blob: 05bda794b744b123e9591cd16a85b1a7abe32808 [file] [log] [blame]
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001#ifndef HEADER_CURL_URLDATA_H
2#define HEADER_CURL_URLDATA_H
Kristian Monsen5ab50182010-05-14 18:53:44 +01003/***************************************************************************
4 * _ _ ____ _
5 * Project ___| | | | _ \| |
6 * / __| | | | |_) | |
7 * | (__| |_| | _ <| |___
8 * \___|\___/|_| \_\_____|
9 *
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070010 * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al.
Kristian Monsen5ab50182010-05-14 18:53:44 +010011 *
12 * This software is licensed as described in the file COPYING, which
13 * you should have received as part of this distribution. The terms
14 * are also available at http://curl.haxx.se/docs/copyright.html.
15 *
16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
17 * copies of the Software, and permit persons to whom the Software is
18 * furnished to do so, under the terms of the COPYING file.
19 *
20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
21 * KIND, either express or implied.
22 *
23 ***************************************************************************/
24
25/* This file is for lib internal stuff */
26
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070027#include "curl_setup.h"
Kristian Monsen5ab50182010-05-14 18:53:44 +010028
29#define PORT_FTP 21
30#define PORT_FTPS 990
31#define PORT_TELNET 23
32#define PORT_HTTP 80
33#define PORT_HTTPS 443
34#define PORT_DICT 2628
35#define PORT_LDAP 389
36#define PORT_LDAPS 636
37#define PORT_TFTP 69
38#define PORT_SSH 22
39#define PORT_IMAP 143
40#define PORT_IMAPS 993
41#define PORT_POP3 110
42#define PORT_POP3S 995
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070043#define PORT_SMB 445
44#define PORT_SMBS 445
Kristian Monsen5ab50182010-05-14 18:53:44 +010045#define PORT_SMTP 25
46#define PORT_SMTPS 465 /* sometimes called SSMTP */
47#define PORT_RTSP 554
Lucas Eckels9bd90e62012-08-06 15:07:02 -070048#define PORT_RTMP 1935
49#define PORT_RTMPT PORT_HTTP
50#define PORT_RTMPS PORT_HTTPS
51#define PORT_GOPHER 70
Kristian Monsen5ab50182010-05-14 18:53:44 +010052
53#define DICT_MATCH "/MATCH:"
54#define DICT_MATCH2 "/M:"
55#define DICT_MATCH3 "/FIND:"
56#define DICT_DEFINE "/DEFINE:"
57#define DICT_DEFINE2 "/D:"
58#define DICT_DEFINE3 "/LOOKUP:"
59
60#define CURL_DEFAULT_USER "anonymous"
61#define CURL_DEFAULT_PASSWORD "ftp@example.com"
62
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070063/* Convenience defines for checking protocols or their SSL based version. Each
64 protocol handler should only ever have a single CURLPROTO_ in its protocol
65 field. */
66#define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS)
67#define PROTO_FAMILY_FTP (CURLPROTO_FTP|CURLPROTO_FTPS)
68#define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S)
69#define PROTO_FAMILY_SMB (CURLPROTO_SMB|CURLPROTO_SMBS)
70#define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS)
71
72#define DEFAULT_CONNCACHE_SIZE 5
73
Kristian Monsen5ab50182010-05-14 18:53:44 +010074/* length of longest IPv6 address string including the trailing null */
75#define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
76
77/* Default FTP/IMAP etc response timeout in milliseconds.
78 Symbian OS panics when given a timeout much greater than 1/2 hour.
79*/
80#define RESP_TIMEOUT (1800*1000)
81
82#include "cookie.h"
83#include "formdata.h"
84
Kristian Monsen5ab50182010-05-14 18:53:44 +010085#ifdef USE_OPENSSL
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070086#include <openssl/ssl.h>
Kristian Monsen5ab50182010-05-14 18:53:44 +010087#ifdef HAVE_OPENSSL_ENGINE_H
88#include <openssl/engine.h>
89#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +010090#endif /* USE_OPENSSL */
Kristian Monsen5ab50182010-05-14 18:53:44 +010091
92#ifdef USE_GNUTLS
93#include <gnutls/gnutls.h>
94#endif
95
Lucas Eckels9bd90e62012-08-06 15:07:02 -070096#ifdef USE_POLARSSL
Lucas Eckels9bd90e62012-08-06 15:07:02 -070097#include <polarssl/ssl.h>
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -070098#include <polarssl/version.h>
99#if POLARSSL_VERSION_NUMBER<0x01010000
100#include <polarssl/havege.h>
101#else
102#include <polarssl/entropy.h>
103#include <polarssl/ctr_drbg.h>
104#endif /* POLARSSL_VERSION_NUMBER<0x01010000 */
105#endif /* USE_POLARSSL */
106
107#ifdef USE_CYASSL
108#undef OCSP_REQUEST /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */
109#undef OCSP_RESPONSE /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */
110#include <cyassl/openssl/ssl.h>
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700111#endif
112
Kristian Monsen5ab50182010-05-14 18:53:44 +0100113#ifdef USE_NSS
114#include <nspr.h>
115#include <pk11pub.h>
116#endif
117
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700118#ifdef USE_GSKIT
119#include <gskssl.h>
120#endif
121
122#ifdef USE_AXTLS
123#include <axTLS/config.h>
124#include <axTLS/ssl.h>
125#undef malloc
126#undef calloc
127#undef realloc
128#endif /* USE_AXTLS */
129
130#ifdef USE_SCHANNEL
131#include "curl_sspi.h"
132#include <schnlsp.h>
133#include <schannel.h>
134#endif
135
136#ifdef USE_DARWINSSL
137#include <Security/Security.h>
138/* For some reason, when building for iOS, the omnibus header above does
139 * not include SecureTransport.h as of iOS SDK 5.1. */
140#include <Security/SecureTransport.h>
Kristian Monsen5ab50182010-05-14 18:53:44 +0100141#endif
142
143#ifdef HAVE_NETINET_IN_H
144#include <netinet/in.h>
145#endif
146
147#include "timeval.h"
148
149#ifdef HAVE_ZLIB_H
150#include <zlib.h> /* for content-encoding */
151#ifdef __SYMBIAN32__
152/* zlib pollutes the namespace with this definition */
153#undef WIN32
154#endif
155#endif
156
Kristian Monsen5ab50182010-05-14 18:53:44 +0100157#include <curl/curl.h>
158
159#include "http_chunks.h" /* for the structs and enum stuff */
160#include "hostip.h"
161#include "hash.h"
162#include "splay.h"
163
164#include "imap.h"
165#include "pop3.h"
166#include "smtp.h"
167#include "ftp.h"
168#include "file.h"
169#include "ssh.h"
170#include "http.h"
171#include "rtsp.h"
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700172#include "smb.h"
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700173#include "wildcard.h"
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700174#include "multihandle.h"
Kristian Monsen5ab50182010-05-14 18:53:44 +0100175
176#ifdef HAVE_GSSAPI
177# ifdef HAVE_GSSGNU
178# include <gss.h>
179# elif defined HAVE_GSSMIT
180# include <gssapi/gssapi.h>
181# include <gssapi/gssapi_generic.h>
182# else
183# include <gssapi.h>
184# endif
185#endif
186
187#ifdef HAVE_LIBSSH2_H
188#include <libssh2.h>
189#include <libssh2_sftp.h>
190#endif /* HAVE_LIBSSH2_H */
191
192/* Download buffer size, keep it fairly big for speed reasons */
193#undef BUFSIZE
194#define BUFSIZE CURL_MAX_WRITE_SIZE
195
196/* Initial size of the buffer to store headers in, it'll be enlarged in case
197 of need. */
198#define HEADERSIZE 256
199
200#define CURLEASY_MAGIC_NUMBER 0xc0dedbadU
201
202/* Some convenience macros to get the larger/smaller value out of two given.
