1 #ifndef HEADER_CURL_URLDATA_H 2 #define HEADER_CURL_URLDATA_H 3 /*************************************************************************** 4 * _ _ ____ _ 5 * Project ___| | | | _ \| | 6 * / __| | | | |_) | | 7 * | (__| |_| | _ <| |___ 8 * \___|\___/|_| \_\_____| 9 * 10 * Copyright (C) 1998 - 2017, Daniel Stenberg, <daniel@haxx.se>, et al. 11 * 12 * This software is licensed as described in the file COPYING, which 13 * you should have received as part of this distribution. The terms 14 * are also available at https://curl.haxx.se/docs/copyright.html. 15 * 16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell 17 * copies of the Software, and permit persons to whom the Software is 18 * furnished to do so, under the terms of the COPYING file. 19 * 20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY 21 * KIND, either express or implied. 22 * 23 ***************************************************************************/ 24 25 /* This file is for lib internal stuff */ 26 27 #include "curl_setup.h" 28 29 #define PORT_FTP 21 30 #define PORT_FTPS 990 31 #define PORT_TELNET 23 32 #define PORT_HTTP 80 33 #define PORT_HTTPS 443 34 #define PORT_DICT 2628 35 #define PORT_LDAP 389 36 #define PORT_LDAPS 636 37 #define PORT_TFTP 69 38 #define PORT_SSH 22 39 #define PORT_IMAP 143 40 #define PORT_IMAPS 993 41 #define PORT_POP3 110 42 #define PORT_POP3S 995 43 #define PORT_SMB 445 44 #define PORT_SMBS 445 45 #define PORT_SMTP 25 46 #define PORT_SMTPS 465 /* sometimes called SSMTP */ 47 #define PORT_RTSP 554 48 #define PORT_RTMP 1935 49 #define PORT_RTMPT PORT_HTTP 50 #define PORT_RTMPS PORT_HTTPS 51 #define PORT_GOPHER 70 52 53 #define DICT_MATCH "/MATCH:" 54 #define DICT_MATCH2 "/M:" 55 #define DICT_MATCH3 "/FIND:" 56 #define DICT_DEFINE "/DEFINE:" 57 #define DICT_DEFINE2 "/D:" 58 #define DICT_DEFINE3 "/LOOKUP:" 59 60 #define CURL_DEFAULT_USER "anonymous" 61 #define CURL_DEFAULT_PASSWORD "ftp@example.com" 62 63 /* Convenience defines for checking protocols or their SSL based version. Each 64 protocol handler should only ever have a single CURLPROTO_ in its protocol 65 field. */ 66 #define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS) 67 #define PROTO_FAMILY_FTP (CURLPROTO_FTP|CURLPROTO_FTPS) 68 #define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S) 69 #define PROTO_FAMILY_SMB (CURLPROTO_SMB|CURLPROTO_SMBS) 70 #define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS) 71 72 #define DEFAULT_CONNCACHE_SIZE 5 73 74 /* length of longest IPv6 address string including the trailing null */ 75 #define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255") 76 77 /* Default FTP/IMAP etc response timeout in milliseconds. 78 Symbian OS panics when given a timeout much greater than 1/2 hour. 79 */ 80 #define RESP_TIMEOUT (1800*1000) 81 82 #include "cookie.h" 83 #include "formdata.h" 84 85 #ifdef USE_OPENSSL 86 #include <openssl/ssl.h> 87 #ifdef HAVE_OPENSSL_ENGINE_H 88 #include <openssl/engine.h> 89 #endif 90 #endif /* USE_OPENSSL */ 91 92 #ifdef USE_GNUTLS 93 #include <gnutls/gnutls.h> 94 #endif 95 96 #ifdef USE_MBEDTLS 97 98 #include <mbedtls/ssl.h> 99 #include <mbedtls/version.h> 100 #include <mbedtls/entropy.h> 101 #include <mbedtls/ctr_drbg.h> 102 103 #elif defined USE_POLARSSL 104 105 #include <polarssl/ssl.h> 106 #include <polarssl/version.h> 107 #if POLARSSL_VERSION_NUMBER<0x01010000 108 #include <polarssl/havege.h> 109 #else 110 #include <polarssl/entropy.h> 111 #include <polarssl/ctr_drbg.h> 112 #endif /* POLARSSL_VERSION_NUMBER<0x01010000 */ 113 114 #endif /* USE_POLARSSL */ 115 116 #ifdef USE_CYASSL 117 #undef OCSP_REQUEST /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */ 118 #undef OCSP_RESPONSE /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */ 119 #include <cyassl/openssl/ssl.h> 120 #endif 121 122 #ifdef USE_NSS 123 #include <nspr.h> 124 #include <pk11pub.h> 125 #endif 126 127 #ifdef USE_GSKIT 128 #include <gskssl.h> 129 #endif 130 131 #ifdef USE_AXTLS 132 #include <axTLS/config.h> 133 #include <axTLS/ssl.h> 134 #undef malloc 135 #undef calloc 136 #undef realloc 137 #endif /* USE_AXTLS */ 138 139 #if defined(USE_SCHANNEL) || defined(USE_WINDOWS_SSPI) 140 #include "curl_sspi.h" 141 #endif 142 #ifdef USE_SCHANNEL 143 #include <schnlsp.h> 144 #include <schannel.h> 145 #endif 146 147 #ifdef USE_DARWINSSL 148 #include <Security/Security.h> 149 /* For some reason, when building for iOS, the omnibus header above does 150 * not include SecureTransport.h as of iOS SDK 5.1. */ 151 #include <Security/SecureTransport.h> 152 #endif 153 154 #ifdef HAVE_NETINET_IN_H 155 #include <netinet/in.h> 156 #endif 157 158 #include "timeval.h" 159 160 #ifdef HAVE_ZLIB_H 161 #include <zlib.h> /* for content-encoding */ 162 #ifdef __SYMBIAN32__ 163 /* zlib pollutes the namespace with this definition */ 164 #undef WIN32 165 #endif 166 #endif 167 168 #include <curl/curl.h> 169 170 #include "http_chunks.h" /* for the structs and enum stuff */ 171 #include "hostip.h" 172 #include "hash.h" 173 #include "splay.h" 174 175 #include "imap.h" 176 #include "pop3.h" 177 #include "smtp.h" 178 #include "ftp.h" 179 #include "file.h" 180 #include "ssh.h" 181 #include "http.h" 182 #include "rtsp.h" 183 #include "smb.h" 184 #include "wildcard.h" 185 #include "multihandle.h" 186 187 #ifdef HAVE_GSSAPI 188 # ifdef HAVE_GSSGNU 189 # include <gss.h> 190 # elif defined HAVE_GSSMIT 191 # include <gssapi/gssapi.h> 192 # include <gssapi/gssapi_generic.h> 193 # else 194 # include <gssapi.h> 195 # endif 196 #endif 197 198 #ifdef HAVE_LIBSSH2_H 199 #include <libssh2.h> 200 #include <libssh2_sftp.h> 201 #endif /* HAVE_LIBSSH2_H */ 202 203 /* Download buffer size, keep it fairly big for speed reasons */ 204 #undef BUFSIZE 205 #define BUFSIZE CURL_MAX_WRITE_SIZE 206 #undef MAX_BUFSIZE 207 #define MAX_BUFSIZE CURL_MAX_READ_SIZE 208 #define CURL_BUFSIZE(x) ((x)?(x):(BUFSIZE)) 209 210 /* Initial size of the buffer to store headers in, it'll be enlarged in case 211 of need. */ 212 #define HEADERSIZE 256 213 214 #define CURLEASY_MAGIC_NUMBER 0xc0dedbadU 215 #define GOOD_EASY_HANDLE(x) \ 216 ((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER)) 217 218 /* Some convenience macros to get the larger/smaller value out of two given. 219 We prefix with CURL to prevent name collisions. */ 220 #define CURLMAX(x,y) ((x)>(y)?(x):(y)) 221 #define CURLMIN(x,y) ((x)<(y)?(x):(y)) 222 223 #ifdef HAVE_GSSAPI 224 /* Types needed for krb5-ftp connections */ 225 struct krb5buffer { 226 void *data; 227 size_t size; 228 size_t index; 229 int eof_flag; 230 }; 231 232 enum protection_level { 233 PROT_NONE, /* first in list */ 234 PROT_CLEAR, 235 PROT_SAFE, 236 PROT_CONFIDENTIAL, 237 PROT_PRIVATE, 238 PROT_CMD, 239 PROT_LAST /* last in list */ 240 }; 241 #endif 242 243 #ifdef USE_SCHANNEL 244 /* Structs to store Schannel handles */ 245 struct curl_schannel_cred { 246 CredHandle cred_handle; 247 TimeStamp time_stamp; 248 int refcount; 249 }; 250 251 struct curl_schannel_ctxt { 252 CtxtHandle ctxt_handle; 253 TimeStamp time_stamp; 254 }; 255 #endif 256 257 /* enum for the nonblocking SSL connection state machine */ 258 typedef enum { 259 ssl_connect_1, 260 ssl_connect_2, 261 ssl_connect_2_reading, 262 ssl_connect_2_writing, 263 ssl_connect_3, 264 ssl_connect_done 265 } ssl_connect_state; 266 267 typedef enum { 268 ssl_connection_none, 269 ssl_connection_negotiating, 270 ssl_connection_complete 271 } ssl_connection_state; 272 273 /* struct for data related to each SSL connection */ 274 struct ssl_connect_data { 275 /* Use ssl encrypted communications TRUE/FALSE, not necessarily using it atm 276 but at least asked to or meaning to use it. See 'state' for the exact 277 current state of the connection. */ 278 bool use; 279 ssl_connection_state state; 280 ssl_connect_state connecting_state; 281 #if defined(USE_OPENSSL) 282 /* these ones requires specific SSL-types */ 283 SSL_CTX* ctx; 284 SSL* handle; 285 X509* server_cert; 286 #elif defined(USE_GNUTLS) 287 gnutls_session_t session; 288 gnutls_certificate_credentials_t cred; 289 #ifdef USE_TLS_SRP 290 gnutls_srp_client_credentials_t srp_client_cred; 291 #endif 292 #elif defined(USE_MBEDTLS) 293 mbedtls_ctr_drbg_context ctr_drbg; 294 mbedtls_entropy_context entropy; 295 mbedtls_ssl_context ssl; 296 int server_fd; 297 mbedtls_x509_crt cacert; 298 mbedtls_x509_crt clicert; 299 mbedtls_x509_crl crl; 300 mbedtls_pk_context pk; 301 mbedtls_ssl_config config; 302 const char *protocols[3]; 303 #elif defined(USE_POLARSSL) 304 ctr_drbg_context ctr_drbg; 305 entropy_context entropy; 306 ssl_context ssl; 307 int server_fd; 308 x509_crt cacert; 309 x509_crt clicert; 310 x509_crl crl; 311 rsa_context rsa; 312 #elif defined(USE_CYASSL) 313 SSL_CTX* ctx; 314 SSL* handle; 315 #elif defined(USE_NSS) 316 PRFileDesc *handle; 317 char *client_nickname; 318 struct Curl_easy *data; 319 struct curl_llist *obj_list; 320 PK11GenericObject *obj_clicert; 321 #elif defined(USE_GSKIT) 322 gsk_handle handle; 323 int iocport; 324 int localfd; 325 int remotefd; 326 #elif defined(USE_AXTLS) 327 SSL_CTX* ssl_ctx; 328 SSL* ssl; 329 #elif defined(USE_SCHANNEL) 330 struct curl_schannel_cred *cred; 331 struct curl_schannel_ctxt *ctxt; 332 SecPkgContext_StreamSizes stream_sizes; 333 