blob: 7c7bf1ba0743744677edf0c08cbf453f3adb9ff5 [file] [log] [blame]
Dirk Vogta7d7f962016-12-01 10:50:48 +01001#ifndef HEADER_CURL_URLDATA_H
2#define HEADER_CURL_URLDATA_H
9487f7f2011-08-03 07:05:30 -07003/***************************************************************************
4 * _ _ ____ _
5 * Project ___| | | | _ \| |
6 * / __| | | | |_) | |
7 * | (__| |_| | _ <| |___
8 * \___|\___/|_| \_\_____|
9 *
Dirk Vogta7d7f962016-12-01 10:50:48 +010010 * Copyright (C) 1998 - 2016, Daniel Stenberg, <daniel@haxx.se>, et al.
9487f7f2011-08-03 07:05:30 -070011 *
12 * This software is licensed as described in the file COPYING, which
13 * you should have received as part of this distribution. The terms
Dirk Vogta7d7f962016-12-01 10:50:48 +010014 * are also available at https://curl.haxx.se/docs/copyright.html.
9487f7f2011-08-03 07:05:30 -070015 *
16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
17 * copies of the Software, and permit persons to whom the Software is
18 * furnished to do so, under the terms of the COPYING file.
19 *
20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
21 * KIND, either express or implied.
22 *
23 ***************************************************************************/
24
25/* This file is for lib internal stuff */
26
Dirk Vogta7d7f962016-12-01 10:50:48 +010027#include "curl_setup.h"
9487f7f2011-08-03 07:05:30 -070028
29#define PORT_FTP 21
30#define PORT_FTPS 990
31#define PORT_TELNET 23
32#define PORT_HTTP 80
33#define PORT_HTTPS 443
34#define PORT_DICT 2628
35#define PORT_LDAP 389
36#define PORT_LDAPS 636
37#define PORT_TFTP 69
38#define PORT_SSH 22
39#define PORT_IMAP 143
40#define PORT_IMAPS 993
41#define PORT_POP3 110
42#define PORT_POP3S 995
Dirk Vogta7d7f962016-12-01 10:50:48 +010043#define PORT_SMB 445
44#define PORT_SMBS 445
9487f7f2011-08-03 07:05:30 -070045#define PORT_SMTP 25
46#define PORT_SMTPS 465 /* sometimes called SSMTP */
47#define PORT_RTSP 554
48#define PORT_RTMP 1935
49#define PORT_RTMPT PORT_HTTP
50#define PORT_RTMPS PORT_HTTPS
51#define PORT_GOPHER 70
52
53#define DICT_MATCH "/MATCH:"
54#define DICT_MATCH2 "/M:"
55#define DICT_MATCH3 "/FIND:"
56#define DICT_DEFINE "/DEFINE:"
57#define DICT_DEFINE2 "/D:"
58#define DICT_DEFINE3 "/LOOKUP:"
59
60#define CURL_DEFAULT_USER "anonymous"
61#define CURL_DEFAULT_PASSWORD "ftp@example.com"
62
Dirk Vogta7d7f962016-12-01 10:50:48 +010063/* Convenience defines for checking protocols or their SSL based version. Each
64 protocol handler should only ever have a single CURLPROTO_ in its protocol
65 field. */
66#define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS)
67#define PROTO_FAMILY_FTP (CURLPROTO_FTP|CURLPROTO_FTPS)
68#define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S)
69#define PROTO_FAMILY_SMB (CURLPROTO_SMB|CURLPROTO_SMBS)
70#define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS)
71
72#define DEFAULT_CONNCACHE_SIZE 5
73
9487f7f2011-08-03 07:05:30 -070074/* length of longest IPv6 address string including the trailing null */
75#define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
76
77/* Default FTP/IMAP etc response timeout in milliseconds.
78 Symbian OS panics when given a timeout much greater than 1/2 hour.
79*/
80#define RESP_TIMEOUT (1800*1000)
81
82#include "cookie.h"
83#include "formdata.h"
84
9487f7f2011-08-03 07:05:30 -070085#ifdef USE_OPENSSL
Dirk Vogta7d7f962016-12-01 10:50:48 +010086#include <openssl/ssl.h>
9487f7f2011-08-03 07:05:30 -070087#ifdef HAVE_OPENSSL_ENGINE_H
88#include <openssl/engine.h>
89#endif
9487f7f2011-08-03 07:05:30 -070090#endif /* USE_OPENSSL */
9487f7f2011-08-03 07:05:30 -070091
92#ifdef USE_GNUTLS
93#include <gnutls/gnutls.h>
94#endif
95
Dirk Vogta7d7f962016-12-01 10:50:48 +010096#ifdef USE_MBEDTLS
97
98#include <mbedtls/ssl.h>
99#include <mbedtls/version.h>
100#include <mbedtls/entropy.h>
101#include <mbedtls/ctr_drbg.h>
102
103#elif defined USE_POLARSSL
104
9487f7f2011-08-03 07:05:30 -0700105#include <polarssl/ssl.h>
Dirk Vogta7d7f962016-12-01 10:50:48 +0100106#include <polarssl/version.h>
107#if POLARSSL_VERSION_NUMBER<0x01010000
108#include <polarssl/havege.h>
109#else
110#include <polarssl/entropy.h>
111#include <polarssl/ctr_drbg.h>
112#endif /* POLARSSL_VERSION_NUMBER<0x01010000 */
113
114#endif /* USE_POLARSSL */
115
116#ifdef USE_CYASSL
117#undef OCSP_REQUEST /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */
118#undef OCSP_RESPONSE /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */
119#include <cyassl/openssl/ssl.h>
9487f7f2011-08-03 07:05:30 -0700120#endif
121
122#ifdef USE_NSS
123#include <nspr.h>
124#include <pk11pub.h>
125#endif
126
Dirk Vogta7d7f962016-12-01 10:50:48 +0100127#ifdef USE_GSKIT
128#include <gskssl.h>
129#endif
130
131#ifdef USE_AXTLS
132#include <axTLS/config.h>
133#include <axTLS/ssl.h>
134#undef malloc
135#undef calloc
136#undef realloc
137#endif /* USE_AXTLS */
138
139#ifdef USE_SCHANNEL
140#include "curl_sspi.h"
141#include <schnlsp.h>
142#include <schannel.h>
143#endif
144
145#ifdef USE_DARWINSSL
146#include <Security/Security.h>
147/* For some reason, when building for iOS, the omnibus header above does
148 * not include SecureTransport.h as of iOS SDK 5.1. */
149#include <Security/SecureTransport.h>
9487f7f2011-08-03 07:05:30 -0700150#endif
151
152#ifdef HAVE_NETINET_IN_H
153#include <netinet/in.h>
154#endif
155
156#include "timeval.h"
157
158#ifdef HAVE_ZLIB_H
159#include <zlib.h> /* for content-encoding */
160#ifdef __SYMBIAN32__
161/* zlib pollutes the namespace with this definition */
162#undef WIN32
163#endif
164#endif
165
9487f7f2011-08-03 07:05:30 -0700166#include <curl/curl.h>
167
168#include "http_chunks.h" /* for the structs and enum stuff */
169#include "hostip.h"
170#include "hash.h"
171#include "splay.h"
172
173#include "imap.h"
174#include "pop3.h"
175#include "smtp.h"
176#include "ftp.h"
177#include "file.h"
178#include "ssh.h"
179#include "http.h"
180#include "rtsp.h"
Dirk Vogta7d7f962016-12-01 10:50:48 +0100181#include "smb.h"
9487f7f2011-08-03 07:05:30 -0700182#include "wildcard.h"
Dirk Vogta7d7f962016-12-01 10:50:48 +0100183#include "multihandle.h"
9487f7f2011-08-03 07:05:30 -0700184
185#ifdef HAVE_GSSAPI
186# ifdef HAVE_GSSGNU
187# include <gss.h>
188# elif defined HAVE_GSSMIT
189# include <gssapi/gssapi.h>
190# include <gssapi/gssapi_generic.h>
191# else
192# include <gssapi.h>
193# endif
194#endif
195
196#ifdef HAVE_LIBSSH2_H
197#include <libssh2.h>
198#include <libssh2_sftp.h>
199#endif /* HAVE_LIBSSH2_H */
200
201/* Download buffer size, keep it fairly big for speed reasons */
202#undef BUFSIZE
203#define BUFSIZE CURL_MAX_WRITE_SIZE
204
205/* Initial size of the buffer to store headers in, it'll be enlarged in case
206 of need. */
207#define HEADERSIZE 256
208
209#define CURLEASY_MAGIC_NUMBER 0xc0dedbadU
Dirk Vogta7d7f962016-12-01 10:50:48 +0100210#define GOOD_EASY_HANDLE(x) \
211 ((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))
9487f7f2011-08-03 07:05:30 -0700212
213/* Some convenience macros to get the larger/smaller value out of two given.
