Skip to content
Snippets Groups Projects
url.c 87.4 KiB
Newer Older
  • Learn to ignore specific revisions
  • Daniel Stenberg's avatar
    Daniel Stenberg committed
      case CURLOPT_KRB4LEVEL:
    
        /*
         * A string that defines the krb4 security level.
         */
    
        data->set.krb4_level = va_arg(param, char *);
        data->set.krb4=data->set.krb4_level?TRUE:FALSE;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        break;
    
        data->set.ssl.verifypeer = va_arg(param, long);
    
      case CURLOPT_SSL_VERIFYHOST:
        /*
         * Enable verification of the CN contained in the peer certificate
         */
    
        data->set.ssl.verifyhost = va_arg(param, long);
    
        /*
         * Set CA info for SSL connection. Specify file name of the CA certificate
         */
    
        data->set.ssl.CAfile = va_arg(param, char *);
    
        break;
      case CURLOPT_CAPATH:
        /*
    
         * Set CA path info for SSL connection. Specify directory name of the CA
         * certificates which have been prepared using openssl c_rehash utility.
    
        /* This does not work on windows. */
        data->set.ssl.CApath = va_arg(param, char *);
    
      case CURLOPT_TELNETOPTIONS:
    
        /*
         * Set a linked list of telnet options
         */
    
        data->set.telnet_options = va_arg(param, struct curl_slist *);
    
    
      case CURLOPT_BUFFERSIZE:
        /*
         * The application kindly asks for a differently sized receive buffer.
         * If it seems reasonable, we'll use it.
         */
        data->set.buffer_size = va_arg(param, long);
    
        if(data->set.buffer_size> (BUFSIZE -1 ))
          data->set.buffer_size = 0; /* huge internal default */
    
        break;
    
    
      case CURLOPT_NOSIGNAL:
        /*
         * The application asks not to set any signal() or alarm() handlers,
         * even when using a timeout.
         */
        data->set.no_signal = va_arg(param, long) ? TRUE : FALSE;
        break;
    
    
      case CURLOPT_SHARE:
        {
          curl_share *set;
          set = va_arg(param, curl_share *);
          if(data->share)
            data->share->dirty--;
    
          data->share = set;
          data->share->dirty++;
        }
        break;
    
    
      case CURLOPT_PROXYTYPE:
        /*
         * Set proxy type. HTTP/SOCKS4/SOCKS5
         */
        data->set.proxytype = va_arg(param, long);
        break;
    
    
      default:
        /* unknown tag and its companion, just ignore: */
    
        return CURLE_FAILED_INIT; /* correct this */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      return CURLE_OK;
    
    CURLcode Curl_disconnect(struct connectdata *conn)
    
      if(!conn)
        return CURLE_OK; /* this is closed and fine already */
    
    
      /*
       * The range string is usually freed in curl_done(), but we might
       * get here *instead* if we fail prematurely. Thus we need to be able
       * to free this resource here as well.
       */
      if(conn->bits.rangestringalloc) {
        free(conn->range);
        conn->bits.rangestringalloc = FALSE;
      }
    
    
      if(-1 != conn->connectindex) {
    
        infof(conn->data, "Closing connection #%d\n", conn->connectindex);
    
        conn->data->state.connects[conn->connectindex] = NULL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      if(conn->curl_disconnect)
        /* This is set if protocol-specific cleanups should be made */
        conn->curl_disconnect(conn);
    
    
      if(conn->proto.generic)
        free(conn->proto.generic);
    
      if(conn->path) /* the URL path part */
        free(conn->path);
    