size_t encdata_length, decdata_length; 334 size_t encdata_offset, decdata_offset; 335 unsigned char *encdata_buffer, *decdata_buffer; 336 unsigned long req_flags, ret_flags; 337 CURLcode recv_unrecoverable_err; /* schannel_recv had an unrecoverable err */ 338 bool recv_sspi_close_notify; /* true if connection closed by close_notify */ 339 bool recv_connection_closed; /* true if connection closed, regardless how */ 340 bool use_alpn; /* true if ALPN is used for this connection */ 341 #elif defined(USE_DARWINSSL) 342 SSLContextRef ssl_ctx; 343 curl_socket_t ssl_sockfd; 344 bool ssl_direction; /* true if writing, false if reading */ 345 size_t ssl_write_buffered_length; 346 #elif defined(USE_SSL) 347 #error "SSL backend specific information missing from ssl_connect_data" 348 #endif 349 }; 350 351 struct ssl_primary_config { 352 long version; /* what version the client wants to use */ 353 bool verifypeer; /* set TRUE if this is desired */ 354 bool verifyhost; /* set TRUE if CN/SAN must match hostname */ 355 bool verifystatus; /* set TRUE if certificate status must be checked */ 356 char *CApath; /* certificate dir (doesn't work on windows) */ 357 char *CAfile; /* certificate to verify peer against */ 358 char *clientcert; 359 char *random_file; /* path to file containing "random" data */ 360 char *egdsocket; /* path to file containing the EGD daemon socket */ 361 char *cipher_list; /* list of ciphers to use */ 362 }; 363 364 struct ssl_config_data { 365 struct ssl_primary_config primary; 366 bool enable_beast; /* especially allow this flaw for interoperability's 367 sake*/ 368 bool no_revoke; /* disable SSL certificate revocation checks */ 369 long certverifyresult; /* result from the certificate verification */ 370 char *CRLfile; /* CRL to check certificate revocation */ 371 char *issuercert;/* optional issuer certificate filename */ 372 curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */ 373 void *fsslctxp; /* parameter for call back */ 374 bool certinfo; /* gather lots of certificate info */ 375 bool falsestart; 376 377 char *cert; /* client certificate file name */ 378 char *cert_type; /* format for certificate (default: PEM)*/ 379 char *key; /* private key file name */ 380 char *key_type; /* format for private key (default: PEM) */ 381 char *key_passwd; /* plain text private key password */ 382 383 #ifdef USE_TLS_SRP 384 char *username; /* TLS username (for, e.g., SRP) */ 385 char *password; /* TLS password (for, e.g., SRP) */ 386 enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */ 387 #endif 388 }; 389 390 struct ssl_general_config { 391 bool sessionid; /* cache session IDs or not */ 392 size_t max_ssl_sessions; /* SSL session id cache size */ 393 }; 394 395 /* information stored about one single SSL session */ 396 struct curl_ssl_session { 397 char *name; /* host name for which this ID was used */ 398 char *conn_to_host; /* host name for the connection (may be NULL) */ 399 const char *scheme; /* protocol scheme used */ 400 void *sessionid; /* as returned from the SSL layer */ 401 size_t idsize; /* if known, otherwise 0 */ 402 long age; /* just a number, the higher the more recent */ 403 int remote_port; /* remote port */ 404 int conn_to_port; /* remote port for the connection (may be -1) */ 405 struct ssl_primary_config ssl_config; /* setup for this session */ 406 }; 407 408 /* Struct used for Digest challenge-response authentication */ 409 struct digestdata { 410 #if defined(USE_WINDOWS_SSPI) 411 BYTE *input_token; 412 size_t input_token_len; 413 CtxtHandle *http_context; 414 #else 415 char *nonce; 416 char *cnonce; 417 char *realm; 418 int algo; 419 bool stale; /* set true for re-negotiation */ 420 char *opaque; 421 char *qop; 422 char *algorithm; 423 int nc; /* nounce count */ 424 #endif 425 }; 426 427 typedef enum { 428 NTLMSTATE_NONE, 429 NTLMSTATE_TYPE1, 430 NTLMSTATE_TYPE2, 431 NTLMSTATE_TYPE3, 432 NTLMSTATE_LAST 433 } curlntlm; 434 435 #ifdef USE_WINDOWS_SSPI 436 #include "curl_sspi.h" 437 #endif 438 439 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV) 440 #include <iconv.h> 441 #endif 442 443 /* Struct used for GSSAPI (Kerberos V5) authentication */ 444 #if defined(USE_KERBEROS5) 445 struct kerberos5data { 446 #if defined(USE_WINDOWS_SSPI) 447 CredHandle *credentials; 448 CtxtHandle *context; 449 TCHAR *spn; 450 SEC_WINNT_AUTH_IDENTITY identity; 451 SEC_WINNT_AUTH_IDENTITY *p_identity; 452 size_t token_max; 453 BYTE *output_token; 454 #else 455 gss_ctx_id_t context; 456 gss_name_t spn; 457 #endif 458 }; 459 #endif 460 461 /* Struct used for NTLM challenge-response authentication */ 462 #if defined(USE_NTLM) 463 struct ntlmdata { 464 curlntlm state; 465 #ifdef USE_WINDOWS_SSPI 466 CredHandle *credentials; 467 CtxtHandle *context; 468 SEC_WINNT_AUTH_IDENTITY identity; 469 SEC_WINNT_AUTH_IDENTITY *p_identity; 470 size_t token_max; 471 BYTE *output_token; 472 BYTE *input_token; 473 size_t input_token_len; 474 #else 475 unsigned int flags; 476 unsigned char nonce[8]; 477 void *target_info; /* TargetInfo received in the ntlm type-2 message */ 478 unsigned int target_info_len; 479 #endif 480 }; 481 #endif 482 483 #ifdef USE_SPNEGO 484 struct negotiatedata { 485 /* When doing Negotiate (SPNEGO) auth, we first need to send a token 486 and then validate the received one. */ 487 enum { GSS_AUTHNONE, GSS_AUTHRECV, GSS_AUTHSENT } state; 488 #ifdef HAVE_GSSAPI 489 OM_uint32 status; 490 gss_ctx_id_t context; 491 gss_name_t spn; 492 gss_buffer_desc output_token; 493 #else 494 #ifdef USE_WINDOWS_SSPI 495 DWORD status; 496 CredHandle *credentials; 497 CtxtHandle *context; 498 SEC_WINNT_AUTH_IDENTITY identity; 499 SEC_WINNT_AUTH_IDENTITY *p_identity; 500 TCHAR *spn; 501 size_t token_max; 502 BYTE *output_token; 503 size_t output_token_length; 504 #endif 505 #endif 506 }; 507 #endif 508 509 510 /* 511 * Boolean values that concerns this connection. 512 */ 513 struct ConnectBits { 514 /* always modify bits.close with the connclose() and connkeep() macros! */ 515 bool close; /* if set, we close the connection after this request */ 516 bool reuse; /* if set, this is a re-used connection */ 517 bool conn_to_host; /* if set, this connection has a "connect to host" 518 that overrides the host in the URL */ 519 bool conn_to_port; /* if set, this connection has a "connect to port" 520 that overrides the port in the URL (remote port) */ 521 bool proxy; /* if set, this transfer is done through a proxy - any type */ 522 bool httpproxy; /* if set, this transfer is done through a http proxy */ 523 bool socksproxy; /* if set, this transfer is done through a socks proxy */ 524 bool user_passwd; /* do we use user+password for this connection? */ 525 bool proxy_user_passwd; /* user+password for the proxy? */ 526 bool ipv6_ip; /* we communicate with a remote site specified with pure IPv6 527 IP address */ 528 bool ipv6; /* we communicate with a site using an IPv6 address */ 529 530 bool do_more; /* this is set TRUE if the ->curl_do_more() function is 531 supposed to be called, after ->curl_do() */ 532 bool tcpconnect[2]; /* the TCP layer (or similar) is connected, this is set 533 the first time on the first connect function call */ 534 bool protoconnstart;/* the protocol layer has STARTED its operation after 535 the TCP layer connect */ 536 537 bool retry; /* this connection is about to get closed and then 538 re-attempted at another connection. */ 539 bool tunnel_proxy; /* if CONNECT is used to "tunnel" through the proxy. 540 This is implicit when SSL-protocols are used through 541 proxies, but can also be enabled explicitly by 542 apps */ 543 bool authneg; /* TRUE when the auth phase has started, which means 544 that we are creating a request with an auth header, 545 but it is not the final request in the auth 546 negotiation. */ 547 bool rewindaftersend;/* TRUE when the sending couldn't be stopped even 548 though it will be discarded. When the whole send 549 operation is done, we must call the data rewind 550 callback. */ 551 bool ftp_use_epsv; /* As set with CURLOPT_FTP_USE_EPSV, but if we find out 552 EPSV doesn't work we disable it for the forthcoming 553 requests */ 554 555 bool ftp_use_eprt; /* As set with CURLOPT_FTP_USE_EPRT, but if we find out 556 EPRT doesn't work we disable it for the forthcoming 557 requests */ 558 bool ftp_use_data_ssl; /* Enabled SSL for the data connection */ 559 bool netrc; /* name+password provided by netrc */ 560 bool userpwd_in_url; /* name+password found in url */ 561 bool stream_was_rewound; /* Indicates that the stream was rewound after a 562 request read past the end of its response byte 563 boundary */ 564 bool proxy_connect_closed; /* set true if a proxy disconnected the 565 connection in a CONNECT request with auth, so 566 that libcurl should reconnect and continue. */ 567 bool bound; /* set true if bind() has already been done on this socket/ 568 connection */ 569 bool type_set; /* type= was used in the URL */ 570 bool multiplex; /* connection is multiplexed */ 571 572 bool tcp_fastopen; /* use TCP Fast Open */ 573 bool tls_enable_npn; /* TLS NPN extension? */ 574 bool tls_enable_alpn; /* TLS ALPN extension? */ 575 bool proxy_ssl_connected[2]; /* TRUE when SSL initialization for HTTPS proxy 576 is