1999-12-29 17:20:26 +03:00
|
|
|
/*****************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2001-01-03 12:29:33 +03:00
|
|
|
* Copyright (C) 2000, Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 17:20:26 +03:00
|
|
|
*
|
2001-01-03 12:29:33 +03:00
|
|
|
* In order to be useful for every potential user, curl and libcurl are
|
|
|
|
* dual-licensed under the MPL and the MIT/X-derivate licenses.
|
1999-12-29 17:20:26 +03:00
|
|
|
*
|
2001-01-03 12:29:33 +03:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the MPL or the MIT/X-derivate
|
|
|
|
* licenses. You may pick one of these licenses.
|
1999-12-29 17:20:26 +03:00
|
|
|
*
|
2001-01-03 12:29:33 +03:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 17:20:26 +03:00
|
|
|
*
|
2001-01-03 12:29:33 +03:00
|
|
|
* $Id$
|
|
|
|
*****************************************************************************/
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-08-24 18:26:33 +04:00
|
|
|
#include "setup.h"
|
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
/* -- WIN32 approved -- */
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <sys/stat.h>
|
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
|
|
|
|
|
2000-08-24 16:33:16 +04:00
|
|
|
#ifdef NEED_REENTRANT
|
|
|
|
#define _REENTRANT /* Necessary to use in Solaris, since the silly guys at Sun
|
|
|
|
made the localtime_r() prototype dependent on it (or
|
|
|
|
_POSIX_C_SOURCE or _POSIX_PTHREAD_SEMANTICS). */
|
|
|
|
#endif
|
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
#if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__)
|
|
|
|
#include <winsock.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <io.h>
|
|
|
|
#else
|
|
|
|
#ifdef HAVE_SYS_SOCKET_H
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#endif
|
2000-08-23 11:23:42 +04:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
1999-12-29 17:20:26 +03:00
|
|
|
#include <netinet/in.h>
|
2000-08-23 11:23:42 +04:00
|
|
|
#endif
|
1999-12-29 17:20:26 +03:00
|
|
|
#include <sys/time.h>
|
2000-07-30 02:21:10 +04:00
|
|
|
|
2000-08-01 02:42:34 +04:00
|
|
|
#ifdef HAVE_TIME_H
|
|
|
|
#ifdef TIME_WITH_SYS_TIME
|
|
|
|
#include <time.h>
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
#include <sys/resource.h>
|
|
|
|
#ifdef HAVE_UNISTD_H
|
|
|
|
#include <unistd.h>
|
|
|
|
#endif
|
|
|
|
#include <netdb.h>
|
|
|
|
#ifdef HAVE_ARPA_INET_H
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
#endif
|
|
|
|
#ifdef HAVE_NET_IF_H
|
|
|
|
#include <net/if.h>
|
|
|
|
#endif
|
|
|
|
#include <sys/ioctl.h>
|
|
|
|
#include <signal.h>
|
|
|
|
|
|
|
|
#ifdef HAVE_SYS_PARAM_H
|
|
|
|
#include <sys/param.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef HAVE_SYS_SELECT_H
|
|
|
|
#include <sys/select.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include "urldata.h"
|
|
|
|
#include <curl/curl.h>
|
2001-01-17 16:23:01 +03:00
|
|
|
#include "transfer.h"
|
1999-12-29 17:20:26 +03:00
|
|
|
#include "sendf.h"
|
|
|
|
#include "formdata.h"
|
|
|
|
#include "progress.h"
|
|
|
|
#include "base64.h"
|
|
|
|
#include "cookie.h"
|
2000-05-22 18:12:12 +04:00
|
|
|
#include "strequal.h"
|
|
|
|
#include "ssluse.h"
|
1999-12-29 17:20:26 +03:00
|
|
|
|
|
|
|
#define _MPRINTF_REPLACE /* use our functions only */
|
|
|
|
#include <curl/mprintf.h>
|
|
|
|
|
2000-10-09 15:12:34 +04:00
|
|
|
/* The last #include file should be: */
|
|
|
|
#ifdef MALLOCDEBUG
|
|
|
|
#include "memdebug.h"
|
|
|
|
#endif
|
|
|
|
|
2001-03-08 02:51:41 +03:00
|
|
|
/* ------------------------------------------------------------------------- */
|
2001-01-05 13:11:41 +03:00
|
|
|
/*
|
|
|
|
* The add_buffer series of functions are used to build one large memory chunk
|
|
|
|
* from repeated function invokes. Used so that the entire HTTP request can
|
|
|
|
* be sent in one go.
|
|
|
|
*/
|
|
|
|
static CURLcode
|
|
|
|
add_buffer(send_buffer *in, void *inptr, size_t size);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* add_buffer_init() returns a fine buffer struct
|
|
|
|
*/
|
|
|
|
static
|
|
|
|
send_buffer *add_buffer_init(void)
|
|
|
|
{
|
|
|
|
send_buffer *blonk;
|
|
|
|
blonk=(send_buffer *)malloc(sizeof(send_buffer));
|
|
|
|
if(blonk) {
|
|
|
|
memset(blonk, 0, sizeof(send_buffer));
|
|
|
|
return blonk;
|
|
|
|
}
|
|
|
|
return NULL; /* failed, go home */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* add_buffer_send() sends a buffer and frees all associated memory.