    
    #ifdef USE_SSLEAY
    
    #endif /* USE_SSLEAY */
    
      /* close possibly still open sockets */
    
      if(-1 != conn->secondarysocket)
    
        sclose(conn->secondarysocket);
    
      if(-1 != conn->firstsocket)
    
        sclose(conn->firstsocket);
    
    
      if(conn->allocptr.proxyuserpwd)
        free(conn->allocptr.proxyuserpwd);
      if(conn->allocptr.uagent)
        free(conn->allocptr.uagent);
      if(conn->allocptr.userpwd)
        free(conn->allocptr.userpwd);
    
      if(conn->allocptr.accept_encoding)
        free(conn->allocptr.accept_encoding);
    
      if(conn->allocptr.rangeline)
        free(conn->allocptr.rangeline);
      if(conn->allocptr.ref)
        free(conn->allocptr.ref);
      if(conn->allocptr.cookie)
        free(conn->allocptr.cookie);
      if(conn->allocptr.host)
        free(conn->allocptr.host);
    
    
      if(conn->proxyhost)
        free(conn->proxyhost);
    
    
      free(conn); /* free all the connection oriented data */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    /*
     * This function should return TRUE if the socket is to be assumed to
     * be dead. Most commonly this happens when the server has closed the
     * connection due to inactivity.
     */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    { 
      int sval; 
      bool ret_val = TRUE; 
      fd_set check_set; 
      struct timeval to; 
    
      FD_ZERO(&check_set); 
      FD_SET(sock,&check_set); 
    
      to.tv_sec = 0; 
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
      sval = select(sock + 1, &check_set, 0, 0, &to);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* timeout */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      
      return ret_val;
    }
    
    
     * Given one filled in connection struct (named needle), this function should
     * detect if there already is one that have all the significant details
     * exactly the same and thus should be used instead.
    
    ConnectionExists(struct SessionHandle *data,
    
                     struct connectdata *needle,
                     struct connectdata **usethis)
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    {
    
      struct connectdata *check;
    
    
      for(i=0; i< data->state.numconnects; i++) {
    
        /*
         * Note that if we use a HTTP proxy, we check connections to that
         * proxy and not to the actual remote server.
         */
    
        if(!check)
          /* NULL pointer means not filled-in entry */
          continue;
    
        if(!needle->bits.httpproxy || needle->protocol&PROT_SSL) {
          /* The requested connection does not use a HTTP proxy or it
             uses SSL. */
    
          if(!(needle->protocol&PROT_SSL) && check->bits.httpproxy)
            /* we don't do SSL but the cached connection has a proxy,
               then don't match this */
            continue;
    
    
          if(strequal(needle->protostr, check->protostr) &&
             strequal(needle->name, check->name) &&
    
             (needle->remote_port == check->remote_port) ) {
    
            if(strequal(needle->protostr, "FTP")) {
              /* This is FTP, verify that we're using the same name and
                 password as well */
    
              if(!strequal(needle->data->state.user, check->proto.ftp->user) ||
                 !strequal(needle->data->state.passwd, check->proto.ftp->passwd)) {
    
                /* one of them was different */
                continue;
              }
            }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
    
        else { /* The requested needle connection is using a proxy,
                  is the checked one using the same? */
          if(check->bits.httpproxy &&
             strequal(needle->proxyhost, check->proxyhost) &&
             needle->port == check->port) {
            /* This is the same proxy connection, use it! */
    
            match = TRUE;
          }
        }
    
        if(match) {
          bool dead = SocketIsDead(check->firstsocket);
          if(dead) {
            /*
             */
            infof(data, "Connection %d seems to be dead!\n", i);
            Curl_disconnect(check); /* disconnect resources */
            data->state.connects[i]=NULL; /* nothing here */
    
            /* There's no need to continue searching, because we only store
               one connection for each unique set of identifiers */
            return FALSE;
    
    
          *usethis = check;
          return TRUE; /* yes, we found one to use! */
    
      }
      return FALSE; /* no matching connecting exists */
    }
    
    /*
     * This function frees/closes a connection in the connection cache. This
     * should take the previously set policy into account when deciding which
     * of the connections to kill.
     */
    static int
    
    ConnectionKillOne(struct SessionHandle *data)
    
      struct connectdata *conn;
    
      int highscore=-1;
      int connindex=-1;
      int score;
      CURLcode result;
    
      struct timeval now;
    
      now = Curl_tvnow();
    
      for(i=0; i< data->state.numconnects; i++) {
        conn = data->state.connects[i];
    
        
        if(!conn)
          continue;
    
