| /*************************************************************************** |
| * _ _ ____ _ |
| * Project ___| | | | _ \| | |
| * / __| | | | |_) | | |
| * | (__| |_| | _ <| |___ |
| * \___|\___/|_| \_\_____| |
| * |
| * Copyright (C) 1998 - 2011, Daniel Stenberg, <daniel@haxx.se>, et al. |
| * |
| * This software is licensed as described in the file COPYING, which |
| * you should have received as part of this distribution. The terms |
| * are also available at http://curl.haxx.se/docs/copyright.html. |
| * |
| * You may opt to use, copy, modify, merge, publish, distribute and/or sell |
| * copies of the Software, and permit persons to whom the Software is |
| * furnished to do so, under the terms of the COPYING file. |
| * |
| * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY |
| * KIND, either express or implied. |
| * |
| ***************************************************************************/ |
| |
| #include "setup.h" |
| |
| #ifdef HAVE_SYS_SOCKET_H |
| #include <sys/socket.h> /* required for send() & recv() prototypes */ |
| #endif |
| |
| #ifdef HAVE_UNISTD_H |
| #include <unistd.h> |
| #endif |
| |
| #include <curl/curl.h> |
| #include "urldata.h" |
| #include "sendf.h" |
| #include "connect.h" |
| #include "sslgen.h" |
| #include "ssh.h" |
| #include "multiif.h" |
| #include "non-ascii.h" |
| |
| #define _MPRINTF_REPLACE /* use the internal *printf() functions */ |
| #include <curl/mprintf.h> |
| |
| /* the krb4 functions only exists for FTP and if krb4 or gssapi is defined */ |
| #if !defined(CURL_DISABLE_FTP) && (defined(HAVE_KRB4) || defined(HAVE_GSSAPI)) |
| #include "krb4.h" |
| #else |
| #define Curl_sec_send(a,b,c,d) -1 |
| #define Curl_sec_read(a,b,c,d) -1 |
| #endif |
| |
| #include "curl_memory.h" |
| #include "strerror.h" |
| |
| /* The last #include file should be: */ |
| #include "memdebug.h" |
| |
| #ifdef CURL_DO_LINEEND_CONV |
| /* |
| * convert_lineends() changes CRLF (\r\n) end-of-line markers to a single LF |
| * (\n), with special processing for CRLF sequences that are split between two |
| * blocks of data. Remaining, bare CRs are changed to LFs. The possibly new |
| * size of the data is returned. |
| */ |
| static size_t convert_lineends(struct SessionHandle *data, |
| char *startPtr, size_t size) |
| { |
| char *inPtr, *outPtr; |
| |
| /* sanity check */ |
| if((startPtr == NULL) || (size < 1)) { |
| return(size); |
| } |
| |
| if(data->state.prev_block_had_trailing_cr) { |
| /* The previous block of incoming data |
| had a trailing CR, which was turned into a LF. */ |
| if(*startPtr == '\n') { |
| /* This block of incoming data starts with the |
| previous block's LF so get rid of it */ |
| memmove(startPtr, startPtr+1, size-1); |
| size--; |
| /* and it wasn't a bare CR but a CRLF conversion instead */ |
| data->state.crlf_conversions++; |
| } |
| data->state.prev_block_had_trailing_cr = FALSE; /* reset the flag */ |
| } |
| |
| /* find 1st CR, if any */ |
| inPtr = outPtr = memchr(startPtr, '\r', size); |
| if(inPtr) { |
| /* at least one CR, now look for CRLF */ |
| while(inPtr < (startPtr+size-1)) { |
| /* note that it's size-1, so we'll never look past the last byte */ |
| if(memcmp(inPtr, "\r\n", 2) == 0) { |
| /* CRLF found, bump past the CR and copy the NL */ |
| inPtr++; |
| *outPtr = *inPtr; |
| /* keep track of how many CRLFs we converted */ |