complete */ 577 bool socksproxy_connecting; /* connecting through a socks proxy */ 578 }; 579 580 struct hostname { 581 char *rawalloc; /* allocated "raw" version of the name */ 582 char *encalloc; /* allocated IDN-encoded version of the name */ 583 char *name; /* name to use internally, might be encoded, might be raw */ 584 const char *dispname; /* name to display, as 'name' might be encoded */ 585 }; 586 587 /* 588 * Flags on the keepon member of the Curl_transfer_keeper 589 */ 590 591 #define KEEP_NONE 0 592 #define KEEP_RECV (1<<0) /* there is or may be data to read */ 593 #define KEEP_SEND (1<<1) /* there is or may be data to write */ 594 #define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there 595 might still be data to read */ 596 #define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there 597 might still be data to write */ 598 #define KEEP_RECV_PAUSE (1<<4) /* reading is paused */ 599 #define KEEP_SEND_PAUSE (1<<5) /* writing is paused */ 600 601 #define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE) 602 #define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE) 603 604 605 #ifdef HAVE_LIBZ 606 typedef enum { 607 ZLIB_UNINIT, /* uninitialized */ 608 ZLIB_INIT, /* initialized */ 609 ZLIB_GZIP_HEADER, /* reading gzip header */ 610 ZLIB_GZIP_INFLATING, /* inflating gzip stream */ 611 ZLIB_INIT_GZIP /* initialized in transparent gzip mode */ 612 } zlibInitState; 613 #endif 614 615 #ifdef CURLRES_ASYNCH 616 struct Curl_async { 617 char *hostname; 618 int port; 619 struct Curl_dns_entry *dns; 620 bool done; /* set TRUE when the lookup is complete */ 621 int status; /* if done is TRUE, this is the status from the callback */ 622 void *os_specific; /* 'struct thread_data' for Windows */ 623 }; 624 #endif 625 626 #define FIRSTSOCKET 0 627 #define SECONDARYSOCKET 1 628 629 /* These function pointer types are here only to allow easier typecasting 630 within the source when we need to cast between data pointers (such as NULL) 631 and function pointers. */ 632 typedef CURLcode (*Curl_do_more_func)(struct connectdata *, int *); 633 typedef CURLcode (*Curl_done_func)(struct connectdata *, CURLcode, bool); 634 635 enum expect100 { 636 EXP100_SEND_DATA, /* enough waiting, just send the body now */ 637 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */ 638 EXP100_SENDING_REQUEST, /* still sending the request but will wait for 639 the 100 header once done with the request */ 640 EXP100_FAILED /* used on 417 Expectation Failed */ 641 }; 642 643 enum upgrade101 { 644 UPGR101_INIT, /* default state */ 645 UPGR101_REQUESTED, /* upgrade requested */ 646 UPGR101_RECEIVED, /* response received */ 647 UPGR101_WORKING /* talking upgraded protocol */ 648 }; 649 650 /* 651 * Request specific data in the easy handle (Curl_easy). Previously, 652 * these members were on the connectdata struct but since a conn struct may 653 * now be shared between different Curl_easys, we store connection-specific 654 * data here. This struct only keeps stuff that's interesting for *this* 655 * request, as it will be cleared between multiple ones 656 */ 657 struct SingleRequest { 658 curl_off_t size; /* -1 if unknown at this point */ 659 curl_off_t *bytecountp; /* return number of bytes read or NULL */ 660 661 curl_off_t maxdownload; /* in bytes, the maximum amount of data to fetch, 662 -1 means unlimited */ 663 curl_off_t *writebytecountp; /* return number of bytes written or NULL */ 664 665 curl_off_t bytecount; /* total number of bytes read */ 666 curl_off_t writebytecount; /* number of bytes written */ 667 668 long headerbytecount; /* only count received headers */ 669 long deductheadercount; /* this amount of bytes doesn't count when we check 670 if anything has been transferred at the end of a 671 connection. We use this counter to make only a 672 100 reply (without a following second response 673 code) result in a CURLE_GOT_NOTHING error code */ 674 675 struct timeval start; /* transfer started at this time */ 676 struct timeval now; /* current time */ 677 bool header; /* incoming data has HTTP header */ 678 enum { 679 HEADER_NORMAL, /* no bad header at all */ 680 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest 681 is normal data */ 682 HEADER_ALLBAD /* all was believed to be header */ 683 } badheader; /* the header was deemed bad and will be 684 written as body */ 685 int headerline; /* counts header lines to better track the 686 first one */ 687 char *hbufp; /* points at *end* of header line */ 688 size_t hbuflen; 689 char *str; /* within buf */ 690 char *str_start; /* within buf */ 691 char *end_ptr; /* within buf */ 692 char *p; /* within headerbuff */ 693 bool content_range; /* set TRUE if Content-Range: was found */ 694 curl_off_t offset; /* possible resume offset read from the 695 Content-Range: header */ 696 int httpcode; /* error code from the 'HTTP/1.? XXX' or 697 'RTSP/1.? XXX' line */ 698 struct timeval start100; /* time stamp to wait for the 100 code from */ 699 enum expect100 exp100; /* expect 100 continue state */ 700 enum upgrade101 upgr101; /* 101 upgrade state */ 701 702 int auto_decoding; /* What content encoding. sec 3.5, RFC2616. */ 703 704 #define IDENTITY 0 /* No encoding */ 705 #define DEFLATE 1 /* zlib deflate [RFC 1950 & 1951] */ 706 #define GZIP 2 /* gzip algorithm [RFC 1952] */ 707 708 #ifdef HAVE_LIBZ 709 zlibInitState zlib_init; /* possible zlib init state; 710 undefined if Content-Encoding header. */ 711 z_stream z; /* State structure for zlib. */ 712 #endif 713 714 time_t timeofdoc; 715 long bodywrites; 716 717 char *buf; 718 char *uploadbuf; 719 curl_socket_t maxfd; 720 721 int keepon; 722 723 bool upload_done; /* set to TRUE when doing chunked transfer-encoding upload 724 and we're uploading the last chunk */ 725 726 bool ignorebody; /* we read a response-body but we ignore it! */ 727 bool ignorecl; /* This HTTP response has no body so we ignore the Content- 728 Length: header */ 729 730 char *location; /* This points to an allocated version of the Location: 731 header data */ 732 char *newurl; /* Set to the new URL to use when a redirect or a retry is 733 wanted */ 734 735 /* 'upload_present' is used to keep a byte counter of how much data there is 736 still left in the buffer, aimed for upload. */ 737 ssize_t upload_present; 738 739 /* 'upload_fromhere' is used as a read-pointer when we uploaded parts of a 740 buffer, so the next read should read from where this pointer points to, 741 and the 'upload_present' contains the number of bytes available at this 742 position */ 743 char *upload_fromhere; 744 745 bool chunk; /* if set, this is a chunked transfer-encoding */ 746 bool upload_chunky; /* set TRUE if we are doing chunked transfer-encoding 747 on upload */ 748 bool getheader; /* TRUE if header parsing is wanted */ 749 750 bool forbidchunk; /* used only to explicitly forbid chunk-upload for 751 specific upload buffers. See readmoredata() in 752 http.c for details. */ 753 754 void *protop; /* Allocated protocol-specific data. Each protocol 755 handler makes sure this points to data it needs. */ 756 }; 757 758 /* 759 * Specific protocol handler. 760 */ 761 762 struct Curl_handler { 763 const char *scheme; /* URL scheme name. */ 764 765 /* Complement to setup_connection_internals(). */ 766 CURLcode (*setup_connection)(struct connectdata *); 767 768 /* These two functions MUST be set to be protocol dependent */ 769 CURLcode (*do_it)(struct connectdata *, bool *done); 770 Curl_done_func done; 771 772 /* If the curl_do() function is better made in two halves, this 773 * curl_do_more() function will be called afterwards, if set. For example 774 * for doing the FTP stuff after the PASV/PORT command. 775 */ 776 Curl_do_more_func do_more; 777 778 /* This function *MAY* be set to a protocol-dependent function that is run 779 * after the connect() and everything is done, as a step in the connection. 