Skip to content
Snippets Groups Projects
url.c 91.1 KiB
Newer Older
  • Learn to ignore specific revisions
  • Daniel Stenberg's avatar
    Daniel Stenberg committed
       * Set a few convenience pointers 
       *************************************************************/
    
      conn->name = conn->gname;
      conn->ppath = conn->path;
    
      conn->hostname = conn->name;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Detect what (if any) proxy to use
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If proxy was not specified, we check for default proxy environment
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
         * variables, to enable i.e Lynx compliance:
         *
         * http_proxy=http://some.server.dom:port/
         * https_proxy=http://some.server.dom:port/
         * ftp_proxy=http://some.server.dom:port/
         * gopher_proxy=http://some.server.dom:port/
         * no_proxy=domain1.dom,host.domain2.dom
         *   (a comma-separated list of hosts which should
         *   not be proxied, or an asterisk to override
         *   all proxy variables)
         * all_proxy=http://some.server.dom:port/
         *   (seems to exist for the CERN www lib. Probably
         *   the first to check for.)
         *
         * For compatibility, the all-uppercase versions of these variables are
         * checked if the lowercase versions don't exist.
         */
    
        char *no_proxy_tok_buf;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *proxy=NULL;
        char proxy_env[128];
    
    
        no_proxy=curl_getenv("no_proxy");
    
          no_proxy=curl_getenv("NO_PROXY");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!no_proxy || !strequal("*", no_proxy)) {
          /* NO_PROXY wasn't specified or it wasn't just an asterisk */
          char *nope;
    
    
          nope=no_proxy?strtok_r(no_proxy, ", ", &no_proxy_tok_buf):NULL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          while(nope) {
    
            unsigned int namelen;
    
            char *endptr = strchr(conn->name, ':');
            if(endptr)
              namelen=endptr-conn->name;
            else
              namelen=strlen(conn->name);
    
            if(strlen(nope) <= namelen) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              char *checkn=
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
                /* no proxy for this host! */
                break;
              }
            }
    
    	nope=strtok_r(NULL, ", ", &no_proxy_tok_buf);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          if(!nope) {
    	/* It was not listed as without proxy */
    
    	char *protop = conn->protostr;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	char *envp = proxy_env;
    	char *prox;
    
    
    	/* Now, build <protocol>_proxy and check for such a one to use */
    	while(*protop)
    	  *envp++ = tolower(*protop++);
    
    	/* append _proxy */
    	strcpy(envp, "_proxy");
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	/* read the protocol proxy: */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            /*
             * We don't try the uppercase version of HTTP_PROXY because of
             * security reasons:
             *
             * When curl is used in a webserver application
             * environment (cgi or php), this environment variable can
             * be controlled by the web server user by setting the
             * http header 'Proxy:' to some value.
             * 
             * This can cause 'internal' http/ftp requests to be
             * arbitrarily redirected by any external attacker.
             */
    	if(!prox && !strequal("http_proxy", proxy_env)) {
    
              /* There was no lowercase variable, try the uppercase version: */
    	  for(envp = proxy_env; *envp; envp++)
    	    *envp = toupper(*envp);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	if(prox && *prox) { /* don't count "" strings */
    	  proxy = prox; /* use this */
    
    	  proxy = curl_getenv("all_proxy"); /* default proxy to use */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
            if(proxy && *proxy) {
              /* we have a proxy here to set */
    
              data->change.proxy = proxy;
              data->change.proxy_alloc=TRUE; /* this needs to be freed later */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            }
    
          } /* if (!nope) - it wasn't specified non-proxy */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        } /* NO_PROXY wasn't specified or '*' */
    
        if(no_proxy)
          free(no_proxy);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      } /* if not using proxy */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
    
