Skip to content
Snippets Groups Projects
url.c 43.4 KiB
Newer Older
  • Learn to ignore specific revisions
  •     conn->curl_connect = http_connect;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else /* USE_SSLEAY */
    
        failf(data, "libcurl was built with SSL disabled, https: not supported!");
    
        return CURLE_UNSUPPORTED_PROTOCOL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif /* !USE_SSLEAY */
      }
    
      else if (strequal(conn->proto, "GOPHER")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!data->port)
          data->port = PORT_GOPHER;
        data->remote_port = PORT_GOPHER;
        /* Skip /<item-type>/ in path if present */
    
        if (isdigit((int)conn->path[1])) {
          conn->ppath = strchr(&conn->path[1], '/');
          if (conn->ppath == NULL)
    	conn->ppath = conn->path;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
    
        conn->protocol |= PROT_GOPHER;
        conn->curl_do = http;
        conn->curl_done = http_done;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if(strequal(conn->proto, "FTP")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *type;
        if(!data->port)
          data->port = PORT_FTP;
        data->remote_port = PORT_FTP;
    
        conn->protocol |= PROT_FTP;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        if(data->bits.httpproxy &&
           !data->bits.tunnel_thru_httpproxy) {
          /* Unless we have asked to tunnel ftp operations through the proxy, we
             switch and use HTTP operations only */
    
          conn->curl_do = http;
          conn->curl_done = http_done;
    
        }
        else {
          conn->curl_do = ftp;
          conn->curl_done = ftp_done;
          conn->curl_connect = ftp_connect;
        }
    
        conn->ppath++; /* don't include the initial slash */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        /* FTP URLs support an extension like ";type=<typecode>" that
           we'll try to get now! */
    
        type=strstr(conn->ppath, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!type) {
    
          type=strstr(conn->gname, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
        if(type) {
          char command;
          *type=0;
          command = toupper(type[6]);
          switch(command) {
          case 'A': /* ASCII mode */
    
    	data->bits.ftp_ascii = 1;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'D': /* directory mode */
    
    	data->bits.ftp_list_only = 1;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'I': /* binary mode */
          default:
    	/* switch off ASCII */
    
    	data->bits.ftp_ascii = 0;
    
      else if(strequal(conn->proto, "TELNET")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* telnet testing factory */
    
        conn->protocol |= PROT_TELNET;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!data->port)
          data->port = PORT_TELNET;
        data->remote_port = PORT_TELNET;
    
    
        conn->curl_do = telnet;
        conn->curl_done = telnet_done;
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->proto, "DICT")) {
        conn->protocol |= PROT_DICT;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!data->port)
          data->port = PORT_DICT;
        data->remote_port = PORT_DICT;
    
        conn->curl_do = dict;
        conn->curl_done = dict_done;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->proto, "LDAP")) {
        conn->protocol |= PROT_LDAP;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!data->port)
          data->port = PORT_LDAP;
        data->remote_port = PORT_LDAP;
    
        conn->curl_do = ldap;
        conn->curl_done = ldap_done;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->proto, "FILE")) {
        conn->protocol |= PROT_FILE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        conn->curl_do = file;
        /* no done() function */
    
    
        result = Transfer(conn, -1, -1, FALSE, NULL, /* no download */
                          -1, NULL); /* no upload */
    
        return CURLE_OK;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
      else {
    
        failf(data, "Unsupported protocol: %s", conn->proto);
        return CURLE_UNSUPPORTED_PROTOCOL;
    
      if(data->bits.use_netrc) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(ParseNetrc(data->hostname, data->user, data->passwd)) {
          infof(data, "Couldn't find host %s in the .netrc file, using defaults",
                data->hostname);
        }
        /* weather we failed or not, we don't know which fields that were filled
           in anyway */
        if(!data->user[0])
          strcpy(data->user, CURL_DEFAULT_USER);
        if(!data->passwd[0])
          strcpy(data->passwd, CURL_DEFAULT_PASSWORD);
    
        if(conn->protocol&PROT_HTTP) {
          data->bits.user_passwd = 1; /* enable user+password */
    
      else if(!(data->bits.user_passwd) &&
    	  (conn->protocol & (PROT_FTP|PROT_HTTP)) ) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* This is a FTP or HTTP URL, and we haven't got the user+password in
           the extra parameter, we will now try to extract the possible
           user+password pair in a string like:
           ftp://user:password@ftp.my.site:8021/README */
        char *ptr=NULL; /* assign to remove possible warnings */
    