780 * The 'done' pointer points to a bool that should be set to TRUE if the 781 * function completes before return. If it doesn't complete, the caller 782 * should call the curl_connecting() function until it is. 783 */ 784 CURLcode (*connect_it)(struct connectdata *, bool *done); 785 786 /* See above. Currently only used for FTP. */ 787 CURLcode (*connecting)(struct connectdata *, bool *done); 788 CURLcode (*doing)(struct connectdata *, bool *done); 789 790 /* Called from the multi interface during the PROTOCONNECT phase, and it 791 should then return a proper fd set */ 792 int (*proto_getsock)(struct connectdata *conn, 793 curl_socket_t *socks, 794 int numsocks); 795 796 /* Called from the multi interface during the DOING phase, and it should 797 then return a proper fd set */ 798 int (*doing_getsock)(struct connectdata *conn, 799 curl_socket_t *socks, 800 int numsocks); 801 802 /* Called from the multi interface during the DO_MORE phase, and it should 803 then return a proper fd set */ 804 int (*domore_getsock)(struct connectdata *conn, 805 curl_socket_t *socks, 806 int numsocks); 807 808 /* Called from the multi interface during the DO_DONE, PERFORM and 809 WAITPERFORM phases, and it should then return a proper fd set. Not setting 810 this will make libcurl use the generic default one. */ 811 int (*perform_getsock)(const struct connectdata *conn, 812 curl_socket_t *socks, 813 int numsocks); 814 815 /* This function *MAY* be set to a protocol-dependent function that is run 816 * by the curl_disconnect(), as a step in the disconnection. If the handler 817 * is called because the connection has been considered dead, dead_connection 818 * is set to TRUE. 819 */ 820 CURLcode (*disconnect)(struct connectdata *, bool dead_connection); 821 822 /* If used, this function gets called from transfer.c:readwrite_data() to 823 allow the protocol to do extra reads/writes */ 824 CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn, 825 ssize_t *nread, bool *readmore); 826 827 long defport; /* Default port. */ 828 unsigned int protocol; /* See CURLPROTO_* - this needs to be the single 829 specific protocol bit */ 830 unsigned int flags; /* Extra particular characteristics, see PROTOPT_* */ 831 }; 832 833 #define PROTOPT_NONE 0 /* nothing extra */ 834 #define PROTOPT_SSL (1<<0) /* uses SSL */ 835 #define PROTOPT_DUAL (1<<1) /* this protocol uses two connections */ 836 #define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */ 837 /* some protocols will have to call the underlying functions without regard to 838 what exact state the socket signals. IE even if the socket says "readable", 839 the send function might need to be called while uploading, or vice versa. 840 */ 841 #define PROTOPT_DIRLOCK (1<<3) 842 #define PROTOPT_NONETWORK (1<<4) /* protocol doesn't use the network! */ 843 #define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it 844 gets a default */ 845 #define PROTOPT_NOURLQUERY (1<<6) /* protocol can't handle 846 url query strings (?foo=bar) ! */ 847 #define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per 848 request instead of per connection */ 849 #define PROTOPT_ALPN_NPN (1<<8) /* set ALPN and/or NPN for this */ 850 #define PROTOPT_STREAM (1<<9) /* a protocol with individual logical streams */ 851 #define PROTOPT_URLOPTIONS (1<<10) /* allow options part in the userinfo field 852 of the URL */ 853 854 /* return the count of bytes sent, or -1 on error */ 855 typedef ssize_t (Curl_send)(struct connectdata *conn, /* connection data */ 856 int sockindex, /* socketindex */ 857 const void *buf, /* data to write */ 858 size_t len, /* max amount to write */ 859 CURLcode *err); /* error to return */ 860 861 /* return the count of bytes read, or -1 on error */ 862 typedef ssize_t (Curl_recv)(struct connectdata *conn, /* connection data */ 863 int sockindex, /* socketindex */ 864 char *buf, /* store data here */ 865 size_t len, /* max amount to read */ 866 CURLcode *err); /* error to return */ 867 868 #ifdef USE_RECV_BEFORE_SEND_WORKAROUND 869 struct postponed_data { 870 char *buffer; /* Temporal store for received data during 871 sending, must be freed */ 872 size_t allocated_size; /* Size of temporal store */ 873 size_t recv_size; /* Size of received data during sending */ 874 size_t recv_processed; /* Size of processed part of postponed data */ 875 #ifdef DEBUGBUILD 876 curl_socket_t bindsock;/* Structure must be bound to specific socket, 877 used only for DEBUGASSERT */ 878 #endif /* DEBUGBUILD */ 879 }; 880 #endif /* USE_RECV_BEFORE_SEND_WORKAROUND */ 881 882 struct proxy_info { 883 struct hostname host; 884 long port; 885 curl_proxytype proxytype; /* what kind of proxy that is in use */ 886 char *user; /* proxy user name string, allocated */ 887 char *passwd; /* proxy password string, allocated */ 888 }; 889 890 /* 891 * The connectdata struct contains all fields and variables that should be 892 * unique for an entire connection. 893 */ 894 struct connectdata { 895 /* 'data' is the CURRENT Curl_easy using this connection -- take great 896 caution that this might very well vary between different times this 897 connection is used! */ 898 struct Curl_easy *data; 899 900 /* chunk is for HTTP chunked encoding, but is in the general connectdata 901 struct only because we can do just about any protocol through a HTTP proxy 902 and a HTTP proxy may in fact respond using chunked encoding */ 903 struct Curl_chunker chunk; 904 905 curl_closesocket_callback fclosesocket; /* function closing the socket(s) */ 906 void *closesocket_client; 907 908 bool inuse; /* This is a marker for the connection cache logic. If this is 909 TRUE this handle is being used by an easy handle and cannot 910 be used by any other easy handle without careful 911 consideration (== only for pipelining). */ 912 913 /**** Fields set when inited and not modified again */ 914 long connection_id; /* Contains a unique number to make it easier to 915 track the connections in the log output */ 916 917 /* 'dns_entry' is the particular host we use. This points to an entry in the 918 DNS cache and it will not get pruned while locked. It gets unlocked in 919 Curl_done(). This entry will be NULL if the connection is re-used as then 920 there is no name resolve done. */ 921 struct Curl_dns_entry *dns_entry; 922 923 /* 'ip_addr' is the particular IP we connected to. It points to a struct 924 within the DNS cache, so this pointer is only valid as long as the DNS 925 cache entry remains locked. It gets unlocked in Curl_done() */ 926 Curl_addrinfo *ip_addr; 927 Curl_addrinfo *tempaddr[2]; /* for happy eyeballs */ 928 929 /* 'ip_addr_str' is the ip_addr data as a human readable string. 930 It remains available as long as the connection does, which is longer than 931 the ip_addr itself. */ 932 char ip_addr_str[MAX_IPADR_LEN]; 933 934 unsigned int scope_id; /* Scope id for IPv6 */ 935 936 int socktype; /* SOCK_STREAM or SOCK_DGRAM */ 937 938 struct hostname host; 939 char *secondaryhostname; /* secondary socket host name (ftp) */ 940 struct hostname conn_to_host; /* the host to connect to. valid only if 941 bits.conn_to_host is set */ 942 943 struct proxy_info socks_proxy; 944 struct proxy_info http_proxy; 945 946 long port; /* which port to use locally */ 947 int remote_port; /* the remote port, not the proxy port! */ 948 int conn_to_port; /* the remote port to connect to. valid only if 949 bits.conn_to_port is set */ 950 unsigned short secondary_port; /* secondary socket remote port to connect to 951 (ftp) */ 952 953 /* 'primary_ip' and 'primary_port' get filled with peer's numerical 954 ip address and port number whenever an outgoing connection is 955 *attempted* from the primary socket to a remote address. When more 956 than one address is tried for a connection these will hold data 957 for the last attempt. When the connection is actually established 958 these are updated with data which comes directly from the socket. */ 959 960 char primary_ip[MAX_IPADR_LEN]; 961 long primary_port; 962 963 /* 'local_ip' and 'local_port' get filled with local's numerical 964 ip address and port number whenever an outgoing connection is 965 **established** from the primary socket to a remote address. */ 966 967 char local_ip[MAX_IPADR_LEN]; 968 long local_port; 969 970 char *user; /* user name string, allocated */ 971 char *passwd; /* password string, allocated */ 972 char *options; /* options string, allocated */ 973 974 char *oauth_bearer; /* bearer token for OAuth 2.0, allocated */ 975 976 int httpversion; /* the HTTP version*10 reported by the server */ 977 int rtspversion; /* the RTSP version*10 reported by the server */ 978 979 struct timeval now; /* "current" time */ 980 struct timeval created; /* creation time */ 981 curl_socket_t sock[2]; /* two sockets, the second is used for the data 982 transfer when doing FTP */ 983 curl_socket_t tempsock[2]; /* temporary sockets for happy eyeballs */ 984 bool sock_accepted[2]; /* TRUE if the socket on this index was created with 985 accept() */ 986 Curl_recv *recv[2]; 987 Curl_send *send[2]; 988 989 #ifdef USE_RECV_BEFORE_SEND_WORKAROUND 990 struct postponed_data postponed[2]; /* two buffers for two sockets */ 991 #endif /* USE_RECV_BEFORE_SEND_WORKAROUND */ 992 struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */ 993 struct ssl_connect_data proxy_ssl[2]; /* this is for proxy ssl-stuff */ 994 struct ssl_primary_config ssl_config; 995 struct ssl_primary_config proxy_ssl_config; 996 bool tls_upgraded; 997 998 struct ConnectBits bits; /* various state-flags for this connection */ 999 1000 /* connecttime: when connect() is called on the current IP address. Used to 1001 be able to track when to move on to try next IP - but only when the multi 1002 interface is used. */ 1003 struct timeval connecttime; 1004 /* The two fields below get set in Curl_connecthost */ 1005 int num_addr; /* number of addresses to try to connect to */ 1006 time_t timeoutms_per_addr; /* how long time in milliseconds to spend on 1007 trying to connect to each IP address */ 1008 1009 const struct Curl_handler *handler; /* Connection's protocol handler */ 1010 const struct Curl_handler *given; /* The protocol first given */ 1011 1012 long ip_version; /* copied from the Curl_easy at creation time */ 1013 1014 /**** curl_get() phase fields */ 1015 1016 curl_socket_t sockfd; /* socket to read from or CURL_SOCKET_BAD */ 1017 curl_socket_t writesockfd; /* socket to write to, it may very 1018 well be the same we read from. 1019 CURL_SOCKET_BAD disables */ 1020 1021 /** Dynamicly allocated