|
|
|
|
*/
|
|
|
|
static
|
|
|
|
size_t add_buffer_send(int sockfd, struct connectdata *conn, send_buffer *in)
|
|
|
|
{
|
|
|
|
size_t amount;
|
|
|
|
if(conn->data->bits.verbose) {
|
|
|
|
fputs("> ", conn->data->err);
|
|
|
|
/* this data _may_ contain binary stuff */
|
|
|
|
fwrite(in->buffer, in->size_used, 1, conn->data->err);
|
|
|
|
}
|
|
|
|
|
2001-01-25 15:19:02 +03:00
|
|
|
Curl_write(conn, sockfd, in->buffer, in->size_used, &amount);
|
2001-01-05 13:11:41 +03:00
|
|
|
|
|
|
|
if(in->buffer)
|
|
|
|
free(in->buffer);
|
|
|
|
free(in);
|
|
|
|
|
|
|
|
return amount;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* add_bufferf() builds a buffer from the formatted input
|
|
|
|
*/
|
|
|
|
static
|
|
|
|
CURLcode add_bufferf(send_buffer *in, char *fmt, ...)
|
|
|
|
{
|
|
|
|
CURLcode result = CURLE_OUT_OF_MEMORY;
|
|
|
|
char *s;
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2001-01-05 15:19:42 +03:00
|
|
|
s = vaprintf(fmt, ap); /* this allocs a new string to append */
|
2001-01-05 13:11:41 +03:00
|
|
|
va_end(ap);
|
|
|
|
|
|
|
|
if(s) {
|
|
|
|
result = add_buffer(in, s, strlen(s));
|
|
|
|
free(s);
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* add_buffer() appends a memory chunk to the existing one
|
|
|
|
*/
|
|
|
|
static
|
|
|
|
CURLcode add_buffer(send_buffer *in, void *inptr, size_t size)
|
|
|
|
{
|
|
|
|
char *new_rb;
|
|
|
|
int new_size;
|
|
|
|
|
|
|
|
if(size > 0) {
|
|
|
|
if(!in->buffer ||
|
|
|
|
((in->size_used + size) > (in->size_max - 1))) {
|
|
|
|
new_size = (in->size_used+size)*2;
|
|
|
|
if(in->buffer)
|
|
|
|
/* we have a buffer, enlarge the existing one */
|
|
|
|
new_rb = (char *)realloc(in->buffer, new_size);
|
|
|
|
else
|
|
|
|
/* create a new buffer */
|
|
|
|
new_rb = (char *)malloc(new_size);
|
|
|
|
|
|
|
|
if(!new_rb)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
|
|
|
|
in->buffer = new_rb;
|
|
|
|
in->size_max = new_size;
|
|
|
|
}
|
|
|
|
memcpy(&in->buffer[in->size_used], inptr, size);
|
|
|
|
|
|
|
|
in->size_used += size;
|
|
|
|
}
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* end of the add_buffer functions */
|
2001-03-08 02:51:41 +03:00
|
|
|
/* ------------------------------------------------------------------------- */
|
2001-01-05 13:11:41 +03:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Read everything until a newline.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static
|
2001-01-25 15:19:02 +03:00
|
|
|
int GetLine(int sockfd, char *buf, struct connectdata *conn)
|
2001-01-05 13:11:41 +03:00
|
|
|
{
|
2001-01-31 16:54:12 +03:00
|
|
|
ssize_t nread;
|
2001-01-05 13:11:41 +03:00
|
|
|
int read_rc=1;
|
|
|
|
char *ptr;
|
2001-01-25 15:19:02 +03:00
|
|
|
struct UrlData *data=conn->data;
|
|
|
|
|
2001-01-05 13:11:41 +03:00
|
|
|
ptr=buf;
|
|
|
|
|
|
|
|
/* get us a full line, terminated with a newline */
|
|
|
|
for(nread=0;
|
|
|
|
(nread<BUFSIZE) && read_rc;
|
|
|
|
nread++, ptr++) {
|
2001-01-25 15:19:02 +03:00
|
|
|
if((CURLE_OK != Curl_read(conn, sockfd, ptr, 1, &nread)) ||
|
2001-02-07 12:31:03 +03:00
|
|
|
(nread <= 0) ||
|
2001-01-25 15:19:02 +03:00
|
|
|
(*ptr == '\n'))
|
2001-01-05 13:11:41 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
*ptr=0; /* zero terminate */
|
2001-02-07 12:31:03 +03:00
|
|
|
|
2001-01-05 13:11:41 +03:00
|
|
|
if(data->bits.verbose) {
|
|
|
|
fputs("< ", data->err);
|
|
|
|
fwrite(buf, 1, nread, data->err);
|
|
|
|
fputs("\n", data->err);
|
|
|
|
}
|
2001-02-07 12:31:03 +03:00
|
|
|
return nread>0?nread:0;
|
2001-01-05 13:11:41 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
/*
|
|
|
|
* This function checks the linked list of custom HTTP headers for a particular
|
|
|
|
* header (prefix).
|
|
|
|
*/
|
|
|
|
bool static checkheaders(struct UrlData *data, char *thisheader)
|
|
|
|
{
|
2000-06-05 12:23:50 +04:00
|
|
|
struct curl_slist *head;
|
1999-12-29 17:20:26 +03:00
|
|
|
size_t thislen = strlen(thisheader);
|
|
|
|
|
|
|
|
for(head = data->headers; head; head=head->next) {
|
2000-06-05 12:23:50 +04:00
|
|
|
if(strnequal(head->data, thisheader, thislen)) {
|
1999-12-29 17:20:26 +03:00
|
|
|
return TRUE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
2000-09-14 18:05:01 +04:00
|
|
|
/*
|
2001-01-05 13:11:41 +03:00
|
|
|
* ConnectHTTPProxyTunnel() requires that we're connected to a HTTP proxy. This
|
2000-09-14 18:05:01 +04:00
|
|
|
* function will issue the necessary commands to get a seamless tunnel through
|
|
|
|
* this proxy. After that, the socket can be used just as a normal socket.