       * No protocol part in URL was used, add it!
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
       *************************************************************/
    
      if(conn->protocol&PROT_MISSING) {
        /* We're guessing prefixes here and if we're told to use a proxy or if
           we're gonna follow a Location: later or... then we need the protocol
           part added so that we have a valid URL. */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *reurl;
    
    
        reurl = aprintf("%s://%s", conn->protostr, data->change.url);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        if(!reurl)
    
          return CURLE_OUT_OF_MEMORY;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        data->change.url = reurl;
        data->change.url_alloc = TRUE; /* free this later */
    
        conn->protocol &= ~PROT_MISSING; /* switch that one off again */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /************************************************************
       * RESUME on a HTTP page is a tricky business. First, let's just check that
       * 'range' isn't used, then set the range parameter and leave the resume as
       * it is to inform about this situation for later use. We will then
       * "attempt" to resume, and if we're talking to a HTTP/1.1 (or later)
       * server, we will get the document resumed. If we talk to a HTTP/1.0
       * server, we just fail since we can't rewind the file writing from within
       * this function.
       ***********************************************************/
    
      if(conn->resume_from) {
        if(!conn->bits.use_range) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* if it already was in use, we just skip this */
    
          snprintf(resumerange, sizeof(resumerange), "%d-", conn->resume_from);
          conn->range=strdup(resumerange); /* tell ourselves to fetch this range */
          conn->bits.rangestringalloc = TRUE; /* mark as allocated */
          conn->bits.use_range = 1; /* switch on range usage */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Setup internals depending on protocol
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      if (strequal(conn->protostr, "HTTP")) {
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_HTTP;
    
        conn->protocol |= PROT_HTTP;
    
        conn->curl_done = Curl_http_done;
    
        conn->curl_connect = Curl_http_connect;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with HTTP disabled, http: not supported!");
        return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "HTTPS")) {
    
    #if defined(USE_SSLEAY) && !defined(CURL_DISABLE_HTTP)
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_HTTPS;
    
        conn->protocol |= PROT_HTTP|PROT_HTTPS|PROT_SSL;
    
        conn->curl_done = Curl_http_done;
        conn->curl_connect = Curl_http_connect;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else /* USE_SSLEAY */
    
        failf(data, LIBCURL_NAME
              " was built with SSL disabled, https: not supported!");
    
        return CURLE_UNSUPPORTED_PROTOCOL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif /* !USE_SSLEAY */
      }
    
      else if (strequal(conn->protostr, "GOPHER")) {
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_GOPHER;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* Skip /<item-type>/ in path if present */
    
        if (isdigit((int)conn->path[1])) {
          conn->ppath = strchr(&conn->path[1], '/');
          if (conn->ppath == NULL)
    	conn->ppath = conn->path;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
    
        conn->protocol |= PROT_GOPHER;
    
        conn->curl_done = Curl_http_done;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with GOPHER disabled, gopher: not supported!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      else if(strequal(conn->protostr, "FTP") ||
              strequal(conn->protostr, "FTPS")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *type;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        if(strequal(conn->protostr, "FTPS")) {
    #ifdef USE_SSLEAY
    
          conn->protocol |= PROT_FTPS|PROT_SSL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else
    
          failf(data, LIBCURL_NAME
                " was built with SSL disabled, ftps: not supported!");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          return CURLE_UNSUPPORTED_PROTOCOL;
    #endif /* !USE_SSLEAY */
        }
    
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_FTP;
    
        conn->protocol |= PROT_FTP;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
          /* Unless we have asked to tunnel ftp operations through the proxy, we
             switch and use HTTP operations only */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          if(conn->protocol & PROT_FTPS) {
            /* FTPS is a hacked protocol and does not work through your
               ordinary http proxy! */
            failf(data, "ftps does not work through http proxy!");
            return CURLE_UNSUPPORTED_PROTOCOL;
          }
    
          conn->curl_do = Curl_http;
          conn->curl_done = Curl_http_done;
    
    #else
          failf(data, "FTP over http proxy requires HTTP support built-in!");
          return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
          conn->curl_do_more = Curl_ftp_nextconnect;
    
          conn->curl_done = Curl_ftp_done;
          conn->curl_connect = Curl_ftp_connect;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          conn->curl_disconnect = Curl_ftp_disconnect;
    
