:18:58 -04:00
switch(info) {
2013-12-02 08:33:51 -05:00
case CURLINFO_CERTINFO:
cipf = *(struct curl_certinfo * *) paramp;
if(cipf) {
2019-05-03 17:18:58 -04:00
cipt = (struct curl_certinfo *) malloc(sizeof(*cipt));
if(!cipt)
ret = CURLE_OUT_OF_MEMORY;
else {
2019-05-03 17:18:58 -04:00
cipt->certinfo = (struct curl_slist **)
calloc(cipf->num_of_certs +
1, sizeof(struct curl_slist *));
if(!cipt->certinfo)
ret = CURLE_OUT_OF_MEMORY;
else {
int i;
cipt->num_of_certs = cipf->num_of_certs;
2013-10-28 07:00:22 -04:00
for(i = 0; i < cipf->num_of_certs; i++)
if(cipf->certinfo[i])
if(!(cipt->certinfo[i] = slist_convert(ccsid,
cipf->certinfo[i],
ASCII_CCSID))) {
ret = CURLE_OUT_OF_MEMORY;
break;
}
}
}
if(ret != CURLE_OK) {
curl_certinfo_free_all(cipt);
cipt = (struct curl_certinfo *) NULL;
}
*(struct curl_certinfo * *) paramp = cipt;
}
2013-12-02 08:33:51 -05:00
break;
case CURLINFO_TLS_SESSION:
case CURLINFO_TLS_SSL_PTR:
case CURLINFO_SOCKET:
2013-12-02 08:33:51 -05:00
break;
default:
2019-05-03 17:18:58 -04:00
slp = (struct curl_slist **) paramp;
if(*slp) {
*slp = slist_convert(ccsid, *slp, ASCII_CCSID);
if(!*slp)
ret = CURLE_OUT_OF_MEMORY;
2019-05-03 17:18:58 -04:00
}
2013-12-02 08:33:51 -05:00
break;
}
}
}
2007-08-23 10:30:24 -04:00
va_end(arg);
2007-08-23 10:30:24 -04:00
return ret;
}
static int
Curl_is_formadd_string(CURLformoption option)
{
2019-05-03 17:18:58 -04:00
switch(option) {
2007-08-23 10:30:24 -04:00
case CURLFORM_FILENAME:
case CURLFORM_CONTENTTYPE:
case CURLFORM_BUFFER:
case CURLFORM_FILE:
case CURLFORM_FILECONTENT:
case CURLFORM_COPYCONTENTS:
case CURLFORM_COPYNAME:
return 1;
}
2007-08-23 10:30:24 -04:00
return 0;
}
static void
Curl_formadd_release_local(struct curl_forms * forms, int nargs, int skip)
{
2013-10-28 07:00:22 -04:00
while(nargs--)
if(nargs != skip)
if(Curl_is_formadd_string(forms[nargs].option))
if(forms[nargs].value)
2007-08-23 10:30:24 -04:00
free((char *) forms[nargs].value);
free((char *) forms);
}
static int
Curl_formadd_convert(struct curl_forms * forms,
int formx, int lengthx, unsigned int ccsid)
{
int l;
2019-05-03 17:18:58 -04:00
char *cp;
char *cp2;
2007-08-23 10:30:24 -04:00
if(formx < 0 || !forms[formx].value)
2007-08-23 10:30:24 -04:00
return 0;
if(lengthx >= 0)
2007-08-23 10:30:24 -04:00
l = (int) forms[lengthx].value;
else
l = strlen(forms[formx].value) + 1;
cp = malloc(MAX_CONV_EXPANSION * l);
if(!cp)
2007-08-23 10:30:24 -04:00
return -1;
l = convert(cp, MAX_CONV_EXPANSION * l, ASCII_CCSID,
forms[formx].value, l, ccsid);
if(l < 0) {
2007-08-23 10:30:24 -04:00
free(cp);
return -1;
}
2013-10-28 07:00:22 -04:00
cp2 = realloc(cp, l); /* Shorten buffer to the string size. */
2007-08-23 10:30:24 -04:00
if(cp2)
2007-08-23 10:30:24 -04:00
cp = cp2;
forms[formx].value = cp;
if(lengthx >= 0)
2013-10-28 07:00:22 -04:00
forms[lengthx].value = (char *) l; /* Update length after conversion. */
2007-08-23 10:30:24 -04:00
return l;
}
CURLFORMcode
curl_formadd_ccsid(struct curl_httppost * * httppost,
struct curl_httppost * * last_post, ...)
