Skip to content
Snippets Groups Projects
url.c 103 KiB
Newer Older
  • Learn to ignore specific revisions
  •     return CURLE_OUT_OF_MEMORY; /* really bad error */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Parse the URL.
       *
       * We need to parse the url even when using the proxy, because we will need
       * the hostname and port in case we are trying to SSL connect through the
       * proxy -- and we don't know if we will need to use SSL until we parse the
       * url ...
       ************************************************************/
    
      if((2 == sscanf(data->change.url, "%64[^:]:%[^\n]",
    
                      conn->protostr,
                      conn->path)) && strequal(conn->protostr, "file")) {
    
        if(conn->path[0] == '/' && conn->path[1] == '/') {
          /* Allow omitted hostname (e.g. file:/<path>).  This is not strictly
           * speaking a valid file: URL by RFC 1738, but treating file:/<path> as
           * file://localhost/<path> is similar to how other schemes treat missing
           * hostnames.  See RFC 1808. */
    
          /* This cannot be done with strcpy() in a portable manner, since the
             memory areas overlap! */
          memmove(conn->path, conn->path + 2, strlen(conn->path + 2)+1);
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /*
         * we deal with file://<host>/<path> differently since it supports no
         * hostname other than "localhost" and "127.0.0.1", which is unique among
         * the URL protocols specified in RFC 1738
         */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(conn->path[0] != '/') {
          /* the URL included a host name, we ignore host names in file:// URLs
             as the standards don't define what to do with them */
          char *ptr=strchr(conn->path, '/');
          if(ptr) {
            /* there was a slash present
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
               RFC1738 (section 3.1, page 5) says:
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
               The rest of the locator consists of data specific to the scheme,
               and is known as the "url-path". It supplies the details of how the
               specified resource can be accessed. Note that the "/" between the
               host (or port) and the url-path is NOT part of the url-path.
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
               As most agents use file://localhost/foo to get '/foo' although the
               slash preceeding foo is a separator and not a slash for the path,
               a URL as file://localhost//foo must be valid as well, to refer to
               the same file with an absolute path.
            */
    
            if(ptr[1] && ('/' == ptr[1]))
              /* if there was two slashes, we skip the first one as that is then
                 used truly as a separator */
    
            /* This cannot be made with strcpy, as the memory chunks overlap! */
            memmove(conn->path, ptr, strlen(ptr)+1);
    
        strcpy(conn->protostr, "file"); /* store protocol string lowercase */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else {
        /* Set default host and default path */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        strcpy(conn->gname, "curl.haxx.se");
    
        strcpy(conn->path, "/");
    
        /* We need to search for '/' OR '?' - whichever comes first after host
         * name but before the path. We need to change that to handle things like
         * http://example.com?param= (notice the missing '/'). Later we'll insert
         * that missing slash at the beginning of the path.
         */
    
                       conn->protostr, conn->gname, conn->path)) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /*
           * The URL was badly formatted, let's try the browser-style _without_
           * protocol specified like 'http://'.
           */
    
          if((1 > sscanf(data->change.url, "%512[^\n/?]%[^\n]",
    
                         conn->gname, conn->path)) ) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /*
             * We couldn't even get this format.
             */
    
            failf(data, "<url> malformed");
            return CURLE_URL_MALFORMAT;
          }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
          /*
           * Since there was no protocol part specified, we guess what protocol it
           * is based on the first letters of the server name.
           */
    
    
          /* Note: if you add a new protocol, please update the list in
           * lib/version.c too! */
    
    
          if(checkprefix("FTP", conn->gname)) {
    
            strcpy(conn->protostr, "ftp");
    
          else if(checkprefix("GOPHER", conn->gname))
    
            strcpy(conn->protostr, "gopher");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #ifdef USE_SSLEAY
    
          else if(checkprefix("HTTPS", conn->gname))
    
            strcpy(conn->protostr, "https");
    
          else if(checkprefix("FTPS", conn->gname))
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            strcpy(conn->protostr, "ftps");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif /* USE_SSLEAY */
    
          else if(checkprefix("TELNET", conn->gname))
    
            strcpy(conn->protostr, "telnet");
    
          else if (checkprefix("DICT", conn->gname))
    
            strcpy(conn->protostr, "DICT");
    
          else if (checkprefix("LDAP", conn->gname))
    
            strcpy(conn->protostr, "LDAP");
    
            strcpy(conn->protostr, "http");
    