strings, MUST be freed before this **/ 1022 /** struct is killed. **/ 1023 struct dynamically_allocated_data { 1024 char *proxyuserpwd; 1025 char *uagent; 1026 char *accept_encoding; 1027 char *userpwd; 1028 char *rangeline; 1029 char *ref; 1030 char *host; 1031 char *cookiehost; 1032 char *rtsp_transport; 1033 char *te; /* TE: request header */ 1034 } allocptr; 1035 1036 #ifdef HAVE_GSSAPI 1037 int sec_complete; /* if Kerberos is enabled for this connection */ 1038 enum protection_level command_prot; 1039 enum protection_level data_prot; 1040 enum protection_level request_data_prot; 1041 size_t buffer_size; 1042 struct krb5buffer in_buffer; 1043 void *app_data; 1044 const struct Curl_sec_client_mech *mech; 1045 struct sockaddr_in local_addr; 1046 #endif 1047 1048 #if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */ 1049 struct kerberos5data krb5; /* variables into the structure definition, */ 1050 #endif /* however, some of them are ftp specific. */ 1051 1052 /* the two following *_inuse fields are only flags, not counters in any way. 1053 If TRUE it means the channel is in use, and if FALSE it means the channel 1054 is up for grabs by one. */ 1055 1056 bool readchannel_inuse; /* whether the read channel is in use by an easy 1057 handle */ 1058 bool writechannel_inuse; /* whether the write channel is in use by an easy 1059 handle */ 1060 struct curl_llist *send_pipe; /* List of handles waiting to 1061 send on this pipeline */ 1062 struct curl_llist *recv_pipe; /* List of handles waiting to read 1063 their responses on this pipeline */ 1064 char *master_buffer; /* The master buffer allocated on-demand; 1065 used for pipelining. */ 1066 size_t read_pos; /* Current read position in the master buffer */ 1067 size_t buf_len; /* Length of the buffer?? */ 1068 1069 1070 curl_seek_callback seek_func; /* function that seeks the input */ 1071 void *seek_client; /* pointer to pass to the seek() above */ 1072 1073 /*************** Request - specific items ************/ 1074 1075 #if defined(USE_NTLM) 1076 struct ntlmdata ntlm; /* NTLM differs from other authentication schemes 1077 because it authenticates connections, not 1078 single requests! */ 1079 struct ntlmdata proxyntlm; /* NTLM data for proxy */ 1080 1081 #if defined(NTLM_WB_ENABLED) 1082 /* used for communication with Samba's winbind daemon helper ntlm_auth */ 1083 curl_socket_t ntlm_auth_hlpr_socket; 1084 pid_t ntlm_auth_hlpr_pid; 1085 char *challenge_header; 1086 char *response_header; 1087 #endif 1088 #endif 1089 1090 char syserr_buf [256]; /* buffer for Curl_strerror() */ 1091 1092 #ifdef CURLRES_ASYNCH 1093 /* data used for the asynch name resolve callback */ 1094 struct Curl_async async; 1095 #endif 1096 1097 /* These three are used for chunked-encoding trailer support */ 1098 char *trailer; /* allocated buffer to store trailer in */ 1099 int trlMax; /* allocated buffer size */ 1100 int trlPos; /* index of where to store data */ 1101 1102 union { 1103 struct ftp_conn ftpc; 1104 struct http_conn httpc; 1105 struct ssh_conn sshc; 1106 struct tftp_state_data *tftpc; 1107 struct imap_conn imapc; 1108 struct pop3_conn pop3c; 1109 struct smtp_conn smtpc; 1110 struct rtsp_conn rtspc; 1111 struct smb_conn smbc; 1112 void *generic; /* RTMP and LDAP use this */ 1113 } proto; 1114 1115 int cselect_bits; /* bitmask of socket events */ 1116 int waitfor; /* current READ/WRITE bits to wait for */ 1117 1118 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1119 int socks5_gssapi_enctype; 1120 #endif 1121 1122 /* When this connection is created, store the conditions for the local end 1123 bind. This is stored before the actual bind and before any connection is 1124 made and will serve the purpose of being used for comparison reasons so 1125 that subsequent bound-requested connections aren't accidentally re-using 1126 wrong connections. */ 1127 char *localdev; 1128 unsigned short localport; 1129 int localportrange; 1130 1131 /* tunnel as in tunnel through a HTTP proxy with CONNECT */ 1132 enum { 1133 TUNNEL_INIT, /* init/default/no tunnel state */ 1134 TUNNEL_CONNECT, /* CONNECT has been sent off */ 1135 TUNNEL_COMPLETE /* CONNECT response received completely */ 1136 } tunnel_state[2]; /* two separate ones to allow FTP */ 1137 struct connectbundle *bundle; /* The bundle we are member of */ 1138 1139 int negnpn; /* APLN or NPN TLS negotiated protocol, CURL_HTTP_VERSION* */ 1140 1141 #ifdef USE_UNIX_SOCKETS 1142 char *unix_domain_socket; 1143 bool abstract_unix_socket; 1144 #endif 1145 }; 1146 1147 /* The end of connectdata. */ 1148 1149 /* 1150 * Struct to keep statistical and informational data. 1151 * All variables in this struct must be initialized/reset in Curl_initinfo(). 1152 */ 1153 struct PureInfo { 1154 int httpcode; /* Recent HTTP, FTP, RTSP or SMTP response code */ 1155 int httpproxycode; /* response code from proxy when received separate */ 1156 int httpversion; /* the http version number X.Y = X*10+Y */ 1157 long filetime; /* If requested, this is might get set. Set to -1 if the time 1158 was unretrievable. We cannot have this of type time_t, 1159 since time_t is unsigned on several platforms such as 1160 OpenVMS. */ 1161 bool timecond; /* set to TRUE if the time condition didn't match, which 1162 thus made the document NOT get fetched */ 1163 long header_size; /* size of read header(s) in bytes */ 1164 long request_size; /* the amount of bytes sent in the request(s) */ 1165 unsigned long proxyauthavail; /* what proxy auth types were announced */ 1166 unsigned long httpauthavail; /* what host auth types were announced */ 1167 long numconnects; /* how many new connection did libcurl created */ 1168 char *contenttype; /* the content type of the object */ 1169 char *wouldredirect; /* URL this would've been redirected to if asked to */ 1170 1171 /* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip' 1172 and, 'conn_local_port' are copied over from the connectdata struct in 1173 order to allow curl_easy_getinfo() to return this information even when 1174 the session handle is no longer associated with a connection, and also 1175 allow curl_easy_reset() to clear this information from the session handle 1176 without disturbing information which is still alive, and that might be 1177 reused, in the connection cache. */ 1178 1179 char conn_primary_ip[MAX_IPADR_LEN]; 1180 long conn_primary_port; 1181 1182 char conn_local_ip[MAX_IPADR_LEN]; 1183 long conn_local_port; 1184 1185 const char *conn_scheme; 1186 unsigned int conn_protocol; 1187 1188 struct curl_certinfo certs; /* info about the certs, only populated in 1189 OpenSSL builds. Asked for with 1190 CURLOPT_CERTINFO / CURLINFO_CERTINFO */ 1191 }; 1192 1193 1194 struct Progress { 1195 time_t lastshow; /* time() of the last displayed progress meter or NULL to 1196 force redraw at next call */ 1197 curl_off_t size_dl; /* total expected size */ 1198 curl_off_t size_ul; /* total expected size */ 1199 curl_off_t downloaded; /* transferred so far */ 1200 curl_off_t uploaded; /* transferred so far */ 1201 1202 curl_off_t current_speed; /* uses the currently fastest transfer */ 1203 1204 bool callback; /* set when progress callback is used */ 1205 int width; /* screen width at download start */ 1206 int flags; /* see progress.h */ 1207 1208 double timespent; 1209 1210 curl_off_t dlspeed; 1211 curl_off_t ulspeed; 1212 1213 double t_nslookup; 1214 double t_connect; 1215 double t_appconnect; 1216 double t_pretransfer; 1217 double t_starttransfer; 1218 double t_redirect; 1219 1220 struct timeval start; 1221 struct timeval t_startsingle; 1222 struct timeval t_startop; 1223 struct timeval t_acceptdata; 1224 1225 /* upload speed limit */ 1226 struct timeval ul_limit_start; 1227 curl_off_t ul_limit_size; 1228 /* download speed limit */ 1229 struct timeval dl_limit_start; 1230 curl_off_t dl_limit_size; 1231 1232 #define CURR_TIME (5+1) /* 6 entries for 5 seconds */ 1233 1234 curl_off_t speeder[ CURR_TIME ]; 1235 struct timeval speeder_time[ CURR_TIME ]; 1236 int speeder_c; 1237 }; 1238 1239 typedef enum { 1240 HTTPREQ_NONE, /* first in list */ 1241 HTTPREQ_GET, 1242 HTTPREQ_POST, 1243 HTTPREQ_POST_FORM, /* we make a difference internally */ 1244 HTTPREQ_PUT, 1245 HTTPREQ_HEAD, 1246 HTTPREQ_CUSTOM, 1247 HTTPREQ_LAST /* last in list */ 1248 } Curl_HttpReq; 1249 1250 typedef enum { 1251 RTSPREQ_NONE, /* first in list */ 1252 RTSPREQ_OPTIONS, 1253 RTSPREQ_DESCRIBE, 1254 RTSPREQ_ANNOUNCE, 1255 RTSPREQ_SETUP, 1256 RTSPREQ_PLAY, 1257 RTSPREQ_PAUSE, 1258 RTSPREQ_TEARDOWN, 1259 RTSPREQ_GET_PARAMETER, 1260 RTSPREQ_SET_PARAMETER, 1261 RTSPREQ_RECORD, 1262 RTSPREQ_RECEIVE, 1263 RTSPREQ_LAST /* last in list */ 1264 } Curl_RtspReq; 1265 1266 /* 1267 * Values that are generated, temporary or calculated internally for a 1268 * "session handle" must be defined within the 'struct UrlState'. This struct 1269 * will be used within the Curl_easy struct. When the 'Curl_easy' 1270 * struct is cloned, this data MUST NOT be copied. 1271 * 1272 * Remember that any "state" information goes globally for the curl handle. 