{
va_list arg;
CURLformoption option;
CURLFORMcode result;
struct curl_forms * forms;
struct curl_forms * lforms;
struct curl_forms * tforms;
unsigned int lformlen;
2019-05-03 17:18:58 -04:00
const char *value;
2007-08-23 10:30:24 -04:00
unsigned int ccsid;
int nargs;
int namex;
int namelengthx;
int contentx;
int lengthx;
unsigned int contentccsid;
unsigned int nameccsid;
2017-03-26 11:02:22 -04:00
/* A single curl_formadd() call cannot be split in several calls to deal
2007-08-23 10:30:24 -04:00
with all parameters: the original parameters are thus copied to a local
curl_forms array and converted to ASCII when needed.
CURLFORM_PTRNAME is processed as if it were CURLFORM_COPYNAME.
CURLFORM_COPYNAME and CURLFORM_NAMELENGTH occurrence order in
parameters is not defined; for this reason, the actual conversion is
delayed to the end of parameter processing. The same applies to
CURLFORM_COPYCONTENTS/CURLFORM_CONTENTSLENGTH, but these may appear
several times in the parameter list; the problem resides here in knowing
which CURLFORM_CONTENTSLENGTH applies to which CURLFORM_COPYCONTENTS and
when we can be sure to have both info for conversion: end of parameter
list is such a point, but CURLFORM_CONTENTTYPE is also used here as a
natural separator between content data definitions; this seems to be
in accordance with FormAdd() behavior. */
/* Allocate the local curl_forms array. */
lformlen = ALLOC_GRANULE;
2019-05-03 17:18:58 -04:00
lforms = malloc(lformlen * sizeof(*lforms));
2007-08-23 10:30:24 -04:00
if(!lforms)
2007-08-23 10:30:24 -04:00
return CURL_FORMADD_MEMORY;
/* Process the arguments, copying them into local array, latching conversion
indexes and converting when needed. */
result = CURL_FORMADD_OK;
nargs = 0;
contentx = -1;
lengthx = -1;
namex = -1;
namelengthx = -1;
forms = (struct curl_forms *) NULL;
va_start(arg, last_post);
2013-10-28 07:00:22 -04:00
for(;;) {
2007-08-23 10:30:24 -04:00
/* Make sure there is still room for an item in local array. */
if(nargs >= lformlen) {
2007-08-23 10:30:24 -04:00
lformlen += ALLOC_GRANULE;
2019-05-03 17:18:58 -04:00
tforms = realloc(lforms, lformlen * sizeof(*lforms));
2007-08-23 10:30:24 -04:00
if(!tforms) {
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_MEMORY;
break;
}
lforms = tforms;
}
/* Get next option. */
if(forms) {
2007-08-23 10:30:24 -04:00
/* Get option from array. */
option = forms->option;
value = forms->value;
forms++;
}
else {
/* Get option from arguments. */
option = va_arg(arg, CURLformoption);
if(option == CURLFORM_END)
2007-08-23 10:30:24 -04:00
break;
}
/* Dispatch by option. */
2019-05-03 17:18:58 -04:00
switch(option) {
2007-08-23 10:30:24 -04:00
case CURLFORM_END:
forms = (struct curl_forms *) NULL; /* Leave array mode. */
continue;
case CURLFORM_ARRAY:
if(!forms) {
2007-08-23 10:30:24 -04:00
forms = va_arg(arg, struct curl_forms *);
continue;
}
result = CURL_FORMADD_ILLEGAL_ARRAY;
break;
case CURLFORM_COPYNAME:
option = CURLFORM_PTRNAME; /* Static for now. */
case CURLFORM_PTRNAME:
if(namex >= 0)
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_OPTION_TWICE;
namex = nargs;
if(!forms) {
2007-08-23 10:30:24 -04:00
value = va_arg(arg, char *);
nameccsid = (unsigned int) va_arg(arg, long);
}
else {
nameccsid = (unsigned int) forms->value;
forms++;
}
break;
case CURLFORM_COPYCONTENTS:
if(contentx >= 0)
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_OPTION_TWICE;
contentx = nargs;
if(!forms) {
2007-08-23 10:30:24 -04:00
value = va_arg(arg, char *);