        /*
         * By using the set policy, we score each connection.
         */
    
        case CURLCLOSEPOLICY_LEAST_RECENTLY_USED:
    
          /*
           * Set higher score for the age passed since the connection
           * was used.
           */
    
          score = Curl_tvdiff(now, conn->now);
    
          break;
        case CURLCLOSEPOLICY_OLDEST:
          /*
           * Set higher score for the age passed since the connection
           * was created.
           */
    
          score = Curl_tvdiff(now, conn->created);
    
          break;
        }
    
        if(score > highscore) {
          highscore = score;
          connindex = i;
        }
      }
      if(connindex >= 0) {
    
        /* the winner gets the honour of being disconnected */
    
        result = Curl_disconnect(data->state.connects[connindex]);
    
    
        /* clean the array entry */
    
        data->state.connects[connindex] = NULL;
    
      }
    
      return connindex; /* return the available index or -1 */
    }
    
    /*
     * The given input connection struct pointer is to be stored. If the "cache"
     * is already full, we must clean out the most suitable using the previously
     * set policy.
     *
     * The given connection should be unique. That must've been checked prior to
     * this call.
     */
    static unsigned int
    
    ConnectionStore(struct SessionHandle *data,
    
                    struct connectdata *conn)
    {
    
      for(i=0; i< data->state.numconnects; i++) {
        if(!data->state.connects[i])
    
        /* there was no room available, kill one */
        i = ConnectionKillOne(data);
    
        infof(data, "Connection (#%d) was killed to make room\n", i);
      }
    
      if(-1 != i) {
        /* only do this if a true index was returned, if -1 was returned there
           is no room in the cache for an unknown reason and we cannot store
           this there. */
        data->state.connects[i] = conn; /* fill in this */
        conn->connectindex = i; /* make the child know where the pointer to this
                                   particular data is stored */
      }
    
    /*
     * This function logs in to a SOCKS5 proxy and sends the specifies the final
     * desitination server.
     */
    static int handleSock5Proxy(
        const char *proxy_name,
        const char *proxy_password,
        struct connectdata *conn,
        int sock)
    {
      unsigned char socksreq[600]; /* room for large user/pw (255 max each) */
      int actualread;
      int written;
      CURLcode result;
    
      Curl_nonblock(sock, FALSE);
    
      socksreq[0] = 5; /* version */
      socksreq[1] = (char)(proxy_name[0] ? 2 : 1); /* number of methods (below) */
      socksreq[2] = 0; /* no authentication */
      socksreq[3] = 2; /* username/password */
    
      result = Curl_write(conn, sock, (char *)socksreq, (2 + (int)socksreq[1]),
                          &written);
      if ((result != CURLE_OK) || (written != (2 + (int)socksreq[1]))) {
        failf(conn->data, "Unable to send initial SOCKS5 request.");
        return 1;
      }
    
      result=Curl_read(conn, sock, (char *)socksreq, 2, &actualread);
      if ((result != CURLE_OK) || (actualread != 2)) {
        failf(conn->data, "Unable to receive initial SOCKS5 response.");
        return 1;
      }
    
      if (socksreq[0] != 5) {
        failf(conn->data, "Received invalid version in initial SOCKS5 response.");
        return 1;
      }
      if (socksreq[1] == 0) {
        /* Nothing to do, no authentication needed */
        ;
      }
      else if (socksreq[1] == 2) {
        /* Needs user name and password */
        int userlen, pwlen, len;
    
        userlen = strlen(proxy_name);
        pwlen = strlen(proxy_password);
    