          /* there's a user+password given here, to the left of the @ */
    
          data->user[0] =0;
          data->passwd[0]=0;
    
          if(*conn->name != ':') {
            /* the name is given, get user+password */
    
            sscanf(conn->name, "%127[^:@]:%127[^@]",
    
                   data->user, data->passwd);
          }
          else
            /* no name given, get the password only */
            sscanf(conn->name+1, "%127[^@]", data->passwd);
    
    
          if(data->user[0]) {
            char *newname=curl_unescape(data->user, 0);
            if(strlen(newname) < sizeof(data->user)) {
              strcpy(data->user, newname);
            }
            /* if the new name is longer than accepted, then just use
               the unconverted name, it'll be wrong but what the heck */
            free(newname);
          }
    
    
          /* check for password, if no ask for one */
          if( !data->passwd[0] ) {
    
            if(!data->fpasswd ||
               data->fpasswd(data->passwd_client,
                             "password:",data->passwd,sizeof(data->passwd)))
              return CURLE_BAD_PASSWORD_ENTERED;
    
          else {
            /* we have a password found in the URL, decode it! */
            char *newpasswd=curl_unescape(data->passwd, 0);
            if(strlen(newpasswd) < sizeof(data->passwd)) {
              strcpy(data->passwd, newpasswd);
            }
            free(newpasswd);
          }
    
          conn->name = ++ptr;
          data->bits.user_passwd=1; /* enable user+password */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
        else {
          strcpy(data->user, CURL_DEFAULT_USER);
          strcpy(data->passwd, CURL_DEFAULT_PASSWORD);
        }
      }
    
    
      if(!data->bits.httpproxy) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If not connecting via a proxy, extract the port from the URL, if it is
         * there, thus overriding any defaults that might have been set above. */
    
        tmp = strchr(conn->name, ':');
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if (tmp) {
          *tmp++ = '\0';
          data->port = atoi(tmp);
        }
    
        data->remote_port = data->port; /* it is the same port */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* Connect to target host right on */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        conn->hp = GetHost(data, conn->name, &conn->hostent_buf);
        if(!conn->hp) {
    
          failf(data, "Couldn't resolve host '%s'", conn->name);
    
          return CURLE_COULDNT_RESOLVE_HOST;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
      }
      else {
        char *prox_portno;
        char *endofprot;
    
    
        /* We need to make a duplicate of the proxy so that we can modify the
           string safely. */
        char *proxydup=strdup(data->proxy);
    
        /* We use 'proxyptr' to point to the proxy name from now on... */
        char *proxyptr=proxydup;
    
        if(NULL == proxydup) {
          failf(data, "memory shortage");
    
          return CURLE_OUT_OF_MEMORY;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* we use proxy all right, but we wanna know the remote port for SSL
           reasons */
    
        tmp = strchr(conn->name, ':');
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if (tmp) {
          *tmp++ = '\0'; /* cut off the name there */
          data->remote_port = atoi(tmp);
        }
    
        /* Daniel Dec 10, 1998:
           We do the proxy host string parsing here. We want the host name and the
           port name. Accept a protocol:// prefix, even though it should just be
           ignored. */
    
        /* 1. skip the protocol part if present */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(endofprot) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
        /* allow user to specify proxy.server.com:1080 if desired */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if (prox_portno) {
          *prox_portno = 0x0; /* cut off number from host name */
          prox_portno ++;
          /* now set the local port number */
          data->port = atoi(prox_portno);
        }
    
        else if(data->proxyport) {
          /* None given in the proxy string, then get the default one if it is
             given */
          data->port = data->proxyport;
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        /* connect to proxy */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        conn->hp = GetHost(data, proxyptr, &conn->hostent_buf);
        if(!conn->hp) {
    
          failf(data, "Couldn't resolve proxy '%s'", proxyptr);
    
          return CURLE_COULDNT_RESOLVE_PROXY;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
    
        free(proxydup); /* free the duplicate pointer and not the modified */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      pgrsTime(data, TIMER_NAMELOOKUP);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
      data->firstsocket = socket(AF_INET, SOCK_STREAM, 0);
    
    
      memset((char *) &conn->serv_addr, '\0', sizeof(conn->serv_addr));
      memcpy((char *)&(conn->serv_addr.sin_addr),
             conn->hp->h_addr, conn->hp->h_length);
      conn->serv_addr.sin_family = conn->hp->h_addrtype;
      conn->serv_addr.sin_port = htons(data->port);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    #ifndef WIN32 
      /* We don't generally like checking for OS-versions, we should make this
         HAVE_XXXX based, although at the moment I don't have a decent test for
         this! */
    
      /* sck 8/31/2000 add support for specifing device to bind socket to */
      /* I am using this, but it may not work everywhere, only tested on
         RedHat 6.2 */
    