|
|
|
|
*/
|
|
|
|
|
2001-01-25 15:19:02 +03:00
|
|
|
CURLcode Curl_ConnectHTTPProxyTunnel(struct connectdata *conn,
|
|
|
|
int tunnelsocket,
|
2001-01-05 13:11:41 +03:00
|
|
|
char *hostname, int remote_port)
|
2000-09-14 18:05:01 +04:00
|
|
|
{
|
|
|
|
int httperror=0;
|
|
|
|
int subversion=0;
|
2001-01-25 15:19:02 +03:00
|
|
|
struct UrlData *data=conn->data;
|
2000-09-14 18:05:01 +04:00
|
|
|
|
2000-09-15 16:55:38 +04:00
|
|
|
infof(data, "Establish HTTP proxy tunnel to %s:%d\n", hostname, remote_port);
|
2000-09-14 18:05:01 +04:00
|
|
|
|
2001-01-25 15:19:02 +03:00
|
|
|
/* OK, now send the connect request to the proxy */
|
|
|
|
Curl_sendf(tunnelsocket, conn,
|
|
|
|
"CONNECT %s:%d HTTP/1.0\015\012"
|
|
|
|
"%s"
|
|
|
|
"%s"
|
|
|
|
"\r\n",
|
|
|
|
hostname, remote_port,
|
2001-03-14 17:11:11 +03:00
|
|
|
(conn->bits.proxy_user_passwd)?conn->allocptr.proxyuserpwd:"",
|
2001-02-23 02:32:02 +03:00
|
|
|
(data->useragent?conn->allocptr.uagent:"")
|
2001-01-25 15:19:02 +03:00
|
|
|
);
|
2000-09-14 18:05:01 +04:00
|
|
|
|
|
|
|
/* wait for the proxy to send us a HTTP/1.0 200 OK header */
|
2001-01-25 15:19:02 +03:00
|
|
|
while(GetLine(tunnelsocket, data->buffer, conn)) {
|
2000-09-14 18:05:01 +04:00
|
|
|
if('\r' == data->buffer[0])
|
|
|
|
break; /* end of headers */
|
|
|
|
if(2 == sscanf(data->buffer, "HTTP/1.%d %d",
|
|
|
|
&subversion,
|
|
|
|
&httperror)) {
|
|
|
|
;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if(200 != httperror) {
|
|
|
|
if(407 == httperror)
|
|
|
|
/* Added Nov 6 1998 */
|
|
|
|
failf(data, "Proxy requires authorization!");
|
|
|
|
else
|
|
|
|
failf(data, "Received error code %d from proxy", httperror);
|
|
|
|
return CURLE_READ_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
infof (data, "Proxy replied to CONNECT request\n");
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2001-03-08 02:51:41 +03:00
|
|
|
/*
|
|
|
|
* HTTP stuff to do at connect-time.
|
|
|
|
*/
|
2001-01-05 13:11:41 +03:00
|
|
|
CURLcode Curl_http_connect(struct connectdata *conn)
|
1999-12-29 17:20:26 +03:00
|
|
|
{
|
2000-05-22 18:12:12 +04:00
|
|
|
struct UrlData *data;
|
2000-09-14 18:05:01 +04:00
|
|
|
CURLcode result;
|
2000-05-22 18:12:12 +04:00
|
|
|
|
|
|
|
data=conn->data;
|
|
|
|
|
|
|
|
/* If we are not using a proxy and we want a secure connection,
|
|
|
|
* perform SSL initialization & connection now.
|
|
|
|
* If using a proxy with https, then we must tell the proxy to CONNECT
|
|
|
|
* us to the host we want to talk to. Only after the connect
|
|
|
|
* has occured, can we start talking SSL
|
|
|
|
*/
|
2000-09-14 18:05:01 +04:00
|
|
|
if (conn->protocol & PROT_HTTPS) {
|
|
|
|
if (data->bits.httpproxy) {
|
|
|
|
/* HTTPS through a proxy can only be done with a tunnel */
|
2001-02-20 20:35:51 +03:00
|
|
|
result = Curl_ConnectHTTPProxyTunnel(conn, conn->firstsocket,
|
|
|
|
conn->hostname, conn->remote_port);
|
2000-09-14 18:05:01 +04:00
|
|
|
if(CURLE_OK != result)
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* now, perform the SSL initialization for this socket */
|
2001-02-20 20:35:51 +03:00
|
|
|
if(Curl_SSLConnect(conn))
|
2000-09-14 18:05:01 +04:00
|
|
|
return CURLE_SSL_CONNECT_ERROR;
|
2000-05-22 18:12:12 +04:00
|
|
|
}
|
|
|
|
|
2001-03-14 17:11:11 +03:00
|
|
|
if(conn->bits.user_passwd && !data->bits.this_is_a_follow) {
|
2000-09-14 18:05:01 +04:00
|
|
|
/* Authorization: is requested, this is not a followed location, get the
|
|
|
|
original host name */
|
2001-02-20 20:35:51 +03:00
|
|
|
data->auth_host = strdup(conn->hostname);
|
2000-09-14 18:05:01 +04:00
|
|
|
}
|
2000-07-26 01:16:32 +04:00
|
|
|
|
2000-09-14 18:05:01 +04:00
|
|
|
return CURLE_OK;
|
2000-05-22 18:12:12 +04:00
|
|
|
}
|
2000-07-26 01:16:32 +04:00
|
|
|
|
|
|
|
/* called from curl_close() when this struct is about to get wasted, free
|
|
|
|
protocol-specific resources */
|
2001-01-05 13:11:41 +03:00
|
|
|
CURLcode Curl_http_close(struct connectdata *conn)
|
2000-07-26 01:16:32 +04:00