        /*   username/password request looks like
         * +----+------+----------+------+----------+
         * |VER | ULEN |  UNAME   | PLEN |  PASSWD  |
         * +----+------+----------+------+----------+
         * | 1  |  1   | 1 to 255 |  1   | 1 to 255 |
         * +----+------+----------+------+----------+
         */
        len = 0;
        socksreq[len++] = 1;    /* username/pw subnegotiation version */
        socksreq[len++] = (char) userlen;
        memcpy(socksreq + len, proxy_name, (int) userlen);
        len += userlen;
        socksreq[len++] = (char) pwlen;
        memcpy(socksreq + len, proxy_password, (int) pwlen);
        len += pwlen;
    
        result = Curl_write(conn, sock, (char *)socksreq, len, &written);
        if ((result != CURLE_OK) || (len != written)) {
          failf(conn->data, "Failed to send SOCKS5 sub-negotiation request.");
          return 1;
        }
    
        result=Curl_read(conn, sock, (char *)socksreq, 2, &actualread);
        if ((result != CURLE_OK) || (actualread != 2)) {
          failf(conn->data, "Unable to receive SOCKS5 sub-negotiation response.");
          return 1;
        }
    
        if ((socksreq[0] != 5) || /* version */
            (socksreq[1] != 0)) { /* status */
          failf(conn->data, "User was rejected by the SOCKS5 server (%d %d).",
                socksreq[0], socksreq[1]);
          return 1;
        }
    
        /* Everything is good so far, user was authenticated! */
      }
      else {
        /* error */
        if (socksreq[1] == 1) {
          failf(conn->data,
                "SOCKS5 GSSAPI per-message authentication is not supported.");
          return 1;
        }
        else if (socksreq[1] == 255) {
          if (proxy_name[0] == 0) {
            failf(conn->data,
                  "No authentication method was acceptable. (It is quite likely"
                  " that the SOCKS5 server wanted a username/password, since none"
                  " was supplied to the server on this connection.)");
          }
          else {            
            failf(conn->data, "No authentication method was acceptable.");
          }
          return 1;
        }
        else {
          failf(conn->data,
                "Undocumented SOCKS5 mode attempted to be used by server.");
          return 1;
        }
      }
    
      /* Authentication is complete, now specify destination to the proxy */
      socksreq[0] = 5; /* version (SOCKS5) */
      socksreq[1] = 1; /* connect */
      socksreq[2] = 0; /* must be zero */
      socksreq[3] = 1; /* IPv4 = 1 */
        
      {
        Curl_addrinfo *hp;
        hp = Curl_resolv(conn->data, conn->hostname, conn->remote_port);
        /*
         * We cannot use 'hostent' as a struct that Curl_resolv() returns.  It
         * returns a Curl_addrinfo pointer that may not always look the same.
         */
    #ifndef ENABLE_IPV6
        if (hp && hp->h_addr_list[0]) {
          socksreq[4] = ((char*)hp->h_addr_list[0])[0];
          socksreq[5] = ((char*)hp->h_addr_list[0])[1];
          socksreq[6] = ((char*)hp->h_addr_list[0])[2];
          socksreq[7] = ((char*)hp->h_addr_list[0])[3];
        }
        else {
          failf(conn->data, "Failed to resolve \"%s\" for SOCKS5 connect.",
                conn->hostname);
          return 1;
        }
    #else
        failf(conn->data,
              "%s:%d has an internal error an needs to be fixed to work",
              __FILE__, __LINE__);
        return 1;
    #endif
      }
    
      *((unsigned short*)&socksreq[8]) = htons(conn->remote_port);
    
      {
        const int packetsize = 10;
    
        result = Curl_write(conn, sock, (char *)socksreq, packetsize, &written);
        if ((result != CURLE_OK) || (written != packetsize)) {
          failf(conn->data, "Failed to send SOCKS5 connect request.");
          return 1;
        }
    
        result = Curl_read(conn, sock, (char *)socksreq, packetsize, &actualread);
        if ((result != CURLE_OK) || (actualread != packetsize)) {
          failf(conn->data, "Failed to receive SOCKS5 connect request ack.");
          return 1;
        }
    
        if (socksreq[0] != 5) { /* version */
          failf(conn->data,
                "SOCKS5 reply has wrong version, version should be 5.");
          return 1;
        }
        if (socksreq[1] != 0) { /* Anything besides 0 is an error */
            failf(conn->data,
                  "Can't complete SOCKS5 connection to %d.%d.%d.%d:%d. (%d)",
                  (unsigned char)socksreq[4], (unsigned char)socksreq[5],
                  (unsigned char)socksreq[6], (unsigned char)socksreq[7],
                  (unsigned int)ntohs(*(unsigned short*)(&socksreq[8])),
                  socksreq[1]);
            return 1;
        }
      }
    