contentccsid = (unsigned int) va_arg(arg, long);
}
else {
contentccsid = (unsigned int) forms->value;
forms++;
}
break;
case CURLFORM_PTRCONTENTS:
case CURLFORM_BUFFERPTR:
if(!forms)
2007-08-23 10:30:24 -04:00
value = va_arg(arg, char *); /* No conversion. */
break;
case CURLFORM_CONTENTSLENGTH:
lengthx = nargs;
if(!forms)
2007-08-23 10:30:24 -04:00
value = (char *) va_arg(arg, long);
break;
case CURLFORM_CONTENTLEN:
lengthx = nargs;
if(!forms)
value = (char *) va_arg(arg, curl_off_t);
break;
2007-08-23 10:30:24 -04:00
case CURLFORM_NAMELENGTH:
namelengthx = nargs;
if(!forms)
2007-08-23 10:30:24 -04:00
value = (char *) va_arg(arg, long);
break;
case CURLFORM_BUFFERLENGTH:
if(!forms)
2007-08-23 10:30:24 -04:00
value = (char *) va_arg(arg, long);
break;
case CURLFORM_CONTENTHEADER:
if(!forms)
2007-08-23 10:30:24 -04:00
value = (char *) va_arg(arg, struct curl_slist *);
break;
case CURLFORM_STREAM:
if(!forms)
value = (char *) va_arg(arg, void *);
break;
2007-08-23 10:30:24 -04:00
case CURLFORM_CONTENTTYPE:
/* If a previous content has been encountered, convert it now. */
if(Curl_formadd_convert(lforms, contentx, lengthx, contentccsid) < 0) {
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_MEMORY;
break;
}
contentx = -1;
lengthx = -1;
/* Fall into default. */
default:
/* Must be a convertible string. */
if(!Curl_is_formadd_string(option)) {
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_UNKNOWN_OPTION;
break;
}
if(!forms) {
2007-08-23 10:30:24 -04:00
value = va_arg(arg, char *);
ccsid = (unsigned int) va_arg(arg, long);
}
else {
ccsid = (unsigned int) forms->value;
forms++;
}
/* Do the conversion. */
lforms[nargs].value = value;
if(Curl_formadd_convert(lforms, nargs, -1, ccsid) < 0) {
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_MEMORY;
break;
}
value = lforms[nargs].value;
}
if(result != CURL_FORMADD_OK)
2007-08-23 10:30:24 -04:00
break;
lforms[nargs].value = value;
lforms[nargs++].option = option;
}
va_end(arg);
/* Convert the name and the last content, now that we know their lengths. */
if(result == CURL_FORMADD_OK && namex >= 0) {
if(Curl_formadd_convert(lforms, namex, namelengthx, nameccsid) < 0)
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_MEMORY;
else
lforms[namex].option = CURLFORM_COPYNAME; /* Force copy. */
}
if(result == CURL_FORMADD_OK) {
if(Curl_formadd_convert(lforms, contentx, lengthx, contentccsid) < 0)
2007-08-23 10:30:24 -04:00
result = CURL_FORMADD_MEMORY;
else
contentx = -1;
}
/* Do the formadd with our converted parameters. */
if(result == CURL_FORMADD_OK) {
2007-08-23 10:30:24 -04:00
lforms[nargs].option = CURLFORM_END;
result = curl_formadd(httppost, last_post,
CURLFORM_ARRAY, lforms, CURLFORM_END);
}
/* Terminate. */
Curl_formadd_release_local(lforms, nargs, contentx);
return result;
}
typedef struct {
curl_formget_callback append;
void * arg;
unsigned int ccsid;
} cfcdata;
static size_t
2019-05-03 17:18:58 -04:00
Curl_formget_callback_ccsid(void *arg, const char *buf, size_t len)
2007-08-23 10:30:24 -04:00
{
cfcdata * p;
2019-05-03 17:18:58 -04:00
char *b;
2007-08-23 10:30:24 -04:00
int l;
size_t ret;
p = (cfcdata *) arg;
if((long) len <= 0)
2007-08-23 10:30:24 -04:00
return (*p->append)(p->arg, buf, len);
b = malloc(MAX_CONV_EXPANSION * len);
if(!b)
2007-08-23 10:30:24 -04:00
return (size_t) -1;
l = convert(b, MAX_CONV_EXPANSION * len, p->ccsid, buf, len, ASCII_CCSID);
if(l < 0) {
2007-08-23 10:30:24 -04:00
free(b);
return (size_t) -1;
}
ret = (*p->append)(p->arg, b, l);
free(b);
return ret == l? len: -1;
}
int