        }
    
        conn->ppath++; /* don't include the initial slash */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        /* FTP URLs support an extension like ";type=<typecode>" that
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
         * we'll try to get now! */
    
        type=strstr(conn->ppath, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!type) {
    
          type=strstr(conn->gname, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
        if(type) {
          char command;
    
          *type=0;                     /* it was in the middle of the hostname */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          command = toupper(type[6]);
          switch(command) {
          case 'A': /* ASCII mode */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'D': /* directory mode */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'I': /* binary mode */
          default:
    	/* switch off ASCII */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          }
        }
    
    
    /* MN 06/07/02 */
    #else /* CURL_DISABLE_FTP */
        failf(data, LIBCURL_NAME
              " was built with FTP disabled, ftp/ftps: not supported!");
        return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if(strequal(conn->protostr, "TELNET")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* telnet testing factory */
    
        conn->protocol |= PROT_TELNET;
    
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port: PORT_TELNET;
    
        conn->curl_do = Curl_telnet;
        conn->curl_done = Curl_telnet_done;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with TELNET disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "DICT")) {
    
        conn->protocol |= PROT_DICT;
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_DICT;
    
        conn->curl_done = NULL; /* no DICT-specific done */
    
    #else
        failf(data, LIBCURL_NAME
              " was built with DICT disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "LDAP")) {
    
        conn->protocol |= PROT_LDAP;
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_LDAP;
    
        conn->curl_done = NULL; /* no LDAP-specific done */
    
    #else
        failf(data, LIBCURL_NAME
              " was built with LDAP disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "FILE")) {
    
        conn->protocol |= PROT_FILE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        /* no done() function */
    
        /* anyway, this is supposed to be the connect function so we better
           at least check that the file is present here! */
        result = Curl_file_connect(conn);
    
        /* Setup a "faked" transfer that'll do nothing */
        if(CURLE_OK == result) {
    
          conn->bits.tcpconnect = TRUE; /* we are "connected */
    
          result = Curl_Transfer(conn, -1, -1, FALSE, NULL, /* no download */
                                 -1, NULL); /* no upload */
        }
    
        return result;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with FILE disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      else {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* We fell through all checks and thus we don't support the specified
           protocol */
    
        failf(data, "Unsupported protocol: %s", conn->protostr);
    
        return CURLE_UNSUPPORTED_PROTOCOL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Figure out the remote port number
       *
       * No matter if we use a proxy or not, we have to figure out the remote
       * port number of various reasons.
       *
       * To be able to detect port number flawlessly, we must not confuse them
    
       * IPv6-specified addresses in the [0::1] style. (RFC2732)
    
       *
       * The conn->name is currently [user:passwd@]host[:port] where host could
       * be a hostname, IPv4 address or IPv6 address.
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
       *************************************************************/
    
      if((1 == sscanf(conn->name, "[%*39[0-9a-fA-F:.]%c", &endbracket)) &&
         (']' == endbracket)) {
        /* this is a RFC2732-style specified IP-address */
    
    
        conn->name++; /* pass the starting bracket */ 
    
        tmp = strchr(conn->name, ']');
        *tmp = 0; /* zero terminate */
        tmp++; /* pass the ending bracket */
        if(':' != *tmp)
          tmp = NULL; /* no port number available */
      }
      else
        tmp = strrchr(conn->name, ':');
    
      if (tmp) {
        char *rest;
        unsigned long port;
    
        port=strtoul(tmp+1, &rest, 10);  /* Port number must be decimal */
    
        if (rest != (tmp+1) && *rest == '\0') {
          /* The colon really did have only digits after it,
           * so it is either a port number or a mistake */
    
          if (port > 0xffff) {   /* Single unix standard says port numbers are
                                  * 16 bits long */
            failf(data, "Port number too large: %lu", port);
            return CURLE_URL_MALFORMAT;
          }
    