203 We prefix with CURL to prevent name collisions. */
204#define CURLMAX(x,y) ((x)>(y)?(x):(y))
205#define CURLMIN(x,y) ((x)<(y)?(x):(y))
206
207
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700208#ifdef HAVE_GSSAPI
209/* Types needed for krb5-ftp connections */
210struct krb5buffer {
Kristian Monsen5ab50182010-05-14 18:53:44 +0100211 void *data;
212 size_t size;
213 size_t index;
214 int eof_flag;
215};
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700216
Kristian Monsen5ab50182010-05-14 18:53:44 +0100217enum protection_level {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700218 PROT_NONE, /* first in list */
219 PROT_CLEAR,
220 PROT_SAFE,
221 PROT_CONFIDENTIAL,
222 PROT_PRIVATE,
223 PROT_CMD,
224 PROT_LAST /* last in list */
225};
226#endif
227
228#ifdef USE_SCHANNEL
229/* Structs to store Schannel handles */
230struct curl_schannel_cred {
231 CredHandle cred_handle;
232 TimeStamp time_stamp;
233 int refcount;
234 bool cached;
235};
236
237struct curl_schannel_ctxt {
238 CtxtHandle ctxt_handle;
239 TimeStamp time_stamp;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100240};
241#endif
242
243/* enum for the nonblocking SSL connection state machine */
244typedef enum {
245 ssl_connect_1,
246 ssl_connect_2,
247 ssl_connect_2_reading,
248 ssl_connect_2_writing,
249 ssl_connect_3,
250 ssl_connect_done
251} ssl_connect_state;
252
253typedef enum {
254 ssl_connection_none,
255 ssl_connection_negotiating,
256 ssl_connection_complete
257} ssl_connection_state;
258
259/* struct for data related to each SSL connection */
260struct ssl_connect_data {
261 /* Use ssl encrypted communications TRUE/FALSE, not necessarily using it atm
262 but at least asked to or meaning to use it. See 'state' for the exact
263 current state of the connection. */
264 bool use;
265 ssl_connection_state state;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700266#ifdef USE_OPENSSL
Kristian Monsen5ab50182010-05-14 18:53:44 +0100267 /* these ones requires specific SSL-types */
268 SSL_CTX* ctx;
269 SSL* handle;
270 X509* server_cert;
271 ssl_connect_state connecting_state;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700272#endif /* USE_OPENSSL */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100273#ifdef USE_GNUTLS
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700274 gnutls_session_t session;
275 gnutls_certificate_credentials_t cred;
276#ifdef USE_TLS_SRP
277 gnutls_srp_client_credentials_t srp_client_cred;
278#endif
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700279 ssl_connect_state connecting_state;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100280#endif /* USE_GNUTLS */
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700281#ifdef USE_POLARSSL
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700282 ctr_drbg_context ctr_drbg;
283 entropy_context entropy;
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700284 ssl_context ssl;
285 ssl_session ssn;
286 int server_fd;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700287 x509_crt cacert;
288 x509_crt clicert;
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700289 x509_crl crl;
290 rsa_context rsa;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700291 ssl_connect_state connecting_state;
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700292#endif /* USE_POLARSSL */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700293#ifdef USE_CYASSL
294 SSL_CTX* ctx;
295 SSL* handle;
296 ssl_connect_state connecting_state;
297#endif /* USE_CYASSL */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100298#ifdef USE_NSS
299 PRFileDesc *handle;
300 char *client_nickname;
301 struct SessionHandle *data;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700302 struct curl_llist *obj_list;
303 PK11GenericObject *obj_clicert;
304 ssl_connect_state connecting_state;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100305#endif /* USE_NSS */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700306#ifdef USE_GSKIT
307 gsk_handle handle;
308 int iocport;
309 ssl_connect_state connecting_state;
310#endif
311#ifdef USE_AXTLS
312 SSL_CTX* ssl_ctx;
313 SSL* ssl;
314 ssl_connect_state connecting_state;
315#endif /* USE_AXTLS */
316#ifdef USE_SCHANNEL
317 struct curl_schannel_cred *cred;
318 struct curl_schannel_ctxt *ctxt;
319 SecPkgContext_StreamSizes stream_sizes;
320 ssl_connect_state connecting_state;
321 size_t encdata_length, decdata_length;
322 size_t encdata_offset, decdata_offset;
323 unsigned char *encdata_buffer, *decdata_buffer;
324 unsigned long req_flags, ret_flags;
325 CURLcode recv_unrecoverable_err; /* schannel_recv had an unrecoverable err */
326 bool recv_sspi_close_notify; /* true if connection closed by close_notify */
327 bool recv_connection_closed; /* true if connection closed, regardless how */
328#endif /* USE_SCHANNEL */
329#ifdef USE_DARWINSSL
330 SSLContextRef ssl_ctx;
331 curl_socket_t ssl_sockfd;
332 ssl_connect_state connecting_state;
333 bool ssl_direction; /* true if writing, false if reading */
334 size_t ssl_write_buffered_length;
335#endif /* USE_DARWINSSL */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100336};
337
338struct ssl_config_data {
339 long version; /* what version the client wants to use */
340 long certverifyresult; /* result from the certificate verification */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700341
342 bool verifypeer; /* set TRUE if this is desired */
343 bool verifyhost; /* set TRUE if CN/SAN must match hostname */
344 bool verifystatus; /* set TRUE if certificate status must be checked */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100345 char *CApath; /* certificate dir (doesn't work on windows) */
346 char *CAfile; /* certificate to verify peer against */
347 const char *CRLfile; /* CRL to check certificate revocation */
348 const char *issuercert;/* optional issuer certificate filename */
349 char *random_file; /* path to file containing "random" data */
350 char *egdsocket; /* path to file containing the EGD daemon socket */
351 char *cipher_list; /* list of ciphers to use */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700352 size_t max_ssl_sessions; /* SSL session id cache size */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100353 curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */
354 void *fsslctxp; /* parameter for call back */
355 bool sessionid; /* cache session IDs or not */
356 bool certinfo; /* gather lots of certificate info */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700357 bool falsestart;
358
359#ifdef USE_TLS_SRP
360 char *username; /* TLS username (for, e.g., SRP) */
361 char *password; /* TLS password (for, e.g., SRP) */
362 enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */
363#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +0100364};
365
366/* information stored about one single SSL session */
367struct curl_ssl_session {
368 char *name; /* host name for which this ID was used */
369 void *sessionid; /* as returned from the SSL layer */
370 size_t idsize; /* if known, otherwise 0 */
371 long age; /* just a number, the higher the more recent */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700372 int remote_port; /* remote port to connect to */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100373 struct ssl_config_data ssl_config; /* setup for this session */
374};
375
376/* Struct used for Digest challenge-response authentication */
377struct digestdata {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700378#if defined(USE_WINDOWS_SSPI)
379 BYTE *input_token;
380 size_t input_token_len;
381#else
Kristian Monsen5ab50182010-05-14 18:53:44 +0100382 char *nonce;
383 char *cnonce;
384 char *realm;
385 int algo;
386 bool stale; /* set true for re-negotiation */
387 char *opaque;
388 char *qop;
389 char *algorithm;
390 int nc; /* nounce count */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700391#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +0100392};
393
394typedef enum {
395 NTLMSTATE_NONE,
396 NTLMSTATE_TYPE1,
397 NTLMSTATE_TYPE2,
398 NTLMSTATE_TYPE3,
399 NTLMSTATE_LAST
400} curlntlm;
401
402#ifdef USE_WINDOWS_SSPI
403#include "curl_sspi.h"
404#endif
405
406#if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
407#include <iconv.h>
408#endif
409
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700410/* Struct used for GSSAPI (Kerberos V5) authentication */
411#if defined(USE_KERBEROS5)
412struct kerberos5data {
413#if defined(USE_WINDOWS_SSPI)
414 CredHandle *credentials;
415 CtxtHandle *context;
416 TCHAR *spn;
417 SEC_WINNT_AUTH_IDENTITY identity;
418 SEC_WINNT_AUTH_IDENTITY *p_identity;
419 size_t token_max;
420 BYTE *output_token;
421#else
422 gss_ctx_id_t context;
423 gss_name_t spn;
424#endif
425};
426#endif
427
Kristian Monsen5ab50182010-05-14 18:53:44 +0100428/* Struct used for NTLM challenge-response authentication */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700429#if defined(USE_NTLM)
Kristian Monsen5ab50182010-05-14 18:53:44 +0100430struct ntlmdata {
431 curlntlm state;
432#ifdef USE_WINDOWS_SSPI
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700433 CredHandle *credentials;
434 CtxtHandle *context;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100435 SEC_WINNT_AUTH_IDENTITY identity;
436 SEC_WINNT_AUTH_IDENTITY *p_identity;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700437 size_t token_max;
438 BYTE *output_token;
439 BYTE *input_token;
440 size_t input_token_len;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100441#else
442 unsigned int flags;
443 unsigned char nonce[8];
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700444 void* target_info; /* TargetInfo received in the ntlm type-2 message */
445 unsigned int target_info_len;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100446#endif
447};
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700448#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +0100449
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700450#ifdef USE_SPNEGO
Kristian Monsen5ab50182010-05-14 18:53:44 +0100451struct negotiatedata {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700452 /* When doing Negotiate (SPNEGO) auth, we first need to send a token
453 and then validate the received one. */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100454 enum { GSS_AUTHNONE, GSS_AUTHRECV, GSS_AUTHSENT } state;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700455#ifdef HAVE_GSSAPI
Kristian Monsen5ab50182010-05-14 18:53:44 +0100456 OM_uint32 status;
457 gss_ctx_id_t context;
458 gss_name_t server_name;
459 gss_buffer_desc output_token;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700460#else
461#ifdef USE_WINDOWS_SSPI
462 DWORD status;
463 CredHandle *credentials;
464 CtxtHandle *context;
465 SEC_WINNT_AUTH_IDENTITY identity;
466 SEC_WINNT_AUTH_IDENTITY *p_identity;
467 TCHAR *server_name;
468 size_t token_max;
469 BYTE *output_token;
470 size_t output_token_length;
471#endif
472#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +0100473};
474#endif
475
476
477/*
478 * Boolean values that concerns this connection.
479 */
480struct ConnectBits {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700481 /* always modify bits.close with the connclose() and connkeep() macros! */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100482 bool close; /* if set, we close the connection after this request */
483 bool reuse; /* if set, this is a re-used connection */
484 bool proxy; /* if set, this transfer is done through a proxy - any type */
485 bool httpproxy; /* if set, this transfer is done through a http proxy */
486 bool user_passwd; /* do we use user+password for this connection? */
487 bool proxy_user_passwd; /* user+password for the proxy? */
488 bool ipv6_ip; /* we communicate with a remote site specified with pure IPv6
489 IP address */
490 bool ipv6; /* we communicate with a site using an IPv6 address */
491
492 bool do_more; /* this is set TRUE if the ->curl_do_more() function is
493 supposed to be called, after ->curl_do() */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700494 bool tcpconnect[2]; /* the TCP layer (or similar) is connected, this is set
Kristian Monsen5ab50182010-05-14 18:53:44 +0100495 the first time on the first connect function call */
496 bool protoconnstart;/* the protocol layer has STARTED its operation after
497 the TCP layer connect */
498
499 bool retry; /* this connection is about to get closed and then
500 re-attempted at another connection. */
501 bool tunnel_proxy; /* if CONNECT is used to "tunnel" through the proxy.