2019-05-03 17:18:58 -04:00
curl_formget_ccsid(struct curl_httppost *form, void *arg,
2007-08-23 10:30:24 -04:00
curl_formget_callback append, unsigned int ccsid)
{
cfcdata lcfc;
lcfc.append = append;
lcfc.arg = arg;
lcfc.ccsid = ccsid;
return curl_formget(form, (void *) &lcfc, Curl_formget_callback_ccsid);
}
CURLcode
2019-05-03 17:18:58 -04:00
curl_easy_setopt_ccsid(CURL *curl, CURLoption tag, ...)
2007-08-23 10:30:24 -04:00
{
CURLcode result;
va_list arg;
2019-05-03 17:18:58 -04:00
struct Curl_easy *data;
char *s;
char *cp;
2007-08-23 10:30:24 -04:00
unsigned int ccsid;
curl_off_t pfsize;
2007-08-23 10:30:24 -04:00
data = (struct Curl_easy *) curl;
2007-08-23 10:30:24 -04:00
va_start(arg, tag);
2019-05-03 17:18:58 -04:00
switch(tag) {
2007-08-23 10:30:24 -04:00
case CURLOPT_ABSTRACT_UNIX_SOCKET:
case CURLOPT_ALTSVC:
2007-08-23 10:30:24 -04:00
case CURLOPT_CAINFO:
case CURLOPT_CAPATH:
case CURLOPT_COOKIE:
case CURLOPT_COOKIEFILE:
case CURLOPT_COOKIEJAR:
case CURLOPT_COOKIELIST:
case CURLOPT_CRLFILE:
2007-08-23 10:30:24 -04:00
case CURLOPT_CUSTOMREQUEST:
case CURLOPT_DEFAULT_PROTOCOL:
case CURLOPT_DNS_SERVERS:
case CURLOPT_DNS_INTERFACE:
case CURLOPT_DNS_LOCAL_IP4:
case CURLOPT_DNS_LOCAL_IP6:
case CURLOPT_DOH_URL:
2007-08-23 10:30:24 -04:00
case CURLOPT_EGDSOCKET:
case CURLOPT_ENCODING:
2016-11-24 21:25:21 -05:00
case CURLOPT_FTPPORT:
2007-08-23 10:30:24 -04:00
case CURLOPT_FTP_ACCOUNT:
case CURLOPT_FTP_ALTERNATIVE_TO_USER:
case CURLOPT_INTERFACE:
case CURLOPT_ISSUERCERT:
case CURLOPT_KEYPASSWD:
2007-08-23 10:30:24 -04:00
case CURLOPT_KRBLEVEL:
case CURLOPT_LOGIN_OPTIONS:
case CURLOPT_MAIL_AUTH:
2016-11-24 21:25:21 -05:00
case CURLOPT_MAIL_FROM:
2007-08-23 10:30:24 -04:00
case CURLOPT_NETRC_FILE:
case CURLOPT_NOPROXY:
case CURLOPT_PASSWORD:
case CURLOPT_PINNEDPUBLICKEY:
case CURLOPT_PRE_PROXY:
2007-08-23 10:30:24 -04:00
case CURLOPT_PROXY:
case CURLOPT_PROXYPASSWORD:
case CURLOPT_PROXYUSERNAME:
2007-08-23 10:30:24 -04:00
case CURLOPT_PROXYUSERPWD:
proxy: Support HTTPS proxy and SOCKS+HTTP(s) * HTTPS proxies: An HTTPS proxy receives all transactions over an SSL/TLS connection. Once a secure connection with the proxy is established, the user agent uses the proxy as usual, including sending CONNECT requests to instruct the proxy to establish a [usually secure] TCP tunnel with an origin server. HTTPS proxies protect nearly all aspects of user-proxy communications as opposed to HTTP proxies that receive all requests (including CONNECT requests) in vulnerable clear text. With HTTPS proxies, it is possible to have two concurrent _nested_ SSL/TLS sessions: the "outer" one between the user agent and the proxy and the "inner" one between the user agent and the origin server (through the proxy). This change adds supports for such nested sessions as well. A secure connection with a proxy requires its own set of the usual SSL options (their actual descriptions differ and need polishing, see TODO): --proxy-cacert FILE CA certificate to verify peer against --proxy-capath DIR CA directory to verify peer against --proxy-cert CERT[:PASSWD] Client certificate file and password --proxy-cert-type TYPE Certificate file type (DER/PEM/ENG) --proxy-ciphers LIST SSL ciphers to use --proxy-crlfile FILE Get a CRL list in PEM format from the file --proxy-insecure Allow connections to proxies with bad certs --proxy-key KEY Private key file name --proxy-key-type TYPE Private key file type (DER/PEM/ENG) --proxy-pass PASS Pass phrase for the private key --proxy-ssl-allow-beast Allow