|
|
|
{
|
|
|
|
if(conn->data->auth_host)
|
|
|
|
free(conn->data->auth_host);
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
2001-01-05 13:11:41 +03:00
|
|
|
CURLcode Curl_http_done(struct connectdata *conn)
|
2000-05-22 18:12:12 +04:00
|
|
|
{
|
|
|
|
struct UrlData *data;
|
|
|
|
long *bytecount = &conn->bytecount;
|
|
|
|
struct HTTP *http;
|
|
|
|
|
|
|
|
data=conn->data;
|
2001-02-20 20:35:51 +03:00
|
|
|
http=conn->proto.http;
|
2000-05-22 18:12:12 +04:00
|
|
|
|
|
|
|
if(data->bits.http_formpost) {
|
|
|
|
*bytecount = http->readbytecount + http->writebytecount;
|
|
|
|
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_FormFree(http->sendit); /* Now free that whole lot */
|
2000-05-22 18:12:12 +04:00
|
|
|
|
|
|
|
data->fread = http->storefread; /* restore */
|
|
|
|
data->in = http->in; /* restore */
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
2000-05-22 18:12:12 +04:00
|
|
|
else if(data->bits.http_put) {
|
|
|
|
*bytecount = http->readbytecount + http->writebytecount;
|
|
|
|
}
|
|
|
|
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2001-01-05 13:11:41 +03:00
|
|
|
CURLcode Curl_http(struct connectdata *conn)
|
2000-05-22 18:12:12 +04:00
|
|
|
{
|
|
|
|
struct UrlData *data=conn->data;
|
|
|
|
char *buf = data->buffer; /* this is a short cut to the buffer */
|
2000-06-14 21:15:07 +04:00
|
|
|
CURLcode result=CURLE_OK;
|
2000-05-22 18:12:12 +04:00
|
|
|
struct HTTP *http;
|
|
|
|
struct Cookie *co=NULL; /* no cookies from start */
|
|
|
|
char *ppath = conn->ppath; /* three previous function arguments */
|
|
|
|
char *host = conn->name;
|
|
|
|
long *bytecount = &conn->bytecount;
|
|
|
|
|
2001-02-23 02:41:15 +03:00
|
|
|
if(!conn->proto.http) {
|
|
|
|
/* Only allocate this struct if we don't already have it! */
|
|
|
|
|
|
|
|
http = (struct HTTP *)malloc(sizeof(struct HTTP));
|
|
|
|
if(!http)
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
memset(http, 0, sizeof(struct HTTP));
|
|
|
|
conn->proto.http = http;
|
|
|
|
}
|
2001-03-04 18:25:54 +03:00
|
|
|
else
|
|
|
|
http = conn->proto.http;
|
2000-05-22 18:12:12 +04:00
|
|
|
|
2001-03-05 16:40:08 +03:00
|
|
|
/* We default to persistant connections */
|
|
|
|
conn->bits.close = FALSE;
|
|
|
|
|
2000-05-22 18:12:12 +04:00
|
|
|
if ( (conn->protocol&(PROT_HTTP|PROT_FTP)) &&
|
|
|
|
data->bits.upload) {
|
|
|
|
data->bits.http_put=1;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
/* The User-Agent string has been built in url.c already, because it might
|
|
|
|
have been used in the proxy connect, but if we have got a header with
|
2000-02-02 02:52:11 +03:00
|
|
|
the user-agent string specified, we erase the previously made string
|
1999-12-29 17:20:26 +03:00
|
|
|
here. */
|
2001-02-23 02:32:02 +03:00
|
|
|
if(checkheaders(data, "User-Agent:") && conn->allocptr.uagent) {
|
|
|
|
free(conn->allocptr.uagent);
|
|
|
|
conn->allocptr.uagent=NULL;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
2001-03-14 17:11:11 +03:00
|
|
|
if((conn->bits.user_passwd) && !checkheaders(data, "Authorization:")) {
|
2000-09-21 12:48:48 +04:00
|
|
|
char *authorization;
|
2000-07-26 01:16:32 +04:00
|
|
|
|
|
|
|
/* To prevent the user+password to get sent to other than the original
|
|
|
|
host due to a location-follow, we do some weirdo checks here */
|
|
|
|
if(!data->bits.this_is_a_follow ||
|
|
|
|
!data->auth_host ||
|
2001-02-20 20:35:51 +03:00
|
|
|
strequal(data->auth_host, conn->hostname)) {
|
2000-07-26 01:16:32 +04:00
|
|
|
sprintf(data->buffer, "%s:%s", data->user, data->passwd);
|
2001-01-05 13:11:41 +03:00
|
|
|
if(Curl_base64_encode(data->buffer, strlen(data->buffer),
|
|
|
|
&authorization) >= 0) {
|
2001-02-23 02:32:02 +03:00
|
|
|
if(conn->allocptr.userpwd)
|
|
|
|
free(conn->allocptr.userpwd);
|
|
|
|
conn->allocptr.userpwd = aprintf( "Authorization: Basic %s\015\012",
|
2001-01-05 13:11:41 +03:00
|
|
|
authorization);
|
2000-09-21 12:48:48 +04:00
|
|
|
free(authorization);
|
|
|
|
}
|