502 This is implicit when SSL-protocols are used through
503 proxies, but can also be enabled explicitly by
504 apps */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100505 bool authneg; /* TRUE when the auth phase has started, which means
506 that we are creating a request with an auth header,
507 but it is not the final request in the auth
508 negotiation. */
509 bool rewindaftersend;/* TRUE when the sending couldn't be stopped even
510 though it will be discarded. When the whole send
511 operation is done, we must call the data rewind
512 callback. */
513 bool ftp_use_epsv; /* As set with CURLOPT_FTP_USE_EPSV, but if we find out
514 EPSV doesn't work we disable it for the forthcoming
515 requests */
516
517 bool ftp_use_eprt; /* As set with CURLOPT_FTP_USE_EPRT, but if we find out
518 EPRT doesn't work we disable it for the forthcoming
519 requests */
520 bool netrc; /* name+password provided by netrc */
521 bool userpwd_in_url; /* name+password found in url */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100522 bool stream_was_rewound; /* Indicates that the stream was rewound after a
523 request read past the end of its response byte
524 boundary */
525 bool proxy_connect_closed; /* set true if a proxy disconnected the
526 connection in a CONNECT request with auth, so
527 that libcurl should reconnect and continue. */
528 bool bound; /* set true if bind() has already been done on this socket/
529 connection */
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700530 bool type_set; /* type= was used in the URL */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700531 bool multiplex; /* connection is multiplexed */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100532};
533
534struct hostname {
535 char *rawalloc; /* allocated "raw" version of the name */
536 char *encalloc; /* allocated IDN-encoded version of the name */
537 char *name; /* name to use internally, might be encoded, might be raw */
538 const char *dispname; /* name to display, as 'name' might be encoded */
539};
540
541/*
542 * Flags on the keepon member of the Curl_transfer_keeper
543 */
544
545#define KEEP_NONE 0
546#define KEEP_RECV (1<<0) /* there is or may be data to read */
547#define KEEP_SEND (1<<1) /* there is or may be data to write */
548#define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there
549 might still be data to read */
550#define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there
551 might still be data to write */
552#define KEEP_RECV_PAUSE (1<<4) /* reading is paused */
553#define KEEP_SEND_PAUSE (1<<5) /* writing is paused */
554
555#define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE)
556#define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE)
557
558
559#ifdef HAVE_LIBZ
560typedef enum {
561 ZLIB_UNINIT, /* uninitialized */
562 ZLIB_INIT, /* initialized */
563 ZLIB_GZIP_HEADER, /* reading gzip header */
564 ZLIB_GZIP_INFLATING, /* inflating gzip stream */
565 ZLIB_INIT_GZIP /* initialized in transparent gzip mode */
566} zlibInitState;
567#endif
568
569#ifdef CURLRES_ASYNCH
570struct Curl_async {
571 char *hostname;
572 int port;
573 struct Curl_dns_entry *dns;
574 bool done; /* set TRUE when the lookup is complete */
575 int status; /* if done is TRUE, this is the status from the callback */
576 void *os_specific; /* 'struct thread_data' for Windows */
577};
578#endif
579
580#define FIRSTSOCKET 0
581#define SECONDARYSOCKET 1
582
583/* These function pointer types are here only to allow easier typecasting
584 within the source when we need to cast between data pointers (such as NULL)
585 and function pointers. */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700586typedef CURLcode (*Curl_do_more_func)(struct connectdata *, int *);
Kristian Monsen5ab50182010-05-14 18:53:44 +0100587typedef CURLcode (*Curl_done_func)(struct connectdata *, CURLcode, bool);
588
Kristian Monsen5ab50182010-05-14 18:53:44 +0100589enum expect100 {
590 EXP100_SEND_DATA, /* enough waiting, just send the body now */
591 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */
592 EXP100_SENDING_REQUEST, /* still sending the request but will wait for
593 the 100 header once done with the request */
594 EXP100_FAILED /* used on 417 Expectation Failed */
595};
596
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700597enum upgrade101 {
598 UPGR101_INIT, /* default state */
599 UPGR101_REQUESTED, /* upgrade requested */
600 UPGR101_RECEIVED, /* response received */
601 UPGR101_WORKING /* talking upgraded protocol */
602};
603
Kristian Monsen5ab50182010-05-14 18:53:44 +0100604/*
605 * Request specific data in the easy handle (SessionHandle). Previously,
606 * these members were on the connectdata struct but since a conn struct may
607 * now be shared between different SessionHandles, we store connection-specific
608 * data here. This struct only keeps stuff that's interesting for *this*
609 * request, as it will be cleared between multiple ones
610 */
611struct SingleRequest {
612 curl_off_t size; /* -1 if unknown at this point */
613 curl_off_t *bytecountp; /* return number of bytes read or NULL */
614
615 curl_off_t maxdownload; /* in bytes, the maximum amount of data to fetch,
616 -1 means unlimited */
617 curl_off_t *writebytecountp; /* return number of bytes written or NULL */
618
619 curl_off_t bytecount; /* total number of bytes read */
620 curl_off_t writebytecount; /* number of bytes written */
621
622 long headerbytecount; /* only count received headers */
623 long deductheadercount; /* this amount of bytes doesn't count when we check
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700624 if anything has been transferred at the end of a
Kristian Monsen5ab50182010-05-14 18:53:44 +0100625 connection. We use this counter to make only a
626 100 reply (without a following second response
627 code) result in a CURLE_GOT_NOTHING error code */
628
629 struct timeval start; /* transfer started at this time */
630 struct timeval now; /* current time */
631 bool header; /* incoming data has HTTP header */
632 enum {
633 HEADER_NORMAL, /* no bad header at all */
634 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest
635 is normal data */
636 HEADER_ALLBAD /* all was believed to be header */
637 } badheader; /* the header was deemed bad and will be
638 written as body */
639 int headerline; /* counts header lines to better track the
640 first one */
641 char *hbufp; /* points at *end* of header line */
642 size_t hbuflen;
643 char *str; /* within buf */
644 char *str_start; /* within buf */
645 char *end_ptr; /* within buf */
646 char *p; /* within headerbuff */
647 bool content_range; /* set TRUE if Content-Range: was found */
648 curl_off_t offset; /* possible resume offset read from the
649 Content-Range: header */
650 int httpcode; /* error code from the 'HTTP/1.? XXX' or
651 'RTSP/1.? XXX' line */
652 struct timeval start100; /* time stamp to wait for the 100 code from */
653 enum expect100 exp100; /* expect 100 continue state */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700654 enum upgrade101 upgr101; /* 101 upgrade state */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100655
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700656 int auto_decoding; /* What content encoding. sec 3.5, RFC2616. */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100657
658#define IDENTITY 0 /* No encoding */
659#define DEFLATE 1 /* zlib deflate [RFC 1950 & 1951] */
660#define GZIP 2 /* gzip algorithm [RFC 1952] */
661#define COMPRESS 3 /* Not handled, added for completeness */
662
663#ifdef HAVE_LIBZ
664 zlibInitState zlib_init; /* possible zlib init state;
665 undefined if Content-Encoding header. */
666 z_stream z; /* State structure for zlib. */
667#endif
668
669 time_t timeofdoc;
670 long bodywrites;
671
672 char *buf;
673 char *uploadbuf;
674 curl_socket_t maxfd;
675
676 int keepon;
677
678 bool upload_done; /* set to TRUE when doing chunked transfer-encoding upload
679 and we're uploading the last chunk */
680
681 bool ignorebody; /* we read a response-body but we ignore it! */
682 bool ignorecl; /* This HTTP response has no body so we ignore the Content-
683 Length: header */
684
685 char *location; /* This points to an allocated version of the Location:
686 header data */
687 char *newurl; /* Set to the new URL to use when a redirect or a retry is
688 wanted */
689
690 /* 'upload_present' is used to keep a byte counter of how much data there is
691 still left in the buffer, aimed for upload. */
692 ssize_t upload_present;
693
694 /* 'upload_fromhere' is used as a read-pointer when we uploaded parts of a
695 buffer, so the next read should read from where this pointer points to,
696 and the 'upload_present' contains the number of bytes available at this
697 position */
698 char *upload_fromhere;
699
700 bool chunk; /* if set, this is a chunked transfer-encoding */
701 bool upload_chunky; /* set TRUE if we are doing chunked transfer-encoding
702 on upload */
703 bool getheader; /* TRUE if header parsing is wanted */
704
705 bool forbidchunk; /* used only to explicitly forbid chunk-upload for
706 specific upload buffers. See readmoredata() in
707 http.c for details. */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700708
709 void *protop; /* Allocated protocol-specific data. Each protocol
710 handler makes sure this points to data it needs. */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100711};
712
713/*
714 * Specific protocol handler.