    #ifdef HAVE_INET_NTOA
    
    #ifndef INADDR_NONE
    #define INADDR_NONE (unsigned long) ~0
    #endif
    
      if (data->device && (strlen(data->device)<255)) {
        struct sockaddr_in sa;
        struct hostent *h=NULL;
    
        size_t size;
        char myhost[256] = "";
        unsigned long in;
    
        if(if2ip(data->device, myhost, sizeof(myhost))) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          h = GetHost(data, myhost, &hostdataptr);
    
        }
        else {
          if(strlen(data->device)>1) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            h = GetHost(data, data->device, &hostdataptr);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /* we know data->device is shorter than the myhost array */
            strcpy(myhost, data->device);
    
          }
        }
    
        if(! *myhost) {
          /* need to fix this
             h=GetHost(data,
             getmyhost(*myhost,sizeof(myhost)),
             hostent_buf,
             sizeof(hostent_buf));
          */
          printf("in here\n");
        }
    
        infof(data, "We connect from %s\n", myhost);
    
        if ( (in=inet_addr(myhost)) != INADDR_NONE ) {
    
          if ( h ) {
            memset((char *)&sa, 0, sizeof(sa));
            memcpy((char *)&sa.sin_addr,
                   h->h_addr,
                   h->h_length);
            sa.sin_family = AF_INET;
            sa.sin_addr.s_addr = in;
            sa.sin_port = 0; /* get any port */
    	
            if( bind(data->firstsocket, (struct sockaddr *)&sa, sizeof(sa)) >= 0) {
              /* we succeeded to bind */
              struct sockaddr_in add;
    	
              size = sizeof(add);
              if(getsockname(data->firstsocket, (struct sockaddr *) &add,
                             (int *)&size)<0) {
                failf(data, "getsockname() failed");
                return CURLE_HTTP_PORT_FAILED;
              }
            }
            else {
              switch(errno) {
              case EBADF:
                failf(data, "Invalid descriptor: %d", errno);
                break;
              case EINVAL:
                failf(data, "Invalid request: %d", errno);
                break;
              case EACCES:
                failf(data, "Address is protected, user not superuser: %d", errno);
                break;
              case ENOTSOCK:
                failf(data,
                      "Argument is a descriptor for a file, not a socket: %d",
                      errno);
                break;
              case EFAULT:
                failf(data, "Inaccessable memory error: %d", errno);
                break;
              case ENAMETOOLONG:
                failf(data, "Address too long: %d", errno);
                break;
              case ENOMEM:
                failf(data, "Insufficient kernel memory was available: %d", errno);
                break;
              default:
                failf(data,"errno %d\n");
              } /* end of switch */
    	
              return CURLE_HTTP_PORT_FAILED;
            } /* end of else */
    	
          } /* end of if  h */
          else {
    	failf(data,"could't find my own IP address (%s)", myhost);
    	return CURLE_HTTP_PORT_FAILED;
          }
        } /* end of inet_addr */
    
        else {
          failf(data, "could't find my own IP address (%s)", myhost);
          return CURLE_HTTP_PORT_FAILED;
        }
    
    
        if(hostdataptr)
          free(hostdataptr); /* allocated by GetHost() */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      } /* end of device selection support */
    #endif  /* end of HAVE_INET_NTOA */
    
      if (connect(data->firstsocket,
                  (struct sockaddr *) &(conn->serv_addr),
                  sizeof(conn->serv_addr)
                  ) < 0) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        switch(errno) {
    #ifdef ECONNREFUSED
          /* this should be made nicer */
        case ECONNREFUSED:
          failf(data, "Connection refused");
          break;
    
        case EFAULT:
          failf(data, "Invalid socket address: %d",errno);
          break;
        case EISCONN:
          failf(data, "Socket already connected: %d",errno);
          break;
        case ETIMEDOUT:
          failf(data, "Timeout while accepting connection, server busy: %d",errno);
          break;
        case ENETUNREACH:
          failf(data, "Network is unreachable: %d",errno);
          break;
        case EADDRINUSE:
          failf(data, "Local address already in use: %d",errno);
          break;
        case EINPROGRESS:
          failf(data, "Socket is nonblocking and connection can not be completed immediately: %d",errno);
          break;
        case EALREADY:
          failf(data, "Socket is nonblocking and a previous connection attempt not completed: %d",errno);
          break;
        case EAGAIN:
          failf(data, "No more free local ports: %d",errno);
          break;
        case EACCES:
        case EPERM:
          failf(data, "Attempt to connect to broadcast address without socket broadcast flag or local firewall rule violated: %d",errno);
          break;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif
        case EINTR:
          failf(data, "Connection timeouted");
          break;
        default:
          failf(data, "Can't connect to server: %d", errno);
          break;
        }
    