214 We prefix with CURL to prevent name collisions. */
215#define CURLMAX(x,y) ((x)>(y)?(x):(y))
216#define CURLMIN(x,y) ((x)<(y)?(x):(y))
217
Dirk Vogta7d7f962016-12-01 10:50:48 +0100218#ifdef HAVE_GSSAPI
219/* Types needed for krb5-ftp connections */
220struct krb5buffer {
9487f7f2011-08-03 07:05:30 -0700221 void *data;
222 size_t size;
223 size_t index;
224 int eof_flag;
225};
226
227enum protection_level {
228 PROT_NONE, /* first in list */
229 PROT_CLEAR,
230 PROT_SAFE,
231 PROT_CONFIDENTIAL,
232 PROT_PRIVATE,
233 PROT_CMD,
234 PROT_LAST /* last in list */
235};
236#endif
237
Dirk Vogta7d7f962016-12-01 10:50:48 +0100238#ifdef USE_SCHANNEL
239/* Structs to store Schannel handles */
240struct curl_schannel_cred {
241 CredHandle cred_handle;
242 TimeStamp time_stamp;
243 int refcount;
244};
245
246struct curl_schannel_ctxt {
247 CtxtHandle ctxt_handle;
248 TimeStamp time_stamp;
249};
250#endif
251
9487f7f2011-08-03 07:05:30 -0700252/* enum for the nonblocking SSL connection state machine */
253typedef enum {
254 ssl_connect_1,
255 ssl_connect_2,
256 ssl_connect_2_reading,
257 ssl_connect_2_writing,
258 ssl_connect_3,
259 ssl_connect_done
260} ssl_connect_state;
261
262typedef enum {
263 ssl_connection_none,
264 ssl_connection_negotiating,
265 ssl_connection_complete
266} ssl_connection_state;
267
268/* struct for data related to each SSL connection */
269struct ssl_connect_data {
270 /* Use ssl encrypted communications TRUE/FALSE, not necessarily using it atm
271 but at least asked to or meaning to use it. See 'state' for the exact
272 current state of the connection. */
273 bool use;
274 ssl_connection_state state;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100275 ssl_connect_state connecting_state;
276#if defined(USE_OPENSSL)
9487f7f2011-08-03 07:05:30 -0700277 /* these ones requires specific SSL-types */
278 SSL_CTX* ctx;
279 SSL* handle;
280 X509* server_cert;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100281#elif defined(USE_GNUTLS)
282 gnutls_session_t session;
283 gnutls_certificate_credentials_t cred;
284#ifdef USE_TLS_SRP
285 gnutls_srp_client_credentials_t srp_client_cred;
286#endif
287#elif defined(USE_MBEDTLS)
288 mbedtls_ctr_drbg_context ctr_drbg;
289 mbedtls_entropy_context entropy;
290 mbedtls_ssl_context ssl;
9487f7f2011-08-03 07:05:30 -0700291 int server_fd;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100292 mbedtls_x509_crt cacert;
293 mbedtls_x509_crt clicert;
294 mbedtls_x509_crl crl;
295 mbedtls_pk_context pk;
296 mbedtls_ssl_config config;
297 const char *protocols[3];
298#elif defined(USE_POLARSSL)
299 ctr_drbg_context ctr_drbg;
300 entropy_context entropy;
301 ssl_context ssl;
302 int server_fd;
303 x509_crt cacert;
304 x509_crt clicert;
9487f7f2011-08-03 07:05:30 -0700305 x509_crl crl;
306 rsa_context rsa;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100307#elif defined(USE_CYASSL)
308 SSL_CTX* ctx;
309 SSL* handle;
310#elif defined(USE_NSS)
9487f7f2011-08-03 07:05:30 -0700311 PRFileDesc *handle;
312 char *client_nickname;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100313 struct Curl_easy *data;
314 struct curl_llist *obj_list;
315 PK11GenericObject *obj_clicert;
316#elif defined(USE_GSKIT)
317 gsk_handle handle;
318 int iocport;
319#elif defined(USE_AXTLS)
320 SSL_CTX* ssl_ctx;
321 SSL* ssl;
322#elif defined(USE_SCHANNEL)
323 struct curl_schannel_cred *cred;
324 struct curl_schannel_ctxt *ctxt;
325 SecPkgContext_StreamSizes stream_sizes;
326 size_t encdata_length, decdata_length;
327 size_t encdata_offset, decdata_offset;
328 unsigned char *encdata_buffer, *decdata_buffer;
329 unsigned long req_flags, ret_flags;
330 CURLcode recv_unrecoverable_err; /* schannel_recv had an unrecoverable err */
331 bool recv_sspi_close_notify; /* true if connection closed by close_notify */
332 bool recv_connection_closed; /* true if connection closed, regardless how */
333 bool use_alpn; /* true if ALPN is used for this connection */
334#elif defined(USE_DARWINSSL)
335 SSLContextRef ssl_ctx;
336 curl_socket_t ssl_sockfd;
337 bool ssl_direction; /* true if writing, false if reading */
338 size_t ssl_write_buffered_length;
339#elif defined(USE_SSL)
340#error "SSL backend specific information missing from ssl_connect_data"
9487f7f2011-08-03 07:05:30 -0700341#endif
9487f7f2011-08-03 07:05:30 -0700342};
343
344struct ssl_config_data {
345 long version; /* what version the client wants to use */
346 long certverifyresult; /* result from the certificate verification */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100347
348 bool verifypeer; /* set TRUE if this is desired */
349 bool verifyhost; /* set TRUE if CN/SAN must match hostname */
350 bool verifystatus; /* set TRUE if certificate status must be checked */
9487f7f2011-08-03 07:05:30 -0700351 char *CApath; /* certificate dir (doesn't work on windows) */
352 char *CAfile; /* certificate to verify peer against */
353 const char *CRLfile; /* CRL to check certificate revocation */
354 const char *issuercert;/* optional issuer certificate filename */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100355 char *clientcert;
9487f7f2011-08-03 07:05:30 -0700356 char *random_file; /* path to file containing "random" data */
357 char *egdsocket; /* path to file containing the EGD daemon socket */
358 char *cipher_list; /* list of ciphers to use */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100359 size_t max_ssl_sessions; /* SSL session id cache size */
9487f7f2011-08-03 07:05:30 -0700360 curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */
361 void *fsslctxp; /* parameter for call back */
362 bool sessionid; /* cache session IDs or not */
363 bool certinfo; /* gather lots of certificate info */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100364 bool falsestart;
365
366#ifdef USE_TLS_SRP
367 char *username; /* TLS username (for, e.g., SRP) */
368 char *password; /* TLS password (for, e.g., SRP) */
369 enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */
370#endif
9487f7f2011-08-03 07:05:30 -0700371};
372
373/* information stored about one single SSL session */
374struct curl_ssl_session {
375 char *name; /* host name for which this ID was used */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100376 char *conn_to_host; /* host name for the connection (may be NULL) */
377 const char *scheme; /* protocol scheme used */
9487f7f2011-08-03 07:05:30 -0700378 void *sessionid; /* as returned from the SSL layer */
379 size_t idsize; /* if known, otherwise 0 */
380 long age; /* just a number, the higher the more recent */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100381 int remote_port; /* remote port */
382 int conn_to_port; /* remote port for the connection (may be -1) */
9487f7f2011-08-03 07:05:30 -0700383 struct ssl_config_data ssl_config; /* setup for this session */
384};
385
386/* Struct used for Digest challenge-response authentication */
387struct digestdata {
Dirk Vogta7d7f962016-12-01 10:50:48 +0100388#if defined(USE_WINDOWS_SSPI)
389 BYTE *input_token;
390 size_t input_token_len;
391#else
9487f7f2011-08-03 07:05:30 -0700392 char *nonce;
393 char *cnonce;
394 char *realm;
395 int algo;
396 bool stale; /* set true for re-negotiation */
397 char *opaque;
398 char *qop;
399 char *algorithm;
400 int nc; /* nounce count */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100401#endif
9487f7f2011-08-03 07:05:30 -0700402};
403
404typedef enum {
405 NTLMSTATE_NONE,
406 NTLMSTATE_TYPE1,
407 NTLMSTATE_TYPE2,
408 NTLMSTATE_TYPE3,
409 NTLMSTATE_LAST
410} curlntlm;
411
412#ifdef USE_WINDOWS_SSPI
413#include "curl_sspi.h"
414#endif
415
416#if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
417#include <iconv.h>
418#endif
419
Dirk Vogta7d7f962016-12-01 10:50:48 +0100420/* Struct used for GSSAPI (Kerberos V5) authentication */
421#if defined(USE_KERBEROS5)
422struct kerberos5data {
423#if defined(USE_WINDOWS_SSPI)
424 CredHandle *credentials;
425 CtxtHandle *context;
426 TCHAR *spn;
427 SEC_WINNT_AUTH_IDENTITY identity;
428 SEC_WINNT_AUTH_IDENTITY *p_identity;
429 size_t token_max;
430 BYTE *output_token;
431#else
432 gss_ctx_id_t context;
433 gss_name_t spn;
434#endif
435};
436#endif
437
9487f7f2011-08-03 07:05:30 -0700438/* Struct used for NTLM challenge-response authentication */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100439#if defined(USE_NTLM)
9487f7f2011-08-03 07:05:30 -0700440struct ntlmdata {
441 curlntlm state;
442#ifdef USE_WINDOWS_SSPI
Dirk Vogta7d7f962016-12-01 10:50:48 +0100443 CredHandle *credentials;
444 CtxtHandle *context;
9487f7f2011-08-03 07:05:30 -0700445 SEC_WINNT_AUTH_IDENTITY identity;
446 SEC_WINNT_AUTH_IDENTITY *p_identity;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100447 size_t token_max;
448 BYTE *output_token;
449 BYTE *input_token;
450 size_t input_token_len;
9487f7f2011-08-03 07:05:30 -0700451#else
452 unsigned int flags;
453 unsigned char nonce[8];
Dirk Vogta7d7f962016-12-01 10:50:48 +0100454 void* target_info; /* TargetInfo received in the ntlm type-2 message */
455 unsigned int target_info_len;
9487f7f2011-08-03 07:05:30 -0700456#endif
457};
Dirk Vogta7d7f962016-12-01 10:50:48 +0100458#endif
9487f7f2011-08-03 07:05:30 -0700459
Dirk Vogta7d7f962016-12-01 10:50:48 +0100460#ifdef USE_SPNEGO
9487f7f2011-08-03 07:05:30 -0700461struct negotiatedata {
Dirk Vogta7d7f962016-12-01 10:50:48 +0100462 /* When doing Negotiate (SPNEGO) auth, we first need to send a token
463 and then validate the received one. */
9487f7f2011-08-03 07:05:30 -0700464 enum { GSS_AUTHNONE, GSS_AUTHRECV, GSS_AUTHSENT } state;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100465#ifdef HAVE_GSSAPI
9487f7f2011-08-03 07:05:30 -0700466 OM_uint32 status;
467 gss_ctx_id_t context;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100468 gss_name_t spn;
9487f7f2011-08-03 07:05:30 -0700469 gss_buffer_desc output_token;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100470#else
471#ifdef USE_WINDOWS_SSPI
472 DWORD status;
473 CredHandle *credentials;
474 CtxtHandle *context;
475 SEC_WINNT_AUTH_IDENTITY identity;
476 SEC_WINNT_AUTH_IDENTITY *p_identity;
477 TCHAR *spn;
478 size_t token_max;
479 BYTE *output_token;
480 size_t output_token_length;
481#endif
482#endif
9487f7f2011-08-03 07:05:30 -0700483};
484#endif
485
486
487/*
488 * Boolean values that concerns this connection.
489 */
490struct ConnectBits {
Dirk Vogta7d7f962016-12-01 10:50:48 +0100491 /* always modify bits.close with the connclose() and connkeep() macros! */
9487f7f2011-08-03 07:05:30 -0700492 bool close; /* if set, we close the connection after this request */
493 bool reuse; /* if set, this is a re-used connection */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100494 bool conn_to_host; /* if set, this connection has a "connect to host"
495 that overrides the host in the URL */
496 bool conn_to_port; /* if set, this connection has a "connect to port"
497 that overrides the port in the URL (remote port) */
9487f7f2011-08-03 07:05:30 -0700498 bool proxy; /* if set, this transfer is done through a proxy - any type */
499 bool httpproxy; /* if set, this transfer is done through a http proxy */
500 bool user_passwd; /* do we use user+password for this connection? */
501 bool proxy_user_passwd; /* user+password for the proxy? */
502 bool ipv6_ip; /* we communicate with a remote site specified with pure IPv6
503 IP address */
504 bool ipv6; /* we communicate with a site using an IPv6 address */
505
506 bool do_more; /* this is set TRUE if the ->curl_do_more() function is
507 supposed to be called, after ->curl_do() */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100508 bool tcpconnect[2]; /* the TCP layer (or similar) is connected, this is set
9487f7f2011-08-03 07:05:30 -0700509 the first time on the first connect function call */
510 bool protoconnstart;/* the protocol layer has STARTED its operation after
511 the TCP layer connect */
512
513 bool retry; /* this connection is about to get closed and then
514 re-attempted at another connection. */
515 bool tunnel_proxy; /* if CONNECT is used to "tunnel" through the proxy.