715 */
716
717struct Curl_handler {
718 const char * scheme; /* URL scheme name. */
719
720 /* Complement to setup_connection_internals(). */
721 CURLcode (*setup_connection)(struct connectdata *);
722
723 /* These two functions MUST be set to be protocol dependent */
724 CURLcode (*do_it)(struct connectdata *, bool *done);
725 Curl_done_func done;
726
727 /* If the curl_do() function is better made in two halves, this
728 * curl_do_more() function will be called afterwards, if set. For example
729 * for doing the FTP stuff after the PASV/PORT command.
730 */
731 Curl_do_more_func do_more;
732
733 /* This function *MAY* be set to a protocol-dependent function that is run
734 * after the connect() and everything is done, as a step in the connection.
735 * The 'done' pointer points to a bool that should be set to TRUE if the
736 * function completes before return. If it doesn't complete, the caller
737 * should call the curl_connecting() function until it is.
738 */
739 CURLcode (*connect_it)(struct connectdata *, bool *done);
740
741 /* See above. Currently only used for FTP. */
742 CURLcode (*connecting)(struct connectdata *, bool *done);
743 CURLcode (*doing)(struct connectdata *, bool *done);
744
745 /* Called from the multi interface during the PROTOCONNECT phase, and it
746 should then return a proper fd set */
747 int (*proto_getsock)(struct connectdata *conn,
748 curl_socket_t *socks,
749 int numsocks);
750
751 /* Called from the multi interface during the DOING phase, and it should
752 then return a proper fd set */
753 int (*doing_getsock)(struct connectdata *conn,
754 curl_socket_t *socks,
755 int numsocks);
756
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700757 /* Called from the multi interface during the DO_MORE phase, and it should
758 then return a proper fd set */
759 int (*domore_getsock)(struct connectdata *conn,
760 curl_socket_t *socks,
761 int numsocks);
762
Kristian Monsen5ab50182010-05-14 18:53:44 +0100763 /* Called from the multi interface during the DO_DONE, PERFORM and
764 WAITPERFORM phases, and it should then return a proper fd set. Not setting
765 this will make libcurl use the generic default one. */
766 int (*perform_getsock)(const struct connectdata *conn,
767 curl_socket_t *socks,
768 int numsocks);
769
770 /* This function *MAY* be set to a protocol-dependent function that is run
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700771 * by the curl_disconnect(), as a step in the disconnection. If the handler
772 * is called because the connection has been considered dead, dead_connection
773 * is set to TRUE.
Kristian Monsen5ab50182010-05-14 18:53:44 +0100774 */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700775 CURLcode (*disconnect)(struct connectdata *, bool dead_connection);
Kristian Monsen5ab50182010-05-14 18:53:44 +0100776
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700777 /* If used, this function gets called from transfer.c:readwrite_data() to
778 allow the protocol to do extra reads/writes */
779 CURLcode (*readwrite)(struct SessionHandle *data, struct connectdata *conn,
780 ssize_t *nread, bool *readmore);
781
782 long defport; /* Default port. */
783 unsigned int protocol; /* See CURLPROTO_* - this needs to be the single
784 specific protocol bit */
785 unsigned int flags; /* Extra particular characteristics, see PROTOPT_* */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100786};
787
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700788#define PROTOPT_NONE 0 /* nothing extra */
789#define PROTOPT_SSL (1<<0) /* uses SSL */
790#define PROTOPT_DUAL (1<<1) /* this protocol uses two connections */
791#define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */
792/* some protocols will have to call the underlying functions without regard to
793 what exact state the socket signals. IE even if the socket says "readable",
794 the send function might need to be called while uploading, or vice versa.
795*/
796#define PROTOPT_DIRLOCK (1<<3)
797#define PROTOPT_NONETWORK (1<<4) /* protocol doesn't use the network! */
798#define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it
799 gets a default */
800#define PROTOPT_NOURLQUERY (1<<6) /* protocol can't handle
801 url query strings (?foo=bar) ! */
802#define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per
803 request instead of per connection */
804
805
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700806/* return the count of bytes sent, or -1 on error */
807typedef ssize_t (Curl_send)(struct connectdata *conn, /* connection data */
808 int sockindex, /* socketindex */
809 const void *buf, /* data to write */
810 size_t len, /* max amount to write */
811 CURLcode *err); /* error to return */
812
813/* return the count of bytes read, or -1 on error */
814typedef ssize_t (Curl_recv)(struct connectdata *conn, /* connection data */
815 int sockindex, /* socketindex */
816 char *buf, /* store data here */
817 size_t len, /* max amount to read */
818 CURLcode *err); /* error to return */
819
Kristian Monsen5ab50182010-05-14 18:53:44 +0100820/*
821 * The connectdata struct contains all fields and variables that should be
822 * unique for an entire connection.
823 */
824struct connectdata {
825 /* 'data' is the CURRENT SessionHandle using this connection -- take great
826 caution that this might very well vary between different times this
827 connection is used! */
828 struct SessionHandle *data;
829
830 /* chunk is for HTTP chunked encoding, but is in the general connectdata
831 struct only because we can do just about any protocol through a HTTP proxy
832 and a HTTP proxy may in fact respond using chunked encoding */
833 struct Curl_chunker chunk;
834
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700835 curl_closesocket_callback fclosesocket; /* function closing the socket(s) */
836 void *closesocket_client;
837
Kristian Monsen5ab50182010-05-14 18:53:44 +0100838 bool inuse; /* This is a marker for the connection cache logic. If this is
839 TRUE this handle is being used by an easy handle and cannot
840 be used by any other easy handle without careful
841 consideration (== only for pipelining). */
842
843 /**** Fields set when inited and not modified again */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700844 long connection_id; /* Contains a unique number to make it easier to
845 track the connections in the log output */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100846
847 /* 'dns_entry' is the particular host we use. This points to an entry in the
848 DNS cache and it will not get pruned while locked. It gets unlocked in
849 Curl_done(). This entry will be NULL if the connection is re-used as then
850 there is no name resolve done. */
851 struct Curl_dns_entry *dns_entry;
852
853 /* 'ip_addr' is the particular IP we connected to. It points to a struct
854 within the DNS cache, so this pointer is only valid as long as the DNS
855 cache entry remains locked. It gets unlocked in Curl_done() */
856 Curl_addrinfo *ip_addr;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700857 Curl_addrinfo *tempaddr[2]; /* for happy eyeballs */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100858
859 /* 'ip_addr_str' is the ip_addr data as a human readable string.
860 It remains available as long as the connection does, which is longer than
861 the ip_addr itself. */
862 char ip_addr_str[MAX_IPADR_LEN];
863
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700864 unsigned int scope_id; /* Scope id for IPv6 */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100865
866 int socktype; /* SOCK_STREAM or SOCK_DGRAM */
867
868 struct hostname host;
869 struct hostname proxy;
870
871 long port; /* which port to use locally */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700872 int remote_port; /* what remote port to connect to, not the proxy port! */
873
874 /* 'primary_ip' and 'primary_port' get filled with peer's numerical
875 ip address and port number whenever an outgoing connection is
876 *attempted* from the primary socket to a remote address. When more
877 than one address is tried for a connection these will hold data
878 for the last attempt. When the connection is actually established
879 these are updated with data which comes directly from the socket. */
880
881 char primary_ip[MAX_IPADR_LEN];
882 long primary_port;
883
884 /* 'local_ip' and 'local_port' get filled with local's numerical
885 ip address and port number whenever an outgoing connection is
886 **established** from the primary socket to a remote address. */
887
888 char local_ip[MAX_IPADR_LEN];
889 long local_port;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100890
891 char *user; /* user name string, allocated */
892 char *passwd; /* password string, allocated */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700893 char *options; /* options string, allocated */
894
895 char *xoauth2_bearer; /* bearer token for xoauth2, allocated */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100896
897 char *proxyuser; /* proxy user name string, allocated */
898 char *proxypasswd; /* proxy password string, allocated */
899 curl_proxytype proxytype; /* what kind of proxy that is in use */
900
901 int httpversion; /* the HTTP version*10 reported by the server */
902 int rtspversion; /* the RTSP version*10 reported by the server */
903
904 struct timeval now; /* "current" time */
905 struct timeval created; /* creation time */
906 curl_socket_t sock[2]; /* two sockets, the second is used for the data
907 transfer when doing FTP */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700908 curl_socket_t tempsock[2]; /* temporary sockets for happy eyeballs */
909 bool sock_accepted[2]; /* TRUE if the socket on this index was created with
910 accept() */
Lucas Eckels9bd90e62012-08-06 15:07:02 -0700911 Curl_recv *recv[2];
912 Curl_send *send[2];
913
Kristian Monsen5ab50182010-05-14 18:53:44 +0100914 struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */
915 struct ssl_config_data ssl_config;
916
917 struct ConnectBits bits; /* various state-flags for this connection */
918
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700919 /* connecttime: when connect() is called on the current IP address. Used to
920 be able to track when to move on to try next IP - but only when the multi
921 interface is used. */
922 struct timeval connecttime;
923 /* The two fields below get set in Curl_connecthost */
924 int num_addr; /* number of addresses to try to connect to */
925 long timeoutms_per_addr; /* how long time in milliseconds to spend on
926 trying to connect to each IP address */
927
928 const struct Curl_handler *handler; /* Connection's protocol handler */
929 const struct Curl_handler *given; /* The protocol first given */
930
931 long ip_version; /* copied from the SessionHandle at creation time */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100932
933 /**** curl_get() phase fields */
934
935 curl_socket_t sockfd; /* socket to read from or CURL_SOCKET_BAD */
936 curl_socket_t writesockfd; /* socket to write to, it may very
937 well be the same we read from.