          }
    
          conn->protocol |= PROT_MISSING; /* not given in URL */
        }
    
      /* If the URL is malformatted (missing a '/' after hostname before path) we
       * insert a slash here. The only letter except '/' we accept to start a path
       * is '?'.
       */
      if(conn->path[0] == '?') {
        /* We need this function to deal with overlapping memory areas. We know
           that the memory area 'path' points to is 'urllen' bytes big and that
    
           is bigger than the path. Use +1 to move the zero byte too. */
        memmove(&conn->path[1], conn->path, strlen(conn->path)+1);
    
      /*
       * So if the URL was A://B/C,
       *   conn->protostr is A
       *   conn->gname is B
       *   conn->path is /C
       */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Take care of proxy authentication stuff
       *************************************************************/
    
        char proxyuser[MAX_CURL_USER_LENGTH]="";
        char proxypasswd[MAX_CURL_PASSWORD_LENGTH]="";
    
        sscanf(data->set.proxyuserpwd,
               "%" MAX_CURL_USER_LENGTH_TXT "[^:]:"
               "%" MAX_CURL_PASSWORD_LENGTH_TXT "[^\n]",
    
               proxyuser, proxypasswd);
    
        conn->proxyuser = strdup(proxyuser);
        if(!conn->proxyuser)
          return CURLE_OUT_OF_MEMORY;
        
        conn->proxypasswd = strdup(proxypasswd);
        if(!conn->proxypasswd)
          return CURLE_OUT_OF_MEMORY;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
    
       * Set a few convenience pointers
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
       *************************************************************/
    
      conn->name = conn->gname;
      conn->ppath = conn->path;
    
      conn->hostname = conn->name;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Detect what (if any) proxy to use
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If proxy was not specified, we check for default proxy environment
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
         * variables, to enable i.e Lynx compliance:
         *
         * http_proxy=http://some.server.dom:port/
         * https_proxy=http://some.server.dom:port/
         * ftp_proxy=http://some.server.dom:port/
         * gopher_proxy=http://some.server.dom:port/
         * no_proxy=domain1.dom,host.domain2.dom
         *   (a comma-separated list of hosts which should
         *   not be proxied, or an asterisk to override
         *   all proxy variables)
         * all_proxy=http://some.server.dom:port/
         *   (seems to exist for the CERN www lib. Probably
         *   the first to check for.)
         *
         * For compatibility, the all-uppercase versions of these variables are
         * checked if the lowercase versions don't exist.
         */
    
        char *no_proxy_tok_buf;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *proxy=NULL;
        char proxy_env[128];
    
    
        no_proxy=curl_getenv("no_proxy");
    
          no_proxy=curl_getenv("NO_PROXY");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!no_proxy || !strequal("*", no_proxy)) {
          /* NO_PROXY wasn't specified or it wasn't just an asterisk */
          char *nope;
    
    
          nope=no_proxy?strtok_r(no_proxy, ", ", &no_proxy_tok_buf):NULL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          while(nope) {
    
            unsigned int namelen;
    
            char *endptr = strchr(conn->name, ':');
            if(endptr)
              namelen=endptr-conn->name;
            else
              namelen=strlen(conn->name);
    
            if(strlen(nope) <= namelen) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              char *checkn=
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
                /* no proxy for this host! */
                break;
              }
            }
    
    	nope=strtok_r(NULL, ", ", &no_proxy_tok_buf);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          if(!nope) {
    	/* It was not listed as without proxy */
    
    	char *protop = conn->protostr;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	char *envp = proxy_env;
    	char *prox;
    
    
    	/* Now, build <protocol>_proxy and check for such a one to use */
    	while(*protop)
    	  *envp++ = tolower(*protop++);
    
    	/* append _proxy */
    	strcpy(envp, "_proxy");
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	/* read the protocol proxy: */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            /*
             * We don't try the uppercase version of HTTP_PROXY because of
             * security reasons:
             *
             * When curl is used in a webserver application
             * environment (cgi or php), this environment variable can
             * be controlled by the web server user by setting the
             * http header 'Proxy:' to some value.
    