      Curl_nonblock(sock, TRUE);
      return 0; /* Proxy was successful! */
    }
    
    
    static CURLcode ConnectPlease(struct connectdata *conn,
    
      CURLcode result;
      Curl_ipconnect *addr;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      /*************************************************************
    
       * Connect to server/proxy
    
       *************************************************************/
    
      result= Curl_connecthost(conn,
    
                               conn->port,
                               &conn->firstsocket,
    
      if(CURLE_OK == result) {
        /* All is cool, then we store the current information from the hostaddr
           struct to the serv_addr, as it might be needed later. The address
           returned from the function above is crucial here. */
    #ifdef ENABLE_IPV6
        conn->serv_addr = addr;
    #else
        memset((char *) &conn->serv_addr, '\0', sizeof(conn->serv_addr));
        memcpy((char *)&(conn->serv_addr.sin_addr),
               (struct in_addr *)addr, sizeof(struct in_addr));
    
        conn->serv_addr.sin_family = hostaddr->h_addrtype;
    
        conn->serv_addr.sin_port = htons((unsigned short)conn->port);
    
    
        if (conn->data->set.proxytype == CURLPROXY_SOCKS5) {
          return handleSock5Proxy(conn->data->state.proxyuser,
                                  conn->data->state.proxypasswd,
                                  conn,
                                  conn->firstsocket) ?
            CURLE_COULDNT_CONNECT : CURLE_OK;
        }
        else if (conn->data->set.proxytype == CURLPROXY_HTTP) {
          /* do nothing here. handled later. */
        }
        else {
          failf(conn->data, "unknown proxytype option given");
          return CURLE_COULDNT_CONNECT; 
        }
    
      return result;
    
    static void verboseconnect(struct connectdata *conn,
                               Curl_addrinfo *hostaddr)
    
    {
    #ifdef HAVE_INET_NTOA_R
      char ntoa_buf[64];
    #endif
      struct SessionHandle *data = conn->data;
    
      /* Figure out the ip-number and display the first host name it shows: */
    #ifdef ENABLE_IPV6
    
      (void)hostaddr; /* not used in the IPv6 enabled version */
    
      {
        char hbuf[NI_MAXHOST];
    #ifdef NI_WITHSCOPEID
        const int niflags = NI_NUMERICHOST | NI_WITHSCOPEID;
    #else
        const int niflags = NI_NUMERICHOST;
    #endif
        struct addrinfo *ai = conn->serv_addr;
    
        if (getnameinfo(ai->ai_addr, ai->ai_addrlen, hbuf, sizeof(hbuf), NULL, 0,
    	niflags)) {
          snprintf(hbuf, sizeof(hbuf), "?");
        }
        if (ai->ai_canonname) {
          infof(data, "Connected to %s (%s) port %d\n", ai->ai_canonname, hbuf,
                conn->port);
        } else {
          infof(data, "Connected to %s port %d\n", hbuf, conn->port);
        }
      }
    #else
      {
        struct in_addr in;
        (void) memcpy(&in.s_addr, &conn->serv_addr.sin_addr, sizeof (in.s_addr));
    
        infof(data, "Connected to %s (%s) port %d\n",
    
    #if defined(HAVE_INET_NTOA_R)
              inet_ntoa_r(in, ntoa_buf, sizeof(ntoa_buf)),
    #else
              inet_ntoa(in),
    #endif
              conn->port);
      }
    #endif
    }
    