security flaw to improve interop --proxy-sslv2 Use SSLv2 --proxy-sslv3 Use SSLv3 --proxy-tlsv1 Use TLSv1 --proxy-tlsuser USER TLS username --proxy-tlspassword STRING TLS password --proxy-tlsauthtype STRING TLS authentication type (default SRP) All --proxy-foo options are independent from their --foo counterparts, except --proxy-crlfile which defaults to --crlfile and --proxy-capath which defaults to --capath. Curl now also supports %{proxy_ssl_verify_result} --write-out variable, similar to the existing %{ssl_verify_result} variable. Supported backends: OpenSSL, GnuTLS, and NSS. * A SOCKS proxy + HTTP/HTTPS proxy combination: If both --socks* and --proxy options are given, Curl first connects to the SOCKS proxy and then connects (through SOCKS) to the HTTP or HTTPS proxy. TODO: Update documentation for the new APIs and --proxy-* options. Look for "Added in 7.XXX" marks.
2016-11-16 12:49:15 -05:00
case CURLOPT_PROXY_CAINFO:
case CURLOPT_PROXY_CAPATH:
case CURLOPT_PROXY_CRLFILE:
case CURLOPT_PROXY_KEYPASSWD:
case CURLOPT_PROXY_PINNEDPUBLICKEY:
case CURLOPT_PROXY_SERVICE_NAME:
proxy: Support HTTPS proxy and SOCKS+HTTP(s) * HTTPS proxies: An HTTPS proxy receives all transactions over an SSL/TLS connection. Once a secure connection with the proxy is established, the user agent uses the proxy as usual, including sending CONNECT requests to instruct the proxy to establish a [usually secure] TCP tunnel with an origin server. HTTPS proxies protect nearly all aspects of user-proxy communications as opposed to HTTP proxies that receive all requests (including CONNECT requests) in vulnerable clear text. With HTTPS proxies, it is possible to have two concurrent _nested_ SSL/TLS sessions: the "outer" one between the user agent and the proxy and the "inner" one between the user agent and the origin server (through the proxy). This change adds supports for such nested sessions as well. A secure connection with a proxy requires its own set of the usual SSL options (their actual descriptions differ and need polishing, see TODO): --proxy-cacert FILE CA certificate to verify peer against --proxy-capath DIR CA directory to verify peer against --proxy-cert CERT[:PASSWD] Client certificate file and password --proxy-cert-type TYPE Certificate file type (DER/PEM/ENG) --proxy-ciphers LIST SSL ciphers to use --proxy-crlfile FILE Get a CRL list in PEM format from the file --proxy-insecure Allow connections to proxies with bad certs --proxy-key KEY Private key file name --proxy-key-type TYPE Private key file type (DER/PEM/ENG) --proxy-pass PASS Pass phrase for the private key --proxy-ssl-allow-beast Allow security flaw to improve interop --proxy-sslv2 Use SSLv2 --proxy-sslv3 Use SSLv3 --proxy-tlsv1 Use TLSv1 --proxy-tlsuser USER TLS username --proxy-tlspassword STRING TLS password --proxy-tlsauthtype STRING TLS authentication type (default SRP) All --proxy-foo options are independent from their --foo counterparts, except --proxy-crlfile which defaults to --crlfile and --proxy-capath which defaults to --capath. Curl now also supports %{proxy_ssl_verify_result} --write-out variable, similar to the existing %{ssl_verify_result} variable. Supported backends: OpenSSL, GnuTLS, and NSS. * A SOCKS proxy + HTTP/HTTPS proxy combination: If both --socks* and --proxy options are given, Curl first connects to the SOCKS proxy and then connects (through SOCKS) to the HTTP or HTTPS proxy. TODO: Update documentation for the new APIs and --proxy-* options. Look for "Added in 7.XXX" marks.