             * This can cause 'internal' http/ftp requests to be
             * arbitrarily redirected by any external attacker.
             */
    	if(!prox && !strequal("http_proxy", proxy_env)) {
    
              /* There was no lowercase variable, try the uppercase version: */
    	  for(envp = proxy_env; *envp; envp++)
    	    *envp = toupper(*envp);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	if(prox && *prox) { /* don't count "" strings */
    	  proxy = prox; /* use this */
    
    	  proxy = curl_getenv("all_proxy"); /* default proxy to use */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
            if(proxy && *proxy) {
              /* we have a proxy here to set */
    
              char proxyuser[MAX_CURL_USER_LENGTH];
              char proxypasswd[MAX_CURL_PASSWORD_LENGTH];
    
    
              /* skip the possible protocol piece */
              ptr=strstr(proxy, "://");
              if(ptr)
                ptr += 3;
              else
                ptr = proxy;
    
              /* check for an @-letter */
              ptr = strchr(ptr, '@');
              if(ptr && (2 == sscanf(proxy, "%" MAX_CURL_USER_LENGTH_TXT"[^:]:"
                                     "%" MAX_CURL_PASSWORD_LENGTH_TXT "[^@]",
    
                                     proxyuser, proxypasswd))) {
    
                /* found user and password, rip them out */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
                Curl_safefree(conn->proxyuser);
    
                conn->proxyuser = strdup(proxyuser);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
                Curl_safefree(conn->proxypasswd);
    
                conn->proxypasswd = strdup(proxypasswd);
    
                conn->bits.proxy_user_passwd = TRUE; /* enable it */
    
                ptr = strdup(ptr+1);
                free(proxy); /* free the former data */
                proxy = ptr; /* now use this instead */
              }
    
    
    
              data->change.proxy = proxy;
              data->change.proxy_alloc=TRUE; /* this needs to be freed later */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            }
    
          } /* if (!nope) - it wasn't specified non-proxy */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        } /* NO_PROXY wasn't specified or '*' */
    
        if(no_proxy)
          free(no_proxy);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      } /* if not using proxy */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
    
       * No protocol part in URL was used, add it!
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
       *************************************************************/
    
      if(conn->protocol&PROT_MISSING) {
        /* We're guessing prefixes here and if we're told to use a proxy or if
           we're gonna follow a Location: later or... then we need the protocol
           part added so that we have a valid URL. */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *reurl;
    
    
        reurl = aprintf("%s://%s", conn->protostr, data->change.url);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        if(!reurl)
    
          return CURLE_OUT_OF_MEMORY;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        data->change.url = reurl;
        data->change.url_alloc = TRUE; /* free this later */
    
        conn->protocol &= ~PROT_MISSING; /* switch that one off again */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /************************************************************
       * RESUME on a HTTP page is a tricky business. First, let's just check that
       * 'range' isn't used, then set the range parameter and leave the resume as
       * it is to inform about this situation for later use. We will then
       * "attempt" to resume, and if we're talking to a HTTP/1.1 (or later)
       * server, we will get the document resumed. If we talk to a HTTP/1.0
       * server, we just fail since we can't rewind the file writing from within
       * this function.
       ***********************************************************/
    
      if(conn->resume_from) {
        if(!conn->bits.use_range) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /* if it already was in use, we just skip this */
    
          snprintf(resumerange, sizeof(resumerange), "%d-", conn->resume_from);
          conn->range=strdup(resumerange); /* tell ourselves to fetch this range */
          conn->bits.rangestringalloc = TRUE; /* mark as allocated */
          conn->bits.use_range = 1; /* switch on range usage */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Setup internals depending on protocol
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      if (strequal(conn->protostr, "HTTP")) {
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_HTTP;
    
        conn->protocol |= PROT_HTTP;
    
        conn->curl_done = Curl_http_done;
    
        conn->curl_connect = Curl_http_connect;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with HTTP disabled, http: not supported!");
        return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "HTTPS")) {
    