2000-07-26 01:16:32 +04:00
|
|
|
}
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
2000-05-22 18:12:12 +04:00
|
|
|
if((data->bits.http_set_referer) && !checkheaders(data, "Referer:")) {
|
2001-02-23 02:32:02 +03:00
|
|
|
if(conn->allocptr.ref)
|
|
|
|
free(conn->allocptr.ref);
|
|
|
|
conn->allocptr.ref = aprintf("Referer: %s\015\012", data->referer);
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
if(data->cookie && !checkheaders(data, "Cookie:")) {
|
2001-02-23 02:32:02 +03:00
|
|
|
if(conn->allocptr.cookie)
|
|
|
|
free(conn->allocptr.cookie);
|
|
|
|
conn->allocptr.cookie = aprintf("Cookie: %s\015\012", data->cookie);
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
|
|
|
if(data->cookies) {
|
2001-01-05 13:11:41 +03:00
|
|
|
co = Curl_cookie_getlist(data->cookies,
|
|
|
|
host,
|
|
|
|
ppath,
|
|
|
|
conn->protocol&PROT_HTTPS?TRUE:FALSE);
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
2000-05-22 18:12:12 +04:00
|
|
|
if ((data->bits.httpproxy) && !(conn->protocol&PROT_HTTPS)) {
|
1999-12-29 17:20:26 +03:00
|
|
|
/* The path sent to the proxy is in fact the entire URL */
|
2000-11-20 11:53:21 +03:00
|
|
|
ppath = data->url;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
2000-05-22 18:12:12 +04:00
|
|
|
if(data->bits.http_formpost) {
|
1999-12-29 17:20:26 +03:00
|
|
|
/* we must build the whole darned post sequence first, so that we have
|
|
|
|
a size of the whole shebang before we start to send it */
|
2001-01-05 13:11:41 +03:00
|
|
|
http->sendit = Curl_getFormData(data->httppost, &http->postsize);
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
2001-03-09 19:48:18 +03:00
|
|
|
if(!checkheaders(data, "Host:")) {
|
|
|
|
/* if ptr_host is already set, it is almost OK since we only re-use
|
|
|
|
connections to the very same host and port, but when we use a HTTP
|
|
|
|
proxy we have a persistant connect and yet we must change the Host:
|
|
|
|
header! */
|
|
|
|
|
|
|
|
if(conn->allocptr.host)
|
|
|
|
free(conn->allocptr.host);
|
2001-02-20 20:46:35 +03:00
|
|
|
|
2001-03-02 18:34:15 +03:00
|
|
|
if(((conn->protocol&PROT_HTTPS) && (conn->remote_port == PORT_HTTPS)) ||
|
|
|
|
(!(conn->protocol&PROT_HTTPS) && (conn->remote_port == PORT_HTTP)) )
|
2000-10-20 17:48:38 +04:00
|
|
|
/* If (HTTPS on port 443) OR (non-HTTPS on port 80) then don't include
|
|
|
|
the port number in the host string */
|
2001-02-23 02:32:02 +03:00
|
|
|
conn->allocptr.host = aprintf("Host: %s\r\n", host);
|
2000-10-20 17:48:38 +04:00
|
|
|
else
|
2001-02-23 02:32:02 +03:00
|
|
|
conn->allocptr.host = aprintf("Host: %s:%d\r\n", host,
|
2001-03-02 18:34:15 +03:00
|
|
|
conn->remote_port);
|
2000-07-25 11:28:28 +04:00
|
|
|
}
|
1999-12-29 17:20:26 +03:00
|
|
|
|
|
|
|
if(!checkheaders(data, "Pragma:"))
|
2000-05-22 18:12:12 +04:00
|
|
|
http->p_pragma = "Pragma: no-cache\r\n";
|
1999-12-29 17:20:26 +03:00
|
|
|
|
|
|
|
if(!checkheaders(data, "Accept:"))
|
2000-05-22 18:12:12 +04:00
|
|
|
http->p_accept = "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*\r\n";
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2001-01-26 18:49:39 +03:00
|
|
|
if((data->bits.http_post ||
|
|
|
|
data->bits.http_formpost ||
|
|
|
|
data->bits.http_put) &&
|
|
|
|
data->resume_from) {
|
|
|
|
/**********************************************************************
|
|
|
|
* Resuming upload in HTTP means that we PUT or POST and that we have
|
|
|
|
* got a resume_from value set. The resume value has already created
|
|
|
|
* a Range: header that will be passed along. We need to "fast forward"
|
|
|
|
* the file the given number of bytes and decrease the assume upload
|
|
|
|
* file size before we continue this venture in the dark lands of HTTP.
|
|
|
|
*********************************************************************/
|
|
|
|
|
|
|
|
if(data->resume_from < 0 ) {
|
|
|
|
/*
|
|
|
|
* This is meant to get the size of the present remote-file by itself.
|
|
|
|
* We don't support this now. Bail out!