938 CURL_SOCKET_BAD disables */
939
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700940 /** Dynamicly allocated strings, MUST be freed before this **/
941 /** struct is killed. **/
Kristian Monsen5ab50182010-05-14 18:53:44 +0100942 struct dynamically_allocated_data {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700943 char *proxyuserpwd;
944 char *uagent;
945 char *accept_encoding;
946 char *userpwd;
947 char *rangeline;
948 char *ref;
949 char *host;
950 char *cookiehost;
951 char *rtsp_transport;
952 char *te; /* TE: request header */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100953 } allocptr;
954
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700955#ifdef HAVE_GSSAPI
956 int sec_complete; /* if Kerberos is enabled for this connection */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100957 enum protection_level command_prot;
958 enum protection_level data_prot;
959 enum protection_level request_data_prot;
960 size_t buffer_size;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700961 struct krb5buffer in_buffer;
Kristian Monsen5ab50182010-05-14 18:53:44 +0100962 void *app_data;
963 const struct Curl_sec_client_mech *mech;
964 struct sockaddr_in local_addr;
965#endif
966
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700967#if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */
968 struct kerberos5data krb5; /* variables into the structure definition, */
969#endif /* however, some of them are ftp specific. */
970
Kristian Monsen5ab50182010-05-14 18:53:44 +0100971 /* the two following *_inuse fields are only flags, not counters in any way.
972 If TRUE it means the channel is in use, and if FALSE it means the channel
973 is up for grabs by one. */
974
975 bool readchannel_inuse; /* whether the read channel is in use by an easy
976 handle */
977 bool writechannel_inuse; /* whether the write channel is in use by an easy
978 handle */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100979 struct curl_llist *send_pipe; /* List of handles waiting to
980 send on this pipeline */
981 struct curl_llist *recv_pipe; /* List of handles waiting to read
982 their responses on this pipeline */
Kristian Monsen5ab50182010-05-14 18:53:44 +0100983 char* master_buffer; /* The master buffer allocated on-demand;
984 used for pipelining. */
985 size_t read_pos; /* Current read position in the master buffer */
986 size_t buf_len; /* Length of the buffer?? */
987
988
989 curl_seek_callback seek_func; /* function that seeks the input */
990 void *seek_client; /* pointer to pass to the seek() above */
991
992 /*************** Request - specific items ************/
993
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -0700994#if defined(USE_NTLM)
Kristian Monsen5ab50182010-05-14 18:53:44 +0100995 struct ntlmdata ntlm; /* NTLM differs from other authentication schemes
996 because it authenticates connections, not
997 single requests! */
998 struct ntlmdata proxyntlm; /* NTLM data for proxy */
999
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001000#if defined(NTLM_WB_ENABLED)
1001 /* used for communication with Samba's winbind daemon helper ntlm_auth */
1002 curl_socket_t ntlm_auth_hlpr_socket;
1003 pid_t ntlm_auth_hlpr_pid;
1004 char* challenge_header;
1005 char* response_header;
1006#endif
1007#endif
1008
Kristian Monsen5ab50182010-05-14 18:53:44 +01001009 char syserr_buf [256]; /* buffer for Curl_strerror() */
1010
1011#ifdef CURLRES_ASYNCH
1012 /* data used for the asynch name resolve callback */
1013 struct Curl_async async;
1014#endif
1015
1016 /* These three are used for chunked-encoding trailer support */
1017 char *trailer; /* allocated buffer to store trailer in */
1018 int trlMax; /* allocated buffer size */
1019 int trlPos; /* index of where to store data */
1020
1021 union {
1022 struct ftp_conn ftpc;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001023 struct http_conn httpc;
Kristian Monsen5ab50182010-05-14 18:53:44 +01001024 struct ssh_conn sshc;
1025 struct tftp_state_data *tftpc;
1026 struct imap_conn imapc;
1027 struct pop3_conn pop3c;
1028 struct smtp_conn smtpc;
1029 struct rtsp_conn rtspc;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001030 struct smb_conn smbc;
1031 void *generic; /* RTMP and LDAP use this */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001032 } proto;
1033
1034 int cselect_bits; /* bitmask of socket events */
1035 int waitfor; /* current READ/WRITE bits to wait for */
1036
1037#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
1038 int socks5_gssapi_enctype;
1039#endif
1040
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001041 bool verifypeer;
1042 bool verifyhost;
1043
1044 /* When this connection is created, store the conditions for the local end
1045 bind. This is stored before the actual bind and before any connection is
1046 made and will serve the purpose of being used for comparison reasons so
1047 that subsequent bound-requested connections aren't accidentally re-using
1048 wrong connections. */
1049 char *localdev;
1050 unsigned short localport;
1051 int localportrange;
1052
1053 /* tunnel as in tunnel through a HTTP proxy with CONNECT */
1054 enum {
1055 TUNNEL_INIT, /* init/default/no tunnel state */
1056 TUNNEL_CONNECT, /* CONNECT has been sent off */
1057 TUNNEL_COMPLETE /* CONNECT response received completely */
1058 } tunnel_state[2]; /* two separate ones to allow FTP */
1059 struct connectbundle *bundle; /* The bundle we are member of */
1060
1061 int negnpn; /* APLN or NPN TLS negotiated protocol, CURL_HTTP_VERSION* */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001062};
1063
1064/* The end of connectdata. */
1065
1066/*
1067 * Struct to keep statistical and informational data.
1068 */
1069struct PureInfo {
1070 int httpcode; /* Recent HTTP, FTP, or RTSP response code */
1071 int httpproxycode; /* response code from proxy when received separate */
1072 int httpversion; /* the http version number X.Y = X*10+Y */
1073 long filetime; /* If requested, this is might get set. Set to -1 if the time
1074 was unretrievable. We cannot have this of type time_t,
1075 since time_t is unsigned on several platforms such as
1076 OpenVMS. */
1077 bool timecond; /* set to TRUE if the time condition didn't match, which
1078 thus made the document NOT get fetched */
1079 long header_size; /* size of read header(s) in bytes */
1080 long request_size; /* the amount of bytes sent in the request(s) */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001081 unsigned long proxyauthavail; /* what proxy auth types were announced */
1082 unsigned long httpauthavail; /* what host auth types were announced */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001083 long numconnects; /* how many new connection did libcurl created */
1084 char *contenttype; /* the content type of the object */
1085 char *wouldredirect; /* URL this would've been redirected to if asked to */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001086
1087 /* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip'
1088 and, 'conn_local_port' are copied over from the connectdata struct in
1089 order to allow curl_easy_getinfo() to return this information even when
1090 the session handle is no longer associated with a connection, and also
1091 allow curl_easy_reset() to clear this information from the session handle
1092 without disturbing information which is still alive, and that might be
1093 reused, in the connection cache. */
1094
1095 char conn_primary_ip[MAX_IPADR_LEN];
1096 long conn_primary_port;
1097
1098 char conn_local_ip[MAX_IPADR_LEN];
1099 long conn_local_port;
1100
Kristian Monsen5ab50182010-05-14 18:53:44 +01001101 struct curl_certinfo certs; /* info about the certs, only populated in
1102 OpenSSL builds. Asked for with
1103 CURLOPT_CERTINFO / CURLINFO_CERTINFO */
1104};
1105
1106
1107struct Progress {
1108 long lastshow; /* time() of the last displayed progress meter or NULL to
1109 force redraw at next call */
1110 curl_off_t size_dl; /* total expected size */
1111 curl_off_t size_ul; /* total expected size */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001112 curl_off_t downloaded; /* transferred so far */
1113 curl_off_t uploaded; /* transferred so far */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001114
1115 curl_off_t current_speed; /* uses the currently fastest transfer */
1116
1117 bool callback; /* set when progress callback is used */
1118 int width; /* screen width at download start */
1119 int flags; /* see progress.h */
1120
1121 double timespent;
1122
1123 curl_off_t dlspeed;
1124 curl_off_t ulspeed;
1125
1126 double t_nslookup;
1127 double t_connect;
1128 double t_appconnect;
1129 double t_pretransfer;
1130 double t_starttransfer;
1131 double t_redirect;
1132
1133 struct timeval start;
1134 struct timeval t_startsingle;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001135 struct timeval t_startop;
1136 struct timeval t_acceptdata;
Kristian Monsen5ab50182010-05-14 18:53:44 +01001137#define CURR_TIME (5+1) /* 6 entries for 5 seconds */
1138
1139 curl_off_t speeder[ CURR_TIME ];
1140 struct timeval speeder_time[ CURR_TIME ];
1141 int speeder_c;
1142};
1143
1144typedef enum {
1145 HTTPREQ_NONE, /* first in list */
1146 HTTPREQ_GET,
1147 HTTPREQ_POST,
1148 HTTPREQ_POST_FORM, /* we make a difference internally */
1149 HTTPREQ_PUT,
1150 HTTPREQ_HEAD,
1151 HTTPREQ_CUSTOM,
1152 HTTPREQ_LAST /* last in list */
1153} Curl_HttpReq;
1154
1155typedef enum {
1156 RTSPREQ_NONE, /* first in list */
1157 RTSPREQ_OPTIONS,
1158 RTSPREQ_DESCRIBE,
1159 RTSPREQ_ANNOUNCE,
1160 RTSPREQ_SETUP,
1161 RTSPREQ_PLAY,
1162 RTSPREQ_PAUSE,
1163 RTSPREQ_TEARDOWN,
1164 RTSPREQ_GET_PARAMETER,
1165 RTSPREQ_SET_PARAMETER,
1166 RTSPREQ_RECORD,
1167 RTSPREQ_RECEIVE,
1168 RTSPREQ_LAST /* last in list */
1169} Curl_RtspReq;
1170
1171/*
1172 * Values that are generated, temporary or calculated internally for a
1173 * "session handle" must be defined within the 'struct UrlState'. This struct
1174 * will be used within the SessionHandle struct. When the 'SessionHandle'
1175 * struct is cloned, this data MUST NOT be copied.