    
    /*
     * We have discovered that the TCP connection has been successful, we can now
     * proceed with some action.
     *
     * If we're using the multi interface, this host address pointer is most
     * likely NULL at this point as we can't keep the resolved info around. This
     * may call for some reworking, like a reference counter in the struct or
     * something. The hostaddr is not used for very much though, we have the
     * 'serv_addr' field in the connectdata struct for most of it.
     */
    CURLcode Curl_protocol_connect(struct connectdata *conn,
                                   Curl_addrinfo *hostaddr)
    {
      struct SessionHandle *data = conn->data;
      CURLcode result;
      
      Curl_pgrsTime(data, TIMER_CONNECT); /* connect done */
    
      if(data->set.verbose)
        verboseconnect(conn, hostaddr);
    
      if(conn->curl_connect) {
        /* is there a protocol-specific connect() procedure? */
    
        /* set start time here for timeout purposes in the
         * connect procedure, it is later set again for the
         * progress meter purpose */
        conn->now = Curl_tvnow();
    
        /* Call the protocol-specific connect function */
        result = conn->curl_connect(conn);
      }
    
      return result; /* pass back status */
    }
    
    
    static CURLcode CreateConnection(struct SessionHandle *data,
    
                                     struct connectdata **in_connect)
    
      char resumerange[40]="";
      struct connectdata *conn;
      struct connectdata *conn_temp;
      int urllen;
    
    #ifdef HAVE_ALARM
      unsigned int prev_alarm;
    #endif
    
    
    #ifdef HAVE_SIGACTION
      struct sigaction keep_sigact;   /* store the old struct here */
      bool keep_copysig;              /* did copy it? */
    
    #else
    #ifdef HAVE_SIGNAL
      void *keep_sigact;              /* store the old handler here */
    #endif
    
      /*************************************************************
       * Check input data
       *************************************************************/
    
    
        return CURLE_URL_MALFORMAT;
    
      /* First, split up the current URL in parts so that we can use the
         parts for checking against the already present connections. In order
         to not have to modify everything at once, we allocate a temporary
         connection data struct and fill in for comparison purposes. */
    
      conn = (struct connectdata *)malloc(sizeof(struct connectdata));
      if(!conn) {
        *in_connect = NULL; /* clear the pointer */
        return CURLE_OUT_OF_MEMORY;
      }
    
      /* We must set the return variable as soon as possible, so that our
         parent can cleanup any possible allocs we may have done before
         any failure */
      *in_connect = conn;
    
    
      /* we have to init the struct */
      memset(conn, 0, sizeof(struct connectdata));
    
      /* and we setup a few fields in case we end up actually using this struct */
      conn->data = data;           /* remember our daddy */
      conn->firstsocket = -1;     /* no file descriptor */
      conn->secondarysocket = -1; /* no file descriptor */
      conn->connectindex = -1;    /* no index */
    
      conn->bits.httpproxy = data->change.proxy?TRUE:FALSE; /* proxy-or-not */
      conn->bits.use_range = data->set.set_range?TRUE:FALSE; /* range status */
      conn->range = data->set.set_range;               /* clone the range setting */
      conn->resume_from = data->set.set_resume_from;   /* inherite resume_from */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
      /* Default protocol-independent behavior doesn't support persistant
    
         connections, so we set this to force-close. Protocols that support
         this need to set this to FALSE in their "curl_do" functions. */
      conn->bits.close = TRUE;
    
      /* inherite initial knowledge from the data struct */
    
      conn->bits.user_passwd = data->set.userpwd?1:0;
      conn->bits.proxy_user_passwd = data->set.proxyuserpwd?1:0;
    
      /* maxdownload must be -1 on init, as 0 is a valid value! */
      conn->maxdownload = -1;  /* might have been used previously! */
    
    
      /* Store creation time to help future close decision making */
      conn->created = Curl_tvnow();
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /***********************************************************
       * We need to allocate memory to store the path in. We get the size of the
       * full URL to be sure, and we need to make it at least 256 bytes since
       * other parts of the code will rely on this fact
       ***********************************************************/
    