    #if defined(USE_SSLEAY) && !defined(CURL_DISABLE_HTTP)
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_HTTPS;
    
        conn->protocol |= PROT_HTTP|PROT_HTTPS|PROT_SSL;
    
        conn->curl_done = Curl_http_done;
        conn->curl_connect = Curl_http_connect;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else /* USE_SSLEAY */
    
        failf(data, LIBCURL_NAME
              " was built with SSL disabled, https: not supported!");
    
        return CURLE_UNSUPPORTED_PROTOCOL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif /* !USE_SSLEAY */
      }
    
      else if (strequal(conn->protostr, "GOPHER")) {
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_GOPHER;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* Skip /<item-type>/ in path if present */
    
        if (isdigit((int)conn->path[1])) {
          conn->ppath = strchr(&conn->path[1], '/');
          if (conn->ppath == NULL)
    	conn->ppath = conn->path;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
    
        conn->protocol |= PROT_GOPHER;
    
        conn->curl_done = Curl_http_done;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with GOPHER disabled, gopher: not supported!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      else if(strequal(conn->protostr, "FTP") ||
              strequal(conn->protostr, "FTPS")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *type;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        if(strequal(conn->protostr, "FTPS")) {
    #ifdef USE_SSLEAY
    
          conn->protocol |= PROT_FTPS|PROT_SSL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #else
    
          failf(data, LIBCURL_NAME
                " was built with SSL disabled, ftps: not supported!");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          return CURLE_UNSUPPORTED_PROTOCOL;
    #endif /* !USE_SSLEAY */
        }
    
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_FTP;
    
        conn->protocol |= PROT_FTP;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
          /* Unless we have asked to tunnel ftp operations through the proxy, we
             switch and use HTTP operations only */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          if(conn->protocol & PROT_FTPS) {
            /* FTPS is a hacked protocol and does not work through your
               ordinary http proxy! */
            failf(data, "ftps does not work through http proxy!");
            return CURLE_UNSUPPORTED_PROTOCOL;
          }
    
          conn->curl_do = Curl_http;
          conn->curl_done = Curl_http_done;
    
    #else
          failf(data, "FTP over http proxy requires HTTP support built-in!");
          return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
          conn->curl_do_more = Curl_ftp_nextconnect;
    
          conn->curl_done = Curl_ftp_done;
          conn->curl_connect = Curl_ftp_connect;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          conn->curl_disconnect = Curl_ftp_disconnect;
    
        }
    
        conn->ppath++; /* don't include the initial slash */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
        /* FTP URLs support an extension like ";type=<typecode>" that
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
         * we'll try to get now! */
    
        type=strstr(conn->ppath, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!type) {
    
          type=strstr(conn->gname, ";type=");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
        if(type) {
          char command;
    
          *type=0;                     /* it was in the middle of the hostname */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          command = toupper(type[6]);
          switch(command) {
          case 'A': /* ASCII mode */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'D': /* directory mode */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          case 'I': /* binary mode */
          default:
    	/* switch off ASCII */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	break;
          }
        }
    
    
    /* MN 06/07/02 */
    #else /* CURL_DISABLE_FTP */
        failf(data, LIBCURL_NAME
              " was built with FTP disabled, ftp/ftps: not supported!");
        return CURLE_UNSUPPORTED_PROTOCOL;
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if(strequal(conn->protostr, "TELNET")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* telnet testing factory */
    
        conn->protocol |= PROT_TELNET;
    