1273 * Session-data MUST be put in the connectdata struct and here. */ 1274 #define MAX_CURL_USER_LENGTH 256 1275 #define MAX_CURL_PASSWORD_LENGTH 256 1276 1277 struct auth { 1278 unsigned long want; /* Bitmask set to the authentication methods wanted by 1279 app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */ 1280 unsigned long picked; 1281 unsigned long avail; /* Bitmask for what the server reports to support for 1282 this resource */ 1283 bool done; /* TRUE when the auth phase is done and ready to do the *actual* 1284 request */ 1285 bool multi; /* TRUE if this is not yet authenticated but within the auth 1286 multipass negotiation */ 1287 bool iestyle; /* TRUE if digest should be done IE-style or FALSE if it should 1288 be RFC compliant */ 1289 }; 1290 1291 struct Curl_http2_dep { 1292 struct Curl_http2_dep *next; 1293 struct Curl_easy *data; 1294 }; 1295 1296 struct UrlState { 1297 1298 /* Points to the connection cache */ 1299 struct conncache *conn_cache; 1300 1301 /* when curl_easy_perform() is called, the multi handle is "owned" by 1302 the easy handle so curl_easy_cleanup() on such an easy handle will 1303 also close the multi handle! */ 1304 bool multi_owned_by_easy; 1305 1306 /* buffers to store authentication data in, as parsed from input options */ 1307 struct timeval keeps_speed; /* for the progress meter really */ 1308 1309 struct connectdata *lastconnect; /* The last connection, NULL if undefined */ 1310 1311 char *headerbuff; /* allocated buffer to store headers in */ 1312 size_t headersize; /* size of the allocation */ 1313 1314 char *buffer; /* download buffer */ 1315 char uploadbuffer[BUFSIZE+1]; /* upload buffer */ 1316 curl_off_t current_speed; /* the ProgressShow() funcion sets this, 1317 bytes / second */ 1318 bool this_is_a_follow; /* this is a followed Location: request */ 1319 1320 char *first_host; /* host name of the first (not followed) request. 1321 if set, this should be the host name that we will 1322 sent authorization to, no else. Used to make Location: 1323 following not keep sending user+password... This is 1324 strdup() data. 1325 */ 1326 int first_remote_port; /* remote port of the first (not followed) request */ 1327 struct curl_ssl_session *session; /* array of 'max_ssl_sessions' size */ 1328 long sessionage; /* number of the most recent session */ 1329 char *tempwrite; /* allocated buffer to keep data in when a write 1330 callback returns to make the connection paused */ 1331 size_t tempwritesize; /* size of the 'tempwrite' allocated buffer */ 1332 int tempwritetype; /* type of the 'tempwrite' buffer as a bitmask that is 1333 used with Curl_client_write() */ 1334 char *scratch; /* huge buffer[BUFSIZE*2] when doing upload CRLF replacing */ 1335 bool errorbuf; /* Set to TRUE if the error buffer is already filled in. 1336 This must be set to FALSE every time _easy_perform() is 1337 called. */ 1338 int os_errno; /* filled in with errno whenever an error occurs */ 1339 #ifdef HAVE_SIGNAL 1340 /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */ 1341 void (*prev_signal)(int sig); 1342 #endif 1343 bool allow_port; /* Is set.use_port allowed to take effect or not. This 1344 is always set TRUE when curl_easy_perform() is called. */ 1345 struct digestdata digest; /* state data for host Digest auth */ 1346 struct digestdata proxydigest; /* state data for proxy Digest auth */ 1347 1348 #ifdef USE_SPNEGO 1349 struct negotiatedata negotiate; /* state data for host Negotiate auth */ 1350 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */ 1351 #endif 1352 1353 struct auth authhost; /* auth details for host */ 1354 struct auth authproxy; /* auth details for proxy */ 1355 1356 bool authproblem; /* TRUE if there's some problem authenticating */ 1357 1358 void *resolver; /* resolver state, if it is used in the URL state - 1359 ares_channel f.e. */ 1360 1361 #if defined(USE_OPENSSL) && defined(HAVE_OPENSSL_ENGINE_H) 1362 ENGINE *engine; 1363 #endif /* USE_OPENSSL */ 1364 struct timeval expiretime; /* set this with Curl_expire() only */ 1365 struct Curl_tree timenode; /* for the splay stuff */ 1366 struct curl_llist *timeoutlist; /* list of pending timeouts */ 1367 1368 /* a place to store the most recently set FTP entrypath */ 1369 char *most_recent_ftp_entrypath; 1370 1371 /* set after initial USER failure, to prevent an authentication loop */ 1372 bool ftp_trying_alternative; 1373 1374 int httpversion; /* the lowest HTTP version*10 reported by any server 1375 involved in this request */ 1376 bool expect100header; /* TRUE if we added Expect: 100-continue */ 1377 1378 bool pipe_broke; /* TRUE if the connection we were pipelined on broke 1379 and we need to restart from the beginning */ 1380 1381 #if !defined(WIN32) && !defined(MSDOS) && !defined(__EMX__) && \ 1382 !defined(__SYMBIAN32__) 1383 /* do FTP line-end conversions on most platforms */ 1384 #define CURL_DO_LINEEND_CONV 1385 /* for FTP downloads: track CRLF sequences that span blocks */ 1386 bool prev_block_had_trailing_cr; 1387 /* for FTP downloads: how many CRLFs did we converted to LFs? */ 1388 curl_off_t crlf_conversions; 1389 #endif 1390 char *pathbuffer;/* allocated buffer to store the URL's path part in */ 1391 char *path; /* path to use, points to somewhere within the pathbuffer 1392 area */ 1393 bool slash_removed; /* set TRUE if the 'path' points to a path where the 1394 initial URL slash separator has been taken off */ 1395 bool use_range; 1396 bool rangestringalloc; /* the range string is malloc()'ed */ 1397 1398 char *range; /* range, if used. See README for detailed specification on 1399 this syntax. */ 1400 curl_off_t resume_from; /* continue [ftp] transfer from here */ 1401 1402 /* This RTSP state information survives requests and connections */ 1403 long rtsp_next_client_CSeq; /* the session's next client CSeq */ 1404 long rtsp_next_server_CSeq; /* the session's next server CSeq */ 1405 long rtsp_CSeq_recv; /* most recent CSeq received */ 1406 1407 curl_off_t infilesize; /* size of file to upload, -1 means unknown. 1408 Copied from set.filesize at start of operation */ 1409 1410 size_t drain; /* Increased when this stream has data to read, even if its 1411 socket is not necessarily is readable. Decreased when 1412 checked. */ 1413 bool done; /* set to FALSE when Curl_init_do() is called and set to TRUE 1414 when multi_done() is called, to prevent multi_done() to get 1415 invoked twice when the multi interface is used. */ 1416 1417 curl_read_callback fread_func; /* read callback/function */ 1418 void *in; /* CURLOPT_READDATA */ 1419 1420 struct Curl_easy *stream_depends_on; 1421 bool stream_depends_e; /* set or don't set the Exclusive bit */ 1422 int stream_weight; 1423 }; 1424 1425 1426 /* 1427 * This 'DynamicStatic' struct defines dynamic states that actually change 1428 * values in the 'UserDefined' area, which MUST be taken into consideration 1429 * if the UserDefined struct is cloned or similar. You can probably just 1430 * copy these, but each one indicate a special action on other data. 1431 */ 1432 1433 struct DynamicStatic { 1434 char *url; /* work URL, copied from UserDefined */ 1435 bool url_alloc; /* URL string is malloc()'ed */ 1436 char *referer; /* referer string */ 1437 bool referer_alloc; /* referer sting is malloc()ed */ 1438 struct curl_slist *cookielist; /* list of cookie files set by 1439 curl_easy_setopt(COOKIEFILE) calls */ 1440 struct curl_slist *resolve; /* set to point to the set.resolve list when 1441 this should be dealt with in pretransfer */ 1442 }; 1443 1444 /* 1445 * This 'UserDefined' struct must only contain data that is set once to go 1446 * for many (perhaps) independent connections. Values that are generated or 1447 * calculated internally for the "session handle" MUST be defined within the 1448 * 'struct UrlState' instead. The only exceptions MUST note the changes in 1449 * the 'DynamicStatic' struct. 1450 * Character pointer fields point to dynamic storage, unless otherwise stated. 1451 */ 1452 1453 struct Curl_multi; /* declared and used only in multi.c */ 1454 1455 enum dupstring { 1456 STRING_CERT_ORIG, /* client certificate file name */ 1457 STRING_CERT_PROXY, /* client certificate file name */ 1458 STRING_CERT_TYPE_ORIG, /* format for certificate (default: PEM)*/ 1459 STRING_CERT_TYPE_PROXY, /* format for certificate (default: PEM)*/ 1460 STRING_COOKIE, /* HTTP cookie string to send */ 1461 STRING_COOKIEJAR, /* dump all cookies to this file */ 1462 STRING_CUSTOMREQUEST, /* HTTP/FTP/RTSP request/method to use */ 1463 STRING_DEFAULT_PROTOCOL, /* Protocol to use when the URL doesn't specify */ 1464 STRING_DEVICE, /* local network interface/address to use */ 1465 STRING_ENCODING, /* Accept-Encoding string */ 1466 STRING_FTP_ACCOUNT, /* ftp account data */ 1467 STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */ 1468 STRING_FTPPORT, /* port to send with the FTP PORT command */ 1469 STRING_KEY_ORIG, /* private key file name */ 1470 STRING_KEY_PROXY, /* private key file name */ 1471 STRING_KEY_PASSWD_ORIG, /* plain text private key password */ 1472 STRING_KEY_PASSWD_PROXY, /* plain text private key password */ 1473 STRING_KEY_TYPE_ORIG, /* format for private key (default: PEM) */ 1474 STRING_KEY_TYPE_PROXY, /* format for private key (default: PEM) */ 1475 STRING_KRB_LEVEL, /* krb security level */ 1476 STRING_NETRC_FILE, /* if not NULL, use