| data->state.crlf_conversions++; |
| } |
| else { |
| if(*inPtr == '\r') { |
| /* lone CR, move LF instead */ |
| *outPtr = '\n'; |
| } |
| else { |
| /* not a CRLF nor a CR, just copy whatever it is */ |
| *outPtr = *inPtr; |
| } |
| } |
| outPtr++; |
| inPtr++; |
| } /* end of while loop */ |
| |
| if(inPtr < startPtr+size) { |
| /* handle last byte */ |
| if(*inPtr == '\r') { |
| /* deal with a CR at the end of the buffer */ |
| *outPtr = '\n'; /* copy a NL instead */ |
| /* note that a CRLF might be split across two blocks */ |
| data->state.prev_block_had_trailing_cr = TRUE; |
| } |
| else { |
| /* copy last byte */ |
| *outPtr = *inPtr; |
| } |
| outPtr++; |
| } |
| if(outPtr < startPtr+size) |
| /* tidy up by null terminating the now shorter data */ |
| *outPtr = '\0'; |
| |
| return(outPtr - startPtr); |
| } |
| return(size); |
| } |
| #endif /* CURL_DO_LINEEND_CONV */ |
| |
| /* Curl_infof() is for info message along the way */ |
| |
| void Curl_infof(struct SessionHandle *data, const char *fmt, ...) |
| { |
| if(data && data->set.verbose) { |
| va_list ap; |
| size_t len; |
| char print_buffer[2048 + 1]; |
| va_start(ap, fmt); |
| vsnprintf(print_buffer, sizeof(print_buffer), fmt, ap); |
| va_end(ap); |
| len = strlen(print_buffer); |
| Curl_debug(data, CURLINFO_TEXT, print_buffer, len, NULL); |
| } |
| } |
| |
| /* Curl_failf() is for messages stating why we failed. |
| * The message SHALL NOT include any LF or CR. |
| */ |
| |
| void Curl_failf(struct SessionHandle *data, const char *fmt, ...) |
| { |
| va_list ap; |
| size_t len; |
| va_start(ap, fmt); |
| |
| vsnprintf(data->state.buffer, BUFSIZE, fmt, ap); |
| |
| if(data->set.errorbuffer && !data->state.errorbuf) { |
| snprintf(data->set.errorbuffer, CURL_ERROR_SIZE, "%s", data->state.buffer); |
| data->state.errorbuf = TRUE; /* wrote error string */ |
| } |
| if(data->set.verbose) { |
| len = strlen(data->state.buffer); |
| if(len < BUFSIZE - 1) { |
| data->state.buffer[len] = '\n'; |
| data->state.buffer[++len] = '\0'; |
| } |
| Curl_debug(data, CURLINFO_TEXT, data->state.buffer, len, NULL); |
| } |
| |
| va_end(ap); |
| } |
| |
| /* Curl_sendf() sends formated data to the server */ |
| CURLcode Curl_sendf(curl_socket_t sockfd, struct connectdata *conn, |
| const char *fmt, ...) |
| { |
| struct SessionHandle *data = conn->data; |
| ssize_t bytes_written; |
| size_t write_len; |
| CURLcode res = CURLE_OK; |
| char *s; |
| char *sptr; |
| va_list ap; |
| va_start(ap, fmt); |
| s = vaprintf(fmt, ap); /* returns an allocated string */ |
| va_end(ap); |
| if(!s) |
| return CURLE_OUT_OF_MEMORY; /* failure */ |
| |
| bytes_written=0; |
| write_len = strlen(s); |
| sptr = s; |
| |
| for(;;) { |
| /* Write the buffer to the socket */ |
| res = Curl_write(conn, sockfd, sptr, write_len, &bytes_written); |
| |
| if(CURLE_OK != res) |
| break; |
| |
| if(data->set.verbose) |
| Curl_debug(data, CURLINFO_DATA_OUT, sptr, (size_t)bytes_written, conn); |
| |
| if((size_t)bytes_written != write_len) { |
| /* if not all was written at once, we must advance the pointer, decrease |
| the size left and try again! */ |
| write_len -= bytes_written; |
| sptr += bytes_written; |
| } |
| else |
| break; |
| } |
| |
| free(s); /* free the output string */ |
| |
| return res; |
| } |
| |
| /* |
| * Curl_write() is an internal write function that sends data to the |