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port: PORT_TELNET;
    
        conn->curl_do = Curl_telnet;
        conn->curl_done = Curl_telnet_done;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with TELNET disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "DICT")) {
    
        conn->protocol |= PROT_DICT;
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_DICT;
    
        conn->curl_done = NULL; /* no DICT-specific done */
    
    #else
        failf(data, LIBCURL_NAME
              " was built with DICT disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "LDAP")) {
    
        conn->protocol |= PROT_LDAP;
    
        conn->port = (data->set.use_port && data->state.allow_port)?
          data->set.use_port:PORT_LDAP;
    
        conn->curl_done = NULL; /* no LDAP-specific done */
    
    #else
        failf(data, LIBCURL_NAME
              " was built with LDAP disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else if (strequal(conn->protostr, "FILE")) {
    
        conn->protocol |= PROT_FILE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        /* no done() function */
    
        /* anyway, this is supposed to be the connect function so we better
           at least check that the file is present here! */
        result = Curl_file_connect(conn);
    
        /* Setup a "faked" transfer that'll do nothing */
        if(CURLE_OK == result) {
    
          conn->bits.tcpconnect = TRUE; /* we are "connected */
    
          result = Curl_Transfer(conn, -1, -1, FALSE, NULL, /* no download */
                                 -1, NULL); /* no upload */
        }
    
        return result;
    
    #else
        failf(data, LIBCURL_NAME
              " was built with FILE disabled!");
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      else {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* We fell through all checks and thus we don't support the specified
           protocol */
    
        failf(data, "Unsupported protocol: %s", conn->protostr);
    
        return CURLE_UNSUPPORTED_PROTOCOL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Figure out the remote port number
       *
       * No matter if we use a proxy or not, we have to figure out the remote
       * port number of various reasons.
       *
       * To be able to detect port number flawlessly, we must not confuse them
    
       * IPv6-specified addresses in the [0::1] style. (RFC2732)
    
       *
       * The conn->name is currently [user:passwd@]host[:port] where host could
       * be a hostname, IPv4 address or IPv6 address.
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
       *************************************************************/
    
      if((1 == sscanf(conn->name, "[%*39[0-9a-fA-F:.]%c", &endbracket)) &&
         (']' == endbracket)) {
        /* this is a RFC2732-style specified IP-address */
    
        conn->name++; /* pass the starting bracket */
    
        tmp = strchr(conn->name, ']');
        *tmp = 0; /* zero terminate */
        tmp++; /* pass the ending bracket */
        if(':' != *tmp)
          tmp = NULL; /* no port number available */
      }
      else
        tmp = strrchr(conn->name, ':');
    
      if (tmp) {
        char *rest;
        unsigned long port;
    
        port=strtoul(tmp+1, &rest, 10);  /* Port number must be decimal */
    
        if (rest != (tmp+1) && *rest == '\0') {
          /* The colon really did have only digits after it,
           * so it is either a port number or a mistake */
    
          if (port > 0xffff) {   /* Single unix standard says port numbers are
                                  * 16 bits long */
            failf(data, "Port number too large: %lu", port);
            return CURLE_URL_MALFORMAT;
          }
    
          *tmp = '\0'; /* cut off the name there */
    
          conn->remote_port = (unsigned short)port;
    
      if(data->change.proxy && *data->change.proxy) {
    
        /* If this is supposed to use a proxy, we need to figure out the proxy
           host name name, so that we can re-use an existing connection
           that may exist registered to the same proxy host. */
    
        char *prox_portno;
        char *endofprot;
    
        /* We need to make a duplicate of the proxy so that we can modify the
           string safely. */
    
        char *proxydup=strdup(data->change.proxy);
    
    
        /* We use 'proxyptr' to point to the proxy name from now on... */
        char *proxyptr=proxydup;
    
        if(NULL == proxydup) {
          failf(data, "memory shortage");
          return CURLE_OUT_OF_MEMORY;
        }
    
        /* Daniel Dec 10, 1998:
           We do the proxy host string parsing here. We want the host name and the
           port name. Accept a protocol:// prefix, even though it should just be
           ignored. */
    
        /* 1. skip the protocol part if present */
        endofprot=strstr(proxyptr, "://");
        if(endofprot) {
          proxyptr = endofprot+3;
        }
    
        /* allow user to specify proxy.server.com:1080 if desired */
        prox_portno = strchr (proxyptr, ':');
        if (prox_portno) {
          *prox_portno = 0x0; /* cut off number from host name */
          prox_portno ++;
          /* now set the local port number */
          conn->port = atoi(prox_portno);
        }
    