516 This is implicit when SSL-protocols are used through
517 proxies, but can also be enabled explicitly by
518 apps */
9487f7f2011-08-03 07:05:30 -0700519 bool authneg; /* TRUE when the auth phase has started, which means
520 that we are creating a request with an auth header,
521 but it is not the final request in the auth
522 negotiation. */
523 bool rewindaftersend;/* TRUE when the sending couldn't be stopped even
524 though it will be discarded. When the whole send
525 operation is done, we must call the data rewind
526 callback. */
527 bool ftp_use_epsv; /* As set with CURLOPT_FTP_USE_EPSV, but if we find out
528 EPSV doesn't work we disable it for the forthcoming
529 requests */
530
531 bool ftp_use_eprt; /* As set with CURLOPT_FTP_USE_EPRT, but if we find out
532 EPRT doesn't work we disable it for the forthcoming
533 requests */
534 bool netrc; /* name+password provided by netrc */
535 bool userpwd_in_url; /* name+password found in url */
9487f7f2011-08-03 07:05:30 -0700536 bool stream_was_rewound; /* Indicates that the stream was rewound after a
537 request read past the end of its response byte
538 boundary */
539 bool proxy_connect_closed; /* set true if a proxy disconnected the
540 connection in a CONNECT request with auth, so
541 that libcurl should reconnect and continue. */
542 bool bound; /* set true if bind() has already been done on this socket/
543 connection */
544 bool type_set; /* type= was used in the URL */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100545 bool multiplex; /* connection is multiplexed */
546
547 bool tcp_fastopen; /* use TCP Fast Open */
548 bool tls_enable_npn; /* TLS NPN extension? */
549 bool tls_enable_alpn; /* TLS ALPN extension? */
9487f7f2011-08-03 07:05:30 -0700550};
551
552struct hostname {
553 char *rawalloc; /* allocated "raw" version of the name */
554 char *encalloc; /* allocated IDN-encoded version of the name */
555 char *name; /* name to use internally, might be encoded, might be raw */
556 const char *dispname; /* name to display, as 'name' might be encoded */
557};
558
559/*
560 * Flags on the keepon member of the Curl_transfer_keeper
561 */
562
563#define KEEP_NONE 0
564#define KEEP_RECV (1<<0) /* there is or may be data to read */
565#define KEEP_SEND (1<<1) /* there is or may be data to write */
566#define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there
567 might still be data to read */
568#define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there
569 might still be data to write */
570#define KEEP_RECV_PAUSE (1<<4) /* reading is paused */
571#define KEEP_SEND_PAUSE (1<<5) /* writing is paused */
572
573#define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE)
574#define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE)
575
576
577#ifdef HAVE_LIBZ
578typedef enum {
579 ZLIB_UNINIT, /* uninitialized */
580 ZLIB_INIT, /* initialized */
581 ZLIB_GZIP_HEADER, /* reading gzip header */
582 ZLIB_GZIP_INFLATING, /* inflating gzip stream */
583 ZLIB_INIT_GZIP /* initialized in transparent gzip mode */
584} zlibInitState;
585#endif
586
587#ifdef CURLRES_ASYNCH
588struct Curl_async {
589 char *hostname;
590 int port;
591 struct Curl_dns_entry *dns;
592 bool done; /* set TRUE when the lookup is complete */
593 int status; /* if done is TRUE, this is the status from the callback */
594 void *os_specific; /* 'struct thread_data' for Windows */
595};
596#endif
597
598#define FIRSTSOCKET 0
599#define SECONDARYSOCKET 1
600
601/* These function pointer types are here only to allow easier typecasting
602 within the source when we need to cast between data pointers (such as NULL)
603 and function pointers. */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100604typedef CURLcode (*Curl_do_more_func)(struct connectdata *, int *);
9487f7f2011-08-03 07:05:30 -0700605typedef CURLcode (*Curl_done_func)(struct connectdata *, CURLcode, bool);
606
9487f7f2011-08-03 07:05:30 -0700607enum expect100 {
608 EXP100_SEND_DATA, /* enough waiting, just send the body now */
609 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */
610 EXP100_SENDING_REQUEST, /* still sending the request but will wait for
611 the 100 header once done with the request */
612 EXP100_FAILED /* used on 417 Expectation Failed */
613};
614
Dirk Vogta7d7f962016-12-01 10:50:48 +0100615enum upgrade101 {
616 UPGR101_INIT, /* default state */
617 UPGR101_REQUESTED, /* upgrade requested */
618 UPGR101_RECEIVED, /* response received */
619 UPGR101_WORKING /* talking upgraded protocol */
620};
621
9487f7f2011-08-03 07:05:30 -0700622/*
Dirk Vogta7d7f962016-12-01 10:50:48 +0100623 * Request specific data in the easy handle (Curl_easy). Previously,
9487f7f2011-08-03 07:05:30 -0700624 * these members were on the connectdata struct but since a conn struct may
Dirk Vogta7d7f962016-12-01 10:50:48 +0100625 * now be shared between different Curl_easys, we store connection-specific
9487f7f2011-08-03 07:05:30 -0700626 * data here. This struct only keeps stuff that's interesting for *this*
627 * request, as it will be cleared between multiple ones
628 */
629struct SingleRequest {
630 curl_off_t size; /* -1 if unknown at this point */
631 curl_off_t *bytecountp; /* return number of bytes read or NULL */
632
633 curl_off_t maxdownload; /* in bytes, the maximum amount of data to fetch,
634 -1 means unlimited */
635 curl_off_t *writebytecountp; /* return number of bytes written or NULL */
636
637 curl_off_t bytecount; /* total number of bytes read */
638 curl_off_t writebytecount; /* number of bytes written */
639
640 long headerbytecount; /* only count received headers */
641 long deductheadercount; /* this amount of bytes doesn't count when we check
Dirk Vogta7d7f962016-12-01 10:50:48 +0100642 if anything has been transferred at the end of a
9487f7f2011-08-03 07:05:30 -0700643 connection. We use this counter to make only a
644 100 reply (without a following second response
645 code) result in a CURLE_GOT_NOTHING error code */
646
647 struct timeval start; /* transfer started at this time */
648 struct timeval now; /* current time */
649 bool header; /* incoming data has HTTP header */
650 enum {
651 HEADER_NORMAL, /* no bad header at all */
652 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest
653 is normal data */
654 HEADER_ALLBAD /* all was believed to be header */
655 } badheader; /* the header was deemed bad and will be
656 written as body */
657 int headerline; /* counts header lines to better track the
658 first one */
659 char *hbufp; /* points at *end* of header line */
660 size_t hbuflen;
661 char *str; /* within buf */
662 char *str_start; /* within buf */
663 char *end_ptr; /* within buf */
664 char *p; /* within headerbuff */
665 bool content_range; /* set TRUE if Content-Range: was found */
666 curl_off_t offset; /* possible resume offset read from the
667 Content-Range: header */
668 int httpcode; /* error code from the 'HTTP/1.? XXX' or
669 'RTSP/1.? XXX' line */
670 struct timeval start100; /* time stamp to wait for the 100 code from */
671 enum expect100 exp100; /* expect 100 continue state */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100672 enum upgrade101 upgr101; /* 101 upgrade state */
9487f7f2011-08-03 07:05:30 -0700673
Dirk Vogta7d7f962016-12-01 10:50:48 +0100674 int auto_decoding; /* What content encoding. sec 3.5, RFC2616. */
9487f7f2011-08-03 07:05:30 -0700675
676#define IDENTITY 0 /* No encoding */
677#define DEFLATE 1 /* zlib deflate [RFC 1950 & 1951] */
678#define GZIP 2 /* gzip algorithm [RFC 1952] */
9487f7f2011-08-03 07:05:30 -0700679
680#ifdef HAVE_LIBZ
681 zlibInitState zlib_init; /* possible zlib init state;
682 undefined if Content-Encoding header. */
683 z_stream z; /* State structure for zlib. */
684#endif
685
686 time_t timeofdoc;
687 long bodywrites;
688
689 char *buf;
690 char *uploadbuf;
691 curl_socket_t maxfd;
692
693 int keepon;
694
695 bool upload_done; /* set to TRUE when doing chunked transfer-encoding upload
696 and we're uploading the last chunk */
697
698 bool ignorebody; /* we read a response-body but we ignore it! */
699 bool ignorecl; /* This HTTP response has no body so we ignore the Content-
700 Length: header */
701
702 char *location; /* This points to an allocated version of the Location:
703 header data */
704 char *newurl; /* Set to the new URL to use when a redirect or a retry is
705 wanted */
706
707 /* 'upload_present' is used to keep a byte counter of how much data there is
708 still left in the buffer, aimed for upload. */
709 ssize_t upload_present;
710
711 /* 'upload_fromhere' is used as a read-pointer when we uploaded parts of a
712 buffer, so the next read should read from where this pointer points to,
713 and the 'upload_present' contains the number of bytes available at this
714 position */
715 char *upload_fromhere;
716
717 bool chunk; /* if set, this is a chunked transfer-encoding */
718 bool upload_chunky; /* set TRUE if we are doing chunked transfer-encoding
719 on upload */
720 bool getheader; /* TRUE if header parsing is wanted */
721
722 bool forbidchunk; /* used only to explicitly forbid chunk-upload for
723 specific upload buffers. See readmoredata() in
724 http.c for details. */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100725
726 void *protop; /* Allocated protocol-specific data. Each protocol
727 handler makes sure this points to data it needs. */
9487f7f2011-08-03 07:05:30 -0700728};
729
730/*
731 * Specific protocol handler.
732 */
733
734struct Curl_handler {
735 const char * scheme; /* URL scheme name. */
736
737 /* Complement to setup_connection_internals(). */
738 CURLcode (*setup_connection)(struct connectdata *);
739
740 /* These two functions MUST be set to be protocol dependent */
741 CURLcode (*do_it)(struct connectdata *, bool *done);
742 Curl_done_func done;
743
744 /* If the curl_do() function is better made in two halves, this
745 * curl_do_more() function will be called afterwards, if set. For example
746 * for doing the FTP stuff after the PASV/PORT command.
747 */
748 Curl_do_more_func do_more;
749
750 /* This function *MAY* be set to a protocol-dependent function that is run
751 * after the connect() and everything is done, as a step in the connection.