2016-11-16 12:49:15 -05:00
case CURLOPT_PROXY_SSLCERT:
case CURLOPT_PROXY_SSLCERTTYPE:
case CURLOPT_PROXY_SSLKEY:
case CURLOPT_PROXY_SSLKEYTYPE:
2016-11-24 21:25:21 -05:00
case CURLOPT_PROXY_SSL_CIPHER_LIST:
case CURLOPT_PROXY_TLS13_CIPHERS:
proxy: Support HTTPS proxy and SOCKS+HTTP(s) * HTTPS proxies: An HTTPS proxy receives all transactions over an SSL/TLS connection. Once a secure connection with the proxy is established, the user agent uses the proxy as usual, including sending CONNECT requests to instruct the proxy to establish a [usually secure] TCP tunnel with an origin server. HTTPS proxies protect nearly all aspects of user-proxy communications as opposed to HTTP proxies that receive all requests (including CONNECT requests) in vulnerable clear text. With HTTPS proxies, it is possible to have two concurrent _nested_ SSL/TLS sessions: the "outer" one between the user agent and the proxy and the "inner" one between the user agent and the origin server (through the proxy). This change adds supports for such nested sessions as well. A secure connection with a proxy requires its own set of the usual SSL options (their actual descriptions differ and need polishing, see TODO): --proxy-cacert FILE CA certificate to verify peer against --proxy-capath DIR CA directory to verify peer against --proxy-cert CERT[:PASSWD] Client certificate file and password --proxy-cert-type TYPE Certificate file type (DER/PEM/ENG) --proxy-ciphers LIST SSL ciphers to use --proxy-crlfile FILE Get a CRL list in PEM format from the file --proxy-insecure Allow connections to proxies with bad certs --proxy-key KEY Private key file name --proxy-key-type TYPE Private key file type (DER/PEM/ENG) --proxy-pass PASS Pass phrase for the private key --proxy-ssl-allow-beast Allow security flaw to improve interop --proxy-sslv2 Use SSLv2 --proxy-sslv3 Use SSLv3 --proxy-tlsv1 Use TLSv1 --proxy-tlsuser USER TLS username --proxy-tlspassword STRING TLS password --proxy-tlsauthtype STRING TLS authentication type (default SRP) All --proxy-foo options are independent from their --foo counterparts, except --proxy-crlfile which defaults to --crlfile and --proxy-capath which defaults to --capath. Curl now also supports %{proxy_ssl_verify_result} --write-out variable, similar to the existing %{ssl_verify_result} variable. Supported backends: OpenSSL, GnuTLS, and NSS. * A SOCKS proxy + HTTP/HTTPS proxy combination: If both --socks* and --proxy options are given, Curl first connects to the SOCKS proxy and then connects (through SOCKS) to the HTTP or HTTPS proxy. TODO: Update documentation for the new APIs and --proxy-* options. Look for "Added in 7.XXX" marks.