          /* None given in the proxy string, then get the default one if it is
             given */
    
        }
    
        /* now, clone the cleaned proxy host name */
        conn->proxyhost = strdup(proxyptr);
    
        free(proxydup); /* free the duplicate pointer and not the modified */
      }
    
    
      /*************************************************************
       * Take care of user and password authentication stuff
       *************************************************************/
    
      /*
       * Inputs: data->set.userpwd   (CURLOPT_USERPWD)
       *         data->set.fpasswd   (CURLOPT_PASSWDFUNCTION)
       *         data->set.use_netrc (CURLOPT_NETRC)
       *         conn->hostname
       *         netrc file
       *         hard-coded defaults
       *
       * Outputs: (almost :- all currently undefined)
       *          conn->bits.user_passwd  - non-zero if non-default passwords exist
    
       *          conn->user              - non-zero length if defined
       *          conn->passwd            -   ditto
    
       *          conn->hostname          - remove user name and password
       */
    
      /* At this point, we're hoping all the other special cases have
       * been taken care of, so conn->hostname is at most
       *    [user[:password]]@]hostname
       *
       * We need somewhere to put the embedded details, so do that first.
       */
    
    
      user[0] =0;   /* to make everything well-defined */
      passwd[0]=0;
    
      if (conn->protocol & (PROT_FTP|PROT_HTTP)) {
        /* This is a FTP or HTTP URL, we will now try to extract the possible
         * user+password pair in a string like:
         * ftp://user:password@ftp.my.site:8021/README */
        char *ptr=strchr(conn->name, '@');
        char *userpass = conn->name;
        if(ptr != NULL) {
          /* there's a user+password given here, to the left of the @ */
    
          conn->name = conn->hostname = ++ptr;
    
          /* So the hostname is sane.  Only bother interpreting the
           * results if we could care.  It could still be wasted
           * work because it might be overtaken by the programmatically
           * set user/passwd, but doing that first adds more cases here :-(
           */
    
          if (data->set.use_netrc != CURL_NETRC_REQUIRED) {
            /* We could use the one in the URL */
    
            conn->bits.user_passwd = 1; /* enable user+password */
    
            if(*userpass != ':') {
              /* the name is given, get user+password */
              sscanf(userpass, "%127[^:@]:%127[^@]",
    
            }
            else
              /* no name given, get the password only */
    
              sscanf(userpass, ":%127[^@]", passwd);
    
            if(user[0]) {
              char *newname=curl_unescape(user, 0);
              if(strlen(newname) < sizeof(user)) {
                strcpy(user, newname);
    
              }
              /* if the new name is longer than accepted, then just use
                 the unconverted name, it'll be wrong but what the heck */
              free(newname);
            }
    
              /* we have a password found in the URL, decode it! */
    
              char *newpasswd=curl_unescape(passwd, 0);
              if(strlen(newpasswd) < sizeof(passwd)) {
                strcpy(passwd, newpasswd);
    
              }
              free(newpasswd);
            }
          }
        }
      }
    
      /* Programmatically set password:
       *   - always applies, if available
       *   - takes precedence over the values we just set above
       * so scribble it over the top.
       * User-supplied passwords are assumed not to need unescaping.
       *
       * user_password is set in "inherite initial knowledge' above,
       * so it doesn't have to be set in this block
       */
      if (data->set.userpwd != NULL) {
    
        /* the name is given, get user+password */
    
        sscanf(data->set.userpwd,
               "%" MAX_CURL_USER_LENGTH_TXT "[^:]:"
               "%" MAX_CURL_PASSWORD_LENGTH_TXT "[^\n]",
    
      if (data->set.use_netrc != CURL_NETRC_IGNORED) {
    
        if(Curl_parsenetrc(conn->hostname,
    
                           user, passwd,
                           data->set.netrc_file)) {
    
          infof(data, "Couldn't find host %s in the .netrc file, using defaults",
                conn->hostname);
    
          conn->bits.user_passwd = 1; /* enable user+password */
      }
    
      /* If our protocol needs a password and we have none, use the defaults */
    
           !conn->bits.user_passwd) {
    
        conn->user = strdup(CURL_DEFAULT_USER);
        conn->passwd = strdup(CURL_DEFAULT_PASSWORD);
    