| * server. Works with plain sockets, SCP, SSL or kerberos. |
| * |
| * If the write would block (CURLE_AGAIN), we return CURLE_OK and |
| * (*written == 0). Otherwise we return regular CURLcode value. |
| */ |
| CURLcode Curl_write(struct connectdata *conn, |
| curl_socket_t sockfd, |
| const void *mem, |
| size_t len, |
| ssize_t *written) |
| { |
| ssize_t bytes_written; |
| CURLcode curlcode = CURLE_OK; |
| int num = (sockfd == conn->sock[SECONDARYSOCKET]); |
| |
| bytes_written = conn->send[num](conn, num, mem, len, &curlcode); |
| |
| *written = bytes_written; |
| if(bytes_written >= 0) |
| /* we completely ignore the curlcode value when subzero is not returned */ |
| return CURLE_OK; |
| |
| /* handle CURLE_AGAIN or a send failure */ |
| switch(curlcode) { |
| case CURLE_AGAIN: |
| *written = 0; |
| return CURLE_OK; |
| |
| case CURLE_OK: |
| /* general send failure */ |
| return CURLE_SEND_ERROR; |
| |
| default: |
| /* we got a specific curlcode, forward it */ |
| return (CURLcode)curlcode; |
| } |
| } |
| |
| ssize_t Curl_send_plain(struct connectdata *conn, int num, |
| const void *mem, size_t len, CURLcode *code) |
| { |
| curl_socket_t sockfd = conn->sock[num]; |
| ssize_t bytes_written = swrite(sockfd, mem, len); |
| |
| *code = CURLE_OK; |
| if(-1 == bytes_written) { |
| int err = SOCKERRNO; |
| |
| if( |
| #ifdef WSAEWOULDBLOCK |
| /* This is how Windows does it */ |
| (WSAEWOULDBLOCK == err) |
| #else |
| /* errno may be EWOULDBLOCK or on some systems EAGAIN when it returned |
| due to its inability to send off data without blocking. We therefor |
| treat both error codes the same here */ |
| (EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err) |
| #endif |
| ) { |
| /* this is just a case of EWOULDBLOCK */ |
| bytes_written=0; |
| *code = CURLE_AGAIN; |
| } |
| else { |
| failf(conn->data, "Send failure: %s", |
| Curl_strerror(conn, err)); |
| conn->data->state.os_errno = err; |
| *code = CURLE_SEND_ERROR; |
| } |
| } |
| return bytes_written; |
| } |
| |
| /* |
| * Curl_write_plain() is an internal write function that sends data to the |
| * server using plain sockets only. Otherwise meant to have the exact same |
| * proto as Curl_write() |
| */ |
| CURLcode Curl_write_plain(struct connectdata *conn, |
| curl_socket_t sockfd, |
| const void *mem, |
| size_t len, |
| ssize_t *written) |
| { |
| ssize_t bytes_written; |
| CURLcode retcode; |
| int num = (sockfd == conn->sock[SECONDARYSOCKET]); |
| |
| bytes_written = Curl_send_plain(conn, num, mem, len, &retcode); |
| |
| *written = bytes_written; |
| |
| return retcode; |
| } |
| |
| ssize_t Curl_recv_plain(struct connectdata *conn, int num, char *buf, |
| size_t len, CURLcode *code) |
| { |
| curl_socket_t sockfd = conn->sock[num]; |
| ssize_t nread = sread(sockfd, buf, len); |
| |
| *code = CURLE_OK; |
| if(-1 == nread) { |
| int err = SOCKERRNO; |
| |
| if( |
| #ifdef WSAEWOULDBLOCK |
| /* This is how Windows does it */ |
| (WSAEWOULDBLOCK == err) |
| #else |
| /* errno may be EWOULDBLOCK or on some systems EAGAIN when it returned |
| due to its inability to send off data without blocking. We therefor |
| treat both error codes the same here */ |
| (EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err) |
| #endif |
| ) { |
| /* this is just a case of EWOULDBLOCK */ |
| *code = CURLE_AGAIN; |