|
|
|
|
*/
|
|
|
|
data->resume_from = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(data->resume_from) {
|
|
|
|
/* do we still game? */
|
|
|
|
int passed=0;
|
|
|
|
|
|
|
|
/* Now, let's read off the proper amount of bytes from the
|
|
|
|
input. If we knew it was a proper file we could've just
|
|
|
|
fseek()ed but we only have a stream here */
|
|
|
|
do {
|
|
|
|
int readthisamountnow = (data->resume_from - passed);
|
|
|
|
int actuallyread;
|
|
|
|
|
|
|
|
if(readthisamountnow > BUFSIZE)
|
|
|
|
readthisamountnow = BUFSIZE;
|
|
|
|
|
|
|
|
actuallyread =
|
|
|
|
data->fread(data->buffer, 1, readthisamountnow, data->in);
|
|
|
|
|
|
|
|
passed += actuallyread;
|
|
|
|
if(actuallyread != readthisamountnow) {
|
|
|
|
failf(data, "Could only read %d bytes from the input\n",
|
|
|
|
passed);
|
|
|
|
return CURLE_READ_ERROR;
|
|
|
|
}
|
|
|
|
} while(passed != data->resume_from); /* loop until done */
|
|
|
|
|
|
|
|
/* now, decrease the size of the read */
|
|
|
|
if(data->infilesize>0) {
|
|
|
|
data->infilesize -= data->resume_from;
|
|
|
|
|
|
|
|
if(data->infilesize <= 0) {
|
|
|
|
failf(data, "File already completely uploaded\n");
|
|
|
|
return CURLE_PARTIAL_FILE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* we've passed, proceed as normal */
|
|
|
|
}
|
|
|
|
}
|
2001-01-29 10:24:20 +03:00
|
|
|
if(data->bits.set_range) {
|
|
|
|
/*
|
|
|
|
* A range is selected. We use different headers whether we're downloading
|
|
|
|
* or uploading and we always let customized headers override our internal
|
|
|
|
* ones if any such are specified.
|
|
|
|
*/
|
|
|
|
if((data->httpreq == HTTPREQ_GET) &&
|
|
|
|
!checkheaders(data, "Range:")) {
|
2001-02-23 02:32:02 +03:00
|
|
|
conn->allocptr.rangeline = aprintf("Range: bytes=%s\r\n", data->range);
|
2001-01-29 10:24:20 +03:00
|
|
|
}
|
|
|
|
else if((data->httpreq != HTTPREQ_GET) &&
|
|
|
|
!checkheaders(data, "Content-Range:")) {
|
|
|
|
|
|
|
|
if(data->resume_from) {
|
|
|
|
/* This is because "resume" was selected */
|
|
|
|
long total_expected_size= data->resume_from + data->infilesize;
|
2001-02-23 02:32:02 +03:00
|
|
|
conn->allocptr.rangeline = aprintf("Content-Range: bytes %s%ld/%ld\r\n",
|
2001-01-29 10:24:20 +03:00
|
|
|
data->range, total_expected_size-1,
|
|
|
|
total_expected_size);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
/* Range was selected and then we just pass the incoming range and
|
|
|
|
append total size */
|
2001-02-23 02:32:02 +03:00
|
|
|
conn->allocptr.rangeline = aprintf("Content-Range: bytes %s/%d\r\n",
|
2001-01-29 10:24:20 +03:00
|
|
|
data->range, data->infilesize);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2001-01-26 18:49:39 +03:00
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
do {
|
2000-10-03 15:01:32 +04:00
|
|
|
send_buffer *req_buffer;
|
2000-06-05 12:23:50 +04:00
|
|
|
struct curl_slist *headers=data->headers;
|
2000-10-03 15:01:32 +04:00
|
|
|
|
|
|
|
/* initialize a dynamic send-buffer */
|
|
|
|
req_buffer = add_buffer_init();
|
|
|
|
|
|
|
|
/* add the main request stuff */
|
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"%s " /* GET/HEAD/POST/PUT */
|
2001-02-23 02:32:02 +03:00
|
|
|
"%s HTTP/1.1\r\n" /* path */
|
2000-10-03 15:01:32 +04:00
|
|
|
"%s" /* proxyuserpwd */
|
|
|
|
"%s" /* userpwd */
|
|
|
|
"%s" /* range */
|
|
|
|
"%s" /* user agent */
|
|
|
|
"%s" /* cookie */
|
|
|
|
"%s" /* host */
|
|
|
|
"%s" /* pragma */
|
|
|
|
"%s" /* accept */
|
|
|
|
"%s", /* referer */
|
|
|
|
|
|
|
|
data->customrequest?data->customrequest:
|
|
|
|
(data->bits.no_body?"HEAD":
|
|
|
|
(data->bits.http_post || data->bits.http_formpost)?"POST":
|
|
|
|
(data->bits.http_put)?"PUT":"GET"),
|
|
|
|
ppath,
|
2001-03-14 17:11:11 +03:00
|
|
|
(conn->bits.proxy_user_passwd &&
|
|
|
|
conn->allocptr.proxyuserpwd)?conn->allocptr.proxyuserpwd:"",
|
|
|
|
(conn->bits.user_passwd && conn->allocptr.userpwd)?
|
|
|
|
conn->allocptr.userpwd:"",
|
|
|
|
(data->bits.set_range && conn->allocptr.rangeline)?
|
|
|
|
conn->allocptr.rangeline:"",
|
|
|
|
(data->useragent && *data->useragent && conn->allocptr.uagent)?