        /* This is the default password, so DON'T set conn->bits.user_passwd */
      }
    
        /* store user + password, zero-length if not set */
        conn->user = strdup(user);
        conn->passwd = strdup(passwd);
    
      /*************************************************************
       * Check the current list of connections to see if we can
       * re-use an already existing one or if we have to create a
       * new one.
       *************************************************************/
    
    
      /* get a cloned copy of the SSL config situation stored in the 
         connection struct */
      if(!Curl_clone_ssl_config(&data->set.ssl, &conn->ssl_config))
        return CURLE_OUT_OF_MEMORY;
    
    
      /* reuse_fresh is set TRUE if we are told to use a fresh connection
         by force */
    
         ConnectionExists(data, conn, &conn_temp)) {
    
        /*
         * We already have a connection for this, we got the former connection
         * in the conn_temp variable and thus we need to cleanup the one we
         * just allocated before we can move along and use the previously
         * existing one.
         */
    
        struct connectdata *old_conn = conn;
        char *path = old_conn->path; /* setup the current path pointer properly */
    
        char *ppath = old_conn->ppath; /* this is the modified path pointer */
    
        if(old_conn->proxyhost)
          free(old_conn->proxyhost);
    
        /* free the SSL config struct from this connection struct as this was
           allocated in vain and is targeted for destruction */
        Curl_free_ssl_config(&conn->ssl_config);
    
    
        conn = conn_temp;        /* use this connection from now on */
    
        /* get the user+password information from the old_conn struct since it may
         * be new for this request even when we re-use an existing connection */
        conn->bits.user_passwd = old_conn->bits.user_passwd;
        conn->bits.proxy_user_passwd = conn->bits.proxy_user_passwd;
    
    
        /* If we speak over a proxy, we need to copy the host name too, as it
           might be another remote host even when re-using a connection */
        strcpy(conn->gname, old_conn->gname); /* safe strcpy() */
    
    
        /* we need these pointers if we speak over a proxy */
    
        conn->hostname = conn->gname;
        conn->name = &conn->gname[old_conn->name - old_conn->gname];
    
        free(conn->path);    /* free the previously allocated path pointer */
    
        /* 'path' points to the allocated data, 'ppath' may have been advanced
           to point somewhere within the 'path' area. */
    
        conn->path = path;
    
        conn->ppath = ppath;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        conn->bits.reuse = TRUE; /* yes, we're re-using here */
    
        conn->bits.chunk = FALSE; /* always assume not chunked unless told
                                     otherwise */
    
        conn->maxdownload = -1;  /* might have been used previously! */
    
        Curl_safefree(old_conn->user);
        Curl_safefree(old_conn->passwd);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        Curl_safefree(old_conn->proxyuser);
        Curl_safefree(old_conn->proxypasswd);
    
        if(old_conn->bits.rangestringalloc)
          free(old_conn->range);
    
    
        free(old_conn);          /* we don't need this anymore */
    
    
        /*
         * If we're doing a resumed transfer, we need to setup our stuff
         * properly.
         */
    
        conn->resume_from = data->set.set_resume_from;
    
          snprintf(resumerange, sizeof(resumerange), "%d-", conn->resume_from);
          if (conn->bits.rangestringalloc == TRUE)
            free(conn->range);
    
          /* tell ourselves to fetch this range */
          conn->range = strdup(resumerange);
          conn->bits.use_range = TRUE;        /* enable range download */
          conn->bits.rangestringalloc = TRUE; /* mark range string allocated */
    
          /* There is a range, but is not a resume, useful for random ftp access */
    
          conn->range = strdup(data->set.set_range);
    
          conn->bits.rangestringalloc = TRUE; /* mark range string allocated */
          conn->bits.use_range = TRUE;        /* enable range download */
        }
    
        else
          conn->bits.use_range = FALSE; /* disable range download */
    
        *in_connect = conn;      /* return this instead! */
    
    
        infof(data, "Re-using existing connection! (#%d)\n", conn->connectindex);
    
      }
      else {
        /*
         * This is a brand new connection, so let's store it in the connection
         * cache of ours!
         */
        ConnectionStore(data, conn);
      }
    
    
      /* Continue connectdata initialization here.
    