752 * The 'done' pointer points to a bool that should be set to TRUE if the
753 * function completes before return. If it doesn't complete, the caller
754 * should call the curl_connecting() function until it is.
755 */
756 CURLcode (*connect_it)(struct connectdata *, bool *done);
757
758 /* See above. Currently only used for FTP. */
759 CURLcode (*connecting)(struct connectdata *, bool *done);
760 CURLcode (*doing)(struct connectdata *, bool *done);
761
762 /* Called from the multi interface during the PROTOCONNECT phase, and it
763 should then return a proper fd set */
764 int (*proto_getsock)(struct connectdata *conn,
765 curl_socket_t *socks,
766 int numsocks);
767
768 /* Called from the multi interface during the DOING phase, and it should
769 then return a proper fd set */
770 int (*doing_getsock)(struct connectdata *conn,
771 curl_socket_t *socks,
772 int numsocks);
773
Dirk Vogta7d7f962016-12-01 10:50:48 +0100774 /* Called from the multi interface during the DO_MORE phase, and it should
775 then return a proper fd set */
776 int (*domore_getsock)(struct connectdata *conn,
777 curl_socket_t *socks,
778 int numsocks);
779
9487f7f2011-08-03 07:05:30 -0700780 /* Called from the multi interface during the DO_DONE, PERFORM and
781 WAITPERFORM phases, and it should then return a proper fd set. Not setting
782 this will make libcurl use the generic default one. */
783 int (*perform_getsock)(const struct connectdata *conn,
784 curl_socket_t *socks,
785 int numsocks);
786
787 /* This function *MAY* be set to a protocol-dependent function that is run
788 * by the curl_disconnect(), as a step in the disconnection. If the handler
789 * is called because the connection has been considered dead, dead_connection
790 * is set to TRUE.
791 */
792 CURLcode (*disconnect)(struct connectdata *, bool dead_connection);
793
Dirk Vogta7d7f962016-12-01 10:50:48 +0100794 /* If used, this function gets called from transfer.c:readwrite_data() to
795 allow the protocol to do extra reads/writes */
796 CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
797 ssize_t *nread, bool *readmore);
798
799 long defport; /* Default port. */
800 unsigned int protocol; /* See CURLPROTO_* - this needs to be the single
801 specific protocol bit */
802 unsigned int flags; /* Extra particular characteristics, see PROTOPT_* */
9487f7f2011-08-03 07:05:30 -0700803};
804
Dirk Vogta7d7f962016-12-01 10:50:48 +0100805#define PROTOPT_NONE 0 /* nothing extra */
806#define PROTOPT_SSL (1<<0) /* uses SSL */
807#define PROTOPT_DUAL (1<<1) /* this protocol uses two connections */
808#define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */
809/* some protocols will have to call the underlying functions without regard to
810 what exact state the socket signals. IE even if the socket says "readable",
811 the send function might need to be called while uploading, or vice versa.
812*/
813#define PROTOPT_DIRLOCK (1<<3)
814#define PROTOPT_NONETWORK (1<<4) /* protocol doesn't use the network! */
815#define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it
816 gets a default */
817#define PROTOPT_NOURLQUERY (1<<6) /* protocol can't handle
818 url query strings (?foo=bar) ! */
819#define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per
820 request instead of per connection */
821#define PROTOPT_ALPN_NPN (1<<8) /* set ALPN and/or NPN for this */
822#define PROTOPT_STREAM (1<<9) /* a protocol with individual logical streams */
823
9487f7f2011-08-03 07:05:30 -0700824/* return the count of bytes sent, or -1 on error */
825typedef ssize_t (Curl_send)(struct connectdata *conn, /* connection data */
826 int sockindex, /* socketindex */
827 const void *buf, /* data to write */
828 size_t len, /* max amount to write */
829 CURLcode *err); /* error to return */
830
831/* return the count of bytes read, or -1 on error */
832typedef ssize_t (Curl_recv)(struct connectdata *conn, /* connection data */
833 int sockindex, /* socketindex */
834 char *buf, /* store data here */
835 size_t len, /* max amount to read */
836 CURLcode *err); /* error to return */
837
Dirk Vogta7d7f962016-12-01 10:50:48 +0100838#ifdef USE_RECV_BEFORE_SEND_WORKAROUND
839struct postponed_data {
840 char *buffer; /* Temporal store for received data during
841 sending, must be freed */
842 size_t allocated_size; /* Size of temporal store */
843 size_t recv_size; /* Size of received data during sending */
844 size_t recv_processed; /* Size of processed part of postponed data */
845#ifdef DEBUGBUILD
846 curl_socket_t bindsock;/* Structure must be bound to specific socket,
847 used only for DEBUGASSERT */
848#endif /* DEBUGBUILD */
849};
850#endif /* USE_RECV_BEFORE_SEND_WORKAROUND */
851
9487f7f2011-08-03 07:05:30 -0700852/*
853 * The connectdata struct contains all fields and variables that should be
854 * unique for an entire connection.
855 */
856struct connectdata {
Dirk Vogta7d7f962016-12-01 10:50:48 +0100857 /* 'data' is the CURRENT Curl_easy using this connection -- take great
9487f7f2011-08-03 07:05:30 -0700858 caution that this might very well vary between different times this
859 connection is used! */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100860 struct Curl_easy *data;
9487f7f2011-08-03 07:05:30 -0700861
862 /* chunk is for HTTP chunked encoding, but is in the general connectdata
863 struct only because we can do just about any protocol through a HTTP proxy
864 and a HTTP proxy may in fact respond using chunked encoding */
865 struct Curl_chunker chunk;
866
Dirk Vogta7d7f962016-12-01 10:50:48 +0100867 curl_closesocket_callback fclosesocket; /* function closing the socket(s) */
868 void *closesocket_client;
869
9487f7f2011-08-03 07:05:30 -0700870 bool inuse; /* This is a marker for the connection cache logic. If this is
871 TRUE this handle is being used by an easy handle and cannot
872 be used by any other easy handle without careful
873 consideration (== only for pipelining). */
874
875 /**** Fields set when inited and not modified again */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100876 long connection_id; /* Contains a unique number to make it easier to
877 track the connections in the log output */
9487f7f2011-08-03 07:05:30 -0700878
879 /* 'dns_entry' is the particular host we use. This points to an entry in the
880 DNS cache and it will not get pruned while locked. It gets unlocked in
881 Curl_done(). This entry will be NULL if the connection is re-used as then
882 there is no name resolve done. */
883 struct Curl_dns_entry *dns_entry;
884
885 /* 'ip_addr' is the particular IP we connected to. It points to a struct
886 within the DNS cache, so this pointer is only valid as long as the DNS
887 cache entry remains locked. It gets unlocked in Curl_done() */
888 Curl_addrinfo *ip_addr;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100889 Curl_addrinfo *tempaddr[2]; /* for happy eyeballs */
9487f7f2011-08-03 07:05:30 -0700890
891 /* 'ip_addr_str' is the ip_addr data as a human readable string.
892 It remains available as long as the connection does, which is longer than
893 the ip_addr itself. */
894 char ip_addr_str[MAX_IPADR_LEN];
895
Dirk Vogta7d7f962016-12-01 10:50:48 +0100896 unsigned int scope_id; /* Scope id for IPv6 */
9487f7f2011-08-03 07:05:30 -0700897
898 int socktype; /* SOCK_STREAM or SOCK_DGRAM */
899
900 struct hostname host;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100901 struct hostname conn_to_host; /* the host to connect to. valid only if
902 bits.conn_to_host is set */
9487f7f2011-08-03 07:05:30 -0700903 struct hostname proxy;
904
905 long port; /* which port to use locally */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100906 int remote_port; /* the remote port, not the proxy port! */
907 int conn_to_port; /* the remote port to connect to. valid only if
908 bits.conn_to_port is set */
9487f7f2011-08-03 07:05:30 -0700909
910 /* 'primary_ip' and 'primary_port' get filled with peer's numerical
911 ip address and port number whenever an outgoing connection is
Dirk Vogta7d7f962016-12-01 10:50:48 +0100912 *attempted* from the primary socket to a remote address. When more
9487f7f2011-08-03 07:05:30 -0700913 than one address is tried for a connection these will hold data
Dirk Vogta7d7f962016-12-01 10:50:48 +0100914 for the last attempt. When the connection is actually established
9487f7f2011-08-03 07:05:30 -0700915 these are updated with data which comes directly from the socket. */
916
917 char primary_ip[MAX_IPADR_LEN];
918 long primary_port;
919
920 /* 'local_ip' and 'local_port' get filled with local's numerical
921 ip address and port number whenever an outgoing connection is
922 **established** from the primary socket to a remote address. */
923
924 char local_ip[MAX_IPADR_LEN];
925 long local_port;
926
927 char *user; /* user name string, allocated */
928 char *passwd; /* password string, allocated */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100929 char *options; /* options string, allocated */
930
931 char *oauth_bearer; /* bearer token for OAuth 2.0, allocated */
9487f7f2011-08-03 07:05:30 -0700932
933 char *proxyuser; /* proxy user name string, allocated */
934 char *proxypasswd; /* proxy password string, allocated */
935 curl_proxytype proxytype; /* what kind of proxy that is in use */
936
937 int httpversion; /* the HTTP version*10 reported by the server */
938 int rtspversion; /* the RTSP version*10 reported by the server */
939
940 struct timeval now; /* "current" time */
941 struct timeval created; /* creation time */
942 curl_socket_t sock[2]; /* two sockets, the second is used for the data
943 transfer when doing FTP */
Dirk Vogta7d7f962016-12-01 10:50:48 +0100944 curl_socket_t tempsock[2]; /* temporary sockets for happy eyeballs */
945 bool sock_accepted[2]; /* TRUE if the socket on this index was created with
946 accept() */
9487f7f2011-08-03 07:05:30 -0700947 Curl_recv *recv[2];
948 Curl_send *send[2];
949
Dirk Vogta7d7f962016-12-01 10:50:48 +0100950#ifdef USE_RECV_BEFORE_SEND_WORKAROUND
951 struct postponed_data postponed[2]; /* two buffers for two sockets */
952#endif /* USE_RECV_BEFORE_SEND_WORKAROUND */
9487f7f2011-08-03 07:05:30 -0700953 struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */
954 struct ssl_config_data ssl_config;
Dirk Vogta7d7f962016-12-01 10:50:48 +0100955 bool tls_upgraded;
9487f7f2011-08-03 07:05:30 -0700956
957 struct ConnectBits bits; /* various state-flags for this connection */
958
Dirk Vogta7d7f962016-12-01 10:50:48 +0100959 /* connecttime: when connect() is called on the current IP address. Used to
960 be able to track when to move on to try next IP - but only when the multi
961 interface is used. */
962 struct timeval connecttime;
963 /* The two fields below get set in Curl_connecthost */
964 int num_addr; /* number of addresses to try to connect to */
965 long timeoutms_per_addr; /* how long time in milliseconds to spend on
966 trying to connect to each IP address */
9487f7f2011-08-03 07:05:30 -0700967
Dirk Vogta7d7f962016-12-01 10:50:48 +0100968 const struct Curl_handler *handler; /* Connection's protocol handler */
969 const struct Curl_handler *given; /* The protocol first given */
970
971 long ip_version; /* copied from the Curl_easy at creation time */
9487f7f2011-08-03 07:05:30 -0700972
973 /**** curl_get() phase fields */
974
975 curl_socket_t sockfd; /* socket to read from or CURL_SOCKET_BAD */
976 curl_socket_t writesockfd; /* socket to write to, it may very
977 well be the same we read from.