|
|
|
|
conn->allocptr.uagent:"",
|
2001-02-23 02:32:02 +03:00
|
|
|
(conn->allocptr.cookie?conn->allocptr.cookie:""), /* Cookie: <data> */
|
|
|
|
(conn->allocptr.host?conn->allocptr.host:""), /* Host: host */
|
2000-10-03 15:01:32 +04:00
|
|
|
http->p_pragma?http->p_pragma:"",
|
|
|
|
http->p_accept?http->p_accept:"",
|
2001-02-23 02:32:02 +03:00
|
|
|
(data->bits.http_set_referer && conn->allocptr.ref)?conn->allocptr.ref:"" /* Referer: <data> <CRLF> */
|
2000-10-03 15:01:32 +04:00
|
|
|
);
|
1999-12-29 17:20:26 +03:00
|
|
|
|
|
|
|
if(co) {
|
|
|
|
int count=0;
|
2000-11-17 17:03:58 +03:00
|
|
|
struct Cookie *store=co;
|
1999-12-29 17:20:26 +03:00
|
|
|
/* now loop through all cookies that matched */
|
|
|
|
while(co) {
|
2000-02-11 02:15:33 +03:00
|
|
|
if(co->value && strlen(co->value)) {
|
|
|
|
if(0 == count) {
|
2000-11-13 14:29:32 +03:00
|
|
|
add_bufferf(req_buffer, "Cookie: ");
|
2000-02-11 02:15:33 +03:00
|
|
|
}
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"%s%s=%s", count?"; ":"", co->name, co->value);
|
2000-05-22 18:12:12 +04:00
|
|
|
count++;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
co = co->next; /* next cookie please */
|
|
|
|
}
|
|
|
|
if(count) {
|
2000-10-03 15:01:32 +04:00
|
|
|
add_buffer(req_buffer, "\r\n", 2);
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_cookie_freelist(store); /* free the cookie list */
|
1999-12-29 17:20:26 +03:00
|
|
|
co=NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if(data->timecondition) {
|
|
|
|
struct tm *thistime;
|
|
|
|
|
2000-07-30 02:21:10 +04:00
|
|
|
#ifdef HAVE_LOCALTIME_R
|
|
|
|
/* thread-safe version */
|
|
|
|
struct tm keeptime;
|
2000-08-24 16:33:16 +04:00
|
|
|
thistime = (struct tm *)localtime_r(&data->timevalue, &keeptime);
|
2000-07-30 02:21:10 +04:00
|
|
|
#else
|
1999-12-29 17:20:26 +03:00
|
|
|
thistime = localtime(&data->timevalue);
|
2000-07-30 02:21:10 +04:00
|
|
|
#endif
|
|
|
|
if(NULL == thistime) {
|
|
|
|
failf(data, "localtime() failed!");
|
|
|
|
return CURLE_OUT_OF_MEMORY;
|
|
|
|
}
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-03-16 14:40:48 +03:00
|
|
|
#ifdef HAVE_STRFTIME
|
1999-12-29 17:20:26 +03:00
|
|
|
/* format: "Tue, 15 Nov 1994 12:45:26 GMT" */
|
|
|
|
strftime(buf, BUFSIZE-1, "%a, %d %b %Y %H:%M:%S %Z", thistime);
|
|
|
|
#else
|
2000-01-16 21:52:24 +03:00
|
|
|
/* TODO: Right, we *could* write a replacement here */
|
1999-12-29 17:20:26 +03:00
|
|
|
strcpy(buf, "no strftime() support");
|
|
|
|
#endif
|
|
|
|
switch(data->timecondition) {
|
|
|
|
case TIMECOND_IFMODSINCE:
|
|
|
|
default:
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"If-Modified-Since: %s\r\n", buf);
|
1999-12-29 17:20:26 +03:00
|
|
|
break;
|
|
|
|
case TIMECOND_IFUNMODSINCE:
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"If-Unmodified-Since: %s\r\n", buf);
|
1999-12-29 17:20:26 +03:00
|
|
|
break;
|
|
|
|
case TIMECOND_LASTMOD:
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"Last-Modified: %s\r\n", buf);
|
1999-12-29 17:20:26 +03:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-06-05 12:23:50 +04:00
|
|
|
while(headers) {
|
2000-08-01 01:30:19 +04:00
|
|
|
char *ptr = strchr(headers->data, ':');
|
|
|
|
if(ptr) {
|
|
|
|
/* we require a colon for this to be a true header */
|
|
|
|
|
|
|
|
ptr++; /* pass the colon */
|
2000-11-21 12:31:03 +03:00
|
|
|
while(*ptr && isspace((int)*ptr))
|
2000-08-01 01:30:19 +04:00
|
|
|
ptr++;
|
|
|
|
|
|
|
|
if(*ptr) {
|
|
|
|
/* only send this if the contents was non-blank */
|
|
|
|
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer, "%s\r\n", headers->data);
|
2000-08-01 01:30:19 +04:00
|
|
|
}
|
|
|
|
}
|
2000-06-05 12:23:50 +04:00
|
|
|
headers = headers->next;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
2000-06-14 21:15:07 +04:00
|
|
|
if(data->bits.http_formpost) {
|
2001-01-05 13:11:41 +03:00
|
|
|
if(Curl_FormInit(&http->form, http->sendit)) {
|
2000-06-14 21:15:07 +04:00
|
|
|
failf(data, "Internal HTTP POST error!\n");
|
|
|
|
return CURLE_HTTP_POST_ERROR;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|
2000-06-14 21:15:07 +04:00
|
|
|
http->storefread = data->fread; /* backup */
|
|
|
|
http->in = data->in; /* backup */
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-06-14 21:15:07 +04:00
|
|
|
data->fread =
|
|
|
|
(size_t (*)(char *, size_t, size_t, FILE *))
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_FormReader; /* set the read function to read from the
|
|
|
|
generated form data */
|
2000-06-14 21:15:07 +04:00
|
|
|