| } |
| else { |
| failf(conn->data, "Recv failure: %s", |
| Curl_strerror(conn, err)); |
| conn->data->state.os_errno = err; |
| *code = CURLE_RECV_ERROR; |
| } |
| } |
| return nread; |
| } |
| |
| static CURLcode pausewrite(struct SessionHandle *data, |
| int type, /* what type of data */ |
| const char *ptr, |
| size_t len) |
| { |
| /* signalled to pause sending on this connection, but since we have data |
| we want to send we need to dup it to save a copy for when the sending |
| is again enabled */ |
| struct SingleRequest *k = &data->req; |
| char *dupl = malloc(len); |
| if(!dupl) |
| return CURLE_OUT_OF_MEMORY; |
| |
| memcpy(dupl, ptr, len); |
| |
| /* store this information in the state struct for later use */ |
| data->state.tempwrite = dupl; |
| data->state.tempwritesize = len; |
| data->state.tempwritetype = type; |
| |
| /* mark the connection as RECV paused */ |
| k->keepon |= KEEP_RECV_PAUSE; |
| |
| DEBUGF(infof(data, "Pausing with %zu bytes in buffer for type %02x\n", |
| len, type)); |
| |
| return CURLE_OK; |
| } |
| |
| |
| /* Curl_client_write() sends data to the write callback(s) |
| |
| The bit pattern defines to what "streams" to write to. Body and/or header. |
| The defines are in sendf.h of course. |
| |
| If CURL_DO_LINEEND_CONV is enabled, data is converted IN PLACE to the |
| local character encoding. This is a problem and should be changed in |
| the future to leave the original data alone. |
| */ |
| CURLcode Curl_client_write(struct connectdata *conn, |
| int type, |
| char *ptr, |
| size_t len) |
| { |
| struct SessionHandle *data = conn->data; |
| size_t wrote; |
| |
| if(0 == len) |
| len = strlen(ptr); |
| |
| /* If reading is actually paused, we're forced to append this chunk of data |
| to the already held data, but only if it is the same type as otherwise it |
| can't work and it'll return error instead. */ |
| if(data->req.keepon & KEEP_RECV_PAUSE) { |
| size_t newlen; |
| char *newptr; |
| if(type != data->state.tempwritetype) |
| /* major internal confusion */ |
| return CURLE_RECV_ERROR; |
| |
| DEBUGASSERT(data->state.tempwrite); |
| |
| /* figure out the new size of the data to save */ |
| newlen = len + data->state.tempwritesize; |
| /* allocate the new memory area */ |
| newptr = realloc(data->state.tempwrite, newlen); |
| if(!newptr) |
| return CURLE_OUT_OF_MEMORY; |
| /* copy the new data to the end of the new area */ |
| memcpy(newptr + data->state.tempwritesize, ptr, len); |
| /* update the pointer and the size */ |
| data->state.tempwrite = newptr; |
| data->state.tempwritesize = newlen; |
| |
| return CURLE_OK; |
| } |
| |
| if(type & CLIENTWRITE_BODY) { |
| if((conn->handler->protocol&CURLPROTO_FTP) && |
| conn->proto.ftpc.transfertype == 'A') { |
| /* convert from the network encoding */ |
| CURLcode rc = Curl_convert_from_network(data, ptr, len); |
| /* Curl_convert_from_network calls failf if unsuccessful */ |
| if(rc) |
| return rc; |
| |
| #ifdef CURL_DO_LINEEND_CONV |
| /* convert end-of-line markers */ |
| len = convert_lineends(data, ptr, len); |
| #endif /* CURL_DO_LINEEND_CONV */ |
| } |
| /* If the previous block of data ended with CR and this block of data is |
| just a NL, then the length might be zero */ |
| if(len) { |
| wrote = data->set.fwrite_func(ptr, 1, len, data->set.out); |
| } |
| else { |
| wrote = len; |