        return CURLE_COULDNT_CONNECT;
    
      if(data->bits.proxy_user_passwd) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *authorization;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        snprintf(data->buffer, BUFSIZE, "%s:%s",
                 data->proxyuser, data->proxypasswd);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(base64_encode(data->buffer, strlen(data->buffer),
                        &authorization) >= 0) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          data->ptr_proxyuserpwd =
            maprintf("Proxy-authorization: Basic %s\015\012", authorization);
          free(authorization);
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      if((conn->protocol&PROT_HTTP) || data->bits.httpproxy) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(data->useragent) {
          data->ptr_uagent = maprintf("User-Agent: %s\015\012", data->useragent);
        }
      }
    
    
      if(conn->curl_connect) {
    
        /* is there a connect() procedure? */
        conn->now = tvnow(); /* set this here for timeout purposes in the
                                connect procedure, it is later set again for the
                                progress meter purpose */
    
        result = conn->curl_connect(conn);
    
        if(result != CURLE_OK)
          return result; /* pass back errors */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      pgrsTime(data, TIMER_CONNECT); /* we're connected */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      conn->now = tvnow(); /* time this *after* the connect is done */
      conn->bytecount = 0;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      
      /* Figure out the ip-number and the first host name it shows: */
      {
        struct in_addr in;
    
        (void) memcpy(&in.s_addr, *conn->hp->h_addr_list, sizeof (in.s_addr));
        infof(data, "Connected to %s (%s)\n", conn->hp->h_name, inet_ntoa(in));
    
    #ifdef __EMX__
      /* 20000330 mgs
       * the check is quite a hack...
       * we're calling _fsetmode to fix the problem with fwrite converting newline
       * characters (you get mangled text files, and corrupted binary files when
       * you download to stdout and redirect it to a file). */
    
      if ((data->out)->_handle == NULL) {
        _fsetmode(stdout, "b");
      }
    #endif
    
    
    CURLcode curl_connect(CURL *curl, CURLconnect **in_connect)
    {
      CURLcode code;
      struct connectdata *conn;
    
      /* call the stuff that needs to be called */
      code = _connect(curl, in_connect);
    
      if(CURLE_OK != code) {
        /* We're not allowed to return failure with memory left allocated
           in the connectdata struct, free those here */
        conn = (struct connectdata *)*in_connect;
        if(conn) {
    
          if(conn->path)
            free(conn->path);
    
          if(conn->hostent_buf)
            free(conn->hostent_buf);
          free(conn);
          *in_connect=NULL;
        }
      }
      return code;
    }
    
    
    /*
     * NAME curl_connect()
     *
     * DESCRIPTION
     *
     * Connects to the peer server and performs the initial setup. This function
     * writes a connect handle to its second argument that is a unique handle for
     * this connect. This allows multiple connects from the same handle returned
     * by curl_open().
     *
     * EXAMPLE
     *
     * CURLCode result;
     * CURL curl;
     * CURLconnect connect;
     * result = curl_connect(curl, &connect);
     */
    
    
    
    
    
    CURLcode curl_done(CURLconnect *c_connect)
    {
      struct connectdata *conn = c_connect;
      struct UrlData *data;
      CURLcode result;
    
      if(!conn || (conn->handle!= STRUCT_CONNECT)) {
        return CURLE_BAD_FUNCTION_ARGUMENT;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      if(conn->state != CONN_DO) {
        /* This can only be called after a curl_do() */
        return CURLE_BAD_CALLING_ORDER;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      data = conn->data;
    
      /* this calls the protocol-specific function pointer previously set */
      if(conn->curl_done)
        result = conn->curl_done(conn);
      else
        result = CURLE_OK;
    
      pgrsDone(data); /* done with the operation */
    
      conn->state = CONN_DONE;
    
      return result;
    }
    
    CURLcode curl_do(CURLconnect *in_conn)
    {
      struct connectdata *conn = in_conn;
      CURLcode result;
    
      if(!conn || (conn->handle!= STRUCT_CONNECT)) {
        return CURLE_BAD_FUNCTION_ARGUMENT;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      if(conn->state != CONN_INIT) {
        return CURLE_BAD_CALLING_ORDER;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    
      if(conn->curl_do) {
        /* generic protocol-specific function pointer set in curl_connect() */
        result = conn->curl_do(conn);
        if(result) {
          conn->state = CONN_ERROR;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          return result;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    
      conn->state = CONN_DO; /* we have entered this state */
    
      return CURLE_OK;