       * Inherit the proper values from the urldata struct AFTER we have arranged
       * the persistant conncetion stuff */
      conn->fread = data->set.fread;
      conn->fread_in = data->set.in;
    
      conn->bits.upload_chunky =
        ((conn->protocol&PROT_HTTP) &&
         data->set.upload &&
         (data->set.infilesize == -1) &&
         (data->set.httpversion != CURL_HTTP_VERSION_1_0))?
        /* HTTP, upload, unknown file size and not HTTP 1.0 */
        TRUE:
      /* else, no chunky upload */
      FALSE;
    
    
      /*************************************************************
    
       * Set timeout if that is being used, and we're not using an asynchronous
       * name resolve.
    
       *************************************************************/
    
      if((data->set.timeout || data->set.connecttimeout) && !data->set.no_signal) {
    
        /*************************************************************
         * Set signal handler to catch SIGALRM
         * Store the old value to be able to set it back later!
         *************************************************************/
    
    #ifdef HAVE_SIGACTION
        struct sigaction sigact;
        sigaction(SIGALRM, NULL, &sigact);
    
        keep_sigact = sigact;
    
        keep_copysig = TRUE; /* yes, we have a copy */
    
        sigact.sa_handler = alarmfunc;
    #ifdef SA_RESTART
        /* HPUX doesn't have SA_RESTART but defaults to that behaviour! */
        sigact.sa_flags &= ~SA_RESTART;
    #endif
        /* now set the new struct */
        sigaction(SIGALRM, &sigact, NULL);
    #else
        /* no sigaction(), revert to the much lamer signal() */
    #ifdef HAVE_SIGNAL
    
        keep_sigact = signal(SIGALRM, alarmfunc);
    
        /* We set the timeout on the name resolving phase first, separately from
         * the download/upload part to allow a maximum time on everything. This is
         * a signal-based timeout, why it won't work and shouldn't be used in
         * multi-threaded environments. */
    
    
    #ifdef HAVE_ALARM
        /* alarm() makes a signal get sent when the timeout fires off, and that
    
        prev_alarm = alarm(data->set.connecttimeout?
                           data->set.connecttimeout:
                           data->set.timeout);
        /* We can expect the conn->created time to be "now", as that was just
           recently set in the beginning of this function and nothing slow
           has been done since then until now. */
    #endif
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Resolve the name of the server or proxy
       *************************************************************/
    
      if(conn->bits.reuse) {
        /* re-used connection, no resolving is necessary */
        hostaddr = NULL;
    
        conn->connect_addr = NULL; /* we don't connect now so we don't have any
                                      fresh connect_addr struct to point to */
    
      else if(!data->change.proxy || !*data->change.proxy) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If not connecting via a proxy, extract the port from the URL, if it is
         * there, thus overriding any defaults that might have been set above. */
    
        conn->port =  conn->remote_port; /* it is the same port */
    
        /* Resolve target host right on */
    
        rc = Curl_resolv(conn, conn->name, conn->port, &hostaddr);
        if(rc == 1)
          *async = TRUE;
    
          failf(data, "Couldn't resolve host '%s'", conn->name);
    
          result =  CURLE_COULDNT_RESOLVE_HOST;
          /* don't return yet, we need to clean up the timeout first */
    
      else {
        /* This is a proxy that hasn't been resolved yet. */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
        /* resolve proxy */
    
        rc = Curl_resolv(conn, conn->proxyhost, conn->port, &hostaddr);
    
        if(rc == 1)
          *async = TRUE;
    
          failf(data, "Couldn't resolve proxy '%s'", conn->proxyhost);
    
          result = CURLE_COULDNT_RESOLVE_PROXY;
          /* don't return yet, we need to clean up the timeout first */