978 CURL_SOCKET_BAD disables */
979
Dirk Vogta7d7f962016-12-01 10:50:48 +0100980 /** Dynamicly allocated strings, MUST be freed before this **/
981 /** struct is killed. **/
9487f7f2011-08-03 07:05:30 -0700982 struct dynamically_allocated_data {
Dirk Vogta7d7f962016-12-01 10:50:48 +0100983 char *proxyuserpwd;
984 char *uagent;
985 char *accept_encoding;
986 char *userpwd;
987 char *rangeline;
988 char *ref;
989 char *host;
990 char *cookiehost;
991 char *rtsp_transport;
992 char *te; /* TE: request header */
9487f7f2011-08-03 07:05:30 -0700993 } allocptr;
994
Dirk Vogta7d7f962016-12-01 10:50:48 +0100995#ifdef HAVE_GSSAPI
996 int sec_complete; /* if Kerberos is enabled for this connection */
9487f7f2011-08-03 07:05:30 -0700997 enum protection_level command_prot;
998 enum protection_level data_prot;
999 enum protection_level request_data_prot;
1000 size_t buffer_size;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001001 struct krb5buffer in_buffer;
9487f7f2011-08-03 07:05:30 -07001002 void *app_data;
1003 const struct Curl_sec_client_mech *mech;
1004 struct sockaddr_in local_addr;
1005#endif
1006
Dirk Vogta7d7f962016-12-01 10:50:48 +01001007#if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */
1008 struct kerberos5data krb5; /* variables into the structure definition, */
1009#endif /* however, some of them are ftp specific. */
1010
9487f7f2011-08-03 07:05:30 -07001011 /* the two following *_inuse fields are only flags, not counters in any way.
1012 If TRUE it means the channel is in use, and if FALSE it means the channel
1013 is up for grabs by one. */
1014
1015 bool readchannel_inuse; /* whether the read channel is in use by an easy
1016 handle */
1017 bool writechannel_inuse; /* whether the write channel is in use by an easy
1018 handle */
9487f7f2011-08-03 07:05:30 -07001019 struct curl_llist *send_pipe; /* List of handles waiting to
1020 send on this pipeline */
1021 struct curl_llist *recv_pipe; /* List of handles waiting to read
1022 their responses on this pipeline */
9487f7f2011-08-03 07:05:30 -07001023 char* master_buffer; /* The master buffer allocated on-demand;
1024 used for pipelining. */
1025 size_t read_pos; /* Current read position in the master buffer */
1026 size_t buf_len; /* Length of the buffer?? */
1027
1028
1029 curl_seek_callback seek_func; /* function that seeks the input */
1030 void *seek_client; /* pointer to pass to the seek() above */
1031
1032 /*************** Request - specific items ************/
1033
Dirk Vogta7d7f962016-12-01 10:50:48 +01001034#if defined(USE_NTLM)
9487f7f2011-08-03 07:05:30 -07001035 struct ntlmdata ntlm; /* NTLM differs from other authentication schemes
1036 because it authenticates connections, not
1037 single requests! */
1038 struct ntlmdata proxyntlm; /* NTLM data for proxy */
1039
Dirk Vogta7d7f962016-12-01 10:50:48 +01001040#if defined(NTLM_WB_ENABLED)
1041 /* used for communication with Samba's winbind daemon helper ntlm_auth */
1042 curl_socket_t ntlm_auth_hlpr_socket;
1043 pid_t ntlm_auth_hlpr_pid;
1044 char* challenge_header;
1045 char* response_header;
1046#endif
1047#endif
1048
9487f7f2011-08-03 07:05:30 -07001049 char syserr_buf [256]; /* buffer for Curl_strerror() */
1050
1051#ifdef CURLRES_ASYNCH
1052 /* data used for the asynch name resolve callback */
1053 struct Curl_async async;
1054#endif
1055
1056 /* These three are used for chunked-encoding trailer support */
1057 char *trailer; /* allocated buffer to store trailer in */
1058 int trlMax; /* allocated buffer size */
1059 int trlPos; /* index of where to store data */
1060
1061 union {
1062 struct ftp_conn ftpc;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001063 struct http_conn httpc;
9487f7f2011-08-03 07:05:30 -07001064 struct ssh_conn sshc;
1065 struct tftp_state_data *tftpc;
1066 struct imap_conn imapc;
1067 struct pop3_conn pop3c;
1068 struct smtp_conn smtpc;
1069 struct rtsp_conn rtspc;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001070 struct smb_conn smbc;
1071 void *generic; /* RTMP and LDAP use this */
9487f7f2011-08-03 07:05:30 -07001072 } proto;
1073
1074 int cselect_bits; /* bitmask of socket events */
1075 int waitfor; /* current READ/WRITE bits to wait for */
1076
1077#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
1078 int socks5_gssapi_enctype;
1079#endif
1080
Dirk Vogta7d7f962016-12-01 10:50:48 +01001081 bool verifypeer;
1082 bool verifyhost;
1083
1084 /* When this connection is created, store the conditions for the local end
1085 bind. This is stored before the actual bind and before any connection is
1086 made and will serve the purpose of being used for comparison reasons so
1087 that subsequent bound-requested connections aren't accidentally re-using
1088 wrong connections. */
1089 char *localdev;
1090 unsigned short localport;
1091 int localportrange;
1092
1093 /* tunnel as in tunnel through a HTTP proxy with CONNECT */
1094 enum {
1095 TUNNEL_INIT, /* init/default/no tunnel state */
1096 TUNNEL_CONNECT, /* CONNECT has been sent off */
1097 TUNNEL_COMPLETE /* CONNECT response received completely */
1098 } tunnel_state[2]; /* two separate ones to allow FTP */
1099 struct connectbundle *bundle; /* The bundle we are member of */
1100
1101 int negnpn; /* APLN or NPN TLS negotiated protocol, CURL_HTTP_VERSION* */
9487f7f2011-08-03 07:05:30 -07001102};
1103
1104/* The end of connectdata. */
1105
1106/*
1107 * Struct to keep statistical and informational data.
Dirk Vogta7d7f962016-12-01 10:50:48 +01001108 * All variables in this struct must be reset in Curl_initinfo().
9487f7f2011-08-03 07:05:30 -07001109 */
1110struct PureInfo {
Dirk Vogta7d7f962016-12-01 10:50:48 +01001111 int httpcode; /* Recent HTTP, FTP, RTSP or SMTP response code */
9487f7f2011-08-03 07:05:30 -07001112 int httpproxycode; /* response code from proxy when received separate */
1113 int httpversion; /* the http version number X.Y = X*10+Y */
1114 long filetime; /* If requested, this is might get set. Set to -1 if the time
1115 was unretrievable. We cannot have this of type time_t,
1116 since time_t is unsigned on several platforms such as
1117 OpenVMS. */
1118 bool timecond; /* set to TRUE if the time condition didn't match, which
1119 thus made the document NOT get fetched */
1120 long header_size; /* size of read header(s) in bytes */
1121 long request_size; /* the amount of bytes sent in the request(s) */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001122 unsigned long proxyauthavail; /* what proxy auth types were announced */
1123 unsigned long httpauthavail; /* what host auth types were announced */
9487f7f2011-08-03 07:05:30 -07001124 long numconnects; /* how many new connection did libcurl created */
1125 char *contenttype; /* the content type of the object */
1126 char *wouldredirect; /* URL this would've been redirected to if asked to */
1127
1128 /* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip'
1129 and, 'conn_local_port' are copied over from the connectdata struct in
1130 order to allow curl_easy_getinfo() to return this information even when
1131 the session handle is no longer associated with a connection, and also
1132 allow curl_easy_reset() to clear this information from the session handle
1133 without disturbing information which is still alive, and that might be
1134 reused, in the connection cache. */
1135
1136 char conn_primary_ip[MAX_IPADR_LEN];
1137 long conn_primary_port;
1138
1139 char conn_local_ip[MAX_IPADR_LEN];
1140 long conn_local_port;
1141
1142 struct curl_certinfo certs; /* info about the certs, only populated in
1143 OpenSSL builds. Asked for with
1144 CURLOPT_CERTINFO / CURLINFO_CERTINFO */
1145};
1146
1147
1148struct Progress {
1149 long lastshow; /* time() of the last displayed progress meter or NULL to
1150 force redraw at next call */
1151 curl_off_t size_dl; /* total expected size */
1152 curl_off_t size_ul; /* total expected size */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001153 curl_off_t downloaded; /* transferred so far */
1154 curl_off_t uploaded; /* transferred so far */
9487f7f2011-08-03 07:05:30 -07001155
1156 curl_off_t current_speed; /* uses the currently fastest transfer */
1157
1158 bool callback; /* set when progress callback is used */
1159 int width; /* screen width at download start */
1160 int flags; /* see progress.h */
1161
1162 double timespent;
1163
1164 curl_off_t dlspeed;
1165 curl_off_t ulspeed;
1166
1167 double t_nslookup;
1168 double t_connect;
1169 double t_appconnect;
1170 double t_pretransfer;
1171 double t_starttransfer;
1172 double t_redirect;
1173
1174 struct timeval start;
1175 struct timeval t_startsingle;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001176 struct timeval t_startop;
1177 struct timeval t_acceptdata;
1178
1179 /* upload speed limit */
1180 struct timeval ul_limit_start;
1181 curl_off_t ul_limit_size;
1182 /* download speed limit */
1183 struct timeval dl_limit_start;
1184 curl_off_t dl_limit_size;
1185
9487f7f2011-08-03 07:05:30 -07001186#define CURR_TIME (5+1) /* 6 entries for 5 seconds */
1187
1188 curl_off_t speeder[ CURR_TIME ];
1189 struct timeval speeder_time[ CURR_TIME ];
1190 int speeder_c;
1191};
1192
1193typedef enum {
1194 HTTPREQ_NONE, /* first in list */
1195 HTTPREQ_GET,
1196 HTTPREQ_POST,
1197 HTTPREQ_POST_FORM, /* we make a difference internally */
1198 HTTPREQ_PUT,
1199 HTTPREQ_HEAD,
1200 HTTPREQ_CUSTOM,
1201 HTTPREQ_LAST /* last in list */
1202} Curl_HttpReq;
1203
1204typedef enum {
1205 RTSPREQ_NONE, /* first in list */
1206 RTSPREQ_OPTIONS,
1207 RTSPREQ_DESCRIBE,
1208 RTSPREQ_ANNOUNCE,
1209 RTSPREQ_SETUP,
1210 RTSPREQ_PLAY,
1211 RTSPREQ_PAUSE,
1212 RTSPREQ_TEARDOWN,
1213 RTSPREQ_GET_PARAMETER,
1214 RTSPREQ_SET_PARAMETER,
1215 RTSPREQ_RECORD,
1216 RTSPREQ_RECEIVE,
1217 RTSPREQ_LAST /* last in list */
1218} Curl_RtspReq;
1219
1220/*
1221 * Values that are generated, temporary or calculated internally for a
1222 * "session handle" must be defined within the 'struct UrlState'. This struct
Dirk Vogta7d7f962016-12-01 10:50:48 +01001223 * will be used within the Curl_easy struct. When the 'Curl_easy'
9487f7f2011-08-03 07:05:30 -07001224 * struct is cloned, this data MUST NOT be copied.