          *tmp = '\0'; /* cut off the name there */
    
          conn->remote_port = (unsigned short)port;
    
      if(data->change.proxy && *data->change.proxy) {
    
        /* If this is supposed to use a proxy, we need to figure out the proxy
           host name name, so that we can re-use an existing connection
           that may exist registered to the same proxy host. */
    
        char *prox_portno;
        char *endofprot;
    
        /* We need to make a duplicate of the proxy so that we can modify the
           string safely. */
    
        char *proxydup=strdup(data->change.proxy);
    
    
        /* We use 'proxyptr' to point to the proxy name from now on... */
        char *proxyptr=proxydup;
    
        if(NULL == proxydup) {
          failf(data, "memory shortage");
          return CURLE_OUT_OF_MEMORY;
        }
    
        /* Daniel Dec 10, 1998:
           We do the proxy host string parsing here. We want the host name and the
           port name. Accept a protocol:// prefix, even though it should just be
           ignored. */
    
        /* 1. skip the protocol part if present */
        endofprot=strstr(proxyptr, "://");
        if(endofprot) {
          proxyptr = endofprot+3;
        }
    
        /* allow user to specify proxy.server.com:1080 if desired */
        prox_portno = strchr (proxyptr, ':');
        if (prox_portno) {
          *prox_portno = 0x0; /* cut off number from host name */
          prox_portno ++;
          /* now set the local port number */
          conn->port = atoi(prox_portno);
        }
    
          /* None given in the proxy string, then get the default one if it is
             given */
    
        }
    
        /* now, clone the cleaned proxy host name */
        conn->proxyhost = strdup(proxyptr);
    
        free(proxydup); /* free the duplicate pointer and not the modified */
      }
    
    
      /*************************************************************
       * Take care of user and password authentication stuff
       *************************************************************/
    
      /*
       * Inputs: data->set.userpwd   (CURLOPT_USERPWD)
       *         data->set.fpasswd   (CURLOPT_PASSWDFUNCTION)
       *         data->set.use_netrc (CURLOPT_NETRC)
       *         conn->hostname
       *         netrc file
       *         hard-coded defaults
       *
       * Outputs: (almost :- all currently undefined)
       *          conn->bits.user_passwd  - non-zero if non-default passwords exist
       *          conn->state.user        - non-zero length if defined
       *          conn->state.passwd      -   ditto
       *          conn->hostname          - remove user name and password
       */
    
      /* At this point, we're hoping all the other special cases have
       * been taken care of, so conn->hostname is at most
       *    [user[:password]]@]hostname
       *
       * We need somewhere to put the embedded details, so do that first.
       */
    
      data->state.user[0] =0;   /* to make everything well-defined */
      data->state.passwd[0]=0;
      
      if (conn->protocol & (PROT_FTP|PROT_HTTP)) {
        /* This is a FTP or HTTP URL, we will now try to extract the possible
         * user+password pair in a string like:
         * ftp://user:password@ftp.my.site:8021/README */
        char *ptr=strchr(conn->name, '@');
        char *userpass = conn->name;
        if(ptr != NULL) {
          /* there's a user+password given here, to the left of the @ */
    
          conn->name = conn->hostname = ++ptr;
    
          /* So the hostname is sane.  Only bother interpreting the
           * results if we could care.  It could still be wasted
           * work because it might be overtaken by the programmatically
           * set user/passwd, but doing that first adds more cases here :-(
           */
    
          if (data->set.use_netrc != CURL_NETRC_REQUIRED) {
            /* We could use the one in the URL */
    
            conn->bits.user_passwd = 1; /* enable user+password */
    
            if(*userpass != ':') {
              /* the name is given, get user+password */
              sscanf(userpass, "%127[^:@]:%127[^@]",
                     data->state.user, data->state.passwd);
            }
            else
              /* no name given, get the password only */
              sscanf(userpass, ":%127[^@]", data->state.passwd);
    
            if(data->state.user[0]) {
              char *newname=curl_unescape(data->state.user, 0);
              if(strlen(newname) < sizeof(data->state.user)) {
                strcpy(data->state.user, newname);
              }
              /* if the new name is longer than accepted, then just use
                 the unconverted name, it'll be wrong but what the heck */
              free(newname);
            }
            if (data->state.passwd[0]) {
              /* we have a password found in the URL, decode it! */
              char *newpasswd=curl_unescape(data->state.passwd, 0);
              if(strlen(newpasswd) < sizeof(data->state.passwd)) {
                strcpy(data->state.passwd, newpasswd);
              }
              free(newpasswd);
    