    #define LEAST_PATH_ALLOC 256
    
      if(urllen < LEAST_PATH_ALLOC)
        urllen=LEAST_PATH_ALLOC;
      
      conn->path=(char *)malloc(urllen);
      if(NULL == conn->path)
        return CURLE_OUT_OF_MEMORY; /* really bad error */
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Parse the URL.
       *
       * We need to parse the url even when using the proxy, because we will need
       * the hostname and port in case we are trying to SSL connect through the
       * proxy -- and we don't know if we will need to use SSL until we parse the
       * url ...
       ************************************************************/
    
      if((2 == sscanf(data->change.url, "%64[^:]://%[^\n]",
    
                      conn->protostr,
                      conn->path)) && strequal(conn->protostr, "file")) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /*
         * we deal with file://<host>/<path> differently since it supports no
         * hostname other than "localhost" and "127.0.0.1", which is unique among
         * the URL protocols specified in RFC 1738
         */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(conn->path[0] != '/') {
          /* the URL included a host name, we ignore host names in file:// URLs
             as the standards don't define what to do with them */
          char *ptr=strchr(conn->path, '/');
          if(ptr) {
            /* there was a slash present
               
               RFC1738 (section 3.1, page 5) says:
     
               The rest of the locator consists of data specific to the scheme,
               and is known as the "url-path". It supplies the details of how the
               specified resource can be accessed. Note that the "/" between the
               host (or port) and the url-path is NOT part of the url-path.
     
               As most agents use file://localhost/foo to get '/foo' although the
               slash preceeding foo is a separator and not a slash for the path,
               a URL as file://localhost//foo must be valid as well, to refer to
               the same file with an absolute path.
            */
    
            if(ptr[1] && ('/' == ptr[1]))
              /* if there was two slashes, we skip the first one as that is then
                 used truly as a separator */
              ptr++; 
            
            strcpy(conn->path, ptr);
          }
        }
    
        strcpy(conn->protostr, "file"); /* store protocol string lowercase */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      }
    
      else {
        /* Set default host and default path */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        strcpy(conn->gname, "curl.haxx.se");
    
        strcpy(conn->path, "/");
    
    
                       conn->protostr, conn->gname, conn->path)) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          /*
           * The URL was badly formatted, let's try the browser-style _without_
           * protocol specified like 'http://'.
           */
    
          if((1 > sscanf(data->change.url, "%512[^\n/]%[^\n]",
    
                         conn->gname, conn->path)) ) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
            /*
             * We couldn't even get this format.
             */
    
            failf(data, "<url> malformed");
            return CURLE_URL_MALFORMAT;
          }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
          /*
           * Since there was no protocol part specified, we guess what protocol it
           * is based on the first letters of the server name.
           */
    
    
          /* Note: if you add a new protocol, please update the list in
           * lib/version.c too! */
    
    
          if(strnequal(conn->gname, "FTP", 3)) {
    
            strcpy(conn->protostr, "ftp");
    
          }
          else if(strnequal(conn->gname, "GOPHER", 6))
    
            strcpy(conn->protostr, "gopher");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #ifdef USE_SSLEAY
    
          else if(strnequal(conn->gname, "HTTPS", 5))
    
            strcpy(conn->protostr, "https");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          else if(strnequal(conn->gname, "FTPS", 4))
            strcpy(conn->protostr, "ftps");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    #endif /* USE_SSLEAY */
    
          else if(strnequal(conn->gname, "TELNET", 6))
    
            strcpy(conn->protostr, "telnet");
    
          else if (strnequal(conn->gname, "DICT", sizeof("DICT")-1))
    
            strcpy(conn->protostr, "DICT");
    
          else if (strnequal(conn->gname, "LDAP", sizeof("LDAP")-1))
    
            strcpy(conn->protostr, "LDAP");
    
            strcpy(conn->protostr, "http");
    
          }
    
          conn->protocol |= PROT_MISSING; /* not given in URL */
        }
    
      buf = data->state.buffer; /* this is our buffer */
    
      /*
       * So if the URL was A://B/C,
       *   conn->protostr is A
       *   conn->gname is B
       *   conn->path is /C
       */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Take care of proxy authentication stuff
       *************************************************************/
    
        data->state.proxyuser[0] =0;
        data->state.proxypasswd[0]=0;
    