1176 *
1177 * Remember that any "state" information goes globally for the curl handle.
1178 * Session-data MUST be put in the connectdata struct and here. */
1179#define MAX_CURL_USER_LENGTH 256
1180#define MAX_CURL_PASSWORD_LENGTH 256
Kristian Monsen5ab50182010-05-14 18:53:44 +01001181
1182struct auth {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001183 unsigned long want; /* Bitmask set to the authentication methods wanted by
1184 app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */
1185 unsigned long picked;
1186 unsigned long avail; /* Bitmask for what the server reports to support for
1187 this resource */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001188 bool done; /* TRUE when the auth phase is done and ready to do the *actual*
1189 request */
1190 bool multi; /* TRUE if this is not yet authenticated but within the auth
1191 multipass negotiation */
1192 bool iestyle; /* TRUE if digest should be done IE-style or FALSE if it should
1193 be RFC compliant */
1194};
1195
Kristian Monsen5ab50182010-05-14 18:53:44 +01001196struct UrlState {
Kristian Monsen5ab50182010-05-14 18:53:44 +01001197
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001198 /* Points to the connection cache */
1199 struct conncache *conn_cache;
1200
1201 /* when curl_easy_perform() is called, the multi handle is "owned" by
1202 the easy handle so curl_easy_cleanup() on such an easy handle will
1203 also close the multi handle! */
1204 bool multi_owned_by_easy;
Kristian Monsen5ab50182010-05-14 18:53:44 +01001205
1206 /* buffers to store authentication data in, as parsed from input options */
1207 struct timeval keeps_speed; /* for the progress meter really */
1208
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001209 struct connectdata *lastconnect; /* The last connection, NULL if undefined */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001210
1211 char *headerbuff; /* allocated buffer to store headers in */
1212 size_t headersize; /* size of the allocation */
1213
1214 char buffer[BUFSIZE+1]; /* download buffer */
1215 char uploadbuffer[BUFSIZE+1]; /* upload buffer */
1216 curl_off_t current_speed; /* the ProgressShow() funcion sets this,
1217 bytes / second */
1218 bool this_is_a_follow; /* this is a followed Location: request */
1219
1220 char *first_host; /* if set, this should be the host name that we will
1221 sent authorization to, no else. Used to make Location:
1222 following not keep sending user+password... This is
1223 strdup() data.
1224 */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001225 struct curl_ssl_session *session; /* array of 'max_ssl_sessions' size */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001226 long sessionage; /* number of the most recent session */
1227 char *tempwrite; /* allocated buffer to keep data in when a write
1228 callback returns to make the connection paused */
1229 size_t tempwritesize; /* size of the 'tempwrite' allocated buffer */
1230 int tempwritetype; /* type of the 'tempwrite' buffer as a bitmask that is
1231 used with Curl_client_write() */
1232 char *scratch; /* huge buffer[BUFSIZE*2] when doing upload CRLF replacing */
1233 bool errorbuf; /* Set to TRUE if the error buffer is already filled in.
1234 This must be set to FALSE every time _easy_perform() is
1235 called. */
1236 int os_errno; /* filled in with errno whenever an error occurs */
1237#ifdef HAVE_SIGNAL
1238 /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */
1239 void (*prev_signal)(int sig);
1240#endif
1241 bool allow_port; /* Is set.use_port allowed to take effect or not. This
1242 is always set TRUE when curl_easy_perform() is called. */
1243 struct digestdata digest; /* state data for host Digest auth */
1244 struct digestdata proxydigest; /* state data for proxy Digest auth */
1245
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001246#ifdef USE_SPNEGO
Kristian Monsen5ab50182010-05-14 18:53:44 +01001247 struct negotiatedata negotiate; /* state data for host Negotiate auth */
1248 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
1249#endif
1250
1251 struct auth authhost; /* auth details for host */
1252 struct auth authproxy; /* auth details for proxy */
1253
1254 bool authproblem; /* TRUE if there's some problem authenticating */
1255
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001256 void *resolver; /* resolver state, if it is used in the URL state -
1257 ares_channel f.e. */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001258
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001259#if defined(USE_OPENSSL) && defined(HAVE_OPENSSL_ENGINE_H)
Kristian Monsen5ab50182010-05-14 18:53:44 +01001260 ENGINE *engine;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001261#endif /* USE_OPENSSL */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001262 struct timeval expiretime; /* set this with Curl_expire() only */
1263 struct Curl_tree timenode; /* for the splay stuff */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001264 struct curl_llist *timeoutlist; /* list of pending timeouts */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001265
1266 /* a place to store the most recently set FTP entrypath */
1267 char *most_recent_ftp_entrypath;
1268
1269 /* set after initial USER failure, to prevent an authentication loop */
1270 bool ftp_trying_alternative;
1271
1272 int httpversion; /* the lowest HTTP version*10 reported by any server
1273 involved in this request */
1274 bool expect100header; /* TRUE if we added Expect: 100-continue */
1275
1276 bool pipe_broke; /* TRUE if the connection we were pipelined on broke
1277 and we need to restart from the beginning */
1278
1279#if !defined(WIN32) && !defined(MSDOS) && !defined(__EMX__) && \
1280 !defined(__SYMBIAN32__)
1281/* do FTP line-end conversions on most platforms */
1282#define CURL_DO_LINEEND_CONV
1283 /* for FTP downloads: track CRLF sequences that span blocks */
1284 bool prev_block_had_trailing_cr;
1285 /* for FTP downloads: how many CRLFs did we converted to LFs? */
1286 curl_off_t crlf_conversions;
1287#endif
Kristian Monsen5ab50182010-05-14 18:53:44 +01001288 char *pathbuffer;/* allocated buffer to store the URL's path part in */
1289 char *path; /* path to use, points to somewhere within the pathbuffer
1290 area */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001291 bool slash_removed; /* set TRUE if the 'path' points to a path where the
1292 initial URL slash separator has been taken off */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001293 bool use_range;
1294 bool rangestringalloc; /* the range string is malloc()'ed */
1295
1296 char *range; /* range, if used. See README for detailed specification on
1297 this syntax. */
1298 curl_off_t resume_from; /* continue [ftp] transfer from here */
1299
1300 /* This RTSP state information survives requests and connections */
1301 long rtsp_next_client_CSeq; /* the session's next client CSeq */
1302 long rtsp_next_server_CSeq; /* the session's next server CSeq */
1303 long rtsp_CSeq_recv; /* most recent CSeq received */
1304
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001305 curl_off_t infilesize; /* size of file to upload, -1 means unknown.
1306 Copied from set.filesize at start of operation */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001307
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001308 int drain; /* Increased when this stream has data to read, even if its
1309 socket not necessarily is readable. Decreased when
1310 checked. */
1311 bool done; /* set to FALSE when Curl_do() is called and set to TRUE when
1312 Curl_done() is called, to prevent Curl_done() to get invoked
1313 twice when the multi interface is used. */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001314};
1315
1316
1317/*
1318 * This 'DynamicStatic' struct defines dynamic states that actually change
1319 * values in the 'UserDefined' area, which MUST be taken into consideration
1320 * if the UserDefined struct is cloned or similar. You can probably just
1321 * copy these, but each one indicate a special action on other data.
1322 */
1323
1324struct DynamicStatic {
1325 char *url; /* work URL, copied from UserDefined */
1326 bool url_alloc; /* URL string is malloc()'ed */
1327 char *referer; /* referer string */
1328 bool referer_alloc; /* referer sting is malloc()ed */
1329 struct curl_slist *cookielist; /* list of cookie files set by
1330 curl_easy_setopt(COOKIEFILE) calls */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001331 struct curl_slist *resolve; /* set to point to the set.resolve list when
1332 this should be dealt with in pretransfer */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001333};
1334
1335/*
1336 * This 'UserDefined' struct must only contain data that is set once to go
1337 * for many (perhaps) independent connections. Values that are generated or
1338 * calculated internally for the "session handle" MUST be defined within the
1339 * 'struct UrlState' instead. The only exceptions MUST note the changes in
1340 * the 'DynamicStatic' struct.
1341 * Character pointer fields point to dynamic storage, unless otherwise stated.