    
              /* we have set the password */
              data->state.passwdgiven = TRUE;
    
            }
          }
        }
      }
    
      /* Programmatically set password:
       *   - always applies, if available
       *   - takes precedence over the values we just set above
       * so scribble it over the top.
       * User-supplied passwords are assumed not to need unescaping.
       *
       * user_password is set in "inherite initial knowledge' above,
       * so it doesn't have to be set in this block
       */
      if (data->set.userpwd != NULL) {
        if(*data->set.userpwd != ':') {
          /* the name is given, get user+password */
          sscanf(data->set.userpwd, "%127[^:]:%127[^\n]",
                 data->state.user, data->state.passwd);
    
          if(strchr(data->set.userpwd, ':'))
            /* a colon means the password was given, even if blank */
            data->state.passwdgiven = TRUE;
    
          /* no name given, starts with a colon, get the password only */
    
          sscanf(data->set.userpwd+1, "%127[^\n]", data->state.passwd);
      }
    
    
      if ((data->set.use_netrc != CURL_NETRC_IGNORED) &&
    
          !data->state.passwdgiven) {  /* need passwd */
    
        if(Curl_parsenetrc(conn->hostname,
                           data->state.user,
                           data->state.passwd)) {
          infof(data, "Couldn't find host %s in the .netrc file, using defaults",
                conn->hostname);
    
          conn->bits.user_passwd = 1; /* enable user+password */
    
          data->state.passwdgiven = TRUE;
        }
    
      }
    
      /* if we have a user but no password, ask for one */
    
      if(conn->bits.user_passwd && !data->state.passwdgiven ) {
    
        if(data->set.fpasswd(data->set.passwd_client,
                             "password:", data->state.passwd,
                             sizeof(data->state.passwd)))
    
          return CURLE_BAD_PASSWORD_ENTERED;
      }
    
      /* So we could have a password but no user; that's just too bad. */
    
      /* If our protocol needs a password and we have none, use the defaults */
      if ( (conn->protocol & (PROT_FTP|PROT_HTTP)) &&
    
           !conn->bits.user_passwd &&
           !data->state.passwdgiven) {
    
    
        strcpy(data->state.user, CURL_DEFAULT_USER);
        strcpy(data->state.passwd, CURL_DEFAULT_PASSWORD);
    
        /* This is the default password, so DON'T set conn->bits.user_passwd */
      }
    
    
      /*************************************************************
       * Check the current list of connections to see if we can
       * re-use an already existing one or if we have to create a
       * new one.
       *************************************************************/
    
    
      /* reuse_fresh is set TRUE if we are told to use a fresh connection
         by force */
    
         ConnectionExists(data, conn, &conn_temp)) {
    
        /*
         * We already have a connection for this, we got the former connection
         * in the conn_temp variable and thus we need to cleanup the one we
         * just allocated before we can move along and use the previously
         * existing one.
         */
    
        struct connectdata *old_conn = conn;
        char *path = old_conn->path; /* setup the current path pointer properly */
    
        char *ppath = old_conn->ppath; /* this is the modified path pointer */
    
        if(old_conn->proxyhost)
          free(old_conn->proxyhost);
    
        conn = conn_temp;        /* use this connection from now on */
    
        /* If we speak over a proxy, we need to copy the host name too, as it
           might be another remote host even when re-using a connection */
        strcpy(conn->gname, old_conn->gname); /* safe strcpy() */
    