data->in = (FILE *)&http->form;
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"Content-Length: %d\r\n", http->postsize-2);
|
2000-02-15 01:57:42 +03:00
|
|
|
|
2000-10-03 15:01:32 +04:00
|
|
|
/* set upload size to the progress meter */
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_pgrsSetUploadSize(data, http->postsize);
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-10-04 17:07:43 +04:00
|
|
|
data->request_size =
|
2001-02-20 20:35:51 +03:00
|
|
|
add_buffer_send(conn->firstsocket, conn, req_buffer);
|
|
|
|
result = Curl_Transfer(conn, conn->firstsocket, -1, TRUE,
|
2000-06-14 21:15:07 +04:00
|
|
|
&http->readbytecount,
|
2001-02-20 20:35:51 +03:00
|
|
|
conn->firstsocket,
|
2000-06-14 21:15:07 +04:00
|
|
|
&http->writebytecount);
|
|
|
|
if(result) {
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_FormFree(http->sendit); /* free that whole lot */
|
2000-06-14 21:15:07 +04:00
|
|
|
return result;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
}
|
2000-05-22 18:12:12 +04:00
|
|
|
else if(data->bits.http_put) {
|
1999-12-29 17:20:26 +03:00
|
|
|
/* Let's PUT the data to the server! */
|
|
|
|
|
|
|
|
if(data->infilesize>0) {
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"Content-Length: %d\r\n\r\n", /* file size */
|
|
|
|
data->infilesize );
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
else
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer, "\015\012");
|
2000-02-15 01:57:42 +03:00
|
|
|
|
2000-10-03 15:01:32 +04:00
|
|
|
/* set the upload size to the progress meter */
|
2001-01-05 13:11:41 +03:00
|
|
|
Curl_pgrsSetUploadSize(data, data->infilesize);
|
1999-12-29 17:20:26 +03:00
|
|
|
|
2000-10-03 15:01:32 +04:00
|
|
|
/* this sends the buffer and frees all the buffer resources */
|
2000-10-04 17:07:43 +04:00
|
|
|
data->request_size =
|
2001-02-20 20:35:51 +03:00
|
|
|
add_buffer_send(conn->firstsocket, conn, req_buffer);
|
2000-10-03 15:01:32 +04:00
|
|
|
|
|
|
|
/* prepare for transfer */
|
2001-02-20 20:35:51 +03:00
|
|
|
result = Curl_Transfer(conn, conn->firstsocket, -1, TRUE,
|
2000-05-22 18:12:12 +04:00
|
|
|
&http->readbytecount,
|
2001-02-20 20:35:51 +03:00
|
|
|
conn->firstsocket,
|
2000-05-22 18:12:12 +04:00
|
|
|
&http->writebytecount);
|
1999-12-29 17:20:26 +03:00
|
|
|
if(result)
|
|
|
|
return result;
|
2000-06-14 21:15:07 +04:00
|
|
|
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
else {
|
2000-06-14 21:15:07 +04:00
|
|
|
if(data->bits.http_post) {
|
2000-08-11 10:39:53 +04:00
|
|
|
/* this is the simple POST, using x-www-form-urlencoded style */
|
|
|
|
|
|
|
|
if(!checkheaders(data, "Content-Length:"))
|
|
|
|
/* we allow replacing this header, although it isn't very wise to
|
|
|
|
actually set your own */
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"Content-Length: %d\r\n",
|
|
|
|
(data->postfieldsize?data->postfieldsize:
|
|
|
|
strlen(data->postfields)) );
|
2000-08-11 10:39:53 +04:00
|
|
|
|
|
|
|
if(!checkheaders(data, "Content-Type:"))
|
2000-10-03 15:01:32 +04:00
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"Content-Type: application/x-www-form-urlencoded\r\n");
|
2000-08-11 10:39:53 +04:00
|
|
|
|
|
|
|
/* and here comes the actual data */
|
2000-08-24 16:33:16 +04:00
|
|
|
if(data->postfieldsize) {
|
2000-10-03 15:01:32 +04:00
|
|
|
add_buffer(req_buffer, "\r\n", 2);
|
|
|
|
add_buffer(req_buffer, data->postfields,
|
|
|
|
data->postfieldsize);
|
|
|
|
add_buffer(req_buffer, "\r\n", 2);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
add_bufferf(req_buffer,
|
|
|
|
"\r\n"
|
|
|
|
"%s\r\n",
|
|
|
|
data->postfields );
|
2000-08-24 16:33:16 +04:00
|
|
|
}
|
2000-06-14 21:15:07 +04:00
|
|
|
}
|
|
|
|
else
|
2000-10-03 15:01:32 +04:00
|
|
|
add_buffer(req_buffer, "\r\n", 2);
|
2000-05-22 18:12:12 +04:00
|
|
|
|
2000-10-04 17:07:43 +04:00
|
|
|
/* issue the request */
|
|
|
|
data->request_size =
|
2001-02-20 20:35:51 +03:00
|
|
|
add_buffer_send(conn->firstsocket, conn, req_buffer);
|
2000-10-04 17:07:43 +04:00
|
|
|
|
2000-02-02 02:52:11 +03:00
|
|
|
/* HTTP GET/HEAD download: */
|
2001-02-20 20:35:51 +03:00
|
|
|
result = Curl_Transfer(conn, conn->firstsocket, -1, TRUE, bytecount,
|
2000-02-02 02:52:11 +03:00
|
|
|
-1, NULL); /* nothing to upload */
|
|
|
|
}
|
1999-12-29 17:20:26 +03:00
|
|
|
if(result)
|
|
|
|
return result;
|
|
|
|
} while (0); /* this is just a left-over from the multiple document download
|
|
|
|
attempts */
|
|
|
|
|
2000-05-22 18:12:12 +04:00
|
|
|
return CURLE_OK;
|
1999-12-29 17:20:26 +03:00
|
|
|
}
|
|
|
|
|