1342 */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001343
Kristian Monsen5ab50182010-05-14 18:53:44 +01001344struct Curl_multi; /* declared and used only in multi.c */
1345
1346enum dupstring {
1347 STRING_CERT, /* client certificate file name */
1348 STRING_CERT_TYPE, /* format for certificate (default: PEM)*/
1349 STRING_COOKIE, /* HTTP cookie string to send */
1350 STRING_COOKIEJAR, /* dump all cookies to this file */
1351 STRING_CUSTOMREQUEST, /* HTTP/FTP/RTSP request/method to use */
1352 STRING_DEVICE, /* local network interface/address to use */
1353 STRING_ENCODING, /* Accept-Encoding string */
1354 STRING_FTP_ACCOUNT, /* ftp account data */
1355 STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */
1356 STRING_FTPPORT, /* port to send with the FTP PORT command */
1357 STRING_KEY, /* private key file name */
1358 STRING_KEY_PASSWD, /* plain text private key password */
1359 STRING_KEY_TYPE, /* format for private key (default: PEM) */
1360 STRING_KRB_LEVEL, /* krb security level */
1361 STRING_NETRC_FILE, /* if not NULL, use this instead of trying to find
1362 $HOME/.netrc */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001363 STRING_PROXY, /* proxy to use */
1364 STRING_SET_RANGE, /* range, if used */
1365 STRING_SET_REFERER, /* custom string for the HTTP referer field */
1366 STRING_SET_URL, /* what original URL to work on */
1367 STRING_SSL_CAPATH, /* CA directory name (doesn't work on windows) */
1368 STRING_SSL_CAFILE, /* certificate file to verify peer against */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001369 STRING_SSL_PINNEDPUBLICKEY, /* public key file to verify peer against */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001370 STRING_SSL_CIPHER_LIST, /* list of ciphers to use */
1371 STRING_SSL_EGDSOCKET, /* path to file containing the EGD daemon socket */
1372 STRING_SSL_RANDOM_FILE, /* path to file containing "random" data */
1373 STRING_USERAGENT, /* User-Agent string */
1374 STRING_SSL_CRLFILE, /* crl file to check certificate */
1375 STRING_SSL_ISSUERCERT, /* issuer cert file to check certificate */
1376 STRING_USERNAME, /* <username>, if used */
1377 STRING_PASSWORD, /* <password>, if used */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001378 STRING_OPTIONS, /* <options>, if used */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001379 STRING_PROXYUSERNAME, /* Proxy <username>, if used */
1380 STRING_PROXYPASSWORD, /* Proxy <password>, if used */
1381 STRING_NOPROXY, /* List of hosts which should not use the proxy, if
1382 used */
1383 STRING_RTSP_SESSION_ID, /* Session ID to use */
1384 STRING_RTSP_STREAM_URI, /* Stream URI for this request */
1385 STRING_RTSP_TRANSPORT, /* Transport for this session */
1386#ifdef USE_LIBSSH2
1387 STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */
1388 STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */
1389 STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */
1390 STRING_SSH_KNOWNHOSTS, /* file name of knownhosts file */
1391#endif
1392#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001393 STRING_SOCKS5_GSSAPI_SERVICE, /* GSSAPI service name */
1394 STRING_PROXY_SERVICE_NAME, /* Proxy service name */
1395 STRING_SERVICE_NAME, /* Service name */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001396#endif
1397 STRING_MAIL_FROM,
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001398 STRING_MAIL_AUTH,
Kristian Monsen5ab50182010-05-14 18:53:44 +01001399
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001400#ifdef USE_TLS_SRP
1401 STRING_TLSAUTH_USERNAME, /* TLS auth <username> */
1402 STRING_TLSAUTH_PASSWORD, /* TLS auth <password> */
1403#endif
1404 STRING_BEARER, /* <bearer>, if used */
1405#ifdef USE_UNIX_SOCKETS
1406 STRING_UNIX_SOCKET_PATH, /* path to Unix socket, if used */
1407#endif
1408
1409 /* -- end of zero-terminated strings -- */
1410
1411 STRING_LASTZEROTERMINATED,
1412
1413 /* -- below this are pointers to binary data that cannot be strdup'ed.
1414 Each such pointer must be added manually to Curl_dupset() --- */
1415
1416 STRING_COPYPOSTFIELDS, /* if POST, set the fields' values here */
1417
Kristian Monsen5ab50182010-05-14 18:53:44 +01001418 STRING_LAST /* not used, just an end-of-list marker */
1419};
1420
1421struct UserDefined {
1422 FILE *err; /* the stderr user data goes here */
1423 void *debugdata; /* the data that will be passed to fdebug */
1424 char *errorbuffer; /* (Static) store failure messages in here */
1425 long proxyport; /* If non-zero, use this port number by default. If the
1426 proxy string features a ":[port]" that one will override
1427 this. */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001428 void *out; /* CURLOPT_WRITEDATA */
1429 void *in; /* CURLOPT_READDATA */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001430 void *writeheader; /* write the header to this if non-NULL */
1431 void *rtp_out; /* write RTP to this if non-NULL */
1432 long use_port; /* which port to use (when not using default) */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001433 unsigned long httpauth; /* kind of HTTP authentication to use (bitmask) */
1434 unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001435 long followlocation; /* as in HTTP Location: */
1436 long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1
1437 for infinity */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001438
1439 int keep_post; /* keep POSTs as POSTs after a 30x request; each
1440 bit represents a request, from 301 to 303 */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001441 bool free_referer; /* set TRUE if 'referer' points to a string we
1442 allocated */
1443 void *postfields; /* if POST, set the fields' values here */
1444 curl_seek_callback seek_func; /* function that seeks the input */
1445 curl_off_t postfieldsize; /* if POST, this might have a size to use instead
1446 of strlen(), and then the data *may* be binary
1447 (contain zero bytes) */
1448 unsigned short localport; /* local port number to bind to */
1449 int localportrange; /* number of additional port numbers to test in case the
1450 'localport' one can't be bind()ed */
1451 curl_write_callback fwrite_func; /* function that stores the output */
1452 curl_write_callback fwrite_header; /* function that stores headers */
1453 curl_write_callback fwrite_rtp; /* function that stores interleaved RTP */
1454 curl_read_callback fread_func; /* function that reads the input */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001455 int is_fread_set; /* boolean, has read callback been set to non-NULL? */
1456 int is_fwrite_set; /* boolean, has write callback been set to non-NULL? */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001457 curl_progress_callback fprogress; /* OLD and deprecated progress callback */
1458 curl_xferinfo_callback fxferinfo; /* progress callback */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001459 curl_debug_callback fdebug; /* function that write informational data */
1460 curl_ioctl_callback ioctl_func; /* function for I/O control */
1461 curl_sockopt_callback fsockopt; /* function for setting socket options */
1462 void *sockopt_client; /* pointer to pass to the socket options callback */
1463 curl_opensocket_callback fopensocket; /* function for checking/translating
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001464 the address and opening the
1465 socket */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001466 void* opensocket_client;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001467 curl_closesocket_callback fclosesocket; /* function for closing the
1468 socket */
1469 void* closesocket_client;
Kristian Monsen5ab50182010-05-14 18:53:44 +01001470
1471 void *seek_client; /* pointer to pass to the seek callback */
1472 /* the 3 curl_conv_callback functions below are used on non-ASCII hosts */
1473 /* function to convert from the network encoding: */
1474 curl_conv_callback convfromnetwork;
1475 /* function to convert to the network encoding: */
1476 curl_conv_callback convtonetwork;
1477 /* function to convert from UTF-8 encoding: */
1478 curl_conv_callback convfromutf8;
1479
1480 void *progress_client; /* pointer to pass to the progress callback */
1481 void *ioctl_client; /* pointer to pass to the ioctl callback */
1482 long timeout; /* in milliseconds, 0 means no timeout */
1483 long connecttimeout; /* in milliseconds, 0 means no timeout */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001484 long accepttimeout; /* in milliseconds, 0 means no timeout */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001485 long server_response_timeout; /* in milliseconds, 0 means no timeout */
1486 long tftp_blksize ; /* in bytes, 0 means use default */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001487 curl_off_t filesize; /* size of file to upload, -1 means unknown */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001488 long low_speed_limit; /* bytes/second */
1489 long low_speed_time; /* number of seconds */
1490 curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001491 curl_off_t max_recv_speed; /* high speed limit in bytes/second for
1492 download */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001493 curl_off_t set_resume_from; /* continue [ftp] transfer from here */
1494 struct curl_slist *headers; /* linked list of extra headers */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001495 struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001496 struct curl_httppost *httppost; /* linked list of POST data */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001497 bool sep_headers; /* handle host and proxy headers separately */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001498 bool cookiesession; /* new cookie session? */
1499 bool crlf; /* convert crlf on ftp upload(?) */
1500 struct curl_slist *quote; /* after connection is established */
1501 struct curl_slist *postquote; /* after the transfer */
1502 struct curl_slist *prequote; /* before the transfer, after type */
1503 struct curl_slist *source_quote; /* 3rd party quote */
1504 struct curl_slist *source_prequote; /* in 3rd party transfer mode - before
1505 the transfer on source host */
1506 struct curl_slist *source_postquote; /* in 3rd party transfer mode - after
1507 the transfer on source host */
1508 struct curl_slist *telnet_options; /* linked list of telnet options */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001509 struct curl_slist *resolve; /* list of names to add/remove from
1510 DNS cache */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001511 curl_TimeCond timecondition; /* kind of time/date comparison */
1512 time_t timevalue; /* what time to compare with */
1513 Curl_HttpReq httpreq; /* what kind of HTTP request (if any) is this */
1514 long httpversion; /* when non-zero, a specific HTTP version requested to