1225 *
1226 * Remember that any "state" information goes globally for the curl handle.
1227 * Session-data MUST be put in the connectdata struct and here. */
1228#define MAX_CURL_USER_LENGTH 256
1229#define MAX_CURL_PASSWORD_LENGTH 256
9487f7f2011-08-03 07:05:30 -07001230
1231struct auth {
Dirk Vogta7d7f962016-12-01 10:50:48 +01001232 unsigned long want; /* Bitmask set to the authentication methods wanted by
1233 app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */
1234 unsigned long picked;
1235 unsigned long avail; /* Bitmask for what the server reports to support for
1236 this resource */
9487f7f2011-08-03 07:05:30 -07001237 bool done; /* TRUE when the auth phase is done and ready to do the *actual*
1238 request */
1239 bool multi; /* TRUE if this is not yet authenticated but within the auth
1240 multipass negotiation */
1241 bool iestyle; /* TRUE if digest should be done IE-style or FALSE if it should
1242 be RFC compliant */
1243};
1244
9487f7f2011-08-03 07:05:30 -07001245struct UrlState {
9487f7f2011-08-03 07:05:30 -07001246
Dirk Vogta7d7f962016-12-01 10:50:48 +01001247 /* Points to the connection cache */
1248 struct conncache *conn_cache;
1249
1250 /* when curl_easy_perform() is called, the multi handle is "owned" by
1251 the easy handle so curl_easy_cleanup() on such an easy handle will
1252 also close the multi handle! */
1253 bool multi_owned_by_easy;
9487f7f2011-08-03 07:05:30 -07001254
1255 /* buffers to store authentication data in, as parsed from input options */
1256 struct timeval keeps_speed; /* for the progress meter really */
1257
Dirk Vogta7d7f962016-12-01 10:50:48 +01001258 struct connectdata *lastconnect; /* The last connection, NULL if undefined */
9487f7f2011-08-03 07:05:30 -07001259
1260 char *headerbuff; /* allocated buffer to store headers in */
1261 size_t headersize; /* size of the allocation */
1262
1263 char buffer[BUFSIZE+1]; /* download buffer */
1264 char uploadbuffer[BUFSIZE+1]; /* upload buffer */
1265 curl_off_t current_speed; /* the ProgressShow() funcion sets this,
1266 bytes / second */
1267 bool this_is_a_follow; /* this is a followed Location: request */
1268
Dirk Vogta7d7f962016-12-01 10:50:48 +01001269 char *first_host; /* host name of the first (not followed) request.
1270 if set, this should be the host name that we will
9487f7f2011-08-03 07:05:30 -07001271 sent authorization to, no else. Used to make Location:
1272 following not keep sending user+password... This is
1273 strdup() data.
1274 */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001275 int first_remote_port; /* remote port of the first (not followed) request */
1276 struct curl_ssl_session *session; /* array of 'max_ssl_sessions' size */
9487f7f2011-08-03 07:05:30 -07001277 long sessionage; /* number of the most recent session */
1278 char *tempwrite; /* allocated buffer to keep data in when a write
1279 callback returns to make the connection paused */
1280 size_t tempwritesize; /* size of the 'tempwrite' allocated buffer */
1281 int tempwritetype; /* type of the 'tempwrite' buffer as a bitmask that is
1282 used with Curl_client_write() */
1283 char *scratch; /* huge buffer[BUFSIZE*2] when doing upload CRLF replacing */
1284 bool errorbuf; /* Set to TRUE if the error buffer is already filled in.
1285 This must be set to FALSE every time _easy_perform() is
1286 called. */
1287 int os_errno; /* filled in with errno whenever an error occurs */
1288#ifdef HAVE_SIGNAL
1289 /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */
1290 void (*prev_signal)(int sig);
1291#endif
1292 bool allow_port; /* Is set.use_port allowed to take effect or not. This
1293 is always set TRUE when curl_easy_perform() is called. */
1294 struct digestdata digest; /* state data for host Digest auth */
1295 struct digestdata proxydigest; /* state data for proxy Digest auth */
1296
Dirk Vogta7d7f962016-12-01 10:50:48 +01001297#ifdef USE_SPNEGO
9487f7f2011-08-03 07:05:30 -07001298 struct negotiatedata negotiate; /* state data for host Negotiate auth */
1299 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
1300#endif
1301
1302 struct auth authhost; /* auth details for host */
1303 struct auth authproxy; /* auth details for proxy */
1304
1305 bool authproblem; /* TRUE if there's some problem authenticating */
1306
Dirk Vogta7d7f962016-12-01 10:50:48 +01001307 void *resolver; /* resolver state, if it is used in the URL state -
1308 ares_channel f.e. */
9487f7f2011-08-03 07:05:30 -07001309
Dirk Vogta7d7f962016-12-01 10:50:48 +01001310#if defined(USE_OPENSSL) && defined(HAVE_OPENSSL_ENGINE_H)
9487f7f2011-08-03 07:05:30 -07001311 ENGINE *engine;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001312#endif /* USE_OPENSSL */
9487f7f2011-08-03 07:05:30 -07001313 struct timeval expiretime; /* set this with Curl_expire() only */
1314 struct Curl_tree timenode; /* for the splay stuff */
1315 struct curl_llist *timeoutlist; /* list of pending timeouts */
1316
1317 /* a place to store the most recently set FTP entrypath */
1318 char *most_recent_ftp_entrypath;
1319
1320 /* set after initial USER failure, to prevent an authentication loop */
1321 bool ftp_trying_alternative;
1322
1323 int httpversion; /* the lowest HTTP version*10 reported by any server
1324 involved in this request */
1325 bool expect100header; /* TRUE if we added Expect: 100-continue */
1326
1327 bool pipe_broke; /* TRUE if the connection we were pipelined on broke
1328 and we need to restart from the beginning */
1329
1330#if !defined(WIN32) && !defined(MSDOS) && !defined(__EMX__) && \
1331 !defined(__SYMBIAN32__)
1332/* do FTP line-end conversions on most platforms */
1333#define CURL_DO_LINEEND_CONV
1334 /* for FTP downloads: track CRLF sequences that span blocks */
1335 bool prev_block_had_trailing_cr;
1336 /* for FTP downloads: how many CRLFs did we converted to LFs? */
1337 curl_off_t crlf_conversions;
1338#endif
9487f7f2011-08-03 07:05:30 -07001339 char *pathbuffer;/* allocated buffer to store the URL's path part in */
1340 char *path; /* path to use, points to somewhere within the pathbuffer
1341 area */
1342 bool slash_removed; /* set TRUE if the 'path' points to a path where the
1343 initial URL slash separator has been taken off */
1344 bool use_range;
1345 bool rangestringalloc; /* the range string is malloc()'ed */
1346
1347 char *range; /* range, if used. See README for detailed specification on
1348 this syntax. */
1349 curl_off_t resume_from; /* continue [ftp] transfer from here */
1350
1351 /* This RTSP state information survives requests and connections */
1352 long rtsp_next_client_CSeq; /* the session's next client CSeq */
1353 long rtsp_next_server_CSeq; /* the session's next server CSeq */
1354 long rtsp_CSeq_recv; /* most recent CSeq received */
1355
Dirk Vogta7d7f962016-12-01 10:50:48 +01001356 curl_off_t infilesize; /* size of file to upload, -1 means unknown.
1357 Copied from set.filesize at start of operation */
9487f7f2011-08-03 07:05:30 -07001358
Dirk Vogta7d7f962016-12-01 10:50:48 +01001359 size_t drain; /* Increased when this stream has data to read, even if its
1360 socket is not necessarily is readable. Decreased when
1361 checked. */
1362 bool done; /* set to FALSE when Curl_init_do() is called and set to TRUE
1363 when multi_done() is called, to prevent multi_done() to get
1364 invoked twice when the multi interface is used. */
1365
1366 curl_read_callback fread_func; /* read callback/function */
1367 void *in; /* CURLOPT_READDATA */
1368
1369 struct Curl_easy *stream_depends_on;
1370 bool stream_depends_e; /* set or don't set the Exclusive bit */
1371 int stream_weight;
9487f7f2011-08-03 07:05:30 -07001372};
1373
1374
1375/*
1376 * This 'DynamicStatic' struct defines dynamic states that actually change
1377 * values in the 'UserDefined' area, which MUST be taken into consideration
1378 * if the UserDefined struct is cloned or similar. You can probably just
1379 * copy these, but each one indicate a special action on other data.
1380 */
1381
1382struct DynamicStatic {
1383 char *url; /* work URL, copied from UserDefined */
1384 bool url_alloc; /* URL string is malloc()'ed */
1385 char *referer; /* referer string */
1386 bool referer_alloc; /* referer sting is malloc()ed */
1387 struct curl_slist *cookielist; /* list of cookie files set by
1388 curl_easy_setopt(COOKIEFILE) calls */
1389 struct curl_slist *resolve; /* set to point to the set.resolve list when
1390 this should be dealt with in pretransfer */
1391};
1392
1393/*
1394 * This 'UserDefined' struct must only contain data that is set once to go
1395 * for many (perhaps) independent connections. Values that are generated or
1396 * calculated internally for the "session handle" MUST be defined within the
1397 * 'struct UrlState' instead. The only exceptions MUST note the changes in
1398 * the 'DynamicStatic' struct.
1399 * Character pointer fields point to dynamic storage, unless otherwise stated.