    
        /* we need these pointers if we speak over a proxy */
    
        conn->hostname = conn->gname;
        conn->name = &conn->gname[old_conn->name - old_conn->gname];
    
        free(conn->path);    /* free the previously allocated path pointer */
    
        /* 'path' points to the allocated data, 'ppath' may have been advanced
           to point somewhere within the 'path' area. */
        conn->path = path; 
        conn->ppath = ppath;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        conn->bits.reuse = TRUE; /* yes, we're re-using here */
    
        conn->bits.chunk = FALSE; /* always assume not chunked unless told
                                     otherwise */
    
        conn->maxdownload = -1;  /* might have been used previously! */
    
        free(old_conn);          /* we don't need this anymore */
    
    
        /*
         * If we're doing a resumed transfer, we need to setup our stuff
         * properly.
         */
    
        conn->resume_from = data->set.set_resume_from;
    
        if (conn->resume_from) {
            snprintf(resumerange, sizeof(resumerange), "%d-", conn->resume_from);
            if (conn->bits.rangestringalloc == TRUE) 
                free(conn->range);
            
            /* tell ourselves to fetch this range */
            conn->range = strdup(resumerange);
    
            conn->bits.use_range = TRUE;        /* enable range download */
    
            conn->bits.rangestringalloc = TRUE; /* mark range string allocated */
        }
    
          /* There is a range, but is not a resume, useful for random ftp access */
    
          conn->range = strdup(data->set.set_range);
    
          conn->bits.rangestringalloc = TRUE; /* mark range string allocated */
          conn->bits.use_range = TRUE;        /* enable range download */
        }
    
        *in_connect = conn;      /* return this instead! */
    
    
        infof(data, "Re-using existing connection! (#%d)\n", conn->connectindex);
    
      }
      else {
        /*
         * This is a brand new connection, so let's store it in the connection
         * cache of ours!
         */
        ConnectionStore(data, conn);
      }
    
    
      /*************************************************************
       * Set timeout if that is being used
       *************************************************************/
    
      if((data->set.timeout || data->set.connecttimeout) && !data->set.no_signal) {
    
        /*************************************************************
         * Set signal handler to catch SIGALRM
         * Store the old value to be able to set it back later!
         *************************************************************/
    
    #ifdef HAVE_SIGACTION
        struct sigaction sigact;
        sigaction(SIGALRM, NULL, &sigact);
    
        keep_sigact = sigact;
    
        keep_copysig = TRUE; /* yes, we have a copy */
    
        sigact.sa_handler = alarmfunc;
    #ifdef SA_RESTART
        /* HPUX doesn't have SA_RESTART but defaults to that behaviour! */
        sigact.sa_flags &= ~SA_RESTART;
    #endif
        /* now set the new struct */
        sigaction(SIGALRM, &sigact, NULL);
    #else
        /* no sigaction(), revert to the much lamer signal() */
    #ifdef HAVE_SIGNAL
    
        keep_sigact = signal(SIGALRM, alarmfunc);
    
        /* We set the timeout on the name resolving phase first, separately from
         * the download/upload part to allow a maximum time on everything. This is
         * a signal-based timeout, why it won't work and shouldn't be used in
         * multi-threaded environments. */
    
    
    #ifdef HAVE_ALARM
        /* alarm() makes a signal get sent when the timeout fires off, and that
    
        prev_alarm = alarm(data->set.connecttimeout?
                           data->set.connecttimeout:
                           data->set.timeout);
        /* We can expect the conn->created time to be "now", as that was just
           recently set in the beginning of this function and nothing slow
           has been done since then until now. */
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Resolve the name of the server or proxy
       *************************************************************/
    
      if(conn->bits.reuse) {
        /* re-used connection, no resolving is necessary */
        hostaddr = NULL;
      }
    
      else if(!data->change.proxy || !*data->change.proxy) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If not connecting via a proxy, extract the port from the URL, if it is
         * there, thus overriding any defaults that might have been set above. */
    