2016-11-16 12:49:15 -05:00
case CURLOPT_PROXY_TLSAUTH_PASSWORD:
case CURLOPT_PROXY_TLSAUTH_TYPE:
case CURLOPT_PROXY_TLSAUTH_USERNAME:
2007-08-23 10:30:24 -04:00
case CURLOPT_RANDOM_FILE:
case CURLOPT_RANGE:
case CURLOPT_REFERER:
case CURLOPT_REQUEST_TARGET:
case CURLOPT_RTSP_SESSION_ID:
case CURLOPT_RTSP_STREAM_URI:
case CURLOPT_RTSP_TRANSPORT:
case CURLOPT_SASL_AUTHZID:
case CURLOPT_SERVICE_NAME:
case CURLOPT_SOCKS5_GSSAPI_SERVICE:
case CURLOPT_SSH_HOST_PUBLIC_KEY_MD5:
case CURLOPT_SSH_KNOWNHOSTS:
2007-08-23 10:30:24 -04:00
case CURLOPT_SSH_PRIVATE_KEYFILE:
case CURLOPT_SSH_PUBLIC_KEYFILE:
case CURLOPT_SSLCERT:
case CURLOPT_SSLCERTTYPE:
case CURLOPT_SSLENGINE:
case CURLOPT_SSLKEY:
case CURLOPT_SSLKEYTYPE:
2016-11-24 21:25:21 -05:00
case CURLOPT_SSL_CIPHER_LIST:
case CURLOPT_TLS13_CIPHERS:
case CURLOPT_TLSAUTH_PASSWORD:
case CURLOPT_TLSAUTH_TYPE:
case CURLOPT_TLSAUTH_USERNAME:
2014-12-04 09:34:03 -05:00
case CURLOPT_UNIX_SOCKET_PATH:
2007-08-23 10:30:24 -04:00
case CURLOPT_URL:
case CURLOPT_USERAGENT:
case CURLOPT_USERNAME:
case CURLOPT_USERPWD:
case CURLOPT_XOAUTH2_BEARER:
2007-08-23 10:30:24 -04:00
s = va_arg(arg, char *);
ccsid = va_arg(arg, unsigned int);
if(s) {
2007-08-23 10:30:24 -04:00
s = dynconvert(ASCII_CCSID, s, -1, ccsid);
if(!s) {
2007-08-23 10:30:24 -04:00
result = CURLE_OUT_OF_MEMORY;
break;
}
}
2007-08-23 10:30:24 -04:00
result = curl_easy_setopt(curl, tag, s);
free(s);
2007-08-23 10:30:24 -04:00
break;
case CURLOPT_COPYPOSTFIELDS:
/* Special case: byte count may have been given by CURLOPT_POSTFIELDSIZE
prior to this call. In this case, convert the given byte count and
replace the length according to the conversion result. */
s = va_arg(arg, char *);
ccsid = va_arg(arg, unsigned int);
pfsize = data->set.postfieldsize;
if(!s || !pfsize || ccsid == NOCONV_CCSID || ccsid == ASCII_CCSID) {
result = curl_easy_setopt(curl, CURLOPT_COPYPOSTFIELDS, s);
break;
}
if(pfsize == -1) {
/* Data is null-terminated. */
s = dynconvert(ASCII_CCSID, s, -1, ccsid);
if(!s) {
result = CURLE_OUT_OF_MEMORY;
break;
}
}
else {
/* Data length specified. */
size_t len;
if(pfsize < 0 || pfsize > SIZE_MAX) {
result = CURLE_OUT_OF_MEMORY;
break;
}
len = pfsize;
pfsize = len * MAX_CONV_EXPANSION;
if(pfsize > SIZE_MAX)
pfsize = SIZE_MAX;
cp = malloc(pfsize);
if(!cp) {
result = CURLE_OUT_OF_MEMORY;
break;
}
pfsize = convert(cp, pfsize, ASCII_CCSID, s, len, ccsid);
if(pfsize < 0) {
free(cp);
result = CURLE_OUT_OF_MEMORY;
break;
}
data->set.postfieldsize = pfsize; /* Replace data size. */
s = cp;
}
result = curl_easy_setopt(curl, CURLOPT_POSTFIELDS, s);
data->set.str[STRING_COPYPOSTFIELDS] = s; /* Give to library. */
break;
2007-08-23 10:30:24 -04:00
case CURLOPT_ERRORBUFFER: /* This is an output buffer. */
default:
result = Curl_vsetopt(curl, tag, arg);
2007-08-23 10:30:24 -04:00
break;
}
2007-08-23 10:30:24 -04:00
va_end(arg);
return result;
}
char *
curl_form_long_value(long value)
{
/* ILE/RPG cannot cast an integer to a pointer. This procedure does it. */