| } |
| |
| if(CURL_WRITEFUNC_PAUSE == wrote) |
| return pausewrite(data, type, ptr, len); |
| |
| if(wrote != len) { |
| failf(data, "Failed writing body (%zu != %zu)", wrote, len); |
| return CURLE_WRITE_ERROR; |
| } |
| } |
| |
| if((type & CLIENTWRITE_HEADER) && |
| (data->set.fwrite_header || data->set.writeheader) ) { |
| /* |
| * Write headers to the same callback or to the especially setup |
| * header callback function (added after version 7.7.1). |
| */ |
| curl_write_callback writeit= |
| data->set.fwrite_header?data->set.fwrite_header:data->set.fwrite_func; |
| |
| /* Note: The header is in the host encoding |
| regardless of the ftp transfer mode (ASCII/Image) */ |
| |
| wrote = writeit(ptr, 1, len, data->set.writeheader); |
| if(CURL_WRITEFUNC_PAUSE == wrote) |
| /* here we pass in the HEADER bit only since if this was body as well |
| then it was passed already and clearly that didn't trigger the pause, |
| so this is saved for later with the HEADER bit only */ |
| return pausewrite(data, CLIENTWRITE_HEADER, ptr, len); |
| |
| if(wrote != len) { |
| failf (data, "Failed writing header"); |
| return CURLE_WRITE_ERROR; |
| } |
| } |
| |
| return CURLE_OK; |
| } |
| |
| CURLcode Curl_read_plain(curl_socket_t sockfd, |
| char *buf, |
| size_t bytesfromsocket, |
| ssize_t *n) |
| { |
| ssize_t nread = sread(sockfd, buf, bytesfromsocket); |
| |
| if(-1 == nread) { |
| int err = SOCKERRNO; |
| #ifdef USE_WINSOCK |
| if(WSAEWOULDBLOCK == err) |
| #else |
| if((EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err)) |
| #endif |
| return CURLE_AGAIN; |
| else |
| return CURLE_RECV_ERROR; |
| } |
| |
| /* we only return number of bytes read when we return OK */ |
| *n = nread; |
| return CURLE_OK; |
| } |
| |
| /* |
| * Internal read-from-socket function. This is meant to deal with plain |
| * sockets, SSL sockets and kerberos sockets. |
| * |
| * Returns a regular CURLcode value. |
| */ |
| CURLcode Curl_read(struct connectdata *conn, /* connection data */ |
| curl_socket_t sockfd, /* read from this socket */ |
| char *buf, /* store read data here */ |
| size_t sizerequested, /* max amount to read */ |
| ssize_t *n) /* amount bytes read */ |
| { |
| CURLcode curlcode = CURLE_RECV_ERROR; |
| ssize_t nread = 0; |
| size_t bytesfromsocket = 0; |
| char *buffertofill = NULL; |
| bool pipelining = (conn->data->multi && |
| Curl_multi_canPipeline(conn->data->multi)) ? TRUE : FALSE; |
| |
| /* Set 'num' to 0 or 1, depending on which socket that has been sent here. |
| If it is the second socket, we set num to 1. Otherwise to 0. This lets |
| us use the correct ssl handle. */ |
| int num = (sockfd == conn->sock[SECONDARYSOCKET]); |
| |
| *n=0; /* reset amount to zero */ |
| |
| /* If session can pipeline, check connection buffer */ |
| if(pipelining) { |
| size_t bytestocopy = CURLMIN(conn->buf_len - conn->read_pos, |
| sizerequested); |
| |
| /* Copy from our master buffer first if we have some unread data there*/ |
| if(bytestocopy > 0) { |
| memcpy(buf, conn->master_buffer + conn->read_pos, bytestocopy); |
| conn->read_pos += bytestocopy; |
| conn->bits.stream_was_rewound = FALSE; |
| |
| *n = (ssize_t)bytestocopy; |
| return CURLE_OK; |
| } |
| /* If we come here, it means that there is no data to read from the buffer, |
| * so we read from the socket */ |