        conn->port =  conn->remote_port; /* it is the same port */
    
        /* Resolve target host right on */
    
        hostaddr = Curl_resolv(data, conn->name, conn->port);
    
        if(!hostaddr) {
    
          failf(data, "Couldn't resolve host '%s'", conn->name);
    
          result =  CURLE_COULDNT_RESOLVE_HOST;
          /* don't return yet, we need to clean up the timeout first */
    
      else {
        /* This is a proxy that hasn't been resolved yet. */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        /* resolve proxy */
    
        hostaddr = Curl_resolv(data, conn->proxyhost, conn->port);
    
          failf(data, "Couldn't resolve proxy '%s'", conn->proxyhost);
    
          result = CURLE_COULDNT_RESOLVE_PROXY;
          /* don't return yet, we need to clean up the timeout first */
    
      Curl_pgrsTime(data, TIMER_NAMELOOKUP);
    
      if((data->set.timeout || data->set.connecttimeout) && !data->set.no_signal) {
    
    #ifdef HAVE_SIGACTION
        if(keep_copysig) {
          /* we got a struct as it looked before, now put that one back nice
             and clean */
          sigaction(SIGALRM, &keep_sigact, NULL); /* put it back */
        }
    
    #else
    #ifdef HAVE_SIGNAL
        /* restore the previous SIGALRM handler */
        signal(SIGALRM, keep_sigact);
    #endif
    
    #endif
        /* switch back the alarm() to either zero or to what it was before minus
           the time we spent until now! */
        if(prev_alarm) {
          /* there was an alarm() set before us, now put it back */
          long elapsed_ms = Curl_tvdiff(Curl_tvnow(), conn->created);
          long alarm_set;
    
          /* the alarm period is counted in even number of seconds */
          alarm_set = prev_alarm - elapsed_ms/1000;
    
          if(alarm_set<=0) {
            /* if it turned negative, we should fire off a SIGALRM here, but we
               won't, and zero would be to switch it off so we never set it to
               less than 1! */
            alarm(1);
            result = CURLE_OPERATION_TIMEOUTED;
            failf(data, "Previous alarm fired off!");
          }
          else
            alarm(alarm_set);
        }
        else
          alarm(0); /* just shut it off */
      }
    #endif
      if(result)
        return result;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Proxy authentication
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *authorization;
    
        snprintf(data->state.buffer, BUFSIZE, "%s:%s",
                 data->state.proxyuser, data->state.proxypasswd);
        if(Curl_base64_encode(data->state.buffer, strlen(data->state.buffer),
    
          if(conn->allocptr.proxyuserpwd)
            free(conn->allocptr.proxyuserpwd);
          conn->allocptr.proxyuserpwd =
    
            aprintf("Proxy-authorization: Basic %s\015\012", authorization);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          free(authorization);
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
      /*************************************************************
       * Send user-agent to HTTP proxies even if the target protocol
       * isn't HTTP.
       *************************************************************/
    
      if((conn->protocol&PROT_HTTP) ||
         (data->change.proxy && *data->change.proxy)) {
    
          if(conn->allocptr.uagent)
            free(conn->allocptr.uagent);
          conn->allocptr.uagent =
    
            aprintf("User-Agent: %s\015\012", data->set.useragent);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      if(data->set.encoding) {
        if(conn->allocptr.accept_encoding)
          free(conn->allocptr.accept_encoding);
        conn->allocptr.accept_encoding =
          aprintf("Accept-Encoding: %s\015\012", data->set.encoding);
      }
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      if(-1 == conn->firstsocket) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* Connect only if not already connected! */
    
        result = ConnectPlease(conn, hostaddr, &connected);
    
    
          result = Curl_protocol_connect(conn, hostaddr);
    