return (char *) value;
}
char *
curl_pushheader_bynum_cssid(struct curl_pushheaders *h,
size_t num, unsigned int ccsid)
{
char *d = (char *) NULL;
char *s = curl_pushheader_bynum(h, num);
if(s)
d = dynconvert(ccsid, s, -1, ASCII_CCSID);
return d;
}
char *
curl_pushheader_byname_ccsid(struct curl_pushheaders *h, const char *header,
unsigned int ccsidin, unsigned int ccsidout)
{
char *d = (char *) NULL;
if(header) {
header = dynconvert(ASCII_CCSID, header, -1, ccsidin);
if(header) {
char *s = curl_pushheader_byname(h, header);
free((char *) header);
if(s)
d = dynconvert(ccsidout, s, -1, ASCII_CCSID);
}
}
return d;
}
static CURLcode
mime_string_call(curl_mimepart *part, const char *string, unsigned int ccsid,
CURLcode (*mimefunc)(curl_mimepart *part, const char *string))
{
char *s = (char *) NULL;
CURLcode result;
if(!string)
return mimefunc(part, string);
s = dynconvert(ASCII_CCSID, string, -1, ccsid);
if(!s)
return CURLE_OUT_OF_MEMORY;
result = mimefunc(part, s);
free(s);
return result;
}
CURLcode
curl_mime_name_ccsid(curl_mimepart *part, const char *name, unsigned int ccsid)
{
return mime_string_call(part, name, ccsid, curl_mime_name);
}
CURLcode
curl_mime_filename_ccsid(curl_mimepart *part,
const char *filename, unsigned int ccsid)
{
return mime_string_call(part, filename, ccsid, curl_mime_filename);
}
CURLcode
curl_mime_type_ccsid(curl_mimepart *part,
const char *mimetype, unsigned int ccsid)
{
return mime_string_call(part, mimetype, ccsid, curl_mime_type);
}
CURLcode
curl_mime_encoder_ccsid(curl_mimepart *part,
const char *encoding, unsigned int ccsid)
{
return mime_string_call(part, encoding, ccsid, curl_mime_encoder);
}
CURLcode
curl_mime_filedata_ccsid(curl_mimepart *part,
const char *filename, unsigned int ccsid)
{
return mime_string_call(part, filename, ccsid, curl_mime_filedata);
}
CURLcode
curl_mime_data_ccsid(curl_mimepart *part,
const char *data, size_t datasize, unsigned int ccsid)
{
char *s = (char *) NULL;
CURLcode result;
if(!data)
return curl_mime_data(part, data, datasize);
s = dynconvert(ASCII_CCSID, data, datasize, ccsid);
if(!s)
return CURLE_OUT_OF_MEMORY;
result = curl_mime_data(part, s, datasize);
free(s);
return result;
}
CURLUcode
curl_url_get_ccsid(CURLU *handle, CURLUPart what, char **part,
unsigned int flags, unsigned int ccsid)
{
char *s = (char *)NULL;
CURLUcode result;
if(!part)
return CURLUE_BAD_PARTPOINTER;
*part = (char *)NULL;
result = curl_url_get(handle, what, &s, flags);
if(result == CURLUE_OK) {
if(s) {
*part = dynconvert(ccsid, s, -1, ASCII_CCSID);
if(!*part)
result = CURLUE_OUT_OF_MEMORY;
}
}
if(s)
free(s);
return result;
}
CURLUcode
curl_url_set_ccsid(CURLU *handle, CURLUPart what, const char *part,
unsigned int flags, unsigned int ccsid)
{
char *s = (char *)NULL;
CURLUcode result;
if(part) {
s = dynconvert(ASCII_CCSID, part, -1, ccsid);
if(!s)
return CURLUE_OUT_OF_MEMORY;
}
result = curl_url_set(handle, what, s, flags);
if(s)
free(s);
return result;
}