1400 */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001401
9487f7f2011-08-03 07:05:30 -07001402struct Curl_multi; /* declared and used only in multi.c */
1403
1404enum dupstring {
1405 STRING_CERT, /* client certificate file name */
1406 STRING_CERT_TYPE, /* format for certificate (default: PEM)*/
1407 STRING_COOKIE, /* HTTP cookie string to send */
1408 STRING_COOKIEJAR, /* dump all cookies to this file */
1409 STRING_CUSTOMREQUEST, /* HTTP/FTP/RTSP request/method to use */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001410 STRING_DEFAULT_PROTOCOL, /* Protocol to use when the URL doesn't specify */
9487f7f2011-08-03 07:05:30 -07001411 STRING_DEVICE, /* local network interface/address to use */
1412 STRING_ENCODING, /* Accept-Encoding string */
1413 STRING_FTP_ACCOUNT, /* ftp account data */
1414 STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */
1415 STRING_FTPPORT, /* port to send with the FTP PORT command */
1416 STRING_KEY, /* private key file name */
1417 STRING_KEY_PASSWD, /* plain text private key password */
1418 STRING_KEY_TYPE, /* format for private key (default: PEM) */
1419 STRING_KRB_LEVEL, /* krb security level */
1420 STRING_NETRC_FILE, /* if not NULL, use this instead of trying to find
1421 $HOME/.netrc */
9487f7f2011-08-03 07:05:30 -07001422 STRING_PROXY, /* proxy to use */
1423 STRING_SET_RANGE, /* range, if used */
1424 STRING_SET_REFERER, /* custom string for the HTTP referer field */
1425 STRING_SET_URL, /* what original URL to work on */
1426 STRING_SSL_CAPATH, /* CA directory name (doesn't work on windows) */
1427 STRING_SSL_CAFILE, /* certificate file to verify peer against */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001428 STRING_SSL_PINNEDPUBLICKEY, /* public key file to verify peer against */
9487f7f2011-08-03 07:05:30 -07001429 STRING_SSL_CIPHER_LIST, /* list of ciphers to use */
1430 STRING_SSL_EGDSOCKET, /* path to file containing the EGD daemon socket */
1431 STRING_SSL_RANDOM_FILE, /* path to file containing "random" data */
1432 STRING_USERAGENT, /* User-Agent string */
1433 STRING_SSL_CRLFILE, /* crl file to check certificate */
1434 STRING_SSL_ISSUERCERT, /* issuer cert file to check certificate */
1435 STRING_USERNAME, /* <username>, if used */
1436 STRING_PASSWORD, /* <password>, if used */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001437 STRING_OPTIONS, /* <options>, if used */
9487f7f2011-08-03 07:05:30 -07001438 STRING_PROXYUSERNAME, /* Proxy <username>, if used */
1439 STRING_PROXYPASSWORD, /* Proxy <password>, if used */
1440 STRING_NOPROXY, /* List of hosts which should not use the proxy, if
1441 used */
1442 STRING_RTSP_SESSION_ID, /* Session ID to use */
1443 STRING_RTSP_STREAM_URI, /* Stream URI for this request */
1444 STRING_RTSP_TRANSPORT, /* Transport for this session */
1445#ifdef USE_LIBSSH2
1446 STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */
1447 STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */
1448 STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */
1449 STRING_SSH_KNOWNHOSTS, /* file name of knownhosts file */
1450#endif
1451#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
Dirk Vogta7d7f962016-12-01 10:50:48 +01001452 STRING_PROXY_SERVICE_NAME, /* Proxy service name */
1453#endif
1454#if !defined(CURL_DISABLE_CRYPTO_AUTH) || defined(USE_KERBEROS5) || \
1455 defined(USE_SPNEGO)
1456 STRING_SERVICE_NAME, /* Service name */
9487f7f2011-08-03 07:05:30 -07001457#endif
1458 STRING_MAIL_FROM,
Dirk Vogta7d7f962016-12-01 10:50:48 +01001459 STRING_MAIL_AUTH,
9487f7f2011-08-03 07:05:30 -07001460
Dirk Vogta7d7f962016-12-01 10:50:48 +01001461#ifdef USE_TLS_SRP
1462 STRING_TLSAUTH_USERNAME, /* TLS auth <username> */
1463 STRING_TLSAUTH_PASSWORD, /* TLS auth <password> */
1464#endif
1465 STRING_BEARER, /* <bearer>, if used */
1466#ifdef USE_UNIX_SOCKETS
1467 STRING_UNIX_SOCKET_PATH, /* path to Unix socket, if used */
1468#endif
1469
1470 /* -- end of zero-terminated strings -- */
1471
1472 STRING_LASTZEROTERMINATED,
1473
1474 /* -- below this are pointers to binary data that cannot be strdup'ed.
1475 Each such pointer must be added manually to Curl_dupset() --- */
1476
1477 STRING_COPYPOSTFIELDS, /* if POST, set the fields' values here */
1478
9487f7f2011-08-03 07:05:30 -07001479 STRING_LAST /* not used, just an end-of-list marker */
1480};
1481
1482struct UserDefined {
1483 FILE *err; /* the stderr user data goes here */
1484 void *debugdata; /* the data that will be passed to fdebug */
1485 char *errorbuffer; /* (Static) store failure messages in here */
1486 long proxyport; /* If non-zero, use this port number by default. If the
1487 proxy string features a ":[port]" that one will override
1488 this. */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001489 void *out; /* CURLOPT_WRITEDATA */
1490 void *in_set; /* CURLOPT_READDATA */
9487f7f2011-08-03 07:05:30 -07001491 void *writeheader; /* write the header to this if non-NULL */
1492 void *rtp_out; /* write RTP to this if non-NULL */
1493 long use_port; /* which port to use (when not using default) */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001494 unsigned long httpauth; /* kind of HTTP authentication to use (bitmask) */
1495 unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */
9487f7f2011-08-03 07:05:30 -07001496 long followlocation; /* as in HTTP Location: */
1497 long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1
1498 for infinity */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001499
1500 int keep_post; /* keep POSTs as POSTs after a 30x request; each
1501 bit represents a request, from 301 to 303 */
9487f7f2011-08-03 07:05:30 -07001502 bool free_referer; /* set TRUE if 'referer' points to a string we
1503 allocated */
1504 void *postfields; /* if POST, set the fields' values here */
1505 curl_seek_callback seek_func; /* function that seeks the input */
1506 curl_off_t postfieldsize; /* if POST, this might have a size to use instead
1507 of strlen(), and then the data *may* be binary
1508 (contain zero bytes) */
1509 unsigned short localport; /* local port number to bind to */
1510 int localportrange; /* number of additional port numbers to test in case the
1511 'localport' one can't be bind()ed */
1512 curl_write_callback fwrite_func; /* function that stores the output */
1513 curl_write_callback fwrite_header; /* function that stores headers */
1514 curl_write_callback fwrite_rtp; /* function that stores interleaved RTP */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001515 curl_read_callback fread_func_set; /* function that reads the input */
9487f7f2011-08-03 07:05:30 -07001516 int is_fread_set; /* boolean, has read callback been set to non-NULL? */
1517 int is_fwrite_set; /* boolean, has write callback been set to non-NULL? */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001518 curl_progress_callback fprogress; /* OLD and deprecated progress callback */
1519 curl_xferinfo_callback fxferinfo; /* progress callback */
9487f7f2011-08-03 07:05:30 -07001520 curl_debug_callback fdebug; /* function that write informational data */
1521 curl_ioctl_callback ioctl_func; /* function for I/O control */
1522 curl_sockopt_callback fsockopt; /* function for setting socket options */
1523 void *sockopt_client; /* pointer to pass to the socket options callback */
1524 curl_opensocket_callback fopensocket; /* function for checking/translating
Dirk Vogta7d7f962016-12-01 10:50:48 +01001525 the address and opening the
1526 socket */
9487f7f2011-08-03 07:05:30 -07001527 void* opensocket_client;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001528 curl_closesocket_callback fclosesocket; /* function for closing the
1529 socket */
1530 void* closesocket_client;
9487f7f2011-08-03 07:05:30 -07001531
1532 void *seek_client; /* pointer to pass to the seek callback */
1533 /* the 3 curl_conv_callback functions below are used on non-ASCII hosts */
1534 /* function to convert from the network encoding: */
1535 curl_conv_callback convfromnetwork;
1536 /* function to convert to the network encoding: */
1537 curl_conv_callback convtonetwork;
1538 /* function to convert from UTF-8 encoding: */
1539 curl_conv_callback convfromutf8;
1540
1541 void *progress_client; /* pointer to pass to the progress callback */
1542 void *ioctl_client; /* pointer to pass to the ioctl callback */
1543 long timeout; /* in milliseconds, 0 means no timeout */
1544 long connecttimeout; /* in milliseconds, 0 means no timeout */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001545 long accepttimeout; /* in milliseconds, 0 means no timeout */
9487f7f2011-08-03 07:05:30 -07001546 long server_response_timeout; /* in milliseconds, 0 means no timeout */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001547 long tftp_blksize; /* in bytes, 0 means use default */
1548 bool tftp_no_options; /* do not send TFTP options requests */
1549 curl_off_t filesize; /* size of file to upload, -1 means unknown */
9487f7f2011-08-03 07:05:30 -07001550 long low_speed_limit; /* bytes/second */
1551 long low_speed_time; /* number of seconds */
1552 curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001553 curl_off_t max_recv_speed; /* high speed limit in bytes/second for
1554 download */
9487f7f2011-08-03 07:05:30 -07001555 curl_off_t set_resume_from; /* continue [ftp] transfer from here */
1556 struct curl_slist *headers; /* linked list of extra headers */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001557 struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */
9487f7f2011-08-03 07:05:30 -07001558 struct curl_httppost *httppost; /* linked list of POST data */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001559 bool sep_headers; /* handle host and proxy headers separately */
9487f7f2011-08-03 07:05:30 -07001560 bool cookiesession; /* new cookie session? */
1561 bool crlf; /* convert crlf on ftp upload(?) */
1562 struct curl_slist *quote; /* after connection is established */
1563 struct curl_slist *postquote; /* after the transfer */
1564 struct curl_slist *prequote; /* before the transfer, after type */
1565 struct curl_slist *source_quote; /* 3rd party quote */
1566 struct curl_slist *source_prequote; /* in 3rd party transfer mode - before
1567 the transfer on source host */
1568 struct curl_slist *source_postquote; /* in 3rd party transfer mode - after
1569 the transfer on source host */
1570 struct curl_slist *telnet_options; /* linked list of telnet options */
1571 struct curl_slist *resolve; /* list of names to add/remove from
1572 DNS cache */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001573 struct curl_slist *connect_to; /* list of host:port mappings to override
1574 the hostname and port to connect to */
9487f7f2011-08-03 07:05:30 -07001575 curl_TimeCond timecondition; /* kind of time/date comparison */