          if(CURLE_OK == result)
            conn->bits.tcpconnect = TRUE;
        }
        else
          conn->bits.tcpconnect = FALSE;
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(CURLE_OK != result)
          return result;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else {
        Curl_pgrsTime(data, TIMER_CONNECT); /* we're connected already */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    
      conn->now = Curl_tvnow(); /* time this *after* the connect is done, we
                                   set this here perhaps a second time */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    #ifdef __EMX__
      /* 20000330 mgs
       * the check is quite a hack...
       * we're calling _fsetmode to fix the problem with fwrite converting newline
       * characters (you get mangled text files, and corrupted binary files when
       * you download to stdout and redirect it to a file). */
    
    
      if ((data->set.out)->_handle == NULL) {
    
        _fsetmode(stdout, "b");
      }
    #endif
    
    
    CURLcode Curl_connect(struct SessionHandle *data,
    
                          struct connectdata **in_connect)
    
    {
      CURLcode code;
      struct connectdata *conn;
    
      /* call the stuff that needs to be called */
    
      code = CreateConnection(data, in_connect);
    
    
      if(CURLE_OK != code) {
        /* We're not allowed to return failure with memory left allocated
           in the connectdata struct, free those here */
        conn = (struct connectdata *)*in_connect;
    
          Curl_disconnect(conn);      /* close the connection */
    
    CURLcode Curl_done(struct connectdata *conn)
    
      struct SessionHandle *data=conn->data;
    
      CURLcode result;
    
    
      /* cleanups done even if the connection is re-used */
    
      if(conn->bits.rangestringalloc) {
        free(conn->range);
        conn->bits.rangestringalloc = FALSE;
      }
    
    
      /* Cleanup possible redirect junk */
      if(conn->newurl) {
        free(conn->newurl);
        conn->newurl = NULL;
      }
    
        Curl_resolv_unlock(conn->data, conn->connect_addr); /* done with this */
    
    #if defined(MALLOCDEBUG) && defined(AGGRESIVE_TEST)
    
      /* scan for DNS cache entries still marked as in use */
      Curl_hash_apply(data->hostcache,
                      NULL, Curl_scan_cache_used);
    #endif
    
    
      /* this calls the protocol-specific function pointer previously set */
      if(conn->curl_done)
        result = conn->curl_done(conn);
      else
        result = CURLE_OK;
    
    
      Curl_pgrsDone(conn); /* done with the operation */
    
      /* if data->set.reuse_forbid is TRUE, it means the libcurl client has
    
         forced us to close this no matter what we think.
        
         if conn->bits.close is TRUE, it means that the connection should be
         closed in spite of all our efforts to be nice, due to protocol
         restrictions in our or the server's end */
    
         ((CURLE_OK == result) && conn->bits.close))
    
        result = Curl_disconnect(conn); /* close the connection */
    
        infof(data, "Connection #%d left intact\n", conn->connectindex);
    
    CURLcode Curl_do(struct connectdata **connp)
    
      CURLcode result=CURLE_OK;
    
      struct connectdata *conn = *connp;
      struct SessionHandle *data=conn->data;
    
      conn->bits.do_more = FALSE; /* by default there's no curl_do_more() to use */
    
        /* generic protocol-specific function pointer set in curl_connect() */
        result = conn->curl_do(conn);
    
    
        /* This was formerly done in transfer.c, but we better do it here */
        
    
        if((CURLE_SEND_ERROR == result) && conn->bits.reuse) {
    
          /* This was a re-use of a connection and we got a write error in the
           * DO-phase. Then we DISCONNECT this connection and have another attempt
           * to CONNECT and then DO again! The retry cannot possibly find another
           * connection to re-use, since we only keep one possible connection for
           * each.  */
    
          infof(data, "Re-used connection seems dead, get a new one\n");
    
          conn->bits.close = TRUE; /* enforce close of this connetion */
          result = Curl_done(conn);   /* we are so done with this */
          if(CURLE_OK == result) {
            /* Now, redo the connect and get a new connection */
            result = Curl_connect(data, connp);
            if(CURLE_OK == result)
              /* ... finally back to actually retry the DO phase */
              result = conn->curl_do(*connp);
          }