          /* the name is given, get user+password */
    
          sscanf(data->set.proxyuserpwd, "%127[^:]:%127[^\n]",
                 data->state.proxyuser, data->state.proxypasswd);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
    
        else
          /* no name given, get the password only */
    
          sscanf(data->set.proxyuserpwd+1, "%127[^\n]", data->state.proxypasswd);
    
    
        /* check for password, if no ask for one */
    
          if(data->set.fpasswd( data->set.passwd_client,
                                "proxy password:",
                                data->state.proxypasswd,
                                sizeof(data->state.proxypasswd))) {
    
            failf(data, "Bad password from password callback");
    
            return CURLE_BAD_PASSWORD_ENTERED;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        }
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Set a few convenience pointers 
       *************************************************************/
    
      conn->name = conn->gname;
      conn->ppath = conn->path;
    
      conn->hostname = conn->name;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
      /*************************************************************
       * Detect what (if any) proxy to use
       *************************************************************/
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        /* If proxy was not specified, we check for default proxy environment
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
         * variables, to enable i.e Lynx compliance:
         *
         * http_proxy=http://some.server.dom:port/
         * https_proxy=http://some.server.dom:port/
         * ftp_proxy=http://some.server.dom:port/
         * gopher_proxy=http://some.server.dom:port/
         * no_proxy=domain1.dom,host.domain2.dom
         *   (a comma-separated list of hosts which should
         *   not be proxied, or an asterisk to override
         *   all proxy variables)
         * all_proxy=http://some.server.dom:port/
         *   (seems to exist for the CERN www lib. Probably
         *   the first to check for.)
         *
         * For compatibility, the all-uppercase versions of these variables are
         * checked if the lowercase versions don't exist.
         */
    
        char *no_proxy_tok_buf;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        char *proxy=NULL;
        char proxy_env[128];
    
    
        no_proxy=curl_getenv("no_proxy");
    
          no_proxy=curl_getenv("NO_PROXY");
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
        if(!no_proxy || !strequal("*", no_proxy)) {
          /* NO_PROXY wasn't specified or it wasn't just an asterisk */
          char *nope;
    
    
          nope=no_proxy?strtok_r(no_proxy, ", ", &no_proxy_tok_buf):NULL;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          while(nope) {
    
            unsigned int namelen;
    
            char *endptr = strchr(conn->name, ':');
            if(endptr)
              namelen=endptr-conn->name;
            else
              namelen=strlen(conn->name);
    
            if(strlen(nope) <= namelen) {
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              char *checkn=
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
              if(strnequal(nope, checkn, strlen(nope))) {
                /* no proxy for this host! */
                break;
              }
            }
    
    	nope=strtok_r(NULL, ", ", &no_proxy_tok_buf);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
          }
          if(!nope) {
    	/* It was not listed as without proxy */
    
    	char *protop = conn->protostr;
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	char *envp = proxy_env;
    	char *prox;
    
    
    	/* Now, build <protocol>_proxy and check for such a one to use */
    	while(*protop)
    	  *envp++ = tolower(*protop++);
    
    	/* append _proxy */
    	strcpy(envp, "_proxy");
    
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	/* read the protocol proxy: */
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    
    
            /*
             * We don't try the uppercase version of HTTP_PROXY because of
             * security reasons:
             *
             * When curl is used in a webserver application
             * environment (cgi or php), this environment variable can
             * be controlled by the web server user by setting the
             * http header 'Proxy:' to some value.
             * 
             * This can cause 'internal' http/ftp requests to be
             * arbitrarily redirected by any external attacker.
             */
    	if(!prox && !strequal("http_proxy", proxy_env)) {
    
              /* There was no lowercase variable, try the uppercase version: */
    	  for(envp = proxy_env; *envp; envp++)
    	    *envp = toupper(*envp);
    
    Daniel Stenberg's avatar
    Daniel Stenberg committed
    	if(prox && *prox) { /* don't count "" strings */
    	  proxy = prox; /* use this */