1576 time_t timevalue; /* what time to compare with */
1577 Curl_HttpReq httpreq; /* what kind of HTTP request (if any) is this */
1578 long httpversion; /* when non-zero, a specific HTTP version requested to
1579 be used in the library's request(s) */
1580 struct ssl_config_data ssl; /* user defined SSL stuff */
1581 curl_proxytype proxytype; /* what kind of proxy that is in use */
1582 long dns_cache_timeout; /* DNS cache timeout */
1583 long buffer_size; /* size of receive buffer to use */
1584 void *private_data; /* application-private data */
1585
9487f7f2011-08-03 07:05:30 -07001586 struct curl_slist *http200aliases; /* linked list of aliases for http200 */
1587
1588 long ipver; /* the CURL_IPRESOLVE_* defines in the public header file
1589 0 - whatever, 1 - v2, 2 - v6 */
1590
1591 curl_off_t max_filesize; /* Maximum file size to download */
1592
1593 curl_ftpfile ftp_filemethod; /* how to get to a file when FTP is used */
1594
1595 int ftp_create_missing_dirs; /* 1 - create directories that don't exist
1596 2 - the same but also allow MKD to fail once
1597 */
1598
1599 curl_sshkeycallback ssh_keyfunc; /* key matching callback */
1600 void *ssh_keyfunc_userp; /* custom pointer to callback */
1601
1602/* Here follows boolean settings that define how to behave during
1603 this session. They are STATIC, set by libcurl users or at least initially
1604 and they don't change during operations. */
1605
1606 bool printhost; /* printing host name in debug info */
1607 bool get_filetime; /* get the time and get of the remote file */
1608 bool tunnel_thru_httpproxy; /* use CONNECT through a HTTP proxy */
1609 bool prefer_ascii; /* ASCII rather than binary */
1610 bool ftp_append; /* append, not overwrite, on upload */
1611 bool ftp_list_only; /* switch FTP command for listing directories */
1612 bool ftp_use_port; /* use the FTP PORT command */
1613 bool hide_progress; /* don't use the progress meter */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001614 bool http_fail_on_error; /* fail on HTTP error codes >= 400 */
1615 bool http_keep_sending_on_error; /* for HTTP status codes >= 300 */
9487f7f2011-08-03 07:05:30 -07001616 bool http_follow_location; /* follow HTTP redirects */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001617 bool http_transfer_encoding; /* request compressed HTTP transfer-encoding */
9487f7f2011-08-03 07:05:30 -07001618 bool http_disable_hostname_check_before_authentication;
1619 bool include_header; /* include received protocol headers in data output */
1620 bool http_set_referer; /* is a custom referer used */
1621 bool http_auto_referer; /* set "correct" referer when following location: */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001622 bool opt_no_body; /* as set with CURLOPT_NOBODY */
9487f7f2011-08-03 07:05:30 -07001623 bool upload; /* upload request */
1624 enum CURL_NETRC_OPTION
1625 use_netrc; /* defined in include/curl.h */
1626 bool verbose; /* output verbosity */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001627 bool krb; /* Kerberos connection requested */
9487f7f2011-08-03 07:05:30 -07001628 bool reuse_forbid; /* forbidden to be reused, close after use */
1629 bool reuse_fresh; /* do not re-use an existing connection */
1630 bool ftp_use_epsv; /* if EPSV is to be attempted or not */
1631 bool ftp_use_eprt; /* if EPRT is to be attempted or not */
1632 bool ftp_use_pret; /* if PRET is to be used before PASV or not */
1633
Dirk Vogta7d7f962016-12-01 10:50:48 +01001634 curl_usessl use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or
9487f7f2011-08-03 07:05:30 -07001635 IMAP or POP3 or others! */
1636 curl_ftpauth ftpsslauth; /* what AUTH XXX to be attempted */
1637 curl_ftpccc ftp_ccc; /* FTP CCC options */
1638 bool no_signal; /* do not use any signal/alarm handler */
1639 bool global_dns_cache; /* subject for future removal */
1640 bool tcp_nodelay; /* whether to enable TCP_NODELAY or not */
1641 bool ignorecl; /* ignore content length */
1642 bool ftp_skip_ip; /* skip the IP address the FTP server passes on to
1643 us */
1644 bool connect_only; /* make connection, let application use the socket */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001645 bool ssl_enable_beast; /* especially allow this flaw for interoperability's
1646 sake*/
1647 bool ssl_no_revoke; /* disable SSL certificate revocation checks */
9487f7f2011-08-03 07:05:30 -07001648 long ssh_auth_types; /* allowed SSH auth types */
1649 bool http_te_skip; /* pass the raw body data to the user, even when
1650 transfer-encoded (chunked, compressed) */
1651 bool http_ce_skip; /* pass the raw body data to the user, even when
1652 content-encoded (chunked, compressed) */
1653 long new_file_perms; /* Permissions to use when creating remote files */
1654 long new_directory_perms; /* Permissions to use when creating remote dirs */
1655 bool proxy_transfer_mode; /* set transfer mode (;type=<a|i>) when doing FTP
1656 via an HTTP proxy */
1657 char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001658 unsigned int scope_id; /* Scope id for IPv6 */
9487f7f2011-08-03 07:05:30 -07001659 long allowed_protocols;
1660 long redir_protocols;
1661#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
Dirk Vogta7d7f962016-12-01 10:50:48 +01001662 bool socks5_gssapi_nec; /* Flag to support NEC SOCKS5 server */
9487f7f2011-08-03 07:05:30 -07001663#endif
1664 struct curl_slist *mail_rcpt; /* linked list of mail recipients */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001665 bool sasl_ir; /* Enable/disable SASL initial response */
9487f7f2011-08-03 07:05:30 -07001666 /* Common RTSP header options */
1667 Curl_RtspReq rtspreq; /* RTSP request type */
1668 long rtspversion; /* like httpversion, for RTSP */
1669 bool wildcardmatch; /* enable wildcard matching */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001670 curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer
1671 starts */
9487f7f2011-08-03 07:05:30 -07001672 curl_chunk_end_callback chunk_end; /* called after part transferring
1673 stopped */
1674 curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds
1675 to pattern (e.g. if WILDCARDMATCH is on) */
1676 void *fnmatch_data;
Dirk Vogta7d7f962016-12-01 10:50:48 +01001677
1678 long gssapi_delegation; /* GSS-API credential delegation, see the
1679 documentation of CURLOPT_GSSAPI_DELEGATION */
1680
1681 bool tcp_keepalive; /* use TCP keepalives */
1682 long tcp_keepidle; /* seconds in idle before sending keepalive probe */
1683 long tcp_keepintvl; /* seconds between TCP keepalive probes */
1684 bool tcp_fastopen; /* use TCP Fast Open */
1685
1686 size_t maxconnects; /* Max idle connections in the connection cache */
1687
1688 bool ssl_enable_npn; /* TLS NPN extension? */
1689 bool ssl_enable_alpn; /* TLS ALPN extension? */
1690 bool path_as_is; /* allow dotdots? */
1691 bool pipewait; /* wait for pipe/multiplex status before starting a
1692 new connection */
1693 long expect_100_timeout; /* in milliseconds */
1694
1695 struct Curl_easy *stream_depends_on;
1696 bool stream_depends_e; /* set or don't set the Exclusive bit */
1697 int stream_weight;
9487f7f2011-08-03 07:05:30 -07001698};
1699
1700struct Names {
1701 struct curl_hash *hostcache;
1702 enum {
1703 HCACHE_NONE, /* not pointing to anything */
9487f7f2011-08-03 07:05:30 -07001704 HCACHE_GLOBAL, /* points to the (shrug) global one */
1705 HCACHE_MULTI, /* points to a shared one in the multi handle */
1706 HCACHE_SHARED /* points to a shared one in a shared object */
1707 } hostcachetype;
1708};
1709
1710/*
1711 * The 'connectdata' struct MUST have all the connection oriented stuff as we
1712 * may have several simultaneous connections and connection structs in memory.
1713 *
1714 * The 'struct UserDefined' must only contain data that is set once to go for
1715 * many (perhaps) independent connections. Values that are generated or
1716 * calculated internally for the "session handle" must be defined within the
1717 * 'struct UrlState' instead.
1718 */
1719
Dirk Vogta7d7f962016-12-01 10:50:48 +01001720struct Curl_easy {
1721 /* first, two fields for the linked list of these */
1722 struct Curl_easy *next;
1723 struct Curl_easy *prev;
1724
1725 struct connectdata *easy_conn; /* the "unit's" connection */
1726
1727 CURLMstate mstate; /* the handle's state */
1728 CURLcode result; /* previous result */
1729
1730 struct Curl_message msg; /* A single posted message. */
1731
1732 /* Array with the plain socket numbers this handle takes care of, in no
1733 particular order. Note that all sockets are added to the sockhash, where
1734 the state etc are also kept. This array is mostly used to detect when a
1735 socket is to be removed from the hash. See singlesocket(). */
1736 curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE];
1737 int numsocks;
1738
9487f7f2011-08-03 07:05:30 -07001739 struct Names dns;
1740 struct Curl_multi *multi; /* if non-NULL, points to the multi handle
Dirk Vogta7d7f962016-12-01 10:50:48 +01001741 struct to which this "belongs" when used by
1742 the multi interface */
1743 struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle
1744 struct to which this "belongs" when used
1745 by the easy interface */
9487f7f2011-08-03 07:05:30 -07001746 struct Curl_share *share; /* Share, handles global variable mutexing */
1747 struct SingleRequest req; /* Request-specific data */
1748 struct UserDefined set; /* values set by the libcurl user */
1749 struct DynamicStatic change; /* possibly modified userdefined data */
1750 struct CookieInfo *cookies; /* the cookies, read from files and servers.
1751 NOTE that the 'cookie' field in the
1752 UserDefined struct defines if the "engine"
1753 is to be used or not. */
1754 struct Progress progress; /* for all the progress meter data */
1755 struct UrlState state; /* struct for fields used for state info and
1756 other dynamic purposes */
1757 struct WildcardData wildcard; /* wildcard download state info */
1758 struct PureInfo info; /* stats, reports and info data */
Dirk Vogta7d7f962016-12-01 10:50:48 +01001759 struct curl_tlssessioninfo tsi; /* Information about the TLS session, only
1760 valid after a client has asked for it */
9487f7f2011-08-03 07:05:30 -07001761#if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
1762 iconv_t outbound_cd; /* for translating to the network encoding */
1763 iconv_t inbound_cd; /* for translating from the network encoding */
1764 iconv_t utf8_cd; /* for translating to UTF8 */
1765#endif /* CURL_DOES_CONVERSIONS && HAVE_ICONV */
1766 unsigned int magic; /* set to a CURLEASY_MAGIC_NUMBER */
1767};
1768
1769#define LIBCURL_NAME "libcurl"
1770
Dirk Vogta7d7f962016-12-01 10:50:48 +01001771#endif /* HEADER_CURL_URLDATA_H */