1515 be used in the library's request(s) */
1516 struct ssl_config_data ssl; /* user defined SSL stuff */
1517 curl_proxytype proxytype; /* what kind of proxy that is in use */
1518 long dns_cache_timeout; /* DNS cache timeout */
1519 long buffer_size; /* size of receive buffer to use */
1520 void *private_data; /* application-private data */
1521
Kristian Monsen5ab50182010-05-14 18:53:44 +01001522 struct curl_slist *http200aliases; /* linked list of aliases for http200 */
1523
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001524 long ipver; /* the CURL_IPRESOLVE_* defines in the public header file
1525 0 - whatever, 1 - v2, 2 - v6 */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001526
1527 curl_off_t max_filesize; /* Maximum file size to download */
1528
1529 curl_ftpfile ftp_filemethod; /* how to get to a file when FTP is used */
1530
1531 int ftp_create_missing_dirs; /* 1 - create directories that don't exist
1532 2 - the same but also allow MKD to fail once
1533 */
1534
1535 curl_sshkeycallback ssh_keyfunc; /* key matching callback */
1536 void *ssh_keyfunc_userp; /* custom pointer to callback */
1537
1538/* Here follows boolean settings that define how to behave during
1539 this session. They are STATIC, set by libcurl users or at least initially
1540 and they don't change during operations. */
1541
1542 bool printhost; /* printing host name in debug info */
1543 bool get_filetime; /* get the time and get of the remote file */
1544 bool tunnel_thru_httpproxy; /* use CONNECT through a HTTP proxy */
1545 bool prefer_ascii; /* ASCII rather than binary */
1546 bool ftp_append; /* append, not overwrite, on upload */
1547 bool ftp_list_only; /* switch FTP command for listing directories */
1548 bool ftp_use_port; /* use the FTP PORT command */
1549 bool hide_progress; /* don't use the progress meter */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001550 bool http_fail_on_error; /* fail on HTTP error codes >= 400 */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001551 bool http_follow_location; /* follow HTTP redirects */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001552 bool http_transfer_encoding; /* request compressed HTTP transfer-encoding */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001553 bool http_disable_hostname_check_before_authentication;
1554 bool include_header; /* include received protocol headers in data output */
1555 bool http_set_referer; /* is a custom referer used */
1556 bool http_auto_referer; /* set "correct" referer when following location: */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001557 bool opt_no_body; /* as set with CURLOPT_NOBODY */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001558 bool set_port; /* custom port number used */
1559 bool upload; /* upload request */
1560 enum CURL_NETRC_OPTION
1561 use_netrc; /* defined in include/curl.h */
1562 bool verbose; /* output verbosity */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001563 bool krb; /* Kerberos connection requested */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001564 bool reuse_forbid; /* forbidden to be reused, close after use */
1565 bool reuse_fresh; /* do not re-use an existing connection */
1566 bool ftp_use_epsv; /* if EPSV is to be attempted or not */
1567 bool ftp_use_eprt; /* if EPRT is to be attempted or not */
1568 bool ftp_use_pret; /* if PRET is to be used before PASV or not */
1569
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001570 curl_usessl use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or
Kristian Monsen5ab50182010-05-14 18:53:44 +01001571 IMAP or POP3 or others! */
1572 curl_ftpauth ftpsslauth; /* what AUTH XXX to be attempted */
1573 curl_ftpccc ftp_ccc; /* FTP CCC options */
1574 bool no_signal; /* do not use any signal/alarm handler */
1575 bool global_dns_cache; /* subject for future removal */
1576 bool tcp_nodelay; /* whether to enable TCP_NODELAY or not */
1577 bool ignorecl; /* ignore content length */
1578 bool ftp_skip_ip; /* skip the IP address the FTP server passes on to
1579 us */
1580 bool connect_only; /* make connection, let application use the socket */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001581 bool ssl_enable_beast; /* especially allow this flaw for interoperability's
1582 sake*/
Kristian Monsen5ab50182010-05-14 18:53:44 +01001583 long ssh_auth_types; /* allowed SSH auth types */
1584 bool http_te_skip; /* pass the raw body data to the user, even when
1585 transfer-encoded (chunked, compressed) */
1586 bool http_ce_skip; /* pass the raw body data to the user, even when
1587 content-encoded (chunked, compressed) */
1588 long new_file_perms; /* Permissions to use when creating remote files */
1589 long new_directory_perms; /* Permissions to use when creating remote dirs */
1590 bool proxy_transfer_mode; /* set transfer mode (;type=<a|i>) when doing FTP
1591 via an HTTP proxy */
1592 char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001593 unsigned int scope_id; /* Scope id for IPv6 */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001594 long allowed_protocols;
1595 long redir_protocols;
1596#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
1597 long socks5_gssapi_nec; /* flag to support nec socks5 server */
1598#endif
1599 struct curl_slist *mail_rcpt; /* linked list of mail recipients */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001600 bool sasl_ir; /* Enable/disable SASL initial response */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001601 /* Common RTSP header options */
1602 Curl_RtspReq rtspreq; /* RTSP request type */
1603 long rtspversion; /* like httpversion, for RTSP */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001604 bool wildcardmatch; /* enable wildcard matching */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001605 curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer
1606 starts */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001607 curl_chunk_end_callback chunk_end; /* called after part transferring
1608 stopped */
1609 curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds
1610 to pattern (e.g. if WILDCARDMATCH is on) */
1611 void *fnmatch_data;
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001612
1613 long gssapi_delegation; /* GSS-API credential delegation, see the
1614 documentation of CURLOPT_GSSAPI_DELEGATION */
1615
1616 bool tcp_keepalive; /* use TCP keepalives */
1617 long tcp_keepidle; /* seconds in idle before sending keepalive probe */
1618 long tcp_keepintvl; /* seconds between TCP keepalive probes */
1619
1620 size_t maxconnects; /* Max idle connections in the connection cache */
1621
1622 bool ssl_enable_npn; /* TLS NPN extension? */
1623 bool ssl_enable_alpn; /* TLS ALPN extension? */
1624 bool path_as_is; /* allow dotdots? */
1625 bool pipewait; /* wait for pipe/multiplex status before starting a
1626 new connection */
1627 long expect_100_timeout; /* in milliseconds */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001628};
1629
1630struct Names {
1631 struct curl_hash *hostcache;
1632 enum {
1633 HCACHE_NONE, /* not pointing to anything */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001634 HCACHE_GLOBAL, /* points to the (shrug) global one */
1635 HCACHE_MULTI, /* points to a shared one in the multi handle */
1636 HCACHE_SHARED /* points to a shared one in a shared object */
1637 } hostcachetype;
1638};
1639
1640/*
1641 * The 'connectdata' struct MUST have all the connection oriented stuff as we
1642 * may have several simultaneous connections and connection structs in memory.
1643 *
1644 * The 'struct UserDefined' must only contain data that is set once to go for
1645 * many (perhaps) independent connections. Values that are generated or
1646 * calculated internally for the "session handle" must be defined within the
1647 * 'struct UrlState' instead.
1648 */
1649
1650struct SessionHandle {
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001651 /* first, two fields for the linked list of these */
1652 struct SessionHandle *next;
1653 struct SessionHandle *prev;
1654
1655 struct connectdata *easy_conn; /* the "unit's" connection */
1656
1657 CURLMstate mstate; /* the handle's state */
1658 CURLcode result; /* previous result */
1659
1660 struct Curl_message msg; /* A single posted message. */
1661
1662 /* Array with the plain socket numbers this handle takes care of, in no
1663 particular order. Note that all sockets are added to the sockhash, where
1664 the state etc are also kept. This array is mostly used to detect when a
1665 socket is to be removed from the hash. See singlesocket(). */
1666 curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE];
1667 int numsocks;
1668
Kristian Monsen5ab50182010-05-14 18:53:44 +01001669 struct Names dns;
1670 struct Curl_multi *multi; /* if non-NULL, points to the multi handle
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001671 struct to which this "belongs" when used by
1672 the multi interface */
1673 struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle
1674 struct to which this "belongs" when used
1675 by the easy interface */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001676 struct Curl_share *share; /* Share, handles global variable mutexing */
1677 struct SingleRequest req; /* Request-specific data */
1678 struct UserDefined set; /* values set by the libcurl user */
1679 struct DynamicStatic change; /* possibly modified userdefined data */
1680 struct CookieInfo *cookies; /* the cookies, read from files and servers.
1681 NOTE that the 'cookie' field in the
1682 UserDefined struct defines if the "engine"
1683 is to be used or not. */
1684 struct Progress progress; /* for all the progress meter data */
1685 struct UrlState state; /* struct for fields used for state info and
1686 other dynamic purposes */
Lucas Eckels9bd90e62012-08-06 15:07:02 -07001687 struct WildcardData wildcard; /* wildcard download state info */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001688 struct PureInfo info; /* stats, reports and info data */
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001689 struct curl_tlssessioninfo tsi; /* Information about the TLS session, only
1690 valid after a client has asked for it */
Kristian Monsen5ab50182010-05-14 18:53:44 +01001691#if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
1692 iconv_t outbound_cd; /* for translating to the network encoding */
1693 iconv_t inbound_cd; /* for translating from the network encoding */
1694 iconv_t utf8_cd; /* for translating to UTF8 */
1695#endif /* CURL_DOES_CONVERSIONS && HAVE_ICONV */
1696 unsigned int magic; /* set to a CURLEASY_MAGIC_NUMBER */
1697};
1698
1699#define LIBCURL_NAME "libcurl"
1700
Bertrand SIMONNETe6cd7382015-07-01 15:39:44 -07001701#endif /* HEADER_CURL_URLDATA_H */