| bytesfromsocket = CURLMIN(sizerequested, BUFSIZE * sizeof (char)); |
| buffertofill = conn->master_buffer; |
| } |
| else { |
| bytesfromsocket = CURLMIN((long)sizerequested, |
| conn->data->set.buffer_size ? |
| conn->data->set.buffer_size : BUFSIZE); |
| buffertofill = buf; |
| } |
| |
| nread = conn->recv[num](conn, num, buffertofill, bytesfromsocket, &curlcode); |
| if(nread < 0) |
| return curlcode; |
| |
| if(pipelining) { |
| memcpy(buf, conn->master_buffer, nread); |
| conn->buf_len = nread; |
| conn->read_pos = nread; |
| } |
| |
| *n += nread; |
| |
| return CURLE_OK; |
| } |
| |
| /* return 0 on success */ |
| static int showit(struct SessionHandle *data, curl_infotype type, |
| char *ptr, size_t size) |
| { |
| static const char s_infotype[CURLINFO_END][3] = { |
| "* ", "< ", "> ", "{ ", "} ", "{ ", "} " }; |
| |
| #ifdef CURL_DOES_CONVERSIONS |
| char buf[BUFSIZE+1]; |
| size_t conv_size = 0; |
| |
| switch(type) { |
| case CURLINFO_HEADER_OUT: |
| /* assume output headers are ASCII */ |
| /* copy the data into my buffer so the original is unchanged */ |
| if(size > BUFSIZE) { |
| size = BUFSIZE; /* truncate if necessary */ |
| buf[BUFSIZE] = '\0'; |
| } |
| conv_size = size; |
| memcpy(buf, ptr, size); |
| /* Special processing is needed for this block if it |
| * contains both headers and data (separated by CRLFCRLF). |
| * We want to convert just the headers, leaving the data as-is. |
| */ |
| if(size > 4) { |
| size_t i; |
| for(i = 0; i < size-4; i++) { |
| if(memcmp(&buf[i], "\x0d\x0a\x0d\x0a", 4) == 0) { |
| /* convert everything through this CRLFCRLF but no further */ |
| conv_size = i + 4; |
| break; |
| } |
| } |
| } |
| |
| Curl_convert_from_network(data, buf, conv_size); |
| /* Curl_convert_from_network calls failf if unsuccessful */ |
| /* we might as well continue even if it fails... */ |
| ptr = buf; /* switch pointer to use my buffer instead */ |
| break; |
| default: |
| /* leave everything else as-is */ |
| break; |
| } |
| #endif /* CURL_DOES_CONVERSIONS */ |
| |
| if(data->set.fdebug) |
| return (*data->set.fdebug)(data, type, ptr, size, |
| data->set.debugdata); |
| |
| switch(type) { |
| case CURLINFO_TEXT: |
| case CURLINFO_HEADER_OUT: |
| case CURLINFO_HEADER_IN: |
| fwrite(s_infotype[type], 2, 1, data->set.err); |
| fwrite(ptr, size, 1, data->set.err); |
| #ifdef CURL_DOES_CONVERSIONS |
| if(size != conv_size) { |
| /* we had untranslated data so we need an explicit newline */ |
| fwrite("\n", 1, 1, data->set.err); |
| } |
| #endif |
| break; |
| default: /* nada */ |
| break; |
| } |
| return 0; |
| } |
| |
| int Curl_debug(struct SessionHandle *data, curl_infotype type, |
| char *ptr, size_t size, |
| struct connectdata *conn) |
| { |
| int rc; |
| if(data->set.printhost && conn && conn->host.dispname) { |
| char buffer[160]; |
| const char *t=NULL; |
| const char *w="Data"; |
| switch (type) { |
| case CURLINFO_HEADER_IN: |
| w = "Header"; |
| case CURLINFO_DATA_IN: |
| t = "from"; |
| break; |
| case CURLINFO_HEADER_OUT: |
| w = "Header"; |
| case CURLINFO_DATA_OUT: |
| t = "to"; |
| break; |
| default: |
| break; |
| } |
| |
| if(t) { |
| snprintf(buffer, sizeof(buffer), "[%s %s %s]", w, t, |
| conn->host.dispname); |
| rc = showit(data, CURLINFO_TEXT, buffer, strlen(buffer)); |
| if(rc) |
| return rc; |
| } |
| } |
| rc = showit(data, type, ptr, size); |
| return rc; |
| } |