this instead of trying to find 1477 $HOME/.netrc */ 1478 STRING_PROXY, /* proxy to use */ 1479 STRING_PRE_PROXY, /* pre socks proxy to use */ 1480 STRING_SET_RANGE, /* range, if used */ 1481 STRING_SET_REFERER, /* custom string for the HTTP referer field */ 1482 STRING_SET_URL, /* what original URL to work on */ 1483 STRING_SSL_CAPATH_ORIG, /* CA directory name (doesn't work on windows) */ 1484 STRING_SSL_CAPATH_PROXY, /* CA directory name (doesn't work on windows) */ 1485 STRING_SSL_CAFILE_ORIG, /* certificate file to verify peer against */ 1486 STRING_SSL_CAFILE_PROXY, /* certificate file to verify peer against */ 1487 STRING_SSL_PINNEDPUBLICKEY_ORIG, /* public key file to verify peer against */ 1488 STRING_SSL_PINNEDPUBLICKEY_PROXY, /* public key file to verify proxy */ 1489 STRING_SSL_CIPHER_LIST_ORIG, /* list of ciphers to use */ 1490 STRING_SSL_CIPHER_LIST_PROXY, /* list of ciphers to use */ 1491 STRING_SSL_EGDSOCKET, /* path to file containing the EGD daemon socket */ 1492 STRING_SSL_RANDOM_FILE, /* path to file containing "random" data */ 1493 STRING_USERAGENT, /* User-Agent string */ 1494 STRING_SSL_CRLFILE_ORIG, /* crl file to check certificate */ 1495 STRING_SSL_CRLFILE_PROXY, /* crl file to check certificate */ 1496 STRING_SSL_ISSUERCERT_ORIG, /* issuer cert file to check certificate */ 1497 STRING_SSL_ISSUERCERT_PROXY, /* issuer cert file to check certificate */ 1498 STRING_USERNAME, /* <username>, if used */ 1499 STRING_PASSWORD, /* <password>, if used */ 1500 STRING_OPTIONS, /* <options>, if used */ 1501 STRING_PROXYUSERNAME, /* Proxy <username>, if used */ 1502 STRING_PROXYPASSWORD, /* Proxy <password>, if used */ 1503 STRING_NOPROXY, /* List of hosts which should not use the proxy, if 1504 used */ 1505 STRING_RTSP_SESSION_ID, /* Session ID to use */ 1506 STRING_RTSP_STREAM_URI, /* Stream URI for this request */ 1507 STRING_RTSP_TRANSPORT, /* Transport for this session */ 1508 #ifdef USE_LIBSSH2 1509 STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */ 1510 STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */ 1511 STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */ 1512 STRING_SSH_KNOWNHOSTS, /* file name of knownhosts file */ 1513 #endif 1514 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1515 STRING_PROXY_SERVICE_NAME, /* Proxy service name */ 1516 #endif 1517 #if !defined(CURL_DISABLE_CRYPTO_AUTH) || defined(USE_KERBEROS5) || \ 1518 defined(USE_SPNEGO) 1519 STRING_SERVICE_NAME, /* Service name */ 1520 #endif 1521 STRING_MAIL_FROM, 1522 STRING_MAIL_AUTH, 1523 1524 #ifdef USE_TLS_SRP 1525 STRING_TLSAUTH_USERNAME_ORIG, /* TLS auth <username> */ 1526 STRING_TLSAUTH_USERNAME_PROXY, /* TLS auth <username> */ 1527 STRING_TLSAUTH_PASSWORD_ORIG, /* TLS auth <password> */ 1528 STRING_TLSAUTH_PASSWORD_PROXY, /* TLS auth <password> */ 1529 #endif 1530 STRING_BEARER, /* <bearer>, if used */ 1531 #ifdef USE_UNIX_SOCKETS 1532 STRING_UNIX_SOCKET_PATH, /* path to Unix socket, if used */ 1533 #endif 1534 1535 /* -- end of zero-terminated strings -- */ 1536 1537 STRING_LASTZEROTERMINATED, 1538 1539 /* -- below this are pointers to binary data that cannot be strdup'ed. 1540 Each such pointer must be added manually to Curl_dupset() --- */ 1541 1542 STRING_COPYPOSTFIELDS, /* if POST, set the fields' values here */ 1543 1544 STRING_LAST /* not used, just an end-of-list marker */ 1545 }; 1546 1547 struct UserDefined { 1548 FILE *err; /* the stderr user data goes here */ 1549 void *debugdata; /* the data that will be passed to fdebug */ 1550 char *errorbuffer; /* (Static) store failure messages in here */ 1551 long proxyport; /* If non-zero, use this port number by default. If the 1552 proxy string features a ":[port]" that one will override 1553 this. */ 1554 void *out; /* CURLOPT_WRITEDATA */ 1555 void *in_set; /* CURLOPT_READDATA */ 1556 void *writeheader; /* write the header to this if non-NULL */ 1557 void *rtp_out; /* write RTP to this if non-NULL */ 1558 long use_port; /* which port to use (when not using default) */ 1559 unsigned long httpauth; /* kind of HTTP authentication to use (bitmask) */ 1560 unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */ 1561 long followlocation; /* as in HTTP Location: */ 1562 long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1 1563 for infinity */ 1564 1565 int keep_post; /* keep POSTs as POSTs after a 30x request; each 1566 bit represents a request, from 301 to 303 */ 1567 bool free_referer; /* set TRUE if 'referer' points to a string we 1568 allocated */ 1569 void *postfields; /* if POST, set the fields' values here */ 1570 curl_seek_callback seek_func; /* function that seeks the input */ 1571 curl_off_t postfieldsize; /* if POST, this might have a size to use instead 1572 of strlen(), and then the data *may* be binary 1573 (contain zero bytes) */ 1574 unsigned short localport; /* local port number to bind to */ 1575 int localportrange; /* number of additional port numbers to test in case the 1576 'localport' one can't be bind()ed */ 1577 curl_write_callback fwrite_func; /* function that stores the output */ 1578 curl_write_callback fwrite_header; /* function that stores headers */ 1579 curl_write_callback fwrite_rtp; /* function that stores interleaved RTP */ 1580 curl_read_callback fread_func_set; /* function that reads the input */ 1581 int is_fread_set; /* boolean, has read callback been set to non-NULL? */ 1582 int is_fwrite_set; /* boolean, has write callback been set to non-NULL? */ 1583 curl_progress_callback fprogress; /* OLD and deprecated progress callback */ 1584 curl_xferinfo_callback fxferinfo; /* progress callback */ 1585 curl_debug_callback fdebug; /* function that write informational data */ 1586 curl_ioctl_callback ioctl_func; /* function for I/O control */ 1587 curl_sockopt_callback fsockopt; /* function for setting socket options */ 1588 void *sockopt_client; /* pointer to pass to the socket options callback */ 1589 curl_opensocket_callback fopensocket; /* function for checking/translating 1590 the address and opening the 1591 socket */ 1592 void *opensocket_client; 1593 curl_closesocket_callback fclosesocket; /* function for closing the 1594 socket */ 1595 void *closesocket_client; 1596 1597 void *seek_client; /* pointer to pass to the seek callback */ 1598 /* the 3 curl_conv_callback functions below are used on non-ASCII hosts */ 1599 /* function to convert from the network encoding: */ 1600 curl_conv_callback convfromnetwork; 1601 /* function to convert to the network encoding: */ 1602 curl_conv_callback convtonetwork; 1603 /* function to convert from UTF-8 encoding: */ 1604 curl_conv_callback convfromutf8; 1605 1606 void *progress_client; /* pointer to pass to the progress callback */ 1607 void *ioctl_client; /* pointer to pass to the ioctl callback */ 1608 long timeout; /* in milliseconds, 0 means no timeout */ 1609 long connecttimeout; /* in milliseconds, 0 means no timeout */ 1610 long accepttimeout; /* in milliseconds, 0 means no timeout */ 1611 long server_response_timeout; /* in milliseconds, 0 means no timeout */ 1612 long tftp_blksize; /* in bytes, 0 means use default */ 1613 bool tftp_no_options; /* do not send TFTP options requests */ 1614 curl_off_t filesize; /* size of file to upload, -1 means unknown */ 1615 long low_speed_limit; /* bytes/second */ 1616 long low_speed_time; /* number of seconds */ 1617 curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */ 1618 curl_off_t max_recv_speed; /* high speed limit in bytes/second for 1619 download */ 1620 curl_off_t set_resume_from; /* continue [ftp] transfer from here */ 1621 struct curl_slist *headers; /* linked list of extra headers */ 1622 struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */ 1623 struct curl_httppost *httppost; /* linked list of POST data */ 1624 bool sep_headers; /* handle host and proxy headers separately */ 1625 bool cookiesession; /* new cookie session? */ 1626 bool crlf; /* convert crlf on ftp upload(?) */ 1627 struct curl_slist *quote; /* after connection is established */ 1628 struct curl_slist *postquote; /* after the transfer */ 1629 struct curl_slist *prequote; /* before the transfer, after type */ 1630 struct curl_slist *source_quote; /* 3rd party quote */ 1631 struct curl_slist *source_prequote; /* in 3rd party transfer mode - before 1632 the transfer on source host */ 1633 struct curl_slist *source_postquote; /* in 3rd party transfer mode - after 1634 the transfer on source host */ 1635 struct curl_slist *telnet_options; /* linked list of telnet options */ 1636 struct curl_slist *resolve; /* list of names to add/remove from 1637 DNS cache */ 1638 struct curl_slist *connect_to; /* list of host:port mappings to override 1639 the hostname and port to connect to */ 1640 curl_TimeCond timecondition; /* kind of time/date comparison */ 1641 time_t timevalue; /* what time to compare with */ 1642 Curl_HttpReq httpreq; /* what kind of HTTP request (if any) is this */ 1643 long httpversion; /* when non-zero, a specific HTTP version requested to 1644 be used in the library's request(s) */ 1645 struct ssl_config_data ssl; /* user defined SSL stuff */ 1646 struct ssl_config_data proxy_ssl; /* user defined SSL stuff for proxy */ 1647 struct ssl_general_config general_ssl; /* general user defined SSL stuff */ 1648 curl_proxytype proxytype; /* what kind of proxy that is in use */ 1649 long dns_cache_timeout; /* DNS cache timeout */ 1650 long buffer_size; /* size of receive buffer to use */ 1651 void *private_data; /* application-private data */ 1652 1653 struct curl_slist *http200aliases; /* linked list of aliases for http200 */ 1654 1655 long ipver; /* the CURL_IPRESOLVE_* defines in the public header file 1656 0 - whatever, 1 - v2, 2 - v6 */ 1657 1658 curl_off_t max_filesize; /* Maximum file size to download */ 1659 1660 curl_ftpfile ftp_filemethod; /* how to get to a file when FTP is used */ 1661 1662 int ftp_create_missing_dirs; /* 1 - create directories that don't exist 1663 2 - the same but also allow MKD to fail once 1664 */ 1665 1666 curl_sshkeycallback ssh_keyfunc; /* key matching callback */ 1667 void *ssh_keyfunc_userp; /* custom pointer to callback */ 1668 1669 /* Here follows boolean settings that define how to behave during 1670 this session. They are STATIC, set by libcurl users or at least initially 1671 and they don't change during operations. */ 1672 1673 bool printhost; /* printing host name in debug info */ 1674 bool get_filetime; /* get the time and get of the remote file */ 1675 bool tunnel_thru_httpproxy; /* use CONNECT through a HTTP proxy */ 1676 bool prefer_ascii; /* ASCII rather than binary */ 1677 bool ftp_append; /* append, not overwrite, on upload */ 1678 bool ftp_list_only; /* switch FTP command for listing directories */ 1679 bool ftp_use_port; /* use the FTP PORT command */ 1680 bool hide_progress; /* don't use the progress meter */ 1681 bool http_fail_on_error; /* fail on HTTP error codes >= 400 */ 1682 bool http_keep_sending_on_error; /* for HTTP status codes >= 300 */ 1683 bool http_follow_location; /* follow HTTP redirects */ 1684 bool http_transfer_encoding; /* request compressed HTTP transfer-encoding */ 1685 bool http_disable_hostname_check_before_authentication; 1686 bool include_header; /* include received protocol headers in data output */ 1687 bool http_set_referer; /* is a custom referer used */ 1688 bool http_auto_referer; /* set "correct" referer when following location: */ 1689 bool opt_no_body; /* as set with CURLOPT_NOBODY */ 1690 bool upload; /* upload request */ 1691 enum CURL_NETRC_OPTION 1692 use_netrc; /* defined in include/curl.h */ 1693 bool verbose; /* output verbosity */ 1694 bool krb; /* Kerberos connection requested */ 1695 bool reuse_forbid; /* forbidden to be reused, close after use */ 1696 bool reuse_fresh; /* do not re-use an existing connection */ 1697 bool ftp_use_epsv; /* if EPSV is to be attempted or not */ 1698 bool ftp_use_eprt; /* if EPRT is to be attempted or not */ 1699 bool ftp_use_pret; /* if PRET is to be used before PASV or not */ 1700 1701 curl_usessl use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or 1702 IMAP or POP3 or others! */ 1703 curl_ftpauth ftpsslauth; /* what AUTH XXX to be attempted */ 1704 curl_ftpccc ftp_ccc; /* FTP CCC options */ 1705 bool no_signal; /* do not use any signal/alarm handler */ 1706 bool global_dns_cache; /* subject for future removal */ 1707 bool tcp_nodelay; /* whether to enable TCP_NODELAY or not */ 1708 bool ignorecl; /* ignore content length */ 1709 bool ftp_skip_ip; /* skip the IP address the FTP server passes on to 1710 us */ 1711 bool connect_only; /* make connection, let application use the socket */ 1712 long ssh_auth_types; /* allowed SSH auth types */ 1713 bool http_te_skip; /* pass the raw body data to the user, even when 1714 transfer-encoded (chunked, compressed) */ 1715 bool http_ce_skip; /* pass the raw body data to the user, even when 1716 content-encoded (chunked, compressed) */ 1717 long new_file_perms; /* Permissions to use when creating remote files */ 1718 long new_directory_perms; /* Permissions to use when creating remote dirs */ 1719 bool proxy_transfer_mode; /* set transfer mode (;type=<a|i>) when doing FTP 1720 via an HTTP proxy */ 1721 char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */ 1722 unsigned int scope_id; /* Scope id for IPv6 */ 1723 long allowed_protocols; 1724 long redir_protocols; 1725 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1726 bool socks5_gssapi_nec; /* Flag to support NEC SOCKS5 server */ 1727 #endif 1728 struct curl_slist *mail_rcpt; /* linked list of mail recipients */ 1729 bool sasl_ir; /* Enable/disable SASL initial response */ 1730 /* Common RTSP header options */ 1731 Curl_RtspReq rtspreq; /* RTSP request type */ 1732 long rtspversion; /* like httpversion, for RTSP */ 1733 bool wildcardmatch; /* enable wildcard matching */ 1734 curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer 1735 starts */ 1736 curl_chunk_end_callback chunk_end; /* called after part transferring 1737 stopped */ 1738 curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds 1739 to pattern (e.g. if WILDCARDMATCH is on) */ 1740 void *fnmatch_data; 1741 1742 long gssapi_delegation; /* GSS-API credential delegation, see the 1743 documentation of CURLOPT_GSSAPI_DELEGATION */ 1744 1745 bool tcp_keepalive; /* use TCP keepalives */ 1746 long tcp_keepidle; /* seconds in idle before sending keepalive probe */ 1747 long tcp_keepintvl; /* seconds between TCP keepalive probes */ 1748 bool tcp_fastopen; /* use TCP Fast Open */ 1749 1750 size_t maxconnects; /* Max idle connections in the connection cache */ 1751 1752 bool ssl_enable_npn; /* TLS NPN extension? */ 1753 bool ssl_enable_alpn; /* TLS ALPN extension? */ 1754 bool path_as_is; /* allow dotdots? */ 1755 bool pipewait; /* wait for pipe/multiplex status before starting a 1756 new connection */ 1757 long expect_100_timeout; /* in milliseconds */ 1758 1759 struct Curl_easy *stream_depends_on; 1760 bool stream_depends_e; /* set or don't set the Exclusive bit */ 1761 int stream_weight; 1762 1763 struct Curl_http2_dep *stream_dependents; 1764 1765 bool abstract_unix_socket; 1766 }; 1767 1768 struct Names { 1769 struct curl_hash *hostcache; 1770 enum { 1771 HCACHE_NONE, /* not pointing to anything */ 1772 HCACHE_GLOBAL, /* points to the (shrug) global one */ 1773 HCACHE_MULTI, /* points to a shared one in the multi handle */ 1774 HCACHE_SHARED /* points to a shared one in a shared object */ 1775 } hostcachetype; 1776 }; 1777 1778 /* 1779 * The 'connectdata' struct MUST have all the connection oriented stuff as we 1780 * may have several simultaneous connections and connection structs in memory. 1781 * 1782 * The 'struct UserDefined' must only contain data that is set once to go for 1783 * many (perhaps) independent connections. Values that are generated or 1784 * calculated internally for the "session handle" must be defined within the 1785 * 'struct UrlState' instead. 1786 */ 1787 1788 struct Curl_easy { 1789 /* first, two fields for the linked list of these */ 1790 struct Curl_easy *next; 1791 struct Curl_easy *prev; 1792 1793 struct connectdata *easy_conn; /* the "unit's" connection */ 1794 1795 CURLMstate mstate; /* the handle's state */ 1796 CURLcode result; /* previous result */ 1797 1798 struct Curl_message msg; /* A single posted message. */ 1799 1800 /* Array with the plain socket numbers this handle takes care of, in no 1801 particular order. Note that all sockets are added to the sockhash, where 1802 the state etc are also kept. This array is mostly used to detect when a 1803 socket is to be removed from the hash. See singlesocket(). */ 1804 curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE]; 1805 int numsocks; 1806 1807 struct Names dns; 1808 struct Curl_multi *multi; /* if non-NULL, points to the multi handle 1809 struct to which this "belongs" when used by 1810 the multi interface */ 1811 struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle 1812 struct to which this "belongs" when used 1813 by the easy interface */ 1814 struct Curl_share *share; /* Share, handles global variable mutexing */ 1815 struct SingleRequest req; /* Request-specific data */ 1816 struct UserDefined set; /* values set by the libcurl user */ 1817 struct DynamicStatic change; /* possibly modified userdefined data */ 1818 struct CookieInfo *cookies; /* the cookies, read from files and servers. 1819 NOTE that the 'cookie' field in the 1820 UserDefined struct defines if the "engine" 1821 is to be used or not. */ 1822 struct Progress progress; /* for all the progress meter data */ 1823 struct UrlState state; /* struct for fields used for state info and 1824 other dynamic purposes */ 1825 struct WildcardData wildcard; /* wildcard download state info */ 1826 struct PureInfo info; /* stats, reports and info data */ 1827 struct curl_tlssessioninfo tsi; /* Information about the TLS session, only 1828 valid after a client has asked for it */ 1829 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV) 1830 iconv_t outbound_cd; /* for translating to the network encoding */ 1831 iconv_t inbound_cd; /* for translating from the network encoding */ 1832 iconv_t utf8_cd; /* for translating to UTF8 */ 1833 #endif /* CURL_DOES_CONVERSIONS && HAVE_ICONV */ 1834 unsigned int magic; /* set to a CURLEASY_MAGIC_NUMBER */ 1835 }; 1836 1837 #define LIBCURL_NAME "libcurl" 1838 1839 #endif /* HEADER_CURL